TW201901626A - Security system and method capable of automatically and instantly processing environmental monitoring information to determine a level of security - Google Patents

Security system and method capable of automatically and instantly processing environmental monitoring information to determine a level of security Download PDF

Info

Publication number
TW201901626A
TW201901626A TW106120897A TW106120897A TW201901626A TW 201901626 A TW201901626 A TW 201901626A TW 106120897 A TW106120897 A TW 106120897A TW 106120897 A TW106120897 A TW 106120897A TW 201901626 A TW201901626 A TW 201901626A
Authority
TW
Taiwan
Prior art keywords
moving object
security
image
signal
security system
Prior art date
Application number
TW106120897A
Other languages
Chinese (zh)
Inventor
史德鋒
Original Assignee
綠仕科技控股有限公司
路晟(上海)科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 綠仕科技控股有限公司, 路晟(上海)科技有限公司 filed Critical 綠仕科技控股有限公司
Priority to TW106120897A priority Critical patent/TW201901626A/en
Publication of TW201901626A publication Critical patent/TW201901626A/en

Links

Abstract

The present invention discloses a system. The system includes a sensing module, which is configured to receive a microwave signal from a moving object located in an environment, and acquire at least one optical image containing the moving object; and a processor, which is configured to determine a frequency information associated with the environment according to the microwave signal, determine the profile of the moving object according to the at least one optical image, and determine a level of security according to at least part of the frequency information and the profile of the moving object. Furthermore, the sensing module includes an image sensor or an infrared sensor. The image sensor is associated with one or more camera lenses. The infrared sensor includes an infrared thermographic device.

Description

安全系統及方法 Safety system and method

本申請案涉及一種安全系統,尤其是涉及利用微波信號和光學信號識別人員入侵的安全系統。 The present application relates to a security system, and more particularly to a security system that utilizes microwave signals and optical signals to identify human intrusions.

近年來,不同場所中的安全問題,尤其是人員入侵問題,引起了人們的高度重視。需要一種安全系統,能夠自動即時地處理環境監控資訊,並進行安全條件的判斷。 In recent years, security issues in different places, especially the issue of personnel intrusion, have attracted people's attention. A security system is needed to automatically and automatically process environmental monitoring information and to determine security conditions.

根據本申請案的一個態樣,提供了一種系統,該系統包括一個感測模組,被配置為接收來自位於環境中的一個運動物體的微波信號,和獲取包含有所述運動物體的至少一個光學圖像;一個處理器,被配置為根據所述微波信號,確定與所述環境相關聯的一個頻率資訊,根據所述至少一個光學圖像,確定所述運動物體的輪廓,和根據至少部分所述頻率資訊和所述運動物體的輪廓,確定一個安全級別。 In accordance with an aspect of the present application, a system is provided that includes a sensing module configured to receive a microwave signal from a moving object located in an environment, and to acquire at least one of the moving objects An optical image; a processor configured to determine a frequency information associated with the environment based on the microwave signal, determine an outline of the moving object based on the at least one optical image, and according to at least a portion The frequency information and the contour of the moving object determine a security level.

根據本申請案的另一個態樣,提供了一種方法,該方法包括接收來自位於環境中的一個運動物體的微波信號;獲取包含有所述運動物體的至少一個光學圖像;根據所述微波信號,由一個處理器確定與所述環境相關聯的一個頻率資訊;根據所述至少一個光學圖像,確定所述運動物體的輪廓。 According to another aspect of the present application, a method is provided, the method comprising receiving a microwave signal from a moving object located in an environment; acquiring at least one optical image containing the moving object; Determining, by a processor, a frequency information associated with the environment; determining an outline of the moving object based on the at least one optical image.

根據本申請案的又一個態樣,提供了一種電腦可讀的存儲媒體,其存儲可執行指令,所述可執行指令使得一個電腦設備執行,包括接收來自位於環境中的一個運動物體的微波信號;獲取包含有所述運動物體的至少一個光學圖像;根據所述微波信號,確定與所述環境相關聯的一個頻率資訊;根據所述至少一個光學圖像,確定所述運動物體的輪廓;根據至少部分所述頻率資訊和所述運動物體的輪廓,確定一個安全級別。 In accordance with yet another aspect of the present application, a computer readable storage medium storing executable instructions for causing a computer device to perform includes receiving a microwave signal from a moving object located in an environment Obtaining at least one optical image including the moving object; determining, according to the microwave signal, a frequency information associated with the environment; determining an outline of the moving object according to the at least one optical image; A security level is determined based on at least a portion of the frequency information and an outline of the moving object.

本申請案的一部分附加特性可以在下面的描述中進行說明。通過對以下描述和相應附圖的檢查或者對實施例的生產或操作的瞭解,本申請案的一部分附加特性對於本領域技術人員是明顯的。本揭示的特性可以通過對以下描述的具體實施例的各種態樣的方法、手段和組合的實踐或使用得以實現和達到。 Some additional features of this application can be illustrated in the following description. Some additional features of the present application will be apparent to those skilled in the art from a review of the following description and the accompanying drawings. The features of the present disclosure can be realized and attained by the practice or use of the various methods, methods and combinations of the various embodiments described below.

100‧‧‧安全系統 100‧‧‧Security system

110‧‧‧感測器 110‧‧‧ Sensor

120‧‧‧運動物體 120‧‧‧moving objects

120-1‧‧‧人 120-1‧‧‧ people

120-2‧‧‧動物 120-2‧‧‧ animals

120-3‧‧‧家居用品 120-3‧‧‧Household items

130‧‧‧報警器 130‧‧‧Announcer

140‧‧‧網路 140‧‧‧Network

150‧‧‧移動設備 150‧‧‧Mobile devices

210‧‧‧檢測模組 210‧‧‧Test module

220‧‧‧處理器 220‧‧‧ processor

230‧‧‧輸入輸出介面 230‧‧‧Input and output interface

240‧‧‧記憶體 240‧‧‧ memory

302~308‧‧‧步驟 302~308‧‧‧Steps

410‧‧‧微波信號獲取單元 410‧‧‧Microwave signal acquisition unit

420‧‧‧光學信號獲取單元 420‧‧‧ Optical signal acquisition unit

430‧‧‧圖像信號獲取單元 430‧‧‧Image signal acquisition unit

440‧‧‧紅外線信號獲取單元 440‧‧‧Infrared signal acquisition unit

510‧‧‧信號處理單元 510‧‧‧Signal Processing Unit

520‧‧‧安全條件存儲單元 520‧‧‧Safety condition storage unit

530‧‧‧決策單元 530‧‧‧Decision unit

540‧‧‧指令產生單元 540‧‧‧Command Generation Unit

602~610‧‧‧步驟 602~610‧‧‧Steps

702~710‧‧‧步驟 702~710‧‧‧Steps

801‧‧‧時域波形 801‧‧‧Time domain waveform

802‧‧‧峰值信號 802‧‧‧ peak signal

803‧‧‧頻域波形 803‧‧‧ frequency domain waveform

804‧‧‧時域信號 804‧‧‧Time domain signal

805‧‧‧頻域曲線 805‧‧‧ frequency domain curve

806‧‧‧時域信號 806‧‧‧Time domain signal

807‧‧‧固定頻率信號 807‧‧‧Fixed frequency signal

902~910‧‧‧步驟 902~910‧‧‧Steps

952~962‧‧‧步驟 952~962‧‧‧Steps

1002~1016‧‧‧步驟 1002~1016‧‧‧Steps

1102~1112‧‧‧步驟 1102~1112‧‧‧Steps

在此所述的附圖用來提供對本申請案的進一步理解,構成本申請案的一部分。本申請案的示意性實施例及其說明用於解釋本申請案,並不構成對本申請案的限定。 The drawings described herein are provided to provide a further understanding of the present application and constitute a part of this application. The illustrative embodiments of the present application and the description thereof are for explaining the present application and are not intended to limit the present application.

圖1是根據本申請案一些實施例用於安全系統的應用場景的示意圖。 1 is a schematic diagram of an application scenario for a security system in accordance with some embodiments of the present application.

圖2是根據本申請案一些實施例用於安全系統的模組示意圖。 2 is a schematic diagram of a module for a security system in accordance with some embodiments of the present application.

圖3是根據本申請案一些實施例處理採集到的周邊環境信號的示意性工作流程圖。 3 is a schematic operational flow diagram of processing acquired ambient environmental signals in accordance with some embodiments of the present application.

圖4是根據本申請案一些實施例的檢測模組的示意圖。 4 is a schematic diagram of a detection module in accordance with some embodiments of the present application.

圖5是根據本申請案一些實施例的處理器的示意圖。 FIG. 5 is a schematic diagram of a processor in accordance with some embodiments of the present application.

圖6是根據本申請案一些實施例的示意性安全監控工作流程圖。 6 is a flow chart of an exemplary security monitoring operation in accordance with some embodiments of the present application.

圖7是根據本申請案一些實施例的微波信號處理的示意性流程圖。 7 is a schematic flow diagram of microwave signal processing in accordance with some embodiments of the present application.

圖8-A是根據本申請案一些實施例的運動物體微波信號的時域波形示意圖。 8-A is a timing diagram of a time domain waveform of a moving object microwave signal in accordance with some embodiments of the present application.

圖8-B是根據本申請案一些實施例的運動物體微波信號的頻域波形示意圖。 8-B is a schematic illustration of frequency domain waveforms of a moving object microwave signal in accordance with some embodiments of the present application.

圖8-C是根據本申請案一些實施例的非規律運動物體微波信號的時域波形示意圖。 8-C is a time-domain waveform diagram of a microwave signal of an irregular moving object in accordance with some embodiments of the present application.

圖8-D是根據本申請案一些實施例的非規律運動物體微波信號的頻域波形示意圖。 8-D is a schematic diagram of frequency domain waveforms of a microwave signal of an irregular moving object in accordance with some embodiments of the present application.

圖8-E是根據本申請案一些實施例的規律運動物體微波信號的時域波形示意圖。 8-E is a timing diagram of a time domain waveform of a regularly moving object microwave signal in accordance with some embodiments of the present application.

圖8-F是根據本申請案一些實施例的規律運動物體微波信號的頻域波形示意圖。 8-F is a schematic illustration of frequency domain waveforms of a regularly moving object microwave signal in accordance with some embodiments of the present application.

圖9-A是根據本申請案一些實施例的基於圖像信號成像處理的示意性流程圖。 9-A is a schematic flow diagram of an image based imaging process in accordance with some embodiments of the present application.

圖9-B是根據本申請案一些實施例的基於紅外線信號成像處理的示意性流程圖。 9-B is a schematic flow diagram of an infrared based signal imaging process in accordance with some embodiments of the present application.

圖10是根據本申請案一些實施例的安全系統基於微波信號和圖像信號判斷是否有人員入侵的示意性流程圖。 10 is a schematic flow diagram of a security system determining whether a person has invaded based on microwave signals and image signals, in accordance with some embodiments of the present application.

圖11是根據本申請案一些實施例的安全系統發起干預的示意性流程圖。 11 is a schematic flow diagram of a security system initiated intervention in accordance with some embodiments of the present application.

如本說明書和申請專利範圍中所示,除非上下文明確提示例外情形,“一”、“一個”、“一種”和/或“該”等詞並非特指單數,也可包括複數。一般說來,術語“包括”與“包含”僅提示包括已明確標識的步驟和元素,而這些步驟和元素不構成一個排它性的羅列,方法或者設備也可能包含其它的步驟或元素。術語“基於”是“至少部分地基於”。術語“一個實施例”表示“至少一個實施例”;術語“另一實施例”表示“至少一個另外的實施例”。其他術語的相關定義將在下文描述中給出。 The words "a", "an", "the" and "the" In general, the terms "comprising" and "comprising" are intended to include only the steps and elements that are specifically identified, and the steps and elements do not constitute an exclusive list, and the method or device may also include other steps or elements. The term "based on" is "based at least in part on." The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment." Relevant definitions of other terms will be given in the description below.

雖然本申請案對根據本申請案的實施例的系統中的某些模組做出了各種引用,然而,任何數量的不同模組可以被使用並運行於安全系統中。這些模組僅是說明性的,並且該系統和方法的不同態樣可以使用不同模組。 Although the present application makes various references to certain modules in a system in accordance with an embodiment of the present application, any number of different modules can be used and operated in a security system. These modules are merely illustrative, and different modules of the system and method may use different modules.

本申請案中使用了流程圖用來說明根據本申請案的實施例的系統所執行的操作。應當理解的是,前面或下面操作不一定按照順序來精確地執行。相反,可以按照倒序或同時處理各種步驟。同時,也可以將其他操作添加到這些過程中,或從這些過程移除某一步或數步操作。 Flowcharts are used in this application to illustrate the operations performed by the system in accordance with an embodiment of the present application. It should be understood that the preceding or lower operations are not necessarily performed exactly in the order. Instead, the various steps can be processed in reverse or simultaneously. At the same time, you can add other operations to these processes, or remove a step or a few steps from these processes.

圖1是根據本申請案一些實施例用於安全系統的應用場景的示意圖。安全系統100可以與感測器110、報警器130、網路140和移動設備150等通信。 1 is a schematic diagram of an application scenario for a security system in accordance with some embodiments of the present application. The security system 100 can communicate with the sensors 110, the alarms 130, the network 140, and the mobile device 150, and the like.

感測器110可以採集周邊環境資訊。感測器110可以是微波感測器、光學感測器、超音波感測器、震動感測器、聲音感測器、氣體感測器等感測器中的一種或多種。通過感測器110,安全系統100可以獲取周邊環境中運動物體120的資訊,包括人120-1、動物120-2和風扇、窗簾等 家居用品120-3。安全系統100對獲取的資訊進行分析處理,判斷是否存在人員入侵,並通過報警器130對入侵人員進行報警。在一些實施例中,感測器110可以包括微波感測器、紅外線感測器、圖像感測器、聲音感測器、氣體感測器等。 The sensor 110 can collect peripheral environment information. The sensor 110 may be one or more of a microwave sensor, an optical sensor, an ultrasonic sensor, a vibration sensor, a sound sensor, a gas sensor, or the like. Through the sensor 110, the security system 100 can acquire information about the moving object 120 in the surrounding environment, including the person 120-1, the animal 120-2, the fan, the curtain, etc. Household items 120-3. The security system 100 analyzes and processes the acquired information to determine whether there is a human intrusion, and alarms the intruder through the alarm 130. In some embodiments, the sensor 110 can include a microwave sensor, an infrared sensor, an image sensor, a sound sensor, a gas sensor, and the like.

安全系統100可以連接到網路140。安全系統100連接到網路140的方式可以是有線或者無線的。在一些實施例中,安全系統100可以將採集的資訊或處理的結果傳輸到網路140,用於共用資訊或輔助判斷。在一些實施例中,安全系統100通過網路140獲取資訊,例如系統升級、安全條件調整等。網路140可以是單一網路,也可以是多種網路的組合。網路140可以包括但不限於區域網路、廣域網路、公用網路、專用網路、無線區域網路、虛擬網路、都市都會區網路、公共交換電話網路等中的一種或幾種的組合。網路140可以包括多種網路接入點,例如有線或無線接入點、基站或網路交換點,通過以上接入點使資料來源連接網路140並通過網路發送資訊。 Security system 100 can be connected to network 140. The manner in which the security system 100 is connected to the network 140 can be wired or wireless. In some embodiments, the security system 100 can transmit the collected information or the results of the processing to the network 140 for sharing information or assisting in the determination. In some embodiments, security system 100 obtains information over network 140, such as system upgrades, security condition adjustments, and the like. The network 140 can be a single network or a combination of multiple networks. The network 140 may include, but is not limited to, one or more of a regional network, a wide area network, a public network, a private network, a wireless area network, a virtual network, a metropolitan area network, and a public switched telephone network. The combination. The network 140 can include a variety of network access points, such as wired or wireless access points, base stations, or network switching points, through which the data sources can be connected to the network 140 and sent over the network.

安全系統100可以連接到移動設備150。安全系統100可以將採集的資訊或處理的結果提供給移動設備150,並通過移動設備150接收使用者輸入,包括控制指令、參數設置等。在一些實施例中,移動設備150可以是手機、筆記型電腦、平板電腦、智慧手錶等。 The security system 100 can be connected to the mobile device 150. The security system 100 can provide the collected information or results of the processing to the mobile device 150 and receive user input through the mobile device 150, including control commands, parameter settings, and the like. In some embodiments, mobile device 150 can be a cell phone, a laptop, a tablet, a smart watch, and the like.

在一些實施例中,安全系統100可以包括一個防護外殼和一個輸入輸出面板。防護外殼可以具有一定的美觀性或者隱蔽性,具備防水、防潮、防震、或防撞擊的作用。輸入輸出面板可以提供使用者向安全系統100輸入資訊和/或安全系統100向使用者輸出資訊的介面。在一些實施例 中,輸入輸出介面可以是一個觸控顯示螢幕。在一些實施例中,安全系統100可被安裝於建築物的入口、警衛室、家庭的起居室、走廊、或客廳中。 In some embodiments, the security system 100 can include a protective housing and an input and output panel. The protective casing can have a certain aesthetic or concealment, and is waterproof, moisture-proof, shock-proof, or anti-collision. The input and output panel can provide an interface for the user to input information to the security system 100 and/or the security system 100 to output information to the user. In some embodiments The input and output interface can be a touch display screen. In some embodiments, the security system 100 can be installed in an entrance to a building, a guardhouse, a living room in a home, a hallway, or a living room.

圖2是根據本申請案一些實施例用於安全系統的模組示意圖。安全系統100包括檢測模組210、處理器220、輸入輸出介面230和記憶體240。系統內各模組之間的連接形式可以是有線的,也可以是無線的。任何一個模組都可以是本地的,也可以是遠端的。模組間的對應關係可以是一對一的,也可以是一對多的。例如,安全系統100可以包括多個檢測模組210和多個處理器220;一個處理器可以對應一個檢測模組,以處理其所採集到的資訊。又例如,安全系統100可以包括多個檢測模組210和一個處理器220;這些檢測模組210可以將資訊發送至該處理器220進行處理。 2 is a schematic diagram of a module for a security system in accordance with some embodiments of the present application. The security system 100 includes a detection module 210, a processor 220, an input and output interface 230, and a memory 240. The connection between modules in the system can be wired or wireless. Any module can be local or remote. The correspondence between modules can be one-to-one or one-to-many. For example, the security system 100 can include a plurality of detection modules 210 and a plurality of processors 220; a processor can correspond to a detection module to process the information it collects. For another example, the security system 100 can include a plurality of detection modules 210 and a processor 220; the detection modules 210 can send information to the processor 220 for processing.

檢測模組210可以獲取感測器110採集到的周邊環境資訊。檢測模組210可以與一個或多個感測器110建立通信連接,並利用感測器110對環境中的物體進行監測和資訊採集。環境中的物體可以是靜態物體,如牆壁、門窗、傢俱、靜止的家電等,也可以是動態物體,如轉動的風扇、擺動的鐘錶、晃動的植物、運動的動物、人員等。檢測模組210接收的資訊可以包括微波信號、紅外線信號、圖像信號、超音波信號、音訊信號、壓力信號等。在一些實施例中,所述信號可以是未經處理的感測器直接輸出的信號。在一些實施例中,所述信號可以是經過處理後產生的信號,如對應的電壓、電流信號等。例如,所述信號可以是經過感測器中的處理元件處理後產生的電壓信號。檢測模組210獲取的資訊可以發送給處理器220處理,存儲到記憶體240,通過輸入輸出介面230直接呈現給使用者等。在一些實施例中,檢測模組210可以包括一個或多個處理元件,對接收到的 資訊進行預處理,然後發送給處理器220進行進一步處理。 The detection module 210 can acquire the surrounding environment information collected by the sensor 110. The detection module 210 can establish a communication connection with one or more sensors 110 and utilize the sensor 110 to monitor and collect information on objects in the environment. The objects in the environment may be static objects such as walls, doors and windows, furniture, stationary appliances, etc., or dynamic objects such as rotating fans, oscillating clocks, swaying plants, moving animals, people, and the like. The information received by the detection module 210 may include microwave signals, infrared signals, image signals, ultrasonic signals, audio signals, pressure signals, and the like. In some embodiments, the signal may be a signal that is output directly by an unprocessed sensor. In some embodiments, the signal may be a processed signal, such as a corresponding voltage, current signal, or the like. For example, the signal may be a voltage signal generated after processing by a processing element in the sensor. The information acquired by the detection module 210 can be sent to the processor 220 for processing, stored in the memory 240, and directly presented to the user through the input and output interface 230. In some embodiments, the detection module 210 can include one or more processing elements for the received The information is pre-processed and then sent to processor 220 for further processing.

處理器220可以處理信號、產生判斷決策或指令等。處理器220可以對接收到的信號或資訊進行處理和/或邏輯判斷,並產生控制決策資訊。該接收到的信號或資訊可以由檢測模組210通過感測器110從周邊環境中獲取,或由輸入輸出介面230輸入等。處理器220可以通過使用一種或多種方法對檢測模組210獲取的信號進行處理,所用一種或多種處理方法可以包括擬合、插值、離散、類比數位轉換、Z轉換、傅立葉轉換、低通濾波、輪廓識別、特徵提取、圖像分割、圖像增強、圖像重建、非均勻性校正、紅外線數位圖像細節增強等。例如,處理器220可以通過特徵提取、輪廓識別等方法提取並識別採集到的圖像信號中的人體臉部資訊、人體輪廓資訊等。處理器220也可以對通過輸入輸出介面230獲取的資訊進行邏輯處理,並產生控制或決策資訊。例如,處理器220接收用戶輸入的校準紅外線感測器的指令後,產生控制決策資訊並發送給紅外線感測器。該控制決策資訊可以包括紅外線感測器校準的方法和步驟等。在一些實施例中,處理器220可以對通過檢測模組210獲取的信號(如微波信號、光學圖像信號、超音波信號等)進行處理。處理器220可以基於預設的安全條件,判斷處理後的資訊是否滿足一個或多個安全條件。處理器220還可以據此確定安全級別,產生與當前安全級別相對應的控制資訊。 The processor 220 can process signals, generate decision decisions or instructions, and the like. The processor 220 can process and/or logically determine the received signal or information and generate control decision information. The received signal or information may be acquired by the detection module 210 from the surrounding environment through the sensor 110, or input by the input/output interface 230, and the like. The processor 220 may process the signals acquired by the detection module 210 by using one or more methods, and the one or more processing methods may include fitting, interpolation, discrete, analog to digital conversion, Z conversion, Fourier transform, low pass filtering, Contour recognition, feature extraction, image segmentation, image enhancement, image reconstruction, non-uniformity correction, infrared digital image detail enhancement, etc. For example, the processor 220 may extract and recognize human face information, human body contour information, and the like in the collected image signals by means of feature extraction, contour recognition, and the like. The processor 220 can also logically process the information acquired through the input and output interface 230 and generate control or decision information. For example, after receiving the instruction of the calibration infrared sensor input by the user, the processor 220 generates control decision information and sends it to the infrared sensor. The control decision information may include methods and steps of infrared sensor calibration. In some embodiments, processor 220 may process signals acquired by detection module 210 (eg, microwave signals, optical image signals, ultrasonic signals, etc.). The processor 220 may determine whether the processed information satisfies one or more security conditions based on a preset security condition. The processor 220 can also determine the security level based thereon to generate control information corresponding to the current security level.

在一些實施例中,處理器220可以被動接收資訊。在一些實施例中,處理器220可以根據處理結果或使用者指令主動獲取周邊環境資訊或者請求使用者輸入。例如,處理器220可以在基於計算和影像處理的基礎上,鎖定嫌疑目標,並產生調整監測設備或感測器(如攝像頭等)的 角度或位置的指令,用以繼續追蹤並獲取目標物體信號。又例如,處理器220可以將獲取的信號或處理產生的結果傳送至輸入輸出介面230或者移動設備150,請求使用者確認是否為人員入侵,並產生相應的控制決策資訊。 In some embodiments, processor 220 can passively receive information. In some embodiments, the processor 220 may actively acquire surrounding environment information or request user input according to the processing result or the user instruction. For example, the processor 220 can lock the suspect target based on the calculation and image processing, and generate an adjustment monitoring device or a sensor (such as a camera, etc.). An angle or position command to continue tracking and acquiring the target object signal. For another example, the processor 220 may transmit the acquired signal or the result of the processing to the input/output interface 230 or the mobile device 150, request the user to confirm whether it is a human intrusion, and generate corresponding control decision information.

處理器220可以是處理元件或設備。例如,處理器220可以包括電腦等設備中的中央處理器(central processing unit,CPU)、圖形處理器(graphics processing unit,GPU)、數位訊號處理器(digital signal processor,DSP)、系統晶片(system on a chip,SoC)、微控制器(microcontroller unit,MCU)等。又例如,處理器220可以包括平板電腦、移動終端或電腦等設備。又例如,處理器220可以是特殊設計的具備特殊功能的處理元件或設備。 Processor 220 can be a processing element or device. For example, the processor 220 may include a central processing unit (CPU), a graphics processing unit (GPU), a digital signal processor (DSP), and a system chip (system) in a device such as a computer. On a chip, SoC), microcontroller (MCU), etc. As another example, processor 220 can include a device such as a tablet, mobile terminal, or computer. As another example, processor 220 can be a specially designed processing element or device having special functions.

輸入輸出介面230可以向安全系統100輸入資訊,或將安全系統100產生的資訊輸出。通過輸入輸出介面230輸入的資訊可以包括數位、文本、圖像、視頻、聲音等。例如,所述資訊可以包括安全條件中的數值臨界值或範圍、人臉資訊、虹膜資訊、指紋資訊、語音指令、手勢指令等。輸入輸出介面230獲取來自使用者的資訊的形式可以是使用者手寫操作、觸屏操作、滑鼠操作、按鈕或對按鍵的操作、聲控操作、手勢操作、眼神操作等。上述輸入資訊可以被保存至記憶體240,或被發送至處理器220進行處理等。 The input and output interface 230 can input information to the security system 100 or output information generated by the security system 100. The information input through the input and output interface 230 may include digits, text, images, video, sound, and the like. For example, the information may include numerical thresholds or ranges in security conditions, face information, iris information, fingerprint information, voice commands, gesture commands, and the like. The input and output interface 230 can obtain information from the user in the form of a user's handwriting operation, a touch screen operation, a mouse operation, a button or an operation on a button, a voice control operation, a gesture operation, a eye operation, and the like. The above input information may be saved to the memory 240 or sent to the processor 220 for processing or the like.

安全系統100可以通過輸入輸出介面230輸出處理結果,或向使用者發送獲取資訊的請求。在一些實施例中,輸入輸出介面230輸出資訊的形式可以是光線、文字、聲音、圖像、震動等的一種或幾種的組合。在一些實施例中,輸入輸出介面230可以通過物理顯示器輸出資訊,如LED 指示燈、LCD顯示幕、OLED顯示幕、揚聲器。在一些實施例中,輸入輸出介面230可以是利用虛擬實境技術輸出資訊,如全息影像等。 The security system 100 can output the processing result through the input and output interface 230 or send a request for obtaining information to the user. In some embodiments, the output information of the input and output interface 230 may be in the form of one or a combination of light, text, sound, image, vibration, and the like. In some embodiments, the input and output interface 230 can output information through a physical display, such as an LED. Indicator light, LCD display screen, OLED display screen, speaker. In some embodiments, the input and output interface 230 can be a virtual reality technology that outputs information, such as holographic images.

輸入輸出介面230可以是或者包含於智慧終端機,如平板電腦、行動電話、筆記型電腦、智慧手錶等。在一些實施例中,輸入輸出介面230可以是安全系統100面板上的觸控式螢幕、LED顯示燈、揚聲器、按鈕、按鍵等一種或幾種的組合。 The input and output interface 230 can be or be included in a smart terminal such as a tablet, a mobile phone, a notebook, a smart watch, and the like. In some embodiments, the input and output interface 230 can be a combination of one or more of a touch screen, an LED display light, a speaker, a button, a button, and the like on the panel of the security system 100.

在一些實施例中,輸入輸出介面230可以與網路140建立連接,並通過網路140輸入或輸出資訊。在一些實施例中,輸入輸出介面230可以與使用者移動設備150通過無線方式連接。例如,使用者通過移動設備150可以接收安全系統100輸出的資訊。又例如,使用者可以通過網路140發送使用者指令,實現對安全系統100的遠端控制。 In some embodiments, the input and output interface 230 can establish a connection with the network 140 and input or output information via the network 140. In some embodiments, the input and output interface 230 can be wirelessly coupled to the user mobile device 150. For example, the user can receive information output by the security system 100 via the mobile device 150. For another example, the user can send user commands over the network 140 to implement remote control of the security system 100.

記憶體240可以用於存儲安全系統100獲取和產生的資訊。在一些實施例中,記憶體240可以存儲的資訊包括檢測模組210獲取到的周邊環境資訊、處理器220產生的處理結果以及輸入輸出介面230接收到的使用者輸入資訊。記憶體240存儲資訊的形式可以是文本、數位、聲音、圖像等。在一些實施例中,記憶體240可以包括但不限於常見的各類存放裝置如固態硬碟、機械硬碟、USB快閃記憶體、SD存儲卡、光碟、隨機存取記憶體(random-access memory,RAM)和唯讀記憶體(read-only memory,ROM)等。在一些實施例中,記憶體240可以是系統內部的存放裝置,系統的外接存儲裝置,系統之外的網路存儲裝置(如雲存儲伺服器上的記憶體等)等。 The memory 240 can be used to store information acquired and generated by the security system 100. In some embodiments, the information that the memory 240 can store includes the surrounding environment information acquired by the detection module 210, the processing result generated by the processor 220, and the user input information received by the input/output interface 230. The form in which the memory 240 stores information may be text, digits, sounds, images, and the like. In some embodiments, the memory 240 may include, but is not limited to, various types of storage devices such as solid state hard disks, mechanical hard disks, USB flash memory, SD memory cards, optical disks, and random access memory (random-access). Memory, RAM) and read-only memory (ROM). In some embodiments, the memory 240 may be a storage device inside the system, an external storage device of the system, a network storage device outside the system (such as a memory on a cloud storage server, etc.).

需要注意的是,以上對安全系統100中各模組的描述僅僅是 一些具體實施例,不應被視為是僅有的可行方案。顯然,對於本領域的專業人員來說,在瞭解各模組的基本原理後,可能在不背離這一原理的情況下,對安全系統110的配置進行各種修正和改變。但這些修正和改變仍在以上描述的範圍內。 It should be noted that the above description of each module in the security system 100 is only Some specific embodiments should not be considered as the only feasible solution. Obviously, it will be apparent to those skilled in the art that after understanding the basic principles of the various modules, various modifications and changes may be made to the configuration of the security system 110 without departing from this principle. However, these modifications and changes are still within the scope of the above description.

例如,安全系統100還可以包括一個電源模組,用於對系統進行獨立供電,避免電力中斷帶來的風險。例如,安全系統100還可以包括一個抗干擾模組,用於抵抗入侵人員攜帶的干擾設備,保證安全系統100、各感測器及報警器等正常工作。又例如,檢測模組210可以接收化學信號、光線信號、溫度信號、濕度信號等。 For example, the security system 100 can also include a power module for independently powering the system to avoid the risk of power outages. For example, the security system 100 may further include an anti-interference module for resisting interference devices carried by the intruder, and ensuring that the security system 100, sensors, and alarms work normally. For another example, the detection module 210 can receive a chemical signal, a light signal, a temperature signal, a humidity signal, and the like.

圖3是本申請案一些實施例處理採集到的周邊環境信號的示意性工作流程圖。步驟302可以包括通過感測器110獲取周邊環境資訊。安全系統100獲取的周邊資訊可以包括環境中物體的一種或多種特性。這些特性可以是物理或化學資訊,如物體的輪廓、熱輻射、顏色、聲音、外形特徵、是否運動、動作特徵以及氣味等。在一些實施例中,安全系統100可以通過微波感測器獲取微波信號,用以識別運動物體。在一些實施例中,安全系統100可以通過紅外線感測器獲取物體紅外線信號,用以判斷周邊環境中是否存在人或動物。在一些實施例中,安全系統100可以通過壓力感測器獲取門窗的壓力或形變,用以判斷門窗是否通過正常途徑被打開等。在一些實施例中,安全系統100還可以通過圖像感測器獲取目標物體的圖像資訊,用於分析物體的外形輪廓。 FIG. 3 is a schematic operational flow chart of processing the collected ambient environment signals by some embodiments of the present application. Step 302 can include obtaining peripheral environment information through the sensor 110. The peripheral information acquired by the security system 100 can include one or more characteristics of objects in the environment. These characteristics can be physical or chemical information such as the contour of the object, heat radiation, color, sound, shape characteristics, motion, motion characteristics, and odor. In some embodiments, the security system 100 can acquire microwave signals through the microwave sensor to identify moving objects. In some embodiments, the security system 100 can acquire an object infrared signal through an infrared sensor to determine whether a person or an animal is present in the surrounding environment. In some embodiments, the safety system 100 can obtain the pressure or deformation of the door and window through the pressure sensor to determine whether the door and window are opened by a normal route or the like. In some embodiments, the security system 100 can also acquire image information of the target object through the image sensor for analyzing the contour of the object.

步驟304可以包括安全系統100處理上述資訊,並產生處理結果。對於不同類別的資訊,安全系統100可以選用不同的方法進行處理。 這些方法可以包括數值計算方法、波形處理方法、影像處理方法等。數值計算的方法可以包括擬合、歸一化、積分、主成分分析、離散化等。波形處理的方法可以包括傳立葉轉換、小波轉換、低通濾波、類比數位轉換、線性調頻等。影像處理的方法可以包括圖像幀間差分、模糊識別、圖像去噪、多解析度處理、區域分割、長條圖增強、卷積反投影重建、模型基編碼等。 Step 304 can include the security system 100 processing the above information and generating a processing result. For different types of information, the security system 100 can use different methods for processing. These methods may include numerical calculation methods, waveform processing methods, image processing methods, and the like. Methods of numerical calculations may include fitting, normalization, integration, principal component analysis, discretization, and the like. Waveform processing methods may include Fourier transform, wavelet transform, low pass filtering, analog digital conversion, chirp, and the like. Image processing methods may include image frame difference, blur recognition, image denoising, multi-resolution processing, region segmentation, bar graph enhancement, convolution back projection reconstruction, model base coding, and the like.

在步驟306,安全系統100可以基於上述處理結果,確定是否滿足一個或多個安全條件。該一個或多個安全條件可以包括處理結果所對應的臨界值、微波信號時域頻域特徵、圖像外形特徵、聲音、面部特徵等。在一些實施例中,安全條件可以是輪廓高寬比小於1、紅外線熱成像中溫度低於36℃、規律運動物體、圖像中輪廓為非人體輪廓、面部特徵與使用者匹配或聲音特徵與使用者匹配等。上述安全條件可以來自使用者輸入,系統中預設的預設資訊,由系統根據周邊環境資訊進行自適應調整等。 At step 306, the security system 100 can determine whether one or more security conditions are met based on the processing results described above. The one or more security conditions may include a threshold corresponding to the processing result, a time domain frequency domain characteristic of the microwave signal, an image shape characteristic, a sound, a facial feature, and the like. In some embodiments, the safety condition may be that the aspect ratio is less than 1, the temperature in the infrared thermal imaging is lower than 36 ° C, the moving object in the image, the contour in the image is non-human contour, the facial feature is matched with the user or the sound feature is User matches, etc. The above security conditions may be from user input, preset preset information in the system, and adaptive adjustment by the system according to surrounding environment information.

在一些實施例中,安全系統100可以將獲取到的資訊或處理的結果傳送給用戶或安全機構,用以輔助判斷是否入侵。例如,在一些臨界於安全條件的特殊情況下,安全系統100可以將目前採集到的如聲音、圖像、微波、紅外線等信號或處理後產生的資料通過使用者移動設備150呈現給使用者或通過網路140遠端呈現給安全機構,用於輔助判斷是否入侵。 In some embodiments, the security system 100 can communicate the obtained information or the results of the processing to a user or security authority to assist in determining whether to invade. For example, in some special cases that are critical to the security conditions, the security system 100 can present the currently acquired signals such as sound, image, microwave, infrared, or processed data to the user through the user mobile device 150 or The remote end of the network 140 is presented to the security mechanism for assisting in determining whether to invade.

在步驟308,根據上述判斷,安全系統100可以確定當前安全級別。安全級別可以為多個安全模式中的一個,例如休眠、警戒、威脅、入侵等。休眠模式可以當使用者在家時使用,以減少或避免對用戶在家中 自由活動的干擾。警戒模式可以對應於安全系統100持續監測周邊環境資訊且無異常情況時的安全級別(例如,家中無人時,或夜晚時等)。威脅模式可以對應於安全系統100判定可能存在入侵人員時所確定的安全級別。入侵模式可以對應於安全系統100確認存在人員入侵的高危情況下確定的安全級別。以上所述的幾種安全級別僅僅是為了舉例說明,並非限制本申請案所保護的範圍。安全系統100還可以包括其他的安全級別。 At step 308, based on the above determination, the security system 100 can determine the current security level. The security level can be one of multiple security modes, such as hibernation, alerting, threats, intrusions, and the like. Sleep mode can be used when the user is at home to reduce or avoid the user at home Interference with free activities. The alert mode may correspond to a security level at which the security system 100 continuously monitors surrounding environmental information and has no anomalies (eg, when no one is at home, or at night). The threat mode may correspond to a security level determined by the security system 100 when it is determined that an intruder may be present. The intrusion mode may correspond to a security level determined by the security system 100 to identify a high risk situation in which a human intrusion exists. The several levels of security described above are for illustrative purposes only and are not intended to limit the scope of the application. Security system 100 may also include other levels of security.

在一些實施例中,一個安全級別可以對應一個安全條件或者多個安全條件的組合。滿足上述一個或多個安全條件可以確定一個安全級別。例如,安全系統100通過微波信號處理結果識別到運動物體,通過紅外線信號確定該物體溫度大於設定臨界值,可以確定安全級別為威脅。又例如,安全系統100確定一個運動物體,並且該運動物體做規律運動,則可以確定安全級別為警戒。安全級別與安全條件之間的對應關係可以來自於使用者設置,系統預設內定形式、由系統根據周圍環境情況進行自適應調整等。 In some embodiments, one security level may correspond to one security condition or a combination of multiple security conditions. A security level can be determined by satisfying one or more of the above security conditions. For example, the security system 100 identifies the moving object by the result of the microwave signal processing, and determines that the temperature of the object is greater than the set threshold by the infrared signal, and can determine that the security level is a threat. For another example, the security system 100 determines a moving object, and the moving object performs regular motion, and then the security level can be determined to be an alert. The correspondence between the security level and the security condition may come from the user setting, the system presets the default form, and the system adaptively adjusts according to the surrounding environment.

需要注意的是,以上對安全系統100的工作流程的描述僅僅是一些具體實施例,不應被視為是僅有的可行方案。顯然,對於本領域的專業人員來說,在瞭解其基本原理後,可能在不背離這一原理的情況下,對安全系統100的工作流程或演算法進行形式和細節上的各種修正和改變。但這些修正和改變仍在以上描述的範圍內。 It should be noted that the above description of the workflow of the security system 100 is merely a specific embodiment and should not be considered as the only feasible solution. Obviously, those skilled in the art, after understanding the basic principles, may make various modifications and changes in the form and details of the workflow or algorithm of the security system 100 without departing from this principle. However, these modifications and changes are still within the scope of the above description.

在一些實施例中,判定是否滿足或違背上述安全條件的過程也可以由判定一個或多個危險條件來代替。當處理結果滿足某個危險條件或多個危險條件的組合時,則可以確定一個安全等別。例如,安全系統100 中信號處理結果滿足輪廓高寬比大於1和紅外線熱成像中溫度高於36℃兩個危險條件則可以確定安全級別為入侵。又例如,安全系統100中信號處理結果滿足某一物體為非規律運動物體的危險條件,則安全系統100判定當前安全級別為威脅,並進行其他危險條件的比對,直到確定一個最終的安全級別。 In some embodiments, the process of determining whether to meet or violate the above-described security conditions may also be replaced by determining one or more dangerous conditions. When the processing result satisfies a dangerous condition or a combination of multiple dangerous conditions, a safety level can be determined. For example, security system 100 The medium signal processing results satisfy the contour aspect ratio greater than 1 and the infrared thermal imaging temperature is higher than 36 °C. The two safety conditions can determine the safety level as the intrusion. For another example, if the signal processing result in the security system 100 satisfies the dangerous condition that an object is an irregular moving object, the security system 100 determines that the current security level is a threat, and performs comparison of other dangerous conditions until a final security level is determined. .

圖4是根據本申請案的一些實施例的檢測模組的模組示意圖。檢測模組210可以包括微波信號獲取單元410和光學信號獲取單元420。光學信號獲取單元420可以進一步包括紅外線信號獲取單元430和圖像信號獲取單元440中的至少一個。 4 is a block diagram of a detection module in accordance with some embodiments of the present application. The detection module 210 may include a microwave signal acquisition unit 410 and an optical signal acquisition unit 420. The optical signal acquisition unit 420 may further include at least one of the infrared signal acquisition unit 430 and the image signal acquisition unit 440.

微波信號獲取單元410可以用於獲取微波感測器的信號。微波信號獲取單元410可以與一個或多個微波感測器通信連接。微波信號獲取單元410獲取的微波信號可以是微波感測器輸出的微波信號,也可以是經過預處理處理產生的信號。在一些實施例中,微波信號獲取單元410獲取的微波信號可以是類比信號或數位信號等。在一些實施例中,所述類比信號可以是電壓波形。 The microwave signal acquisition unit 410 can be used to acquire signals of the microwave sensor. The microwave signal acquisition unit 410 can be communicatively coupled to one or more microwave sensors. The microwave signal acquired by the microwave signal acquiring unit 410 may be a microwave signal output by the microwave sensor, or may be a signal generated by a pre-processing. In some embodiments, the microwave signal acquired by the microwave signal acquisition unit 410 may be an analog signal, a digital signal, or the like. In some embodiments, the analog signal can be a voltage waveform.

在一些實施例中,經由靜止物體反射的微波波形可以是平穩或隨時間輕微變化的微波波形。在一些實施例中,經由運動物體反射返回的微波信號的幅值和頻率可以隨時間變化而變化。微波信號隨時間的變化關係可以與物體的運動狀態(如,方向、速度、或加速度等)相關。在一些實施例中,微波信號獲取單元410可以對獲取的微波信號進行預處理,然後發送至處理器220進行進一步信號處理或邏輯判斷。 In some embodiments, the microwave waveform reflected by the stationary object may be a microwave waveform that is smooth or slightly varying over time. In some embodiments, the amplitude and frequency of the microwave signal returned via the moving object reflection may change over time. The relationship of the microwave signal over time can be related to the motion state of the object (eg, direction, velocity, or acceleration, etc.). In some embodiments, the microwave signal acquisition unit 410 may preprocess the acquired microwave signal and then send it to the processor 220 for further signal processing or logic determination.

圖像信號獲取單元430可以用於獲取圖像感測器的信號。圖 像信號獲取單元430可以與一個或多個圖像感測器進行通信連接,並獲取該一個或多個圖像感測器產生的圖像信號。在一些實施例中,圖像信號可以是利用可見光所成的圖像。在一些實施例中,圖像信號可以是利用其他波段的電磁波輔助可見光所成的圖像,例如利用紅外線感測器輔助圖像感測器形成的圖像等。一個圖像感測器可以與一個或多個鏡頭相關聯。在一些實施例中,可以存在多個圖像感測器,所述多個圖像感測器可以與多個鏡頭相關聯。在一些實施例中,可以利用多個圖像感測器和多個鏡頭,獲取包含有物體距離的周邊環境資訊。在一些實施例中,也可以利用一個紅外線感測器與一個或多個圖像感測器及相關聯的鏡頭,獲取周邊環境資訊。在一些實施例中,圖像信號獲取單元430獲取的圖像信號可以是數位圖像。 The image signal acquisition unit 430 can be used to acquire a signal of the image sensor. Figure The image signal acquisition unit 430 can be in communication with one or more image sensors and acquire image signals generated by the one or more image sensors. In some embodiments, the image signal can be an image made using visible light. In some embodiments, the image signal may be an image formed by using electromagnetic waves of other wavelength bands to assist visible light, such as an image formed by an infrared sensor to assist an image sensor, or the like. An image sensor can be associated with one or more lenses. In some embodiments, there may be multiple image sensors that may be associated with multiple lenses. In some embodiments, a plurality of image sensors and a plurality of lenses may be utilized to obtain surrounding environment information including object distances. In some embodiments, an infrared sensor and one or more image sensors and associated lenses may also be utilized to obtain peripheral environmental information. In some embodiments, the image signal acquired by the image signal acquisition unit 430 may be a digital image.

在一些實施例中,圖像信號獲取單元430獲取的圖像資訊可以包括一定角度內的周邊環境資訊。該角度可以與圖像感測器的成像角度相關。在一些實施例中,成像角度可以為0度到360度內的任意角度。在一些實施例中,成像角度可以為135度。在一些實施例中,成像角度可以為180度。 In some embodiments, the image information acquired by the image signal acquisition unit 430 may include surrounding environment information within a certain angle. This angle can be related to the imaging angle of the image sensor. In some embodiments, the imaging angle can be any angle from 0 degrees to 360 degrees. In some embodiments, the imaging angle can be 135 degrees. In some embodiments, the imaging angle can be 180 degrees.

紅外線信號獲取單元440可以獲取紅外線感測器的信號。紅外線信號獲取單元440通過與紅外線感測器建立通信連接,獲取周邊環境的紅外線信號。該紅外線信號可以與周邊環境中物體的熱輻射相關。在一些實施例中,通過標定的方法,將環境中物體的熱輻射與溫度建立聯繫,可以獲得物體的紅外線圖像。在一些實施例中,獲得的紅外線圖像可以是對應物體的溫度分佈圖像。在一些實施例中,利用紅外線圖像可以將溫度 較高的物體與背景環境或溫度較低的物體區分開來。在一些實施例中,紅外線信號獲取單元440可以對獲取的紅外線信號進行預處理,然後發送至處理器220進行進一步的信號處理或判斷決策。 The infrared signal acquisition unit 440 can acquire a signal of the infrared sensor. The infrared signal acquisition unit 440 acquires an infrared signal of the surrounding environment by establishing a communication connection with the infrared sensor. The infrared signal can be related to the thermal radiation of objects in the surrounding environment. In some embodiments, an infrared image of the object can be obtained by correlating the thermal radiation of the object in the environment with the temperature by a calibration method. In some embodiments, the obtained infrared image may be a temperature distribution image of the corresponding object. In some embodiments, the temperature can be used to image the infrared image Higher objects are distinguished from the background environment or objects with lower temperatures. In some embodiments, the infrared signal acquisition unit 440 can preprocess the acquired infrared signals and then send them to the processor 220 for further signal processing or decision making.

紅外線信號獲取單元440接收的紅外線信號可以來源於紅外線成像儀、紅外線測溫儀、紅外線輻射計、紅外線掃描器等。接收的紅外線信號可以是短波紅外線(波長為1~2.5微米)、中波紅外線(波長為3~5微米)、長波紅外線(波長為8~14微米),或處於其他波段的紅外線信號。 The infrared signal received by the infrared signal acquisition unit 440 may be derived from an infrared imager, an infrared thermometer, an infrared radiation meter, an infrared scanner, or the like. The received infrared signal may be short-wave infrared (wavelength of 1 to 2.5 micrometers), medium-wave infrared (wavelength of 3 to 5 micrometers), long-wavelength infrared (wavelength of 8 to 14 micrometers), or infrared signals in other wavelength bands.

圖5是本申請案一些實施例的處理器的示意圖。處理器220可以包括信號處理單元510,安全條件存儲單元520,判斷決策單元530和指令產生單元540。 5 is a schematic diagram of a processor of some embodiments of the present application. The processor 220 may include a signal processing unit 510, a security condition storage unit 520, a decision decision unit 530, and an instruction generation unit 540.

信號處理單元510可以處理安全系統100獲取的信號。信號處理單元510可以接收檢測模組210獲取的信號。該信號可以是微波信號、圖像信號、紅外線信號、音訊信號、超音波信號、氣體信號等的一種或多種。在一些實施例中,信號處理單元510也可以通過輸入輸出介面230獲取信號。例如,安全系統100發起干預時,可以通過採集入侵物件的一些圖像信號或其他信號進行身份認證。採集的圖像信號或其他信號可以包括面部圖像、指紋圖像、視網膜圖像、聲紋信號等。 Signal processing unit 510 can process signals acquired by security system 100. The signal processing unit 510 can receive the signal acquired by the detection module 210. The signal may be one or more of a microwave signal, an image signal, an infrared signal, an audio signal, an ultrasonic signal, a gas signal, and the like. In some embodiments, signal processing unit 510 can also acquire signals through input and output interface 230. For example, when the security system 100 initiates an intervention, it may authenticate by collecting some image signals or other signals of the invading object. The acquired image signals or other signals may include facial images, fingerprint images, retinal images, voiceprint signals, and the like.

信號處理單元510可以通過一種或多種方式對上述信號進行處理並提取有效資訊。該一種或多種處理方式可以包括數值計算、波形處理、影像處理等。數值計算的方法可以包括主成分分析、擬合、反覆運算、離散、插值等。波形處理方法可以包括類比數位轉換、小波轉換、傅立葉轉換、低通濾波等。影像處理方法可以包括運動目標識別、圖像分割、 圖像增強、圖像重建、非均勻性校正、紅外線數位圖像細節增強等。在一些實施例中,利用上述方法,信號處理單元510可以對微波信號進行處理。所述處理結果可以包括環境中是否存在運動物體、運動物體的固定頻率成分資訊、濾除固定頻率後的頻域信號等資訊。在一些實施例中,信號處理單元510可以對圖像信號進行處理。所述處理結果可以包括圖像的紋理特徵、形狀特徵、輪廓特徵等資訊。在一些實施例中,信號處理單元510可以對紅外線圖像進行處理。所述處理結果可以包括圖像的顏色特徵、輪廓特徵等資訊。 The signal processing unit 510 can process the signals and extract valid information in one or more ways. The one or more processing methods may include numerical calculations, waveform processing, image processing, and the like. Numerical calculation methods may include principal component analysis, fitting, repeated operations, discrete, interpolation, and the like. The waveform processing method may include analog digital conversion, wavelet conversion, Fourier transform, low pass filtering, and the like. Image processing methods may include moving target recognition, image segmentation, Image enhancement, image reconstruction, non-uniformity correction, infrared digital image detail enhancement, etc. In some embodiments, signal processing unit 510 can process the microwave signal using the methods described above. The processing result may include information such as whether there is a moving object in the environment, a fixed frequency component information of the moving object, and a frequency domain signal after filtering the fixed frequency. In some embodiments, signal processing unit 510 can process the image signal. The processing result may include information such as a texture feature, a shape feature, and a contour feature of the image. In some embodiments, signal processing unit 510 can process the infrared image. The processing result may include information such as a color feature, a contour feature, and the like of the image.

在一些實施例中,信號處理單元510可以包括微處理器、單片微型電腦、平板電腦、電腦、或特殊設計的具備特殊功能的處理元件或設備等。 In some embodiments, signal processing unit 510 can include a microprocessor, a single-chip microcomputer, a tablet, a computer, or a specially designed processing element or device having special functions.

安全條件存儲單元520,可以存儲安全條件資訊。該資訊可以提供給處理器中的決策單元530,用於判斷周邊環境是否存在安全風險,如人員入侵。安全條件存儲單元520存儲的安全條件資訊可以是數值範圍或臨界值,微波信號或聲音信號的時域頻域特徵,圖像的顏色、紋理、形狀、輪廓等。在一些實施例中,安全條件資訊可以包括不存在運動物體、物體的輪廓高寬比小於1、物體的溫度低於36℃、規律運動物體、圖像中輪廓為非人體輪廓、面部特徵與資料庫匹配以及聲音特徵與資料庫匹配等等。在一些實施例中,安全條件包括一個首要安全條件和一個或多個次要安全條件。在一些實施例中,首要安全條件可以與人員入侵相關。例如,首要安全條件可以是未檢測到運動物體。基於對首要安全條件的判斷,安全系統100可以啟動一個或多個功能。在一些實施例中,首要安全條件被 違背時,安全系統100開始對獲取的多個信號進行分析判斷,確定是否存在人員入侵或誤判斷;在一些實施例中,次要安全條件可以與影響安全系統100判斷的非人員入侵因素相關,如規律運動的風扇、家裡的寵物的移動、擺動的窗簾、晃動的植物等等。滿足一個或多個次要安全條件則可以排除該一個或多個次要安全條件所對應的影響因素。 The security condition storage unit 520 can store security condition information. The information can be provided to the decision unit 530 in the processor for determining whether there is a security risk in the surrounding environment, such as a human intrusion. The security condition information stored by the security condition storage unit 520 may be a numerical range or a critical value, a time domain frequency domain characteristic of the microwave signal or the sound signal, a color, a texture, a shape, a contour, and the like of the image. In some embodiments, the safety condition information may include the absence of a moving object, the contour aspect ratio of the object being less than 1, the temperature of the object being lower than 36 ° C, the moving object in the image, the contour of the image being non-human contour, facial features and data Library matching and sound features match the database and more. In some embodiments, the security condition includes a primary security condition and one or more secondary security conditions. In some embodiments, the primary security condition may be related to a human intrusion. For example, the primary safety condition may be that no moving object is detected. Based on the determination of the primary security condition, the security system 100 can initiate one or more functions. In some embodiments, the primary safety condition is In the event of a violation, the security system 100 begins to analyze and determine the acquired multiple signals to determine whether there is a human intrusion or misjudgment; in some embodiments, the secondary security conditions may be related to non-personal intrusion factors that affect the security system 100. Such as regular movement of the fan, the movement of pets at home, swinging curtains, shaking plants, and so on. The one or more secondary safety conditions are met to rule out the influencing factors for the one or more secondary safety conditions.

安全條件存儲單元520可以使用一種或多種可以讀取或寫入的存儲媒體,例如但不僅限於靜態隨機存取記憶體(static random access memory,SRAM),隨機存取記憶體(random-access memory,RAM)、唯讀記憶體(read-only memory,ROM)、硬碟、快閃記憶體等。在一些實施例中,安全條件存儲單元可以是安全系統本地的存儲,外接的存儲,通過網路140通信連接的存儲(如雲存儲等)等。 The security condition storage unit 520 can use one or more storage media that can be read or written, such as but not limited to static random access memory (SRAM), random access memory (random-access memory, RAM), read-only memory (ROM), hard disk, flash memory, and the like. In some embodiments, the security condition storage unit may be a storage local to the security system, an external storage, a storage connection (eg, cloud storage, etc.) via the network 140, and the like.

決策單元530可以對信號處理結果或使用者輸入作出判斷,並產生決策資訊。決策單元530可以基於信號處理單元510產生的結果進行周邊環境安全級別的判斷,產生相應的決策資訊。在一些實施例中,決策單元530可以從信號處理單元510讀取計算、處理後的資訊,並與安全條件存儲單元520存儲的安全條件資訊進行對比,判斷是否滿足或違背一個或多個安全條件,以確定當前安全級別。在一些實施例中,決策單元530根據當前安全級別,可以產生進一步的判斷決策。例如,決策單元530判定當前安全級別為威脅時,可以進一步作出跟蹤或鎖定目標的決策。 Decision unit 530 can make a determination of the signal processing result or user input and generate decision information. The decision unit 530 can perform the determination of the security level of the surrounding environment based on the result generated by the signal processing unit 510 to generate corresponding decision information. In some embodiments, the decision unit 530 can read the calculated and processed information from the signal processing unit 510 and compare it with the security condition information stored by the security condition storage unit 520 to determine whether one or more security conditions are met or violated. To determine the current security level. In some embodiments, decision unit 530 can generate further decision decisions based on the current level of security. For example, when the decision unit 530 determines that the current security level is a threat, the decision to track or lock the target may be further made.

決策單元530也可以基於使用者通過輸入輸出介面230或者移動設備150輸入的資訊或指令,做出決策。例如,使用者通過移動設備150請求一個被監控區域的圖像資訊時,決策單元530可以產生將圖像資訊 獲取單元430接收的該監控區域的圖像資訊傳輸至移動設備150的決策資訊。 Decision unit 530 can also make decisions based on information or instructions entered by the user via input/output interface 230 or mobile device 150. For example, when the user requests image information of a monitored area through the mobile device 150, the decision unit 530 can generate image information. The image information of the monitoring area received by the obtaining unit 430 is transmitted to the decision information of the mobile device 150.

決策單元530可以包括可程式設計邏輯器件(programmable logic device,PLD)、專用積體電路(application specific integrated circuits,ASIC)、處理器(central processing unit,CPU,)、單片微型電腦(single chip microcomputer,SCM)、系統晶片(system on a chip,SoC)等。 The decision unit 530 can include a programmable logic device (PLD), an application specific integrated circuit (ASIC), a central processing unit (CPU), and a single chip microcomputer. , SCM), system on a chip (SoC), and the like.

指令產生單元540可以基於決策單元530產生的決策資訊,產生安全系統100或外接設備可執行的控制指令。該控制指令可以包括操作資訊和位址資訊。操作資訊可以指示操作的方法和功能。位址資訊可以指向操作的物件。在一些實施例中,指令產生單元540產生的指令可以被發送給一個或多個感測器110,並控制相應的感測器110採集環境資訊。在一些實施例中,發送給感測器110的控制指令還可以控制感測器110的開關、調整感測器110的參數、調整感測器110的信號採集角度、方位等。在一些實施例中,指令產生單元540產生的指令可以發送給使用者輸入輸出介面230,用以打開使用者介面,並讀取使用者輸入或向用戶輸出某些處理後的資訊等。 The instruction generation unit 540 can generate a control instruction executable by the security system 100 or an external device based on the decision information generated by the decision unit 530. The control command can include operational information and address information. Operational information can indicate the method and function of the operation. The address information can point to the object of the operation. In some embodiments, the instructions generated by the instruction generation unit 540 can be sent to one or more of the sensors 110 and control the corresponding sensor 110 to acquire environmental information. In some embodiments, the control commands sent to the sensor 110 can also control the switches of the sensor 110, adjust the parameters of the sensor 110, adjust the signal acquisition angle of the sensor 110, the orientation, and the like. In some embodiments, the instructions generated by the instruction generating unit 540 can be sent to the user input and output interface 230 for opening the user interface, and reading the user input or outputting some processed information to the user.

圖6是根據本申請案一些實施例的示意性安全監控工作流程圖。步驟602可以包括處理器220從感測器110獲取周邊環境資訊。處理器220獲取的信號可以包括微波信號、紅外線信號、圖像信號、音訊信號等。處理器220獲取的信號可以是感測器110輸出的未經處理的信號,或經過預處理後產生的信號(如預處理後產生的電壓或電流信號等)等。在一些實施例中,處理器220可以優先獲取微波信號;在滿足一定條件後,處 理器220可以獲取其他感測器的信號。在一些實施例中,該條件可以是微波信號或者其處理結果違背首要安全條件。 6 is a flow chart of an exemplary security monitoring operation in accordance with some embodiments of the present application. Step 602 can include the processor 220 obtaining peripheral environment information from the sensor 110. The signals acquired by the processor 220 may include microwave signals, infrared signals, image signals, audio signals, and the like. The signal acquired by the processor 220 may be an unprocessed signal output by the sensor 110, or a signal generated after pre-processing (such as a voltage or current signal generated after pre-processing, etc.). In some embodiments, the processor 220 may preferentially acquire the microwave signal; after satisfying certain conditions, The processor 220 can acquire signals of other sensors. In some embodiments, the condition may be a microwave signal or the result of its processing is against the primary safety condition.

步驟604可以包括處理器220對獲取的信號進行處理,產生處理結果資訊。處理器220對不同類別的信號可以採用一種或多種不同的方法進行處理。在一些實施例中,處理器220通過一種或多種方法對微波信號進行處理,以獲得目標物體的運動狀態。該一種或多種處理方法可以包括傅立葉轉換、小波轉換、Z轉換、低通濾波、類比數位轉換等。處理器220產生的微波信號處理結果可以包括環境中是否存在運動物體、運動物體的固定頻率成分資訊、濾除固定頻率後的頻域信號等。 Step 604 can include the processor 220 processing the acquired signal to generate processing result information. The processor 220 can process the different classes of signals in one or more different ways. In some embodiments, processor 220 processes the microwave signal by one or more methods to obtain a motion state of the target object. The one or more processing methods may include Fourier transform, wavelet transform, Z transform, low pass filtering, analog digital conversion, and the like. The microwave signal processing result generated by the processor 220 may include whether there is a moving object in the environment, fixed frequency component information of the moving object, a frequency domain signal after filtering the fixed frequency, and the like.

在一些實施例中,處理器220可以通過一種或多種方法對圖像信號進行處理,以提取圖像特徵、識別圖像。該一種或多種處理方法包括運動目標識別、圖像增強、圖像重建、圖像分割、幾何處理、算術處理、圖像復原、圖像編碼等。運動目標識別可以包括幀間差分法、背景差分法、光流法、邊緣檢測法、混合高斯模型法等。圖像增強方法可以包括長條圖增強、偽彩色增強、灰度視窗等。圖像重建方法可以包括代數法、反覆運算法、傅立葉反投影法、卷積反投影法等。圖像分割方法可以包括基於區域的分割和基於形態學分水嶺的分割等。通過處理,處理器220可以產生包括上述圖像的一個或多個特徵的結果。該一個或多個特徵可以包括輪廓形狀、顏色、紋理、區域形狀、空間關係等。在一些實施例中,處理器220可以利用上述處理方法,獲取運動物體的輪廓。在一些實施例中,處理器220可以利用上述處理方法,對使用者身份驗證資訊進行處理。在一些實施例中,驗證資訊為人臉圖像、指紋圖像或者視網膜圖像等。 In some embodiments, processor 220 may process the image signal by one or more methods to extract image features, identify images. The one or more processing methods include moving object recognition, image enhancement, image reconstruction, image segmentation, geometric processing, arithmetic processing, image restoration, image encoding, and the like. The moving object recognition may include an interframe difference method, a background difference method, an optical flow method, an edge detection method, a hybrid Gaussian model method, and the like. Image enhancement methods may include bar graph enhancement, pseudo color enhancement, grayscale windows, and the like. The image reconstruction method may include an algebra method, an inverse algorithm, a Fourier back projection method, a convolution back projection method, and the like. The image segmentation method may include region-based segmentation and morphological watershed-based segmentation and the like. Through processing, processor 220 can generate a result that includes one or more features of the image described above. The one or more features can include contour shapes, colors, textures, area shapes, spatial relationships, and the like. In some embodiments, the processor 220 may acquire the contour of the moving object using the processing method described above. In some embodiments, the processor 220 can process the user authentication information by using the above processing method. In some embodiments, the verification information is a face image, a fingerprint image, or a retina image or the like.

在一些實施例中,處理器220對紅外線信號的處理可以採用非均勻性校正、紅外線數位圖像細節增強、或上述提及的圖像信號的處理方法等。非均勻性校正可以包括基於定標的校正方法和基於場景的校正方法,紅外線數位圖像細節增強可以包括長條圖均衡化(histogram equalization,HE)、反銳化遮罩法(unsharp masking,UM)及模擬人眼視覺特徵進行的圖像增強方法等。處理器220產生的處理結果可以包括圖像的顏色特徵、輪廓資訊等。 In some embodiments, the processing of the infrared signal by the processor 220 may employ non-uniformity correction, infrared digital image detail enhancement, or the processing method of the image signal mentioned above, and the like. The non-uniformity correction may include a calibration-based correction method and a scene-based correction method, and the infrared digital image detail enhancement may include a histogram equalization (HE) or an unsharp masking (UM). And an image enhancement method for simulating human visual features. The processing results generated by the processor 220 may include color features of the image, contour information, and the like.

在一些實施例中,處理器220可以優先處理微波信號;在滿足一定條件後,處理其他信號。在一些實施例中,該條件可以是違背首要安全條件。 In some embodiments, processor 220 can preferentially process microwave signals; after certain conditions are met, other signals are processed. In some embodiments, the condition may be against the primary security condition.

步驟606可以包括處理器220將處理結果與一個或多個安全條件進行對比,判斷是否滿足或違背安全條件。在一些實施例中,安全條件可以包括一個首要安全條件和一個或多個次要安全條件。在一些實施例中,首要安全條件可以被用來判斷周邊環境是否存在運動物體。在一些實施例中,獲取的微波信號可以是電壓波形。當電壓波形的幅值大於一定臨界值時,安全系統100判定周邊環境中存在運動物體,違背首要安全條件。在一些實施例中,該臨界值為700mV。在一些實施例中,上述一個或多個次要安全條件可以用於排除影響安全系統100判斷的一些因素。這些因素可以包括轉動的風扇、擺動的鐘擺、晃動的植物等,在一些實施例中,上述一個或多個次要安全條件可以包括存在固定頻率成分、圖像輪廓高寬比小於1、音訊資訊匹配、指紋圖像匹配、視網膜圖像匹配等。例如,在一些場景中,安全系統100對環境中運動物體的微波信號經過傅立葉轉換,頻 譜中僅包含一個固定頻率,則違背首要安全條件,滿足一個次要安全條件。又例如,安全系統100對獲取的光學圖像資訊使用圖像幀間差分方法進行處理,並將提取的運動物體輪廓與資料庫中的人體輪廓進行匹配。匹配失敗則滿足一個次要安全條件。利用該次要安全條件,可以判斷並排除運動物體為人體的情況。 Step 606 can include the processor 220 comparing the processing result to one or more security conditions to determine whether the security condition is met or violated. In some embodiments, the security condition may include a primary security condition and one or more secondary security conditions. In some embodiments, the primary safety condition can be used to determine if there is a moving object in the surrounding environment. In some embodiments, the acquired microwave signal can be a voltage waveform. When the magnitude of the voltage waveform is greater than a certain threshold, the safety system 100 determines that a moving object exists in the surrounding environment, violating the primary safety condition. In some embodiments, the threshold is 700 mV. In some embodiments, one or more of the above secondary safety conditions may be used to exclude certain factors that affect the determination of the security system 100. These factors may include a rotating fan, a oscillating pendulum, a swaying plant, etc., in some embodiments, the one or more secondary safety conditions may include the presence of a fixed frequency component, an image aspect ratio of less than 1, and audio information. Matching, fingerprint image matching, retinal image matching, etc. For example, in some scenarios, the security system 100 performs a Fourier transform on the microwave signal of a moving object in the environment. The fact that the spectrum contains only one fixed frequency violates the primary safety condition and satisfies a secondary safety condition. For another example, the security system 100 processes the acquired optical image information using an image interframe difference method and matches the extracted moving object contours with the human contours in the database. A matching failure satisfies a secondary security condition. With this secondary safety condition, it is possible to judge and exclude the situation in which the moving object is a human body.

在一些實施例中,處理器220在首要安全條件被違背前,僅獲取並處理微波信號。在一些實施例中,首要安全條件被違背後,處理器220開始處理其他信號,並與次要安全條件進行對比,判斷是否滿足一個或多個次要安全條件。在一些實施例中,處理器220產生的結果違背首要安全條件則產生啟動一個或多個感測器110的指令資訊,該一個或多個感測器110可以包括紅外線感測器、圖像感測器、聲音感測器等。 In some embodiments, processor 220 only acquires and processes microwave signals before the primary security condition is violated. In some embodiments, after the primary security condition is violated, processor 220 begins processing other signals and compares them with secondary security conditions to determine if one or more secondary security conditions are met. In some embodiments, the results generated by processor 220 violate the primary security condition to generate command information to initiate one or more sensors 110, which may include an infrared sensor, image sense Detector, sound sensor, etc.

步驟608可以包括處理器220通過上述判斷,確定當前的安全級別。在一些實施例中,一個安全級別可以對應一個或多個安全條件。在一些實施例中,首要安全條件被違背可以確定一個安全級別。例如,安全系統100通過微波信號處理結果識別到運動物體,違背首要安全條件;在沒有其他次要安全條件被滿足時,則確定安全級別為入侵。在一些實施例中,違背首要安全條件,並滿足一個或多個次要安全條件可以確定一個安全級別。在一些實施例中,首要安全條件被違背後,處理器220可以將處理結果依次與預設的安全條件進行比對,完成與所有安全條件的比對後可以確定一個安全級別。在一些實施例中,處理器220可以將處理結果與指定的一個或多個安全條件進行比對,確定一個安全級別。 Step 608 can include the processor 220 determining the current security level by the above determination. In some embodiments, one security level may correspond to one or more security conditions. In some embodiments, the primary security condition is violated to determine a level of security. For example, the security system 100 identifies a moving object by microwave signal processing results, violating the primary security condition; and determining that the security level is an intrusion when no other secondary security conditions are met. In some embodiments, a security level may be determined in violation of the primary security condition and satisfying one or more secondary security conditions. In some embodiments, after the primary security condition is violated, the processor 220 may sequentially compare the processing result with a preset security condition, and after completing the comparison with all the security conditions, may determine a security level. In some embodiments, processor 220 may compare the processing results to the specified one or more security conditions to determine a security level.

步驟610可以包括處理器220根據當前安全級別,產生一個 相應的指令資訊。該指令資訊可以被相應的硬體接收並執行。在一些實施例中,當前安全級別為入侵且安全系統100干預失敗時,處理器220可以產生報警的指令資訊。在一些實施例中,該指令資訊可以被發送給報警器130。在一些實施例中,當處理器220確定存在入侵後,報警器130可以通過本地或遠端的形式報警,並可以採取一些安全措施。在一些實施例中,報警器可以根據指令資訊以鳴笛、閃光的方式進行報警,例如提供高分貝蜂鳴聲。在一些實施例中,報警器也可以根據指令通過網路向保安、警察局等報警。在一些實施例中,報警器130也可以根據指令採取一些安全措施,例如鎖定門窗(例如,鎖定被入侵區域的門窗等)、打開照明系統等。 Step 610 can include the processor 220 generating a one based on the current security level. The corresponding instruction information. The command information can be received and executed by the corresponding hardware. In some embodiments, when the current security level is an intrusion and the security system 100 fails to intervene, the processor 220 can generate command information for the alert. In some embodiments, the command information can be sent to the alarm 130. In some embodiments, when the processor 220 determines that there is an intrusion, the alarm 130 can alert by local or remote form and can take some security measures. In some embodiments, the alarm can be audible or flashed according to the command information, such as providing a high-decibel beep. In some embodiments, the alarm can also alert the security, police, etc. via the network in accordance with the instructions. In some embodiments, the alarm 130 can also take some security measures, such as locking doors and windows (eg, locking doors and windows of the invaded area, etc.), turning on the lighting system, etc., depending on the instructions.

需要注意的是,以上對安全監控工作流程的描述僅僅是一些具體實施例,不應被視為是僅有的可行方案。顯然,對於本領域的專業人員來說,在瞭解其基本原理後,可能在不背離這一原理的情況下,對安全監控工作流程或演算法進行形式和細節上的各種修正和改變。但這些修正和改變仍在以上描述的範圍內。 It should be noted that the above description of the security monitoring workflow is only some specific embodiments and should not be regarded as the only feasible solution. Obviously, those skilled in the art, after understanding the basic principles, may make various modifications and changes in the form and details of the security monitoring workflow or algorithm without departing from the principle. However, these modifications and changes are still within the scope of the above description.

在一些實施例中,將一個首要安全條件與一個或多個次要安全條件組合來確定安全級別的方法,可以被其他方法所代替。這些方法可以是一個或者多個危險條件的組合對應一個安全級別。如果信號處理結果滿足一個或多個危險條件,安全系統100可以確認一個安全級別。例如同時滿足輪廓高寬比大於1、紅外線熱成像中溫度高於36℃兩個危險條件或者同時滿足非規律運動物體、圖像中輪廓與人體輪廓相匹配兩個危險條件,安全系統100會確定安全級別為入侵。又例如,存在面部特徵未匹配或者聲音特徵未匹配其中的一個危險條件,安全系統100會確定安全級別 為威脅等。 In some embodiments, a method of combining a primary security condition with one or more secondary security conditions to determine a security level may be replaced by other methods. These methods can be a combination of one or more dangerous conditions corresponding to a security level. If the signal processing result satisfies one or more dangerous conditions, the security system 100 can confirm a security level. For example, if the contour aspect ratio is greater than 1, the infrared thermal imaging temperature is higher than 36 ° C, or the dangerous condition is met, and the contour of the image matches the human contour, the safety system 100 determines. The security level is intrusion. For another example, if there is a dangerous condition in which the facial features are not matched or the sound features are not matched, the security system 100 determines the security level. For threats, etc.

在一些實施例證,上述一個首要安全條件也可以是紅外線信號中不存在溫度大於36℃的物體、圖像資訊中不存在人體輪廓、圖像資訊中輪廓高寬比小於1等安全條件中的一個。在一些實施例中,安全系統100中處理結果違背首要安全條件時,當前安全級別可以設定為威脅,並開始對其他處理結果進行比對,直到確定最終的安全級別。 In some embodiments, one of the first safety conditions may be one of an infrared signal having no object having a temperature greater than 36° C., an image contour having no contour of the human body, and an image aspect ratio having an aspect ratio of less than 1 . . In some embodiments, when the processing results in the security system 100 violate the primary security conditions, the current security level can be set as a threat and the other processing results are compared until the final security level is determined.

圖7是根據本申請案一些實施例的微波信號處理的示意性流程圖。步驟702可以包括安全系統100獲取微波信號。安全系統100獲取的微波信號可以經由周邊環境中的一個或多個物體反射後獲得。在一些實施例中,周邊環境中的物體均為靜態物體,則獲得的時域微波信號的波形較為平穩或隨時間輕微變化,頻率不發生變化。在一些實施例中,周邊環境包括一個或多個運動物體,則微波信號的幅值和頻率發生與運動物體的運動特性相關的變化。安全系統100獲取的微波信號可以是類比信號,也可以是經過某種處理得到的數位信號。在一些實施例中,該處理可以是類比數位轉換。 7 is a schematic flow diagram of microwave signal processing in accordance with some embodiments of the present application. Step 702 can include the security system 100 acquiring a microwave signal. The microwave signal acquired by the security system 100 can be obtained after being reflected by one or more objects in the surrounding environment. In some embodiments, the objects in the surrounding environment are all static objects, and the waveform of the obtained time domain microwave signal is relatively stable or slightly changed with time, and the frequency does not change. In some embodiments, the surrounding environment includes one or more moving objects, and the amplitude and frequency of the microwave signals occur in relation to the motion characteristics of the moving object. The microwave signal acquired by the security system 100 may be an analog signal or a digital signal obtained through some processing. In some embodiments, the process can be analog to digital conversion.

步驟704可以包括對獲取的微波信號進行時域頻域轉換。安全系統100可以通過某種轉換將獲取的時域微波信號轉換成頻域信號。該轉換可以包括傅立葉轉換,小波轉換,Z轉換等。在一些實施例中,安全系統100可以對獲取的類比信號進行預處理,然後利用上述轉換方法獲得頻域信號。在一些實施例中,預處理可以是對其進行抽樣,使其離散化。在一些實施例中,預處理可以是對其進行類比數位轉換。在一些實施例中,安全系統100獲取的微波信號為數位信號,則可以通過直接通過傅立葉轉 換將其轉換成頻域信號。圖8包括使用傅立葉轉換處理微波信號的詳細闡述。 Step 704 can include performing time domain frequency domain conversion on the acquired microwave signals. The security system 100 can convert the acquired time domain microwave signals into frequency domain signals by some conversion. The conversion may include Fourier transform, wavelet transform, Z transform, and the like. In some embodiments, the security system 100 can preprocess the acquired analog signal and then obtain the frequency domain signal using the conversion method described above. In some embodiments, the pre-processing may be to sample it to discretize it. In some embodiments, the pre-processing may be analogous to digital conversion. In some embodiments, the microwave signal acquired by the security system 100 is a digital signal, which can be directly passed through the Fourier transform. Convert it to a frequency domain signal. Figure 8 includes a detailed illustration of the processing of microwave signals using Fourier transform.

圖8是根據本申請案一些實施例的利用傅立葉轉換對微波信號進行頻譜分析的示意圖。安全系統100通過微波感測器110獲取周邊環境的微波信號。在一些實施例中,該微波信號可以是一個時域波形801,如圖8-A。通過對微波信號進行傅立葉轉換,可以將其從時域波形801轉換為頻域波形803,如圖8-B。傅立葉轉換可以是連續傅立葉轉換、離散傅立葉轉換、短時距傅立葉轉換或快速傅立葉轉換等。在一些實施例中,通過對時域波形801進行離散化,再進行離散傅立葉轉換或快速傅立葉轉換,可以獲得頻域波形803。時域信號803頻譜展開後可以包括一個峰值信號802。將頻譜中的峰值信號802分離後,頻域信號803成為一個頻率曲線805,如圖8-D。頻域曲線805對應的時域信號為804,如圖8-C。峰值信號802則對應一個固定頻率信號807,如圖8-F。固定頻率信號807對應的時域信號為806,如圖8-E。其中,頻域信號805對應一個非規律運動物體,如人、動物、窗簾等,固定頻率信號807對應一個規律運動物體,如風扇、擺鐘等。在一些實施例中,上述微波信號的頻譜分析可以通過電腦程式或軟體計算完成,如Matlab,也可以通過頻譜分析部件或設備實現,如頻譜分析儀等。 8 is a schematic diagram of spectral analysis of a microwave signal using Fourier transform, in accordance with some embodiments of the present application. The security system 100 acquires microwave signals of the surrounding environment through the microwave sensor 110. In some embodiments, the microwave signal can be a time domain waveform 801, as in Figure 8-A. By performing a Fourier transform on the microwave signal, it can be converted from the time domain waveform 801 to the frequency domain waveform 803, as shown in Figure 8-B. The Fourier transform may be a continuous Fourier transform, a discrete Fourier transform, a short time interval Fourier transform, or a fast Fourier transform. In some embodiments, the frequency domain waveform 803 can be obtained by discretizing the time domain waveform 801 and then performing discrete Fourier transform or fast Fourier transform. The time domain signal 803 spectrum may be expanded to include a peak signal 802. After separating the peak signal 802 in the spectrum, the frequency domain signal 803 becomes a frequency curve 805, as shown in Figure 8-D. The time domain signal corresponding to the frequency domain curve 805 is 804, as shown in Figure 8-C. The peak signal 802 corresponds to a fixed frequency signal 807, as shown in Figure 8-F. The time domain signal corresponding to the fixed frequency signal 807 is 806, as shown in Figure 8-E. The frequency domain signal 805 corresponds to an irregular moving object, such as a person, an animal, a curtain, etc., and the fixed frequency signal 807 corresponds to a regular moving object, such as a fan, a pendulum clock, and the like. In some embodiments, the spectrum analysis of the microwave signal described above can be performed by computer program or software, such as Matlab, or by spectrum analysis components or devices, such as a spectrum analyzer.

返回圖7,步驟706可以包括判斷頻域信號中是否存在一個固定頻率。在一些實施例中,如果上述頻域信號中存在固定頻率,則滿足相應的次要安全條件,可以排除規律運動物體對安全系統100的影響。通過上述頻域分析,如果頻域信號中存在一個固定頻率,則在步驟708中濾除固定頻率。濾除固定頻率的方法可以通過電腦程式或軟體實現(如MatLab 等),通過物理元件或設備實現(如陷波器等)等。 Returning to Figure 7, step 706 can include determining if a fixed frequency is present in the frequency domain signal. In some embodiments, if a fixed frequency is present in the frequency domain signal, the corresponding secondary safety condition is met, and the influence of the regular moving object on the security system 100 can be eliminated. Through the frequency domain analysis described above, if there is a fixed frequency in the frequency domain signal, the fixed frequency is filtered out in step 708. The method of filtering out the fixed frequency can be implemented by computer program or software (such as MatLab). Etc.), implemented by physical components or equipment (such as traps, etc.).

如果上述微波信號中不存在固定頻率或者存在的固定頻率已在步驟708中濾除,則在步驟710中安全系統100判斷周邊環境中是否仍存在運動物體。在一些實施例中,將經過濾除固定頻率的微波信號與微波感測器發射的微波信號進行對比,如果仍存在其他頻率資訊,則可以判斷有非規律運動物體存在,例如入侵人員、入侵動物、飄動的窗簾、擺動的植物等。在一些實施例中,周邊環境中存在運動物體,違背首要安全條件。在一些實施例中,如果微波信號的處理結果違背首要安全條件,安全系統100可以開始將處理結果與其他次要安全條件進行比對。 If there is no fixed frequency in the microwave signal or the fixed frequency present has been filtered out in step 708, then in step 710 the security system 100 determines if there is still a moving object in the surrounding environment. In some embodiments, the microwave signal filtered by the fixed frequency is compared with the microwave signal emitted by the microwave sensor, and if other frequency information still exists, it can be determined that there is an irregular moving object, such as an intruder or an invading animal. Fluttering curtains, swinging plants, etc. In some embodiments, there are moving objects in the surrounding environment that violate the primary safety conditions. In some embodiments, if the processing result of the microwave signal violates the primary security condition, the security system 100 can begin to compare the processing result with other secondary security conditions.

圖9-A是根據本申請案的一些實施例的基於圖像信號成像處理的示意性流程圖。步驟902可以包括安全系統100獲取圖像感測器產生的圖像信號。該圖像信號可以是利用可見光形成的圖像信號,其他光源輔助可見光形成的圖像信號等。在一些實施例中,利用可見光形成的圖像信號可以是由一個圖像感測器和一個或多個相關聯的鏡頭所提供的。在一些實施例中,圖像信號也可以是由多個圖像感測器和多個相關聯的鏡頭提供。在一些實施例中,其他光源輔助可見光形成的圖像信號可以是由一個紅外線感測器和一個或多個圖像感測器及其相關聯的一個或多個鏡頭共同提供。安全系統100獲取的圖像中可以包括靜態物體,運動物體等。在一些實施例中,安全系統100獲取的圖像中可以包括一個或多個運動物體。此時圖像信號可能存在扭曲或失真;安全系統100可以採用一種或多種方法對該圖像信號進行預處理。該一種或多種預處理方法可以包括全景畸變校正、扭曲校正、偽彩色增強、長條圖增強、減影處理、傅立葉反投影、 卷積反投影等。 9-A is a schematic flow diagram of an image based imaging process in accordance with some embodiments of the present application. Step 902 can include the security system 100 acquiring an image signal generated by the image sensor. The image signal may be an image signal formed using visible light, and other light sources may assist an image signal formed by visible light or the like. In some embodiments, an image signal formed using visible light may be provided by one image sensor and one or more associated lenses. In some embodiments, the image signal may also be provided by a plurality of image sensors and a plurality of associated lenses. In some embodiments, the image signal formed by other light sources to assist visible light may be provided by an infrared sensor and one or more image sensors and their associated one or more lenses. The images acquired by the security system 100 may include static objects, moving objects, and the like. In some embodiments, one or more moving objects may be included in the image acquired by the security system 100. At this point, the image signal may be distorted or distorted; the security system 100 may preprocess the image signal using one or more methods. The one or more pre-processing methods may include panoramic distortion correction, distortion correction, pseudo color enhancement, bar graph enhancement, subtraction processing, Fourier back projection, Convolution back projection, etc.

在步驟904中,安全系統100可以獲取物體輪廓資訊。獲取物體輪廓資訊的方法可以包括邊界特徵法、傅立葉特徵描述法、幀間差分法、背景差分法、混合高斯模型法、光流法、邊緣檢測法等。運動物體的輪廓可以通過幀間差分法、背景差分法、混合高斯模型法、光流法、邊緣檢測法等方法中的一種或多種獲得。在一些實施例中,安全系統100可以採用幀間差分法獲取運動物體的輪廓資訊。在一些實施例中,幀間差分法可以將不同時刻獲取的包含運動物體的圖像進行差分運算來獲取運動物體的輪廓資訊。 In step 904, the security system 100 can obtain object contour information. The method for obtaining the contour information of the object may include a boundary feature method, a Fourier feature description method, an interframe difference method, a background difference method, a mixed Gaussian model method, an optical flow method, an edge detection method, and the like. The contour of the moving object can be obtained by one or more of an interframe difference method, a background difference method, a mixed Gaussian model method, an optical flow method, an edge detection method, and the like. In some embodiments, the security system 100 can acquire the contour information of the moving object using an interframe difference method. In some embodiments, the interframe difference method may perform differential operations on images of moving objects acquired at different times to obtain contour information of the moving object.

步驟906可以包括判斷上述物體的輪廓資訊是否滿足一定條件。在一些實施例中,該條件可以是輪廓是否為某一形狀,高寬比處於或者超出某一範圍等。在一些實施例中,上述形狀或者範圍可以是根據人、寵物、或其他動物的體型而設定的。在一些實施例中,安全系統100判斷物體的輪廓是否為人的輪廓或者輪廓高寬比是否滿足人的體型。在一些實施例中,安全系統100判斷物體的輪廓的高寬比是否大於一個臨界值。例如,臨界值可以是0.5、0.8、1、1.5等正數。 Step 906 can include determining whether the contour information of the object satisfies certain conditions. In some embodiments, the condition may be whether the contour is a shape, the aspect ratio is at or beyond a certain range, and the like. In some embodiments, the above shape or range may be set according to the size of a person, pet, or other animal. In some embodiments, the security system 100 determines whether the contour of the object is a human contour or whether the contour aspect ratio meets the size of the person. In some embodiments, the security system 100 determines if the aspect ratio of the contour of the object is greater than a threshold. For example, the threshold may be a positive number such as 0.5, 0.8, 1, 1.5, or the like.

當物體的輪廓不滿足給定的條件,則流程進入步驟908,安全系統100判斷動物入侵。在一些實施例中,安全系統100判定動物入侵滿足相應的次要安全條件,則可以排除動物對安全系統100判斷的影響。在一些實施例中,使用者可以根據家庭中是否有寵物,來決定當安全系統100判定有動物入侵是否滿足該次要安全條件。例如,如果家中沒有寵物,用戶可以取消該次要安全條件;安全系統100可以在檢測到動物時,採取包 括報警在內的一些措施。在一些實施例中,判斷動物入侵後,安全系統100可以通過蜂鳴器報警。在一些實施例中,安全系統100可以利用蜂鳴器、閃光燈等方式驅趕入侵動物。在一些實施例中,安全系統100可以鎖定被入侵區域的門窗,將入侵的動物限制在一個範圍內。 When the contour of the object does not satisfy the given condition, the flow proceeds to step 908 where the security system 100 determines the animal's invasion. In some embodiments, the security system 100 determines that the animal invasion meets the corresponding secondary safety condition, and the effect of the animal on the security system 100 determination can be ruled out. In some embodiments, the user may decide whether the security system 100 determines whether an animal invasion meets the secondary security condition based on whether there is a pet in the household. For example, if there is no pet in the home, the user can cancel the secondary safety condition; the security system 100 can take the package when the animal is detected Some measures including warnings. In some embodiments, after determining that the animal has invaded, the security system 100 can alert via a buzzer. In some embodiments, the security system 100 can utilize a buzzer, flash, or the like to drive invading animals. In some embodiments, the security system 100 can lock the doors and windows of the invaded area, limiting the invading animals to a range.

如果獲得的高寬比小於臨界值,則流程進入步驟910,安全系100判斷人員入侵,並啟動干預模式。安全系統100發起干預的詳細闡述可以參見本申請案其他部分,如圖11及其描述。 If the obtained aspect ratio is less than the threshold, the flow proceeds to step 910 where the security system 100 determines the intrusion of the person and initiates the intervention mode. A detailed description of the intervention initiated by the security system 100 can be found in other portions of this application, as shown in Figure 11 and its description.

圖9-B是根據本申請案的一些實施例的基於紅外線信號成像處理示意性流程圖。在步驟952,安全系統100可以獲取紅外線感測器產生的紅外線信號。安全系統100可以通過紅外線感測器獲取物體產生的熱輻射。在一些實施例中,物體輻射能量的分佈可以被某些元件,如光敏元件,捕捉而獲得紅外線信號。這種紅外線信號與物體表面的熱分佈相對應。通過對紅外線信號進行標定,可以將物體表面熱分佈與溫度相聯繫。在一些實施例中,紅外線信號可以以紅外線圖像的形式呈現。通過對紅外線信號進行標定,可以利用圖像顏色資訊反應物體的熱分佈。在一些實施例中,通過溫度標定,人體或動物對應的紅外線圖像中的顏色可以是紅色,植物、傢俱等對應的紅外線圖像中的顏色可以是藍色。 9-B is a schematic flow diagram of an infrared based signal imaging process in accordance with some embodiments of the present application. At step 952, the security system 100 can acquire an infrared signal generated by the infrared sensor. The security system 100 can obtain thermal radiation generated by an object through an infrared sensor. In some embodiments, the distribution of radiant energy of the object can be captured by certain elements, such as photosensitive elements, to obtain an infrared signal. This infrared signal corresponds to the heat distribution on the surface of the object. By calibrating the infrared signal, the surface heat distribution of the object can be correlated with temperature. In some embodiments, the infrared signal can be presented in the form of an infrared image. By calibrating the infrared signal, the image color information can be used to reflect the heat distribution of the object. In some embodiments, the color in the infrared image corresponding to the human or animal may be red by temperature calibration, and the color in the corresponding infrared image of the plant, furniture, etc. may be blue.

在一些實施例中,安全系統100通過一種或多種方法對獲取的紅外線信號進行預處理。預處理方法可以包括非均勻性校正、紅外線數位圖像細節增強等紅外線信號處理方法,或採用上述圖像信號預處理所用的方法。非均勻性校正可以包括基於定標的校正方法和基於場景的校正方法等。紅外線數位圖像細節增強可以包括長條圖均衡化(HE)、反銳化遮罩 法(UM)及模擬人眼視覺特徵進行的圖像增強方法等。 In some embodiments, the security system 100 pre-processes the acquired infrared signals by one or more methods. The preprocessing method may include an infrared signal processing method such as non-uniformity correction, infrared digital image detail enhancement, or a method used for preprocessing of the image signal described above. The non-uniformity correction may include a calibration-based correction method, a scene-based correction method, and the like. Infrared digital image detail enhancements can include bar graph equalization (HE), unsharp masking Method (UM) and image enhancement methods for simulating human visual features.

在步驟954,安全系統100判斷紅外線圖像是否滿足一定條件。該條件可以是紅外線圖像中是否存在溫度高於一定臨界值或者範圍的物體。該臨界值或者範圍可以根據人體或動物身體的溫度而設定。例如,該臨界值可以設定為36℃,或35℃至40℃之間等。該臨界值可以由使用者進行設定,系統預設值,系統自適應調整等。在一些實施例中,該臨界值與溫度標定相關。安全系統100可以通過獲取影響溫度標定的因素,如空氣濕度、環境溫度、紅外線感測器與物體表面所成角度等,自適應調整圖像中物體的溫度或臨界值的高低等。 At step 954, the security system 100 determines if the infrared image satisfies certain conditions. The condition may be whether an object having a temperature above a certain threshold or range is present in the infrared image. The threshold or range can be set according to the temperature of the human or animal body. For example, the threshold may be set to 36 ° C, or between 35 ° C and 40 ° C, and the like. The threshold can be set by the user, the system preset value, the system adaptive adjustment, and the like. In some embodiments, the threshold is related to temperature calibration. The safety system 100 can adaptively adjust the temperature or critical value of an object in an image by acquiring factors that affect temperature calibration, such as air humidity, ambient temperature, angle of the infrared sensor to the surface of the object, and the like.

如果安全系統100判斷獲取的紅外線圖像不滿足所述條件,則安全系統100確定周邊環境中不存在人或者動物,相應的次要安全條件被滿足。對應的流程返回步驟952,安全系統100繼續獲取環境中物體的溫度,並與預設的條件進行比較。如果判斷獲取的紅外線圖像滿足所述條件,則安全系統100確定周邊環境中存在人或者動物,不滿足相應的次要安全條件。對應的流程進入步驟956,在紅外線圖像中獲取物體輪廓。在一些實施例中,安全系統100獲取紅外線圖像中物體輪廓的方法可以為如上所述的邊界特徵法、傅立葉特徵描述法、幀間差分法、背景差分法、混合高斯模型法、光流法、邊緣檢測法等圖像輪廓特徵提取方法的一種或多種。在一些實施例中,安全系統100可以通過提取紅外線圖像中的顏色特徵進行處理以獲取紅外線圖像中物體輪廓。例如,安全系統100可以利用紅外線圖像中不同溫度對應不同顏色的特點,採用顏色長條圖等方法來提取人或動物的輪廓資訊。步驟958、步驟960和步驟962分別與圖9-A中所 述步驟906、步驟908和步驟910處理方法類似,此處不再贅述。 If the security system 100 determines that the acquired infrared image does not satisfy the condition, the security system 100 determines that no person or animal exists in the surrounding environment, and the corresponding secondary security condition is satisfied. The corresponding flow returns to step 952, and the security system 100 continues to acquire the temperature of the object in the environment and compares it with the preset conditions. If it is judged that the acquired infrared image satisfies the condition, the security system 100 determines that a person or an animal exists in the surrounding environment and does not satisfy the corresponding secondary safety condition. The corresponding flow proceeds to step 956 where the contour of the object is acquired in the infrared image. In some embodiments, the method for the security system 100 to acquire the contour of the object in the infrared image may be the boundary feature method, the Fourier feature description method, the interframe difference method, the background difference method, the mixed Gaussian model method, and the optical flow method as described above. One or more of image contour feature extraction methods such as edge detection. In some embodiments, the security system 100 can process by extracting color features in the infrared image to obtain an outline of the object in the infrared image. For example, the security system 100 can extract the contour information of a person or an animal by using a color bar graph or the like by using different colors of different colors in the infrared image. Step 958, step 960 and step 962 are respectively associated with Figure 9-A. The processing methods of step 906, step 908, and step 910 are similar, and are not described herein again.

需要注意的是,安全系統100在獲取周邊環境資訊,並判斷是否存在人員入侵時,可以將圖7中所述的微波信號與圖9-A或圖9-B中所述的光學信號中的至少一種結合使用,用於確定安全級別。在一些實施例中,利用微波信號與紅外線信號可以確定安全級別。在一些實施例中,微波信號可以作為首要安全條件或首要判斷方法,而紅外線信號可以作為次要安全條件或排除方法。例如,通過微波信號確定是否存在運動物體,如存在運動物體則違背首要安全條件。基於首要安全條件被違背的情況,安全系統100可以通過對比處理結果,依次判斷該運動物體是否滿足一個或多個次要安全條件。該一個或多個次要安全條件的例子可以包括檢測到的物體為規律運動物體、紅外線圖像溫度臨界值小於36℃、紅外線圖像中輪廓高寬比小於1等。在一些實施例中,所有次要安全條件都不滿足則確定安全級別為入侵。在一些實施例中,滿足運動物體為規律運動物體或者物體溫度臨界值小於36℃等安全條件被則確定安全級別為警戒。在一些實施例中,滿足輪廓高寬比小於1的安全條件則確定安全級別為威脅,此模式下安全系統100可能會繼續追蹤並檢測該物體。 It should be noted that the security system 100 can obtain the surrounding environment information and determine whether there is a human intrusion, and the microwave signal described in FIG. 7 can be compared with the optical signal described in FIG. 9-A or FIG. 9-B. At least one combination is used to determine the level of security. In some embodiments, the level of security can be determined using microwave signals and infrared signals. In some embodiments, the microwave signal can be used as a primary safety condition or a primary method of judgment, and the infrared signal can be used as a secondary safety condition or a method of elimination. For example, it is determined by the microwave signal whether there is a moving object, such as the presence of a moving object, which violates the primary safety condition. Based on the situation in which the primary security condition is violated, the security system 100 can sequentially determine whether the moving object satisfies one or more secondary security conditions by comparing the processing results. Examples of the one or more secondary safety conditions may include that the detected object is a regularly moving object, the infrared image temperature threshold is less than 36 ° C, and the contour aspect ratio in the infrared image is less than one. In some embodiments, all secondary security conditions are not met and the security level is determined to be an intrusion. In some embodiments, the safety level is determined to be a warning if the moving object is a regularly moving object or the object has a temperature threshold of less than 36 °C. In some embodiments, a safety condition that satisfies a contour aspect ratio of less than one determines that the security level is a threat, in which the security system 100 may continue to track and detect the object.

在一些實施例中,首要安全條件被違背後,安全系統100可以確定當前安全級別為威脅。在一些實施例中,安全系統100可以進一步判斷一個或多個次要安全條件是否被滿足。根據判斷次要安全條件是否滿足,安全系統100可以確定相應的安全級別。在一些實施例中,當僅有首要安全條件被違背,所有次要安全條件都不被滿足時,安全系統100可以確定當前安全級別為入侵。在一些實施例中,安全系統100可以啟動干 預程式,並根據干預結果決定是否報警。 In some embodiments, the primary security condition is violated and the security system 100 can determine that the current security level is a threat. In some embodiments, security system 100 can further determine whether one or more secondary security conditions are met. Based on determining whether the secondary security condition is met, the security system 100 can determine the corresponding security level. In some embodiments, when only the primary security condition is violated and all secondary security conditions are not met, the security system 100 can determine that the current security level is an intrusion. In some embodiments, the security system 100 can initiate dry Pre-program and decide whether to report the alarm based on the intervention result.

在一些實施例中安全系統100會自適應地使用或忽略一個或多個次要安全條件。例如外界亮度變暗時,物體輪廓識別較為困難,則排除圖像信號輪廓高寬比小於1這一次要安全條件。 In some embodiments the security system 100 will adaptively use or ignore one or more secondary security conditions. For example, when the brightness of the outside is dark, the contour recognition of the object is difficult, and the safety condition of the image signal aspect ratio of less than 1 is excluded.

圖10是根據本申請案的一些實施例的安全系統基於微波信號和圖像信號判斷是否有人員入侵的示意性流程圖。步驟1002可以包括安全系統100獲取周邊環境的微波信號和圖像資訊。微波信號可以為安全系統100通過微波感測器獲取的周邊環境中物體反射的信號。圖像資訊可以是通過圖像感測器獲取的周邊環境的可見光或紅外線線成像。在一些實施例中,微波信號可以是一個類比的電壓波形;圖像資訊可以是包含周邊環境的一個或多個圖像。 10 is a schematic flow diagram of a security system determining whether a person has invaded based on microwave signals and image signals, in accordance with some embodiments of the present application. Step 1002 can include the security system 100 acquiring microwave signals and image information of the surrounding environment. The microwave signal may be a signal reflected by an object in the surrounding environment obtained by the security system 100 through the microwave sensor. The image information may be visible or infrared line imaging of the surrounding environment acquired by the image sensor. In some embodiments, the microwave signal can be an analog voltage waveform; the image information can be one or more images containing the surrounding environment.

在步驟1004,安全系統100可以判斷是否存在運動物體。在一些實施例中,獲取的微波信號可以是電壓波形。當電壓波形的幅值大於一定臨界值時,安全系統100判定周邊環境中存在運動物體。在一些實施例中,該臨界值為500mV、700mV、1000mV等。若安全系統100判斷的結果為周邊環境中存在運動物體,則首要安全條件被違背。此時安全系統100開始將信號處理結果與一個或多個次要安全條件進行比對,流程進入步驟1006。在一些實施例中,安全系統100可以在後續步驟中判斷所有次要安全條件,以確定當前安全級別。若安全系統100判斷沒有運動物體,則可以返回步驟1002,安全系統100繼續監測並獲取微波信號及圖像資訊。 At step 1004, the security system 100 can determine if there is a moving object. In some embodiments, the acquired microwave signal can be a voltage waveform. When the magnitude of the voltage waveform is greater than a certain threshold, the security system 100 determines that there is a moving object in the surrounding environment. In some embodiments, the threshold is 500 mV, 700 mV, 1000 mV, and the like. If the result of the security system 100 is that there is a moving object in the surrounding environment, the primary security condition is violated. At this point the security system 100 begins comparing the signal processing results to one or more secondary security conditions, and the flow proceeds to step 1006. In some embodiments, the security system 100 can determine all secondary security conditions in a subsequent step to determine the current security level. If the security system 100 determines that there is no moving object, it may return to step 1002, and the security system 100 continues to monitor and acquire the microwave signal and the image information.

在步驟1006,對包含一個或多個運動物體的微波信號進行時域頻域轉換。在一些實施例中,時域頻域轉換是利用傅立葉轉換、Z轉換、 小波轉換等方法中的一種或多種。在一些實施例中,安全系統100可以對上述電壓波形進行抽樣並離散處理,並進行離散傅立葉轉換、快速傅立葉轉換或小波轉換等,將獲取的時域信號轉換為頻域信號。步驟1008和1010包括判斷並濾除頻域信號中的固定頻率成分資訊。該固定頻率成分資訊對應周邊環境中的規律運動物體。在一些實施例中,頻域信號中存在固定頻率成分資訊。通過分析固定頻率成分,可以判斷是否存在規律運動物體,進而可以排除規律運動物體對安全系統100監測判斷人員入侵的影響。在一些實施例中,上述規律運動物體可以包括一些電器,如風扇、擺鐘、掃地機器人等。 At step 1006, a time domain frequency domain conversion is performed on the microwave signal containing one or more moving objects. In some embodiments, the time domain frequency domain conversion is using Fourier transform, Z transform, One or more of methods such as wavelet transform. In some embodiments, the security system 100 may sample and discretely process the voltage waveform described above, and perform discrete Fourier transform, fast Fourier transform, or wavelet transform, etc., to convert the acquired time domain signal into a frequency domain signal. Steps 1008 and 1010 include determining and filtering out fixed frequency component information in the frequency domain signal. The fixed frequency component information corresponds to a regular moving object in the surrounding environment. In some embodiments, there is fixed frequency component information in the frequency domain signal. By analyzing the fixed frequency components, it can be judged whether there is a regular moving object, and thus the influence of the regular moving object on the safety system 100 monitoring and judging personnel invasion can be excluded. In some embodiments, the regularly moving object may include some electrical appliances such as a fan, a pendulum clock, a sweeping robot, and the like.

如果上述頻域信號不包括固定成分資訊,或者固定成分資訊被濾除後仍存在運動物體。則在步驟1012中進行圖像比對。安全系統100可以利用一種或多種圖像比對或處理方法提取上述運動物體的資訊。在一些實施例中,安全系統100通過利用幀間差分法、背景差分法、光流法、混合高斯模型法、邊緣檢測法等方法,獲取上述運動物體輪廓資訊。步驟1014可以包括判斷輪廓資訊是否包括人體輪廓。在一些實施例中,將獲取的輪廓形狀或參數與資料庫中預設輪廓的形狀或參數進行比對,可以確定上述運動物體是否為人體。在一些實施例中,資料庫中預設輪廓的形狀或參數可以根據不同人的體型而設定。在一些實施例中,上述輪廓參數為輪廓的高寬比。在一些實施例中,如果輪廓高寬比小於某一個參照值或參照範圍,則滿足相應的次要安全條件,排除了人員入侵的可能,則可以確定安全級別為警戒,流程返回步驟1002。如果輪廓高寬比大於某一個參照值或參照範圍,則在步驟1016中,安全系統100判定存在人員入侵,並啟動 干預。在一些實施例中,上述參照值可以是0.5、0.8、1、1.5等正數。在一些實施例中,上述參照範圍可以是0.5-0.8、0.8-1、1-1.5等範圍。在一些實施例中,安全系統100可以通過圖11所示的方式和流程對入侵人員進行干預。 If the above frequency domain signal does not include fixed component information, or the fixed component information is filtered out, there is still a moving object. Image matching is then performed in step 1012. The security system 100 can utilize one or more image comparisons or processing methods to extract information about the moving objects described above. In some embodiments, the security system 100 acquires the contour information of the moving object by using an interframe difference method, a background difference method, an optical flow method, a mixed Gaussian model method, an edge detection method, or the like. Step 1014 can include determining if the contour information includes a human contour. In some embodiments, the acquired contour shape or parameter is compared with the shape or parameter of the preset contour in the database, and it can be determined whether the moving object is a human body. In some embodiments, the shape or parameters of the preset contours in the database may be set according to different person's body types. In some embodiments, the contour parameter is the aspect ratio of the contour. In some embodiments, if the aspect aspect ratio is less than a certain reference value or reference range, the corresponding secondary safety condition is met, and the possibility of human intrusion is eliminated, the security level may be determined to be an alert, and the flow returns to step 1002. If the aspect aspect ratio is greater than a certain reference value or reference range, then in step 1016, the security system 100 determines that a human intrusion has occurred and initiated Intervention. In some embodiments, the above reference value may be a positive number such as 0.5, 0.8, 1, 1.5, or the like. In some embodiments, the above reference range may be in the range of 0.5-0.8, 0.8-1, 1-1.5, and the like. In some embodiments, the security system 100 can intervene intruders through the manner and flow illustrated in FIG.

圖11是根據本申請案一些實施例的安全系統發起干預的示意性流程圖。步驟1102可以包括安全系統100獲取安全級別。安全系統100通過對獲取的周邊環境資訊進行處理,並根據處理結果與安全條件的對比,確定當前的安全級別。周邊環境資訊可以是周邊環境的微波信號、紅外線信號、圖像信號和聲音信號等。 11 is a schematic flow diagram of a security system initiated intervention in accordance with some embodiments of the present application. Step 1102 can include the security system 100 obtaining a security level. The security system 100 processes the acquired surrounding environment information and determines the current security level based on the comparison between the processing result and the security conditions. The surrounding environment information may be microwave signals, infrared signals, image signals, and sound signals of the surrounding environment.

步驟1104可以包括安全系統100判斷是否需要身份認證。在一些實施例中,當前安全級別滿足一定條件時,流程返回步驟1102,安全系統100繼續監測並獲取環境資訊,並獲取安全級別。在一些實施例中,所述條件可以是當前安全級別為多個安全模式中的一個或多個,例如休眠或警戒。如果安全系統100判定需要身份認證,則執行步驟1106。在一些實施例中,對應的安全級別為威脅或入侵時,判定需要身份認證。 Step 1104 can include the security system 100 determining if identity authentication is required. In some embodiments, when the current security level meets certain conditions, the process returns to step 1102, and the security system 100 continues to monitor and obtain environmental information and obtain a security level. In some embodiments, the condition may be that the current security level is one or more of a plurality of security modes, such as dormancy or alert. If the security system 100 determines that authentication is required, then step 1106 is performed. In some embodiments, when the corresponding security level is a threat or an intrusion, the determination requires identity authentication.

步驟1106可以包括需要嫌疑人員進行身份認證時,安全系統100提示並要求嫌疑人員進行身份認證。在一些實施例中,安全系統100提供一個短時間的緩衝,也稱為干預時間。在干預時間內,嫌疑人員被要求進行身份認證。身份認證的方式可以是密碼輸入、人臉識別、虹膜識別、指紋錄入、回答問題、圖像選擇、手勢表示、聲紋識別等。在一些實施例中,安全系統110通過輸入輸出介面發送身份認證提示資訊,可以用於提示嫌疑人員身份認證的內容和方式。在一些實施例中,提示資訊可以包括 但不限於語音、文字、指示燈、圖片或者數位等。 Step 1106 can include the security system 100 prompting and requesting the suspect to perform identity authentication when the suspect is required to perform identity authentication. In some embodiments, the security system 100 provides a short time buffer, also referred to as intervention time. During the intervention period, the suspect was asked to be authenticated. The authentication method can be password input, face recognition, iris recognition, fingerprint entry, answering questions, image selection, gesture representation, voiceprint recognition, and the like. In some embodiments, the security system 110 sends the identity authentication prompt information through the input and output interface, which can be used to prompt the content and manner of the identity authentication of the suspect. In some embodiments, the prompt information can include But not limited to voice, text, lights, pictures or digital.

基於嫌疑人員提供的身份認證資訊,步驟1108中安全系統100判斷認證是否通過。在一些實施例中,安全系統100可以將嫌疑物件錄入的資訊與資料庫中保存的資訊進行匹配。資料庫中保存的資訊可以包括密碼、指紋、面部特徵、虹膜特徵、認證問題和/或答案、認證手勢等。 Based on the identity authentication information provided by the suspect, the security system 100 determines in step 1108 whether the authentication has passed. In some embodiments, the security system 100 can match the information entered by the suspect object with the information stored in the database. The information stored in the database may include passwords, fingerprints, facial features, iris features, authentication questions and/or answers, authentication gestures, and the like.

如果認證通過,則流程進入步驟810,安全系統100確定當前安全級別為休眠。休眠等級適用於主人在家時使用,可以保證主人在家裡自由活動,不必擔心誤觸警報器而影響正常生活。如果認證未通過,則流程進入步驟812安全系統100產生報警資訊。在一些實施例中,安全系統100可以通過報警器報警,並採取適當的安全措施。在一些實施例中,安全系統100同時打開所有房間的燈光,提醒入侵。 If the authentication is passed, the flow proceeds to step 810 where the security system 100 determines that the current security level is dormant. The dormancy level is suitable for the owner to use at home, which can ensure that the owner is free to move at home, without having to worry about accidentally touching the alarm and affecting normal life. If the authentication fails, the flow proceeds to step 812 where the security system 100 generates an alert message. In some embodiments, the security system 100 can alert via an alarm and take appropriate security measures. In some embodiments, the security system 100 simultaneously turns on the lights of all rooms to alert the intrusion.

上文已對基本概念做了描述,顯然,對於本領域技術人員來說,上述揭示僅僅作為示例,而並不構成對本申請案的限定。雖然此處並沒有明確說明,本領域技術人員可能會對本申請案進行各種修改、改進和修正。該類修改、改進和修正在本申請案中被建議,所以該類修改、改進、修正仍屬於本申請案示範實施例的精神和範圍。 The basic concept has been described above, and it is obvious to those skilled in the art that the above disclosure is only an example and does not constitute a limitation of the present application. Various modifications, improvements and improvements may be made by the skilled person in the art without departing from the invention. Such modifications, improvements, and modifications are suggested in the present application, and such modifications, improvements, and modifications are still within the spirit and scope of the exemplary embodiments of the present application.

同時,本申請案使用了特定詞語來描述本申請案的實施例。如“一個實施例”、“一實施例”、和/或“一些實施例”意指與本申請案至少一個實施例相關的某一特徵、結構或特點。因此,應強調並注意的是,本說明書中在不同位置兩次或多次提及的“一實施例”或“一個實施例”或“一替代性實施例”並不一定是指同一實施例。此外,本申請案的一個或多個實施例中的某些特徵、結構或特點可以進行適當的組合。 Also, the present application uses specific words to describe embodiments of the present application. An embodiment, an embodiment, and/or some embodiments mean a feature, structure, or characteristic associated with at least one embodiment of the present application. Therefore, it should be emphasized and noted that “an embodiment” or “an embodiment” or “an alternative embodiment” that is referred to in this specification two or more times in different positions does not necessarily refer to the same embodiment. . Furthermore, some of the features, structures, or characteristics of one or more embodiments of the present application can be combined as appropriate.

此外,本領域技術人員可以理解,本申請案的各態樣可以通過若干具有可專利性的種類或情況進行說明和描述,包括任何新的和有用的工序、機器、產品或物質的組合,或對他們的任何新的和有用的改進。相應地,本申請案的各個態樣可以完全由硬體執行、可以完全由軟體(包括固件、常駐軟體、微碼等)執行、也可以由硬體和軟體組合執行。以上硬體或軟體均可被稱為“資料塊”、“模組”、“引擎”、“單元”、“元件”或“系統”。此外,本申請案的各態樣可能表現為位於一個或多個電腦可讀媒體中的電腦產品,該產品包括電腦可讀程式編碼。 Moreover, those skilled in the art will appreciate that aspects of the present application can be illustrated and described by a number of patentable categories or conditions, including any new and useful process, machine, product, or combination of materials, or Any new and useful improvements to them. Accordingly, various aspects of the present application may be performed entirely by hardware, may be performed entirely by software (including firmware, resident software, microcode, etc.), or may be performed by a combination of hardware and software. The above hardware or software may be referred to as "data block", "module", "engine", "unit", "component" or "system". Moreover, aspects of the present application may be embodied in a computer product located in one or more computer readable media, including a computer readable program code.

電腦可讀信號媒體可能包含一個內含有電腦程式編碼的傳播資料信號,例如在基帶上或作為載波的一部分。該傳播信號可能有多種表現形式,包括電磁形式、光形式等等、或合適的組合形式。電腦可讀信號媒體可以是除電腦可讀存儲媒體之外的任何電腦可讀媒體,該媒體可以通過連接至一個指令執行系統、裝置或設備以實現通訊、傳播或傳輸供使用的程式。位於電腦可讀信號媒體上的程式編碼可以通過任何合適的媒體進行傳播,包括無線電、電纜、光纖電纜、射頻信號、或類似媒體、或任何上述媒體的組合。 A computer readable signal medium may include a propagated data signal containing a computer program code, such as on a baseband or as part of a carrier. The propagated signal may have a variety of manifestations, including electromagnetic forms, optical forms, and the like, or a suitable combination. The computer readable signal medium can be any computer readable medium other than a computer readable storage medium that can be communicated, propagated, or transmitted for use by connection to an instruction execution system, apparatus, or device. The program code located on the computer readable signal medium can be propagated over any suitable medium, including radio, cable, fiber optic cable, radio frequency signals, or similar media, or any combination of the above.

本申請案各部分操作所需的電腦程式編碼可以用任意一種或多種程式語言編寫,包括物件導向程式設計語言如Java、Scala、Smalltalk、Eiffel、JADE、Emerald、C++、C#、VB.NET、Python等,常規程式化程式設計語言如C語言、Visual Basic、Fortran 2003、Perl、COBOL 2002、PHP、ABAP,動態程式設計語言如Python、Ruby和Groovy,或其他程式設計語言等。該程式編碼可以完全在使用者電腦上運行、或作為獨立的套裝軟體在使用者 電腦上運行、或部分在使用者電腦上運行部分在遠端電腦運行、或完全在遠端電腦或伺服器上運行。在後種情況下,遠端電腦可以通過任何網路形式與使用者電腦連接,比如區域網路(LAN)或廣域網路(WAN),或連接至外部電腦(例如通過網際網路),或在雲計算環境中,或作為服務使用如軟體即服務(SaaS)。 The computer program code required for the operation of each part of this application can be written in any one or more programming languages, including object oriented programming languages such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C++, C#, VB.NET, Python. Etc., regular stylized programming languages such as C, Visual Basic, Fortran 2003, Perl, COBOL 2002, PHP, ABAP, dynamic programming languages such as Python, Ruby and Groovy, or other programming languages. The program code can be run entirely on the user's computer or as a stand-alone package software. The computer is running, or partially running on the user's computer, running partially on the remote computer, or running entirely on the remote computer or server. In the latter case, the remote computer can be connected to the user's computer via any network, such as a local area network (LAN) or a wide area network (WAN), or connected to an external computer (eg via the Internet), or In a cloud computing environment, or as a service such as Software as a Service (SaaS).

此外,除非申請專利範圍中明確說明,本申請案所述處理元素和序列的順序、數位字母的使用、或其他名稱的使用,並非用於限定本申請案流程和方法的順序。儘管上述揭示中通過各種示例討論了一些目前認為有用的實施例,但應當理解的是,該類細節僅起到說明的目的,附加的申請專利範圍並不僅限於揭露的實施例,相反,申請專利範圍旨在覆蓋所有符合本申請案實施例實質和範圍的修正和均等組合。例如,雖然以上所描述的系統元件可以通過硬體設備實現,但是也可以只通過軟體的解決方案得以實現,如在現有的伺服器或移動設備上安裝所描述的系統。 In addition, the order of processing elements and sequences, the use of digits, or the use of other names in the present application are not intended to limit the order of the processes and methods of the present application, unless explicitly stated in the claims. While the above disclosure discusses some embodiments that are presently considered useful by various examples, it should be understood that such details are for illustrative purposes only, and the scope of the appended claims is not limited to the disclosed embodiments. The scope is intended to cover all such modifications and alternatives For example, although the system components described above may be implemented by hardware devices, they may be implemented only by a software solution, such as installing the described system on an existing server or mobile device.

同理,應當注意的是,為了簡化本申請案揭露的表述,從而幫助對一個或多個實施例的理解,前文對本申請案實施例的描述中,有時會將多種特徵歸併至一個實施例、附圖或對其的描述中。但是,這種揭露方法並不意味著本申請案物件所需要的特徵比申請專利範圍中提及的特徵多。實際上,實施例的特徵要少於上述揭露的單個實施例的全部特徵。 In the same way, it should be noted that in order to simplify the description of the present application to facilitate the understanding of one or more embodiments, in the foregoing description of the embodiments of the present application, various features are sometimes combined into one embodiment. , drawings or descriptions thereof. However, this method of disclosure does not mean that the features of the present application require more features than those mentioned in the scope of the patent application. In fact, the features of the embodiments are less than all of the features of the single embodiments disclosed above.

一些實施例中使用了描述成分、屬性數量的數位,應當理解的是,此類用於實施例描述的數字,在一些示例中使用了修飾詞“大約”、“近似”或“大體上”來修飾。除非另外說明,“大約”、“近似”或“大體上”表明所述數字允許有±20%的變化。相應地,在一些實施例中,說明 書和申請專利範圍中使用的數值參數均為近似值,該近似值根據個別實施例所需特點可以發生改變。在一些實施例中,數值參數應考慮規定的有效數位並採用一般位數保留的方法。儘管本申請案一些實施例中用於確認其範圍廣度的數值域和參數為近似值,在具體實施例中,此類數值的設定在可行範圍內盡可能精確。 Numbers describing the number of components, attributes, are used in some embodiments, it being understood that such numbers are used in the examples, and in some examples the modifiers "about", "approximately" or "substantially" are used. Modification. Unless otherwise stated, "about", "approximately" or "substantially" indicates that the number is allowed to vary by ±20%. Accordingly, in some embodiments, the description Numerical parameters used in the book and in the scope of the claims are approximations that may vary depending upon the desired characteristics of the individual embodiments. In some embodiments, the numerical parameters should take into account the specified significant digits and employ a method of general digit retention. Although numerical fields and parameters used to confirm the breadth of its range in some embodiments of the present application are approximations, in certain embodiments, the setting of such values is as accurate as possible within the feasible range.

針對本申請案引用的每個專利、專利申請、專利申請公開物和其他材料,如文章、書籍、說明書、出版物、文檔等,特此將其全部內容併入本申請案作為參考。與本申請案內容不一致或產生衝突的申請歷史文件除外,對本申請案申請專利範圍最廣範圍有限制的文件(當前或之後附加於本申請案中的)也除外。需要說明的是,如果本申請案附屬材料中的描述、定義、和/或術語的使用與本申請案所述內容有不一致或衝突的地方,以本申請案的描述、定義和/或術語的使用為准。 Each of the patents, patent applications, patent applications, and other materials, such as articles, books, specifications, publications, documents, etc. Except for the application history documents that are inconsistent or conflicting with the content of this application, the documents that have the broadest scope of patent application scope (currently or later attached to this application) are also excluded. It should be noted that, where the use of the descriptions, definitions, and/or terms in the accompanying materials of the present application is inconsistent or conflicting with the content described in the present application, the description, definition, and/or terminology of the present application. The use shall prevail.

最後,應當理解的是,本申請案中所述實施例僅用以說明本申請案實施例的原則。其他的變形也可能屬於本申請案的範圍。因此,作為示例而非限制,本申請案實施例的替代配置可視為與本申請案的教導一致。相應地,本申請案的實施例不侷限於本申請案明確介紹和描述的實施例。 Finally, it should be understood that the embodiments described in this application are merely illustrative of the principles of the embodiments of the present application. Other variations are also possible within the scope of the present application. Thus, by way of example, and not limitation,, and FIG Accordingly, the embodiments of the present application are not limited to the embodiments that are specifically described and described herein.

Claims (20)

一種系統,包括:一個感測模組,被配置為:接收來自位於環境中的一個運動物體的微波信號,和獲取包含有所述運動物體的至少一個光學圖像;與一個處理器,被配置為:根據所述微波信號,確定與所述環境相關聯的一個頻率資訊,根據所述至少一個光學圖像,確定所述運動物體的輪廓,和根據至少部分所述頻率資訊和所述運動物體的輪廓,確定一個安全級別。 A system comprising: a sensing module configured to: receive a microwave signal from a moving object located in the environment, and acquire at least one optical image containing the moving object; and a processor configured Determining, according to the microwave signal, a frequency information associated with the environment, determining an outline of the moving object based on the at least one optical image, and based on at least a portion of the frequency information and the moving object The outline determines a level of security. 根據申請專利範圍第1項所述的系統,所述光學感測器包括一個圖像感測器或者紅外線感測器。 The optical sensor according to the system of claim 1, wherein the optical sensor comprises an image sensor or an infrared sensor. 根據申請專利範圍第2項所述的系統,所述圖像感測器與一個或多個鏡頭相關聯。 In accordance with the system of claim 2, the image sensor is associated with one or more lenses. 根據申請專利範圍第2項所述的系統,所述紅外線感測器包括紅熱成像儀。 According to the system of claim 2, the infrared sensor comprises a red thermal imager. 根據申請專利範圍第1項所述的系統,所述頻率資訊包含與所述運動物體相關的一個固定頻率。 The system of claim 1, wherein the frequency information comprises a fixed frequency associated with the moving object. 根據申請專利範圍第1項所述的系統,所述頻率資訊由所述處理器通過對所述微波信號進行傅立葉轉換獲得。 According to the system of claim 1, the frequency information is obtained by the processor by performing Fourier transform on the microwave signal. 根據申請專利範圍第1項所述的系統,所述運動物體的輪廓由所述處理器將一種影像處理方法應用於所述至少一個光學圖像獲得。 In accordance with the system of claim 1, the contour of the moving object is obtained by the processor applying an image processing method to the at least one optical image. 根據申請專利範圍第7項所述的系統,所述影像處理方法是選自幀間差分法、背景差分法、光流法、邊緣檢測法和混合高斯模型法中的至少一種。 According to the system of claim 7, the image processing method is at least one selected from the group consisting of an interframe difference method, a background difference method, an optical flow method, an edge detection method, and a hybrid Gaussian model method. 根據申請專利範圍第1項所述的系統,所述處理器進一步被配置為根據所述運動物體的輪廓的高寬比,確定所述運動物體是否為人體。 The system of claim 1, wherein the processor is further configured to determine whether the moving object is a human body based on an aspect ratio of a contour of the moving object. 根據申請專利範圍第1項所述的系統,進一步包括一個警報器,被配置為當所述安全級別低於一定臨界值,產生一個報警信號。 The system of claim 1, further comprising an alarm configured to generate an alarm signal when the security level is below a certain threshold. 一種方法,包括:接收來自位於環境中的一個運動物體的微波信號;獲取包含有所述運動物體的至少一個光學圖像;根據所述微波信號,由一個處理器確定與所述環境相關聯的一個頻率資訊;根據所述至少一個光學圖像,確定所述運動物體的輪廓;以及根據至少部分所述頻率資訊和所述運動物體的輪廓,確定一個安全級別。 A method comprising: receiving a microwave signal from a moving object located in an environment; acquiring at least one optical image containing the moving object; determining, by the processor, an association associated with the environment based on the microwave signal a frequency information; determining an outline of the moving object according to the at least one optical image; and determining a security level according to at least part of the frequency information and an outline of the moving object. 根據申請專利範圍第11項所述的方法,所述光學圖像是由一個圖像感測器或者紅外線感測器所採集的。 According to the method of claim 11, the optical image is acquired by an image sensor or an infrared sensor. 根據申請專利範圍第12項所述的方法,所述光學感測器與一個或多個鏡頭相關聯。 The optical sensor is associated with one or more lenses according to the method of claim 12. 根據申請專利範圍第12項所述的方法,所述紅外線感測器包括紅外線熱成像儀。 The infrared sensor includes an infrared thermal imager according to the method of claim 12. 根據申請專利範圍第11項所述的方法,所述頻率資訊包含與所述運動 物體相關的一個固定頻率。 According to the method of claim 11, the frequency information includes the movement A fixed frequency associated with an object. 根據申請專利範圍第11項所述的方法,所述頻率由所述微波信號進行傅立葉轉換獲得。 According to the method of claim 11, the frequency is obtained by Fourier transforming the microwave signal. 根據申請專利範圍第11項所述的方法,所述運動物體的輪廓由所述至少一個光學圖像通過幀間差分法、背景差分法、光流法、邊緣檢測法和混合高斯模型法中的至少一種影像處理方法獲得。 The method of claim 11, wherein the contour of the moving object is passed by the at least one optical image by an interframe difference method, a background difference method, an optical flow method, an edge detection method, and a mixed Gaussian model method. At least one image processing method is obtained. 根據申請專利範圍第11項所述的方法,通過計算所述運動物體的輪廓的高寬比,確定所述運動物體是否為人體。 According to the method of claim 11, the aspect ratio of the moving object is calculated to determine whether the moving object is a human body. 根據申請專利範圍第11項所述的方法,包括當所述安全級別低於一定臨界值,以一種報警方式報警。 The method of claim 11, wherein the alarm is issued in an alarm manner when the security level is below a certain threshold. 一種電腦可讀的存儲媒體,其存儲可執行指令,所述可執行指令使得一個電腦設備執行,包括:接收來自位於環境中的一個運動物體的微波信號;獲取包含有所述運動物體的至少一個光學圖像;根據所述微波信號,確定與所述環境相關聯的一個頻率資訊;根據所述至少一個光學圖像,確定所述運動物體的輪廓;以及根據至少部分所述頻率資訊和所述運動物體的輪廓,確定一個安全級別。 A computer readable storage medium storing executable instructions for causing a computer device to perform, comprising: receiving a microwave signal from a moving object located in an environment; acquiring at least one of the moving objects An optical image; determining, according to the microwave signal, a frequency information associated with the environment; determining an outline of the moving object based on the at least one optical image; and based on at least a portion of the frequency information and the The outline of the moving object determines a level of security.
TW106120897A 2017-06-22 2017-06-22 Security system and method capable of automatically and instantly processing environmental monitoring information to determine a level of security TW201901626A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW106120897A TW201901626A (en) 2017-06-22 2017-06-22 Security system and method capable of automatically and instantly processing environmental monitoring information to determine a level of security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW106120897A TW201901626A (en) 2017-06-22 2017-06-22 Security system and method capable of automatically and instantly processing environmental monitoring information to determine a level of security

Publications (1)

Publication Number Publication Date
TW201901626A true TW201901626A (en) 2019-01-01

Family

ID=65803406

Family Applications (1)

Application Number Title Priority Date Filing Date
TW106120897A TW201901626A (en) 2017-06-22 2017-06-22 Security system and method capable of automatically and instantly processing environmental monitoring information to determine a level of security

Country Status (1)

Country Link
TW (1) TW201901626A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11682277B2 (en) 2017-10-26 2023-06-20 Raptor Vision, Llc Video analytics system
TWI819450B (en) * 2020-12-30 2023-10-21 美商猛龍視訊有限責任公司 Monitoring systems
US11961319B2 (en) 2019-04-10 2024-04-16 Raptor Vision, Llc Monitoring systems

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11682277B2 (en) 2017-10-26 2023-06-20 Raptor Vision, Llc Video analytics system
US11961319B2 (en) 2019-04-10 2024-04-16 Raptor Vision, Llc Monitoring systems
TWI819450B (en) * 2020-12-30 2023-10-21 美商猛龍視訊有限責任公司 Monitoring systems

Similar Documents

Publication Publication Date Title
WO2018014326A1 (en) Security system and method
US11132881B2 (en) Electronic devices capable of communicating over multiple networks
JP7241776B2 (en) audio/video device with viewer
US10475311B2 (en) Dynamic assessment using an audio/video recording and communication device
US11196966B2 (en) Identifying and locating objects by associating video data of the objects with signals identifying wireless devices belonging to the objects
US10891839B2 (en) Customizable intrusion zones associated with security systems
US10593174B1 (en) Automatic setup mode after disconnect from a network
US20180176512A1 (en) Customizable intrusion zones associated with security systems
US11341825B1 (en) Implementing deterrent protocols in response to detected security events
US11217076B1 (en) Camera tampering detection based on audio and video
US11240474B1 (en) Reporting connectivity problems for electronic devices
US11115629B1 (en) Confirming package delivery using audio/video recording and communication devices
US10713928B1 (en) Arming security systems based on communications among a network of security systems
US11257226B1 (en) Low-overhead motion classification
US11659144B1 (en) Security video data processing systems and methods
US11164435B1 (en) Audio/video recording and communication doorbell devices with supercapacitors
US11302156B1 (en) User interfaces associated with device applications
TW201901626A (en) Security system and method capable of automatically and instantly processing environmental monitoring information to determine a level of security
US10791607B1 (en) Configuring and controlling light emitters
US10559172B1 (en) Customized notifications based on device characteristics
US11501618B1 (en) Security device with user-configurable motion detection settings
US11546951B1 (en) Touchless setup mode initiation for networked devices
US11423762B1 (en) Providing device power-level notifications
US10914811B1 (en) Locating a source of a sound using microphones and radio frequency communication
US11350060B1 (en) Using motion sensors for direction detection