WO2019148695A1 - 安全监控方法、装置、安保设备及系统 - Google Patents

安全监控方法、装置、安保设备及系统 Download PDF

Info

Publication number
WO2019148695A1
WO2019148695A1 PCT/CN2018/087750 CN2018087750W WO2019148695A1 WO 2019148695 A1 WO2019148695 A1 WO 2019148695A1 CN 2018087750 W CN2018087750 W CN 2018087750W WO 2019148695 A1 WO2019148695 A1 WO 2019148695A1
Authority
WO
WIPO (PCT)
Prior art keywords
owner
photo
house
entrance
image
Prior art date
Application number
PCT/CN2018/087750
Other languages
English (en)
French (fr)
Inventor
关岩
Original Assignee
深圳春沐源控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳春沐源控股有限公司 filed Critical 深圳春沐源控股有限公司
Publication of WO2019148695A1 publication Critical patent/WO2019148695A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction

Definitions

  • the present invention relates to the field of information technology, and in particular, to a security monitoring method, device, security device and system.
  • a security monitoring method for security devices comprising:
  • the house status information is used to indicate that the owner is away from home and there is no one in the house, the house status information is sent to the monitoring device;
  • the method further includes:
  • the determining whether the second photo has an abnormality with respect to the first photo includes:
  • the method when it is determined that the image of the person is included in the partial image, the method further includes:
  • the recognized character feature is inconsistent with the pre-stored character feature, it is determined that the second photo has an abnormality with respect to the first photo.
  • the method further includes:
  • the preset warning audio is output using the speaker.
  • a safety monitoring device that operates on security equipment, including:
  • a receiving unit configured to receive owner status information of the owner
  • a sending unit configured to send the house status information to the monitoring device if the house status information is used to indicate that the owner is away from home and there is no one in the house;
  • the receiving unit is further configured to receive a first photo that is sent after the monitoring device photographs an entrance and exit of the owner's house when the owner leaves the home, and receives the monitoring device after the owner leaves the home a second photograph sent after the entrance and exit of the owner's house is photographed;
  • a determining unit configured to determine whether the second photo is abnormal with respect to the first photo
  • the sending unit is further configured to: when the determining unit determines that the second photo has an abnormality with respect to the first photo, send an alert message indicating that the owner's house is abnormal to the customer of the owner end.
  • the security monitoring device further includes:
  • a determining unit configured to determine, in a case where the second photo has an abnormality with respect to the first photo, determining a partial image having an abnormality
  • control unit configured to control the monitoring device to capture the partial image within a preset time to obtain a captured video
  • An identification unit configured to identify the captured video
  • the sending unit is specifically configured to send, to the client of the owner, early warning information indicating that the owner's house is abnormal if the captured video is abnormal.
  • the determining unit determining whether the second photo has an abnormality with respect to the first photo, includes:
  • a security device includes a processor and a memory for executing a computer program stored in a memory to implement the security monitoring method.
  • a security monitoring system includes a smart door device, a security device, and a monitoring device, wherein:
  • the smart door device is configured to monitor owner status information of the owner; and send the house status information to the security device;
  • the security device is configured to send the house status information to the monitoring device when the house status information is used to indicate that the owner is away from home and there is no one in the house;
  • the monitoring device is configured to photograph an entrance and exit of the owner's house when the owner leaves home, obtain a first photo, and photograph an entrance and exit of the owner's house after the owner leaves the home, and obtain a second photo; transmitting the first photo and the second photo to the security device;
  • the security device is further configured to determine whether the second photo is abnormal with respect to the first photo; if the second photo has an abnormality with respect to the first photo, send a house for indicating the owner There is abnormal warning information to the owner's client.
  • a computer readable storage medium storing at least one instruction that, when executed by a processor, implements the security monitoring method.
  • the security device can receive the owner's house status information; if the house status information is used to indicate that the owner is away from home and there is no one in the house, the owner is away from home, no one in the house, security equipment
  • the housing status information may be sent to the monitoring device; after the owner leaves the home, the monitoring device takes a picture of the entrance and exit of the owner's house, and obtains a first photo, after the owner leaves the home, the monitoring The device photographs the entrance and exit of the owner's house, obtains a second photo, and sends the first photo and the second photo to the security device; further, the security device can determine the second photo relative to the first photo Whether there is an abnormality; if it is, it may indicate that a suspicious person may appear at the entrance and exit of the owner's house, and the security device may send an early warning message indicating that the owner's house is abnormal to the client's client, so that the owner can timely understand that the house is abnormal.
  • FIG. 1 is a flow chart of a preferred embodiment of a security monitoring method disclosed by the present invention.
  • FIG. 2 is a flow chart of a preferred embodiment of another security monitoring method disclosed by the present invention.
  • FIG. 3 is a functional block diagram of a preferred embodiment of a security monitoring device disclosed herein.
  • FIG. 4 is a schematic structural diagram of a security device according to a preferred embodiment of the security monitoring method of the present invention.
  • FIG. 5 is a schematic structural diagram of a security monitoring system according to a preferred embodiment of the present invention.
  • FIG. 1 is a flow chart of a preferred embodiment of a security monitoring method disclosed by the present invention. The order of the steps in the flowchart may be changed according to different requirements, and some steps may be omitted.
  • the security device receives the owner's house status information.
  • the security device is a device capable of automatically performing binary numerical calculation and/or information processing according to an instruction set or stored in advance, and the hardware includes but is not limited to a microprocessor and an application specific integrated circuit (Application Specific Integrated Circuit) , ASIC), Field-Programmable Gate Array (FPGA), Digital Signal Processor (DSP), embedded devices, etc.
  • ASIC Application Specific Integrated Circuit
  • FPGA Field-Programmable Gate Array
  • DSP Digital Signal Processor
  • the security device includes, but is not limited to, any electronic product that can interact with a user through a keyboard, a mouse, a remote controller, a touch pad, or a voice control device, such as a personal computer, a tablet computer, a smart phone, and a personal digital device.
  • PDA Personal Digital Assistant
  • IPTV Internet Protocol Television
  • the housing status information may be used to indicate that the owner is away from home and there is no one in the house, or the house status information is used to indicate that the owner is at home or in the house.
  • a smart door device is installed in each owner's door, and the smart door device can be used to monitor the owner's house status information, and send the owner's house status information to the security device.
  • the smart door device can monitor the door lock state of the owner's house, and if the door lock state of the owner's house indicates that the house is in an unlocked state outside the door, indicating that the owner is away from home and no one is inside the house. If the door lock status of the owner's house indicates that the house is in the door locked state, it indicates that the owner is at home or inside the house.
  • the owner may also send the owner's house status information to the security device through the client, or the owner may activate the feedback information to automatically feed back the information to the security device after the owner leaves the home.
  • the security device sends the house status information to the monitoring device.
  • the security device may The status information is sent to the monitoring device, so that the monitoring device can monitor the owner's house.
  • the monitoring device may be a device consisting of a camera, a manual or electric lens, a pan/tilt head, a protective early, an infrared monitor, an alarm detector, and a multi-function decoder.
  • the security device receives a first photo sent after the monitoring device photographs the entrance and exit of the owner's house when the owner leaves the home, and receives the monitoring device to the owner after the owner leaves the home.
  • the second photo of the house's entrance and exit is sent after shooting.
  • the monitoring device may shoot the entrance and exit of the owner's house to obtain the first photo.
  • the first photo includes content that is generally an architectural arrangement of the entrance and exit of the owner's house.
  • the monitoring device may photograph the entrance and exit of the owner's house to obtain a second photo. .
  • the content included in the second photo may be the same as or different from the content included in the first photo.
  • the first photo may be a photo
  • the second photo may be a photo or multiple photos.
  • the second photo can be taken in real time or triggered to shoot. Specifically, if the second photo is taken in real time, the second photo may be multiple, and if the second photo is triggered to shoot, the second photo may be one.
  • the monitoring device can shoot the entrance and exit of the owner's house in real time; for trigger shooting, for example, when a certain person or something is close to the owner's house At the entrance and exit, the monitoring device can be triggered to shoot.
  • the entrance and exit of the owner's house may include, but is not limited to, various doors of the house, various windows, and various balconies and the like that can communicate with the outside.
  • step S14 The security device determines whether the second photo is abnormal with respect to the first photo. If yes, step S15 is performed, and if not, the process ends.
  • the second photo and the first photo may be the same or different.
  • the second photo and the first photo are the same when the entrance and exit of the owner's house are not present in two different times, when the owner's house has two entrances and exits
  • the second photo and the first photo are different when a person or object appears at different times.
  • the security device needs to determine whether there is an abnormality in the second photo relative to the first photo for each of the second photos, if multiple of the second photos If there is an abnormality in the second photo of any one of the first photos relative to the first photo, it may be determined that the owner's house has an abnormality.
  • the determining whether the second photo has an abnormality with respect to the first photo includes:
  • the security device may compare the second entrance image of the owner's house in the second photo with the first entrance image of the owner's house in the first photo. If there is a difference between the second entrance image and the first entrance image, it indicates that a person or thing appears in the entrance and exit of the owner's house before and after the owner leaves the home. In this case, the security device can determine the location.
  • the second photo has an abnormality with respect to the first photo.
  • the determining whether the second photo has an abnormality with respect to the first photo includes:
  • the security device needs Further determining whether the image of the person is included in the partial image having the difference, and if the image of the person is included in the partial image having the difference, the security device may determine that the second photo has an abnormality with respect to the first photo.
  • the security device sends an alert message indicating that the owner's house is abnormal to the client of the owner.
  • the security device may send the warning information indicating that the owner's house is abnormal to the client of the owner.
  • the owner's client may include, but is not limited to, a personal computer, a tablet, a smart phone, a smart bracelet, a smart watch, a personal digital assistant (PDA), and an Internet Protocol Television (IPTV). )Wait.
  • the warning information may be a text, a picture, or an audio and video, which is not limited in the embodiment of the present invention.
  • the owner can make a judgment according to the warning information, and whether it is necessary to take corresponding measures, such as an alarm. In this way, it is beneficial for the owner to find abnormal information early and avoid or reduce the loss of property in time.
  • the method may further include:
  • a person passing by at the door of the owner's house is captured by the monitoring device.
  • the security device may determine that there is an abnormal partial image in the case where it is determined that the second photo has an abnormality with respect to the first photo, and control the The monitoring device captures the part of the image in a preset time to obtain a shooting video, wherein the preset time may be a very short time after the second photo is captured, that is, the second photo is captured by the monitoring device.
  • the security device can recognize the captured video and analyze the features in the captured video to determine whether the captured video is captured.
  • an abnormality for example, if a person is included in the captured video, the behavioral characteristics of the character can be analyzed, if Breaking out of that behavior characterized by abnormal behavioral characteristics, it is possible to determine the presence of abnormal shoot video, this security device can send warning messages to indicate the presence of abnormal owners of the houses to the owners of the client.
  • the method may further include:
  • the security device sends the warning information to a client of a manager of the cell to which the owner belongs;
  • the preset warning audio is output using the speaker.
  • the security device may further send the early warning information to a client of a manager of the cell to which the owner belongs; or output a preset alert audio by using a speaker, where the manager may be a cell
  • the client of the manager may include but is not limited to a personal computer, a tablet, a smart phone, a smart bracelet, a smart watch, a personal digital assistant (PDA), and an interactive Internet Protocol Television (IPTV), etc.
  • the speaker may be a device disposed near the owner's house or disposed inside the monitoring device.
  • the manager can go in time.
  • the owner's house is viewed in order to stop the illegal operation of the illegal person in time, and the manager can also notify the owner about the relevant information in the owner's house.
  • the security device may further output a preset warning audio by using a speaker, so as to facilitate alerting the suspicious person or object. At the same time, remind the surrounding management staff or nearby neighbors to check to avoid property damage of the owner's house.
  • the security device can receive the owner's house status information; if the house status information is used to indicate that the owner is away from home and there is no one in the house, the owner is away from home, no one in the house, security
  • the device may send the house status information to the monitoring device; after the owner leaves the home, the monitoring device takes a picture of the entrance and exit of the owner's house, and obtains a first photo, after the owner leaves the home
  • the monitoring device photographs the entrance and exit of the owner's house, obtains a second photo, and sends the first photo and the second photo to the security device; further, the security device can determine the second photo relative to the first Whether there is an abnormality in the photo; if it is, it may indicate that a suspicious person may appear at the entrance and exit of the owner's house, and the security device may send an early warning message indicating that the owner's house is abnormal to the client of the owner, so that the owner can timely understand the existence of the house.
  • FIG. 2 is a flow chart of a preferred embodiment of another security monitoring method disclosed by the present invention. The order of the steps in the flowchart may be changed according to different requirements, and some steps may be omitted.
  • the security device receives the owner's house status information.
  • the security device is a device capable of automatically performing binary numerical calculation and/or information processing according to an instruction set or stored in advance, and the hardware includes but is not limited to a microprocessor and an application specific integrated circuit (Application Specific Integrated Circuit) , ASIC), Field-Programmable Gate Array (FPGA), Digital Signal Processor (DSP), embedded devices, etc.
  • ASIC Application Specific Integrated Circuit
  • FPGA Field-Programmable Gate Array
  • DSP Digital Signal Processor
  • the security device includes, but is not limited to, any electronic product that can interact with a user through a keyboard, a mouse, a remote controller, a touch pad, or a voice control device, such as a personal computer, a tablet computer, a smart phone, and a personal digital device.
  • PDA Personal Digital Assistant
  • IPTV Internet Protocol Television
  • the housing status information may be used to indicate that the owner is away from home and there is no one in the house, or the house status information is used to indicate that the owner is at home or in the house.
  • a smart door device is installed in each owner's door, and the smart door device can be used to monitor the owner's house status information, and send the owner's house status information to the security device.
  • the smart door device can monitor the door lock state of the owner's house, and if the door lock state of the owner's house indicates that the house is in an unlocked state outside the door, indicating that the owner is away from home and no one is inside the house. If the door lock status of the owner's house indicates that the house is in the door locked state, it indicates that the owner is at home or inside the house.
  • the owner may also send the owner's house status information to the security device through the client, or the owner may activate the feedback information to automatically feed back the information to the security device after the owner leaves the home.
  • the security device sends the house status information to the monitoring device.
  • the security device may The status information is sent to the monitoring device, so that the monitoring device can monitor the owner's house.
  • the monitoring device may be a device consisting of a camera, a manual or electric lens, a pan/tilt head, a protective early, an infrared monitor, an alarm detector, and a multi-function decoder.
  • the security device receives a first photo sent after the monitoring device photographs the entrance and exit of the owner's house when the owner leaves the home, and receives the monitoring device to the owner after the owner leaves the home.
  • the second photo of the house's entrance and exit is sent after shooting.
  • the monitoring device may shoot the entrance and exit of the owner's house to obtain the first photo.
  • the first photo includes content that is generally the architectural arrangement of the entrance and exit of the owner's house.
  • the monitoring device may The entrance and exit of the owner's house is photographed to obtain a second photo.
  • the content included in the second photo may be the same as or different from the content included in the first photo.
  • the first photo may be a photo
  • the second photo may be a photo or multiple photos.
  • the second photo can be taken in real time or triggered to shoot. Specifically, if the second photo is taken in real time, the second photo may be multiple, and if the second photo is triggered to shoot, the second photo may be one.
  • the monitoring device can shoot the entrance and exit of the owner's house in real time; for trigger shooting, for example, when a certain person or something is close to the owner's house At the entrance and exit, the monitoring device can be triggered to shoot.
  • the entrance and exit of the owner's house may include, but is not limited to, various doors of the house, various windows, and various balconies and the like that can communicate with the outside.
  • the security device compares the second entrance image of the owner's house in the second photo with the first entrance image of the owner's house in the first photo.
  • the second photo and the first photo may be the same or different.
  • the second photo and the first photo are the same when the entrance and exit of the owner's house are not present in two different times, when the owner's house has two entrances and exits
  • the second photo and the first photo are different when a person or object appears at different times.
  • the security device needs to map the second entrance image of the owner's house in the second photo to the first photo for each of the second photos.
  • the image of the first entrance and exit of the owner's house is compared.
  • step S25 If there is a difference between the second entrance image and the first entrance image, the security device determines whether the image of the difference is included in the partial image, and if yes, step S26 is performed, and if not, the process ends.
  • the security device needs to further judge the existence. Whether the image of the person is included in the partial image of the difference.
  • the security device identifies a character feature of the character image.
  • the security device matches the recognized character features with the pre-stored character features.
  • the security device may pre-store the character characteristics of some people, such as the character characteristics of the owner, the character characteristics of the spouse of the owner, the character characteristics of the child of the owner, and the character characteristics of the parents of the owner.
  • the character feature can be a face feature.
  • the security device determines that the second photo has an abnormality with respect to the first photo.
  • the security device may determine that the second photo is relative to the first A photo is abnormal.
  • the security device sends the early warning information to a client of a management personnel of the cell to which the owner belongs.
  • the security device may further send the early warning information to a client of a management personnel of the cell to which the owner belongs, where the management personnel may be a security of the cell or a patrol personnel of the community, etc.
  • the management personnel Clients may include, but are not limited to, personal computers, tablets, smart phones, smart bracelets, smart watches, personal digital assistants (PDAs), Internet Protocol Television (IPTV), and the like.
  • the manager may go to the owner in time.
  • the house is viewed in order to stop the illegal operation of the illegal personnel in time, and the manager can also notify the owner of the relevant information in the owner's house.
  • the security device may display the second entrance image of the owner's house in the second photo with the first photo.
  • the first entrance image of the owner's house is compared. If there is a difference between the second entrance image and the first entrance image, the security device further determines whether the image of the difference includes a character image, and if so, indicates When someone enters the room, in order to further determine whether the person entering the room is an illegal person, the security device can identify the character of the character image and match the recognized character feature with the pre-stored character feature. If the two are inconsistent, it indicates that there is an illegal person.
  • the security device can send information indicating that the owner's house is abnormal to the client of the management personnel of the owner's community, so that the management personnel can take corresponding measures in time to avoid property loss.
  • FIG. 3 is a functional block diagram of a preferred embodiment of a security monitoring apparatus according to the present invention.
  • the security monitoring device described in FIG. 3 is used to perform some or all of the steps in the security monitoring method described in FIG. 1 or FIG.
  • a unit referred to in the present invention refers to a series of computer program segments that can be executed by a processor and that are capable of performing a fixed function, which are stored in a memory. In the present embodiment, the functions of the respective units will be described in detail in the subsequent embodiments.
  • the security monitoring device 11 depicted in FIG. 3 may include:
  • the receiving unit 101 is configured to receive home status information of the owner
  • the housing status information may be used to indicate that the owner is away from home and there is no one in the house, or the house status information is used to indicate that the owner is at home or in the house.
  • a smart door device is installed in each owner's door, and the smart door device can be used to monitor the owner's house status information, and send the owner's house status information to the security device.
  • the smart door device can monitor the door lock state of the owner's house, and if the door lock state of the owner's house indicates that the house is in an unlocked state outside the door, indicating that the owner is away from home and no one is inside the house. If the door lock status of the owner's house indicates that the house is in the door locked state, it indicates that the owner is at home or inside the house.
  • the owner may also send the owner's house status information to the security device through the client, or the owner may activate the feedback information to automatically feed back the information to the security device after the owner leaves the home.
  • the sending unit 102 is configured to send the house status information to the monitoring device if the house status information is used to indicate that the owner is away from home and there is no one in the house;
  • the security device may The status information is sent to the monitoring device, so that the monitoring device can monitor the owner's house.
  • the monitoring device may be a device consisting of a camera, a manual or electric lens, a pan/tilt head, a protective early, an infrared monitor, an alarm detector, and a multi-function decoder.
  • the receiving unit 101 is further configured to receive a first photo that is sent after the monitoring device photographs an entrance and exit of the owner's house when the owner leaves the home, and receives the monitoring after the owner leaves the home a second photo sent by the device after photographing the entrance and exit of the owner's house;
  • the monitoring device may shoot the entrance and exit of the owner's house to obtain the first photo.
  • the first photo includes content that is generally the architectural arrangement of the entrance and exit of the owner's house.
  • the monitoring device may The entrance and exit of the owner's house is photographed to obtain a second photo.
  • the content included in the second photo may be the same as or different from the content included in the first photo.
  • the first photo may be a photo
  • the second photo may be a photo or multiple photos.
  • the second photo can be taken in real time or triggered to shoot. Specifically, if the second photo is taken in real time, the second photo may be multiple, and if the second photo is triggered to shoot, the second photo may be one.
  • the monitoring device can shoot the entrance and exit of the owner's house in real time; for trigger shooting, for example, when a certain person or something is close to the owner's house At the entrance and exit, the monitoring device can be triggered to shoot.
  • the entrance and exit of the owner's house may include, but is not limited to, various doors of the house, various windows, and various balconies and the like that can communicate with the outside.
  • the determining unit 103 is configured to determine whether the second photo has an abnormality with respect to the first photo
  • the second photo and the first photo may be the same or different.
  • the second photo and the first photo are the same when the entrance and exit of the owner's house are not present in two different times, when the owner's house has two entrances and exits
  • the second photo and the first photo are different when a person or object appears at different times.
  • the sending unit 102 is further configured to: when the determining unit determines that the second photo has an abnormality with respect to the first photo, send an alert information indicating that the owner's house is abnormal to the owner Client.
  • the security device may send the warning information indicating that the owner's house is abnormal to the client of the owner.
  • the owner's client may include, but is not limited to, a personal computer, a tablet, a smart phone, a smart bracelet, a smart watch, a personal digital assistant (PDA), and an Internet Protocol Television (IPTV). )Wait.
  • the owner can make a judgment according to the information, and whether it is necessary to take corresponding measures, such as an alarm. In this way, it is beneficial for the owner to find abnormal information early and avoid or reduce the loss of property in time.
  • the determining unit 103 determines whether the second photo has an abnormality with respect to the first photo, including:
  • the security device may compare the second entrance image of the owner's house in the second photo with the first entrance image of the owner's house in the first photo. If there is a difference between the second entrance image and the first entrance image, it indicates that a person or thing appears in the entrance and exit of the owner's house before and after the owner leaves the home. In this case, the security device can determine the location.
  • the second photo has an abnormality with respect to the first photo.
  • the determining unit 103 determines whether the second photo has an abnormality with respect to the first photo, including:
  • the security device needs Further determining whether the image of the person is included in the partial image having the difference, and if the image of the person is included in the partial image having the difference, the security device may determine that the second photo has an abnormality with respect to the first photo.
  • the determining unit 103 determines whether the second photo has an abnormality with respect to the first photo, including:
  • the recognized character feature does not coincide with the pre-stored character feature, it is determined that the second photo has an abnormality with respect to the first photo.
  • the security device may pre-store the character characteristics of some people, such as the character characteristics of the owner, the character characteristics of the spouse of the owner, the character characteristics of the child of the owner, and the character characteristics of the parents of the owner.
  • the character feature can be a face feature.
  • the security device may determine that the second photo has an abnormality with respect to the first photo.
  • the sending unit is further configured to send information indicating that the owner's house has an abnormality to a client of a manager of the cell to which the owner belongs.
  • the security device may further send the early warning information to the client of the management personnel of the cell to which the owner belongs; or, wherein the management personnel may be the security of the cell or the patrol personnel of the cell, etc.
  • the client of the manager may include, but is not limited to, a personal computer, a tablet, a smart phone, a smart bracelet, a smart watch, a personal digital assistant (PDA), an Internet Protocol Television (IPTV), and the like.
  • the manager may go to the owner in time.
  • the house is viewed in order to stop the illegal operation of the illegal personnel in time, and the manager can also notify the owner of the relevant information in the owner's house.
  • the security monitoring device 11 described in FIG. 3 further includes:
  • a determining unit configured to determine, in a case where the second photo has an abnormality with respect to the first photo, determining a partial image having an abnormality
  • control unit configured to control the monitoring device to capture the partial image within a preset time to obtain a captured video
  • An identification unit configured to identify the captured video
  • the sending unit 102 is specifically configured to send, to the client of the owner, early warning information indicating that the owner's house is abnormal if the captured video is abnormal.
  • the owner's house status information may be received; if the house status information is used to indicate that the owner is away from home and there is no one in the house, indicating that the owner is away from home, no one in the house may Sending the house status information to the monitoring device; after the owner leaves the home, the monitoring device takes a picture of the entrance and exit of the owner's house, and obtains a first photo, after the owner leaves the home, the monitoring device Shooting the entrance and exit of the owner's house, obtaining a second photo, and transmitting the first photo and the second photo to the security device; further, determining whether the second photo is abnormal with respect to the first photo If yes, it indicates that there may be suspicious persons at the entrance and exit of the owner's house, and may send an early warning message indicating that the owner's house is abnormal to the client's client, so that the owner can timely understand the abnormal information of the house and discover in time. Whether there are illegal personnel entering the room and taking corresponding measures, so that home security can
  • the above-described integrated unit implemented in the form of a software function module can be stored in a computer readable storage medium.
  • the computer readable storage medium can store a computer program, which when executed by the processor, can implement the steps of the various method embodiments described above.
  • the computer program comprises computer program code, which may be in the form of source code, object code form, executable file or some intermediate form.
  • the computer readable storage medium may include any entity or device capable of carrying the computer program code, a recording medium, a USB flash drive, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a read only memory (ROM, Read-Only Memory). ), random access memory (RAM), electrical carrier signals, telecommunications signals, and software distribution media.
  • the content contained in the computer readable storage medium may be appropriately increased or decreased according to the requirements of legislation and patent practice in a jurisdiction, for example, in some jurisdictions, according to legislation and patent practice, computer readable The medium does not include electrical carrier signals and telecommunication signals.
  • FIG. 4 is a schematic structural diagram of a security device according to a preferred embodiment of the present invention.
  • the security device 1 comprises a memory 12 and a processor 13. It will be understood by those skilled in the art that the schematic diagram shown in FIG. 4 is only an example of the security device 1 and does not constitute a limitation of the security device 1, and may include more or less components than those illustrated, or a combination of certain Components, or different components, such as the security device 1 may also include input and output devices, network access devices, buses, and the like.
  • the security device 1 further includes, but is not limited to, any electronic product that can interact with a user through a keyboard, a mouse, a remote controller, a touch panel, or a voice control device, such as a personal computer, a tablet computer, a smart phone, Personal Digital Assistant (PDA), game consoles, Internet Protocol Television (IPTV), smart wearable devices, etc.
  • the network in which the security device 1 is located includes, but is not limited to, the Internet, a wide area network, a metropolitan area network, a local area network, a virtual private network (VPN), and the like.
  • VPN virtual private network
  • the memory 12 optionally includes one or more computer readable storage media for storing a program of the security monitoring method and various data, and enabling high speed, automatic completion of program or data access during operation.
  • the memory 12 optionally includes a high speed random access memory, and optionally also a non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid state memory devices.
  • the processor 13 also known as a central processing unit (CPU), is a very large-scale integrated circuit, which is a computing core (Core) and a control unit (Control Unit) of the security device 1.
  • the processor 13 can execute an operating system of the security device 1 and various types of installed applications, program codes, and the like, such as the security monitoring device 11.
  • the memory 12 in the security device 1 stores a plurality of instructions to implement a security monitoring method
  • the processor 13 can execute the plurality of instructions to implement:
  • the house status information is used to indicate that the owner is away from home and there is no one in the house, the house status information is sent to the monitoring device;
  • the determining whether the second photo has an abnormality with respect to the first photo includes:
  • the determining whether the second photo has an abnormality with respect to the first photo includes:
  • the processor 13 may execute the plurality of instructions to implement:
  • the recognized character feature does not coincide with the pre-stored character feature, it is determined that the second photo has an abnormality with respect to the first photo.
  • processor 13 may execute the multiple instructions to implement:
  • the security device can receive the owner's house status information; if the house status information is used to indicate that the owner is away from home and there is no one in the house, the owner is away from home, no one in the house, The security device may send the house status information to the monitoring device; after the owner leaves the home, the monitoring device takes a picture of the entrance and exit of the owner's house, and obtains a first photo after the owner leaves the home.
  • the monitoring device photographs the entrance and exit of the owner's house, obtains a second photo, and sends the first photo and the second photo to the security device; further, the security device can determine the second photo relative to the first Whether there is an abnormality in a photo; if it is, it may indicate that a suspicious person may appear at the entrance and exit of the owner's house, and the security device may send an early warning message indicating that the owner's house is abnormal to the client of the owner, so that the owner can understand the house in time Abnormal information, timely detection of illegal personnel entering the room and taking corresponding measures, thus avoiding Damage.
  • FIG. 5 is a schematic structural diagram of a security monitoring system according to a preferred embodiment of the present invention.
  • the security monitoring system 0 includes a smart door device 2, a security device 1 and a monitoring device 3, wherein:
  • the smart door device 2 is configured to monitor owner status information of the owner; and send the house status information to the security device;
  • the security device 1 is configured to send the house status information to the monitoring device when the house status information is used to indicate that the owner is away from home and there is no one in the house;
  • the monitoring device 3 is configured to photograph an entrance and exit of the owner's house when the owner leaves home, obtain a first photo, and shoot an entrance and exit of the owner's house after the owner leaves the home. Obtaining a second photo; transmitting the first photo and the second photo to the security device;
  • the security device 1 is further configured to determine whether the second photo is abnormal with respect to the first photo; if yes, send an alert message indicating that the owner's house has an abnormality to the client of the owner.
  • the smart door device monitors the owner's house status information in real time, and transmits the house status information to the security device, when the house status information is used to indicate the owner's departure
  • the security device sends the house status information to the monitoring device, and the monitoring device shoots the entrance and exit of the owner's house when the owner leaves home, and obtains the first photo.
  • modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional module in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software function modules.

Abstract

一种安全监控方法、装置、安保设备及系统,安全监控方法包括:接收业主的房屋状态信息(S11);若房屋状态信息表示业主离家且房屋内无人,将房屋状态信息发送至监控设备(S12);接收在业主离家时监控设备对业主的房屋的出入口进行拍摄后发送的第一照片,以及接收在业主离家之后监控设备对业主的房屋的出入口进行拍摄后发送的第二照片(S13);判断第二照片相对于第一照片是否存在异常(S14);若是,发送用于表示业主的房屋存在异常的预警信息至业主的客户端(S15)。该安全监控方法能够实现居家防盗,及时发现非法人员入室,避免财产损失。

Description

安全监控方法、装置、安保设备及系统
本申请要求于2018年01月31日提交中国专利局,申请号为201810098844.2、发明名称为“安全监控方法、装置、安保设备及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及信息技术领域,尤其涉及一种安全监控方法、装置、安保设备及系统。
背景技术
随着智能化、大数据应用的普及,城市小区里的入室盗窃案频发不止,业主即使在出门前将房屋进行反锁,但是对于经常作案的盗贼来说,也很有可能把门锁撬开或者通过爬窗、爬窗户的方式入室盗窃。小区里的同一楼层,即使邻居在家,也会紧闭屋门,很难发现有盗贼入业主的屋内,小区内的保安也不可能随时对每个楼层进行巡视,这些都给盗贼入室提供了契机。盗贼入室后,会给业主造成重大的财产损失。
发明内容
鉴于以上内容,有必要提供一种安全监控方法、装置、安保设备及系统,能够实现居家防盗,及时发现非法人员入室,同时,避免财产损失。
一种安全监控方法,应用于安保设备,所述方法包括:
接收业主的房屋状态信息;
若所述房屋状态信息用于表示所述业主离家且房屋内无人,将所述房屋状态信息发送至监控设备;
接收在所述业主离家时所述监控设备对所述业主的房屋的出入口进行拍摄后发送的第一照片,以及接收在所述业主离家之后所述监控设备对所述业主的房屋的出入口进行拍摄后发送的第二照片,其中,所述第二照片是实时拍摄的或触发拍摄的;
判断所述第二照片相对于所述第一照片是否存在异常;
若所述第二照片相对于所述第一照片存在异常,发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。
在一种可能的实现方式中,在所述第二照片相对于所述第一照片存在异常的情况下,所述方法还包括:
确定存在异常的部分图像;
控制所述监控设备在预设时间内对所述部分图像进行抓拍,获得拍摄视频;
识别所述拍摄视频;
若所述拍摄视频存在异常,则执行所述的发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。
在一种可能的实现方式中,所述判断所述第二照片相对于所述第一照片是否存在异常包括:
将所述第二照片中的所述业主的房屋的第二出入口图像与所述第一照片中的所述业主的房屋的第一出入口图像进行比对;
若所述第二出入口图像与所述第一出入口图像存在差异,判断存在差异的部分图像中是否包括人物图像;
若存在差异的部分图像中包括人物图像,确定所述第二照片相对于所述第一照片存在异常。
在一种可能的实现方式中,在判断所述部分图像中包括人物图像时,所述方法还包括:
识别所述人物图像的人物特征;
将识别的人物特征与预先存储的人物特征进行匹配;
若所述识别的人物特征与预先存储的人物特征不一致,确定所述第二照片相对于所述第一照片存在异常。
在一种可能的实现方式中,所述方法还包括:
发送所述预警信息至所述业主所属小区的管理人员的客户端;或
利用扬声器输出预设的预警音频。
一种安全监控装置,运行于安保设备,包括:
接收单元,用于接收业主的房屋状态信息;
发送单元,用于若所述房屋状态信息用于表示所述业主离家且房屋内无人,将所述房屋状态信息发送至监控设备;
所述接收单元,还用于接收在所述业主离家时所述监控设备对所述业主的房屋的出入口进行拍摄后发送的第一照片,以及接收在所述业主离家之后所述监控设备对所述业主的房屋的出入口进行拍摄后发送的第二照片;
判断单元,用于判断所述第二照片相对于所述第一照片是否存在异常;
所述发送单元,还用于当所述判断单元判断所述第二照片相对于所述第一照片存在异常时,发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。
在一种可能的实现方式中,所述安全监控装置还包括:
确定单元,用于在所述第二照片相对于所述第一照片存在异常的情况下,确定存在异常的部分图像;
控制单元,用于控制所述监控设备在预设时间内对所述部分图像进行抓拍,获得拍摄视频;
识别单元,用于识别所述拍摄视频;
所述发送单元,具体用于若所述拍摄视频存在异常,发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。
在一种可能的实现方式中,所述判断单元判断所述第二照片相对于所述第一照片是否存在异常包括:
将所述第二照片中的所述业主的房屋的第二出入口图像与所述第一照片中的所述业主的房屋的第一出入口图像进行比对;
若所述第二出入口图像与所述第一出入口图像存在差异,判断存在差异的部分图像中是否包括人物图像;
若存在差异的部分图像中包括人物图像,则确定所述第二照片相对于所述第一照片存在异常。
一种安保设备,所述安保设备包括处理器和存储器,所述处理器用于执行存储器中存储的计算机程序以实现所述的安全监控方法。
一种安全监控系统,所述安全监控系统包括智能门设备、安保设备以及监控设备,其中:
所述智能门设备,用于监测业主的房屋状态信息;将所述房屋状态信息发送至所述安保设备;
所述安保设备,用于当所述房屋状态信息用于表示所述业主离家且房屋内无人时,将所述房屋状态信息发送至所述监控设备;
所述监控设备,用于在所述业主离家时对所述业主的房屋的出入口进行拍摄,获得第一照片,以及在所述业主离家之后对所述业主的房屋的出入口进行拍摄,获得第二照片;将所述第一照片以及所述第二照片发送至所述安保设备;
所述安保设备,还用于判断所述第二照片相对于所述第一照片是否存在异常;若所述第二照片相对于所述第一照片存在异常,发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。
一种计算机可读存储介质,所述计算机可读存储介质存储有至少一个指令,所述至少一个指令被处理器执行时实现所述的安全监控方法。
由以上技术方案,本发明中,安保设备可以接收业主的房屋状态信息;若所述房屋状态信息用于表示所述业主离家且房屋内无人,表明业主离家,屋内没人,安保设备可以将所述房屋状态信息发送至监控设备;在所述业主离家时所述监控设备对所述业主的房屋的出入口进行拍摄后,获得第一照片,在所述业主离家之后所述监控设备对所述业主的房屋的出入口进行拍摄,获得第二照片,并将第一照片以及第二照片发送至安保设备;进一步地,安保设备可以判断所述第二照片相对于所述第一照片是否存在异常;若是,表明业主的房屋的出入口可能出现了可疑人物,安保设备可以发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端,以便业主及时了解房屋存在异常的信息,及时发现是否有非法人员入室并采取相应的措施,从而可以实现居家防盗,避免财产损失。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图获得其他的附图。
图1是本发明公开的一种安全监控方法的较佳实施例的流程图。
图2是本发明公开的另一种安全监控方法的较佳实施例的流程图。
图3是本发明公开的一种安全监控装置的较佳实施例的功能模块图。
图4是本发明实现安全监控方法的较佳实施例的安保设备的结构示意图。
图5是本发明实现安全监控方法的较佳实施例的安全监控系统的结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
为使本发明的上述目的、特征和优点能够更加明显易懂,下面结合附图和具体实施方式对本发明作进一步详细的说明。
请参见图1,图1是本发明公开的一种安全监控方法的较佳实施例的流程图。其中,根据不同的需求,该流程图中步骤的顺序可以改变,某些步骤可以省略。
S11、安保设备接收业主的房屋状态信息。
其中,所述安保设备是一种能够按照事先设定或存储的指令,自动进行二进制数值计算和/或信息处理的设备,其硬件包括但不限于微处理器、专用 集成电路(Application Specific Integrated Circuit,ASIC)、可编程门阵列(Field-Programmable Gate Array,FPGA)、数字处理器(Digital Signal Processor,DSP)、嵌入式设备等。
所述安保设备包括但不限于任何一种可与用户通过键盘、鼠标、遥控器、触摸板或声控设备等方式进行人机交互的电子产品,例如,个人计算机、平板电脑、智能手机、个人数字助理(Personal Digital Assistant,PDA)、交互式网络电视(Internet Protocol Television,IPTV)等。上述安保设备仅是举例,而非穷举,包含但不限于上述终端设备。
其中,所述房屋状态信息可以用于表示所述业主离家且房屋内无人,或,所述房屋状态信息用于表示所述业主在家或屋内有人。
本发明实施例中,在每个业主的门中均安装了智能门设备,该智能门设备可以用于监测业主的房屋状态信息,并将业主的房屋状态信息发送至安保设备。具体的,智能门设备可以监测所述业主的房屋的门锁状态,若所述业主的房屋的门锁状态表示所述房屋处于门外反锁状态,表明所述业主离家且房屋内无人,若所述业主的房屋的门锁状态表示所述房屋处于门内反锁状态,表明所述业主在家或屋内有人。
可选的,业主也可以通过自己的客户端向安保设备发送业主的房屋状态信息,或者,业主也可以激活反馈信息,在业主离家后自动反馈信息至安保设备。
S12、若所述房屋状态信息用于表示所述业主离家且房屋内无人,安保设备将所述房屋状态信息发送至监控设备。
本发明实施例中,若所述房屋状态信息用于表示所述业主离家且房屋内无人,为了更好的监控业主离家时该业主的房屋的相关信息,安保设备可以将所述房屋状态信息发送至监控设备,这样,便于监控设备对所述业主的房屋进行监控。
其中,监控设备可以是由摄像机、手动或电动镜头、云台、防护早、红外监听器、报警探测器、和多功能解码器等部件组成的设备。
S13、安保设备接收在所述业主离家时所述监控设备对所述业主的房屋的出入口进行拍摄后发送的第一照片,以及接收在所述业主离家之后所述监控设备对所述业主的房屋的出入口进行拍摄后发送的第二照片。
本发明实施例中,为了更好地确定业主离家前后的房屋的监控信息是否存在异常,在业主离家时,所述监控设备可以对所述业主的房屋的出入口进行拍摄,获得第一照片,所述第一照片包括的内容通常是所述业主的房屋的出入口的建筑摆设,在所述业主离家之后,所述监控设备可以对所述业主的房屋的出入口进行拍摄,获得第二照片。
其中,所述第二照片包括的内容可以与所述第一照片包括的内容相同或者不同,第一照片可以是一张照片,第二照片可以是一张照片也可以是多张照片,所述第二照片可以是实时拍摄的或触发拍摄的。具体的,如果所述第二照片是实时拍摄的,则所述第二照片可以是多张,如果所述第二照片是触发拍摄的,则所述第二照片可以是一张。针对实时拍摄来说,在所述业主离家之后,监控设备可以实时对所述业主的房屋的出入口进行拍摄;针对触发拍摄来说,比如:当某个人或某个物靠近所述业主的房屋的出入口时,可以触发监控设备进行拍摄。
其中,所述业主的房屋的出入口可以包括但不限于房屋的各个门,各个窗户以及各个阳台等可以与外界连通的入口。
S14、安保设备判断所述第二照片相对于所述第一照片是否存在异常,若是,执行步骤S15,若否,结束本流程。
由于所述第二照片和所述第一照片是在两个不同的时间来拍摄的,所述第二照片和所述第一照片可以相同也可以不同。当所述业主的房屋的出入口在两个不同的时间内均没有任何人或物出现时,所述第二照片和所述第一照片是相同的,当所述业主的房屋的出入口在两个不同的时间内人或物出现时,所述第二照片和所述第一照片是不同的。
其中,如果所述第二照片有多张,则安保设备需要针对每张所述第二照片,判断所述第二照片相对于所述第一照片是否存在异常,如果多张所述第二照片中的任一张所述第二照片相对于所述第一照片存在异常,则可以确定所述业主的房屋存在异常。
可选的,所述判断所述第二照片相对于所述第一照片是否存在异常包括:
将所述第二照片中的所述业主的房屋的第二出入口图像与所述第一照片中的所述业主的房屋的第一出入口图像进行比对;
若所述第二出入口图像与所述第一出入口图像存在差异,则确定所述第二照片相对于所述第一照片存在异常。
在该可选的实施例中,安保设备可以将所述第二照片中的所述业主的房屋的第二出入口图像与所述第一照片中的所述业主的房屋的第一出入口图像进行比对,若所述第二出入口图像与所述第一出入口图像存在差异,表明在所述业主离家前后所述业主的房屋的出入口出现了人或物,这种情况下,安保设备可以确定所述第二照片相对于所述第一照片存在异常。
可选的,所述判断所述第二照片相对于所述第一照片是否存在异常包括:
将所述第二照片中的所述业主的房屋的第二出入口图像与所述第一照片中的所述业主的房屋的第一出入口图像进行比对;
若所述第二出入口图像与所述第一出入口图像存在差异,判断存在差异的部分图像中是否包括人物图像;
若存在差异的部分图像中包括人物图像,则确定所述第二照片相对于所述第一照片存在异常。
在该可选的实施例中,若所述第二出入口图像与所述第一出入口图像存在差异,表明在所述业主离家前后所述业主的房屋的出入口出现了人或物,如果是物,比如猫经过阳台等,就不需要特别关注,如果是人,就可能存在是非法人员入室的可能性,故若所述第二出入口图像与所述第一出入口图像存在差异,安保设备还需要进一步判断存在差异的部分图像中是否包括人物图像,若存在差异的部分图像中包括人物图像,则安保设备可以确定所述第二照片相对于所述第一照片存在异常。
S15、安保设备发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。
本发明实施例中,当确定所述第二照片相对于所述第一照片存在异常时,安保设备可以发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。其中,所述业主的客户端可以包括但不限于个人计算机、平板电脑、智能手机、智能手环、智能手表、个人数字助理(Personal Digital Assistant,PDA)、交互式网络电视(Internet Protocol Television,IPTV)等。所述预警信息可以是文字,也可以是图片,也可以是音视频,本发明实施例不做限定。
所述业主的客户端接收到用于表示所述业主的房屋存在异常的预警信息 后,所述业主可以根据该预警信息做判断,是否需要采取相应的措施,比如报警等。这样,有利于业主及早地发现异常信息,并及时地避免或减少财产的损失。
作为一种可选的实施方式,在所述第二照片相对于所述第一照片存在异常的情况下,所述方法还可以包括:
确定存在异常的部分图像;
控制所述监控设备在预设时间内对所述部分图像进行抓拍,获得拍摄视频;
识别所述拍摄视频;
若所述拍摄视频存在异常,则执行所述的发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。
在该可选的实施方式中,有些场景下,比如业主的房屋门口有路过的人,正好被监控设备抓拍到了,这种情况下,虽然第二照片相对于第一照片存在异常,但是该异常并不是长久稳定的,而是瞬间的,为了进一步加强判断,安保设备在确定所述第二照片相对于所述第一照片存在异常的情况下,可以确定存在异常的部分图像,并控制所述监控设备在预设时间内对所述部分图像进行抓拍,获得拍摄视频,其中,该预设时间可以是拍摄到第二照片后的很极短的时间,也即在监控设备拍摄到第二照片后的很极短的时间内,跟踪该异常的部分图像,并进行连续抓拍,获得拍摄视频,进一步地,安保设备可以识别所拍摄视频,对拍摄视频中的特征进行分析,以确定拍摄视频是否存在异常,比如:如果拍摄视频中包括人物,可以对该人物的行为特征进行分析,若判断出该行为特征为异常行为特征,则可以确定所述拍摄视频存在异常,以此安保设备可以发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。
作为一种可选的实施方式,所述方法还可以包括:
安保设备发送所述预警信息至所述业主所属小区的管理人员的客户端;或
利用扬声器输出预设的预警音频。
在该可选的实施方式中,安保设备还可以发送所述预警信息至所述业主所属小区的管理人员的客户端;或利用扬声器输出预设的预警音频,其中,所述管理人员可以为小区的保安或小区的巡逻人员等,所述管理人员的客户端可以包括但不限于个人计算机、平板电脑、智能手机、智能手环、智能手表、个人数字助理(Personal Digital Assistant,PDA)、交互式网络电视(Internet Protocol Television,IPTV)等,所述扬声器可以是设置在业主房屋附近的设备,或者设置在监控设备内部。
在该可选的实施方式中,所述业主所属的小区的管理人员的客户端接收到安保设备发送的用于表示所述业主的房屋存在异常的预警信息之后,所述管理人员可以及时地去所述业主的房屋中查看,以便及时制止非法人员的非法操作,同时,所述管理人员还可以通知所述业主关于所述业主房屋中的相关信息。
在该可选的实施方式中,在确定所述第二照片相对于所述第一照片存在异常之后,安保设备还可以利用扬声器输出预设的预警音频,以便于对可疑的人或物进行预警,同时,提醒周围的管理人员或附近的邻居进行查看,避免业主房屋的财产损失。
在图1所描述的方法流程中,安保设备可以接收业主的房屋状态信息;若所述房屋状态信息用于表示所述业主离家且房屋内无人,表明业主离家,屋内没人,安保设备可以将所述房屋状态信息发送至监控设备;在所述业主离家时 所述监控设备对所述业主的房屋的出入口进行拍摄后,获得第一照片,在所述业主离家之后所述监控设备对所述业主的房屋的出入口进行拍摄,获得第二照片,并将第一照片以及第二照片发送至安保设备;进一步地,安保设备可以判断所述第二照片相对于所述第一照片是否存在异常;若是,表明业主的房屋的出入口可能出现了可疑人物,安保设备可以发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端,以便业主及时了解房屋存在异常的信息,及时发现是否有非法人员入室并采取相应的措施,从而可以实现居家防盗,避免财产损失。
请参见图2,图2是本发明公开的另一种安全监控方法的较佳实施例的流程图。其中,根据不同的需求,该流程图中步骤的顺序可以改变,某些步骤可以省略。
S21、安保设备接收业主的房屋状态信息。
其中,所述安保设备是一种能够按照事先设定或存储的指令,自动进行二进制数值计算和/或信息处理的设备,其硬件包括但不限于微处理器、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程门阵列(Field-Programmable Gate Array,FPGA)、数字处理器(Digital Signal Processor,DSP)、嵌入式设备等。
所述安保设备包括但不限于任何一种可与用户通过键盘、鼠标、遥控器、触摸板或声控设备等方式进行人机交互的电子产品,例如,个人计算机、平板电脑、智能手机、个人数字助理(Personal Digital Assistant,PDA)、交互式网络电视(Internet Protocol Television,IPTV)等。上述安保设备仅是举例,而非穷举,包含但不限于上述终端设备。
其中,所述房屋状态信息可以用于表示所述业主离家且房屋内无人,或,所述房屋状态信息用于表示所述业主在家或屋内有人。
本发明实施例中,在每个业主的门中均安装了智能门设备,该智能门设备可以用于监测业主的房屋状态信息,并将业主的房屋状态信息发送至安保设备。具体的,智能门设备可以监测所述业主的房屋的门锁状态,若所述业主的房屋的门锁状态表示所述房屋处于门外反锁状态,表明所述业主离家且房屋内无人,若所述业主的房屋的门锁状态表示所述房屋处于门内反锁状态,表明所述业主在家或屋内有人。
可选的,业主也可以通过自己的客户端向安保设备发送业主的房屋状态信息,或者,业主也可以激活反馈信息,在业主离家后自动反馈信息至安保设备。
S22、若所述房屋状态信息用于表示所述业主离家且房屋内无人,安保设备将所述房屋状态信息发送至监控设备。
通常,当房屋处于门外反锁状态时,表明业主离家,且房屋内无人,当房屋处于门内反锁状态时,表明业主的房屋内有人。
本发明实施例中,若所述房屋状态信息用于表示所述业主离家且房屋内无人,为了更好的监控业主离家时该业主的房屋的相关信息,安保设备可以将所述房屋状态信息发送至监控设备,这样,便于监控设备对所述业主的房屋进行监控。
其中,监控设备可以是由摄像机、手动或电动镜头、云台、防护早、红外监听器、报警探测器、和多功能解码器等部件组成的设备。
S23、安保设备接收在所述业主离家时所述监控设备对所述业主的房屋的出入口进行拍摄后发送的第一照片,以及接收在所述业主离家之后所述监控设备 对所述业主的房屋的出入口进行拍摄后发送的第二照片。
本发明实施例中,为了更好地确定业主离家前后的房屋的监控信息是否存在异常,在业主离家时,所述监控设备可以对所述业主的房屋的出入口进行拍摄,获得第一照片,所述第一照片包括的内容通常是所述业主的房屋的出入口的建筑摆设,在所述业主离家之后(通常是距离所述业主离家时有一段时间),所述监控设备可以对所述业主的房屋的出入口进行拍摄,获得第二照片。
其中,所述第二照片包括的内容可以与所述第一照片包括的内容相同或者不同,第一照片可以是一张照片,第二照片可以是一张照片也可以是多张照片,所述第二照片可以是实时拍摄的或触发拍摄的。具体的,如果所述第二照片是实时拍摄的,则所述第二照片可以是多张,如果所述第二照片是触发拍摄的,则所述第二照片可以是一张。针对实时拍摄来说,在所述业主离家之后,监控设备可以实时对所述业主的房屋的出入口进行拍摄;针对触发拍摄来说,比如:当某个人或某个物靠近所述业主的房屋的出入口时,可以触发监控设备进行拍摄。
其中,所述业主的房屋的出入口可以包括但不限于房屋的各个门,各个窗户以及各个阳台等可以与外界连通的入口。
S24、安保设备将所述第二照片中的所述业主的房屋的第二出入口图像与所述第一照片中的所述业主的房屋的第一出入口图像进行比对。
由于所述第二照片和所述第一照片是在两个不同的时间来拍摄的,所述第二照片和所述第一照片可以相同也可以不同。当所述业主的房屋的出入口在两个不同的时间内均没有任何人或物出现时,所述第二照片和所述第一照片是相同的,当所述业主的房屋的出入口在两个不同的时间内人或物出现时,所述第二照片和所述第一照片是不同的。
其中,如果所述第二照片有多张,则安保设备需要针对每张所述第二照片,将所述第二照片中的所述业主的房屋的第二出入口图像与所述第一照片中的所述业主的房屋的第一出入口图像进行比对。
S25、若所述第二出入口图像与所述第一出入口图像存在差异,安保设备判断存在差异的部分图像中是否包括人物图像,若是,执行步骤S26,若否,结束本流程。
本发明实施例中,若所述第二出入口图像与所述第一出入口图像存在差异,表明在所述业主离家前后所述业主的房屋的出入口出现了人或物,如果是物,比如猫经过阳台等,就不需要特别关注,如果是人,就可能存在是非法人员入室的可能性,故若所述第二出入口图像与所述第一出入口图像存在差异,安保设备还需要进一步判断存在差异的部分图像中是否包括人物图像。
S26、安保设备识别所述人物图像的人物特征。
本发明实施例中,由于业主的房屋的所有人通常有多个,经常会有不同的人出入,这些人是进出该房屋的合法人员,比如:业主的配偶,子女,父母等。为了区分合法人员和非法人员,安保设备在判断存在不同的部分图像为人物图像时,还需要进一步识别所述人物图像的人物特征,以对该人物图像做进一步地确认。
S27、安保设备将识别的人物特征与预先存储的人物特征进行匹配。
本发明实施例中,安保设备可以预先存储一些人的人物特征,比如业主的人物特征,业主的配偶的人物特征,业主的子女的人物特征,业主的父母的人物特征。
其中,人物特征可以为人脸特征。
S28、若所述识别的人物特征与预先存储的人物特征不一致,安保设备确定所述第二照片相对于所述第一照片存在异常。
本发明实施例中,若所述识别的人物特征与预先存储的人物特征不一致,表明所述部分图像的人物特征所属的用户为非法人员,安保设备可以确定所述第二照片相对于所述第一照片存在异常。
S29、安保设备发送所述预警信息至所述业主所属小区的管理人员的客户端。
本发明实施例中,安保设备还可以发送所述预警信息至所述业主所属小区的管理人员的客户端,其中,所述管理人员可以为小区的保安或小区的巡逻人员等,所述管理人员的客户端可以包括但不限于个人计算机、平板电脑、智能手机、智能手环、智能手表、个人数字助理(Personal Digital Assistant,PDA)、交互式网络电视(Internet Protocol Television,IPTV)等。
本发明实施例中,所述业主所属的小区的管理人员的客户端接收到安保设备发送的用于表示所述业主的房屋存在异常的信息之后,所述管理人员可以及时地去所述业主的房屋中查看,以便及时制止非法人员的非法操作,同时,所述管理人员还可以通知所述业主关于所述业主房屋中的相关信息。
在图2所描述的方法流程中,安保设备在接收到第一照片和第二照片之后,可以将所述第二照片中的所述业主的房屋的第二出入口图像与所述第一照片中的所述业主的房屋的第一出入口图像进行比对,若所述第二出入口图像与所述第一出入口图像存在差异,安保设备进一步判断存在差异的部分图像中是否包括人物图像,若是,表明有人入室,为了进一步确定入室的人是否为非法人员,安保设备可以识别所述人物图像的人物特征,并将识别的人物特征与预先存储的人物特征进行匹配,若二者不一致,表明有非法人员入室了,安保设备可以将用于表示所述业主的房屋存在异常的信息发送至所述业主所属小区的管理人员的客户端,以便管理人员及时地采取相应的措施,避免财产损失。
请参见图3,图3是本发明公开的一种安全监控装置的较佳实施例的功能模块图。其中,图3描述的安全监控装置用于执行图1或图2所描述的安全监控方法中的部分或全部步骤。本发明所称的单元是指一种能够被处理器所执行并且能够完成固定功能的一系列计算机程序段,其存储在存储器中。在本实施例中,关于各单元的功能将在后续的实施例中详述。
图3描述的安全监控装置11可以包括:
接收单元101,用于接收业主的房屋状态信息;
其中,所述房屋状态信息可以用于表示所述业主离家且房屋内无人,或,所述房屋状态信息用于表示所述业主在家或屋内有人。
本发明实施例中,在每个业主的门中均安装了智能门设备,该智能门设备可以用于监测业主的房屋状态信息,并将业主的房屋状态信息发送至安保设备。具体的,智能门设备可以监测所述业主的房屋的门锁状态,若所述业主的房屋的门锁状态表示所述房屋处于门外反锁状态,表明所述业主离家且房屋内无人,若所述业主的房屋的门锁状态表示所述房屋处于门内反锁状态,表明所述业主在家或屋内有人。
可选的,业主也可以通过自己的客户端向安保设备发送业主的房屋状态信息,或者,业主也可以激活反馈信息,在业主离家后自动反馈信息至安保设备。
发送单元102,用于若所述房屋状态信息用于表示所述业主离家且房屋内无 人,将所述房屋状态信息发送至监控设备;
本发明实施例中,若所述房屋状态信息用于表示所述业主离家且房屋内无人,为了更好的监控业主离家时该业主的房屋的相关信息,安保设备可以将所述房屋状态信息发送至监控设备,这样,便于监控设备对所述业主的房屋进行监控。
其中,监控设备可以是由摄像机、手动或电动镜头、云台、防护早、红外监听器、报警探测器、和多功能解码器等部件组成的设备。
所述接收单元101,还用于接收在所述业主离家时所述监控设备对所述业主的房屋的出入口进行拍摄后发送的第一照片,以及接收在所述业主离家之后所述监控设备对所述业主的房屋的出入口进行拍摄后发送的第二照片;
本发明实施例中,为了更好地确定业主离家前后的房屋的监控信息是否存在异常,在业主离家时,所述监控设备可以对所述业主的房屋的出入口进行拍摄,获得第一照片,所述第一照片包括的内容通常是所述业主的房屋的出入口的建筑摆设,在所述业主离家之后(通常是距离所述业主离家时有一段时间),所述监控设备可以对所述业主的房屋的出入口进行拍摄,获得第二照片。
其中,所述第二照片包括的内容可以与所述第一照片包括的内容相同或者不同,第一照片可以是一张照片,第二照片可以是一张照片也可以是多张照片,所述第二照片可以是实时拍摄的或触发拍摄的。具体的,如果所述第二照片是实时拍摄的,则所述第二照片可以是多张,如果所述第二照片是触发拍摄的,则所述第二照片可以是一张。针对实时拍摄来说,在所述业主离家之后,监控设备可以实时对所述业主的房屋的出入口进行拍摄;针对触发拍摄来说,比如:当某个人或某个物靠近所述业主的房屋的出入口时,可以触发监控设备进行拍摄。
其中,所述业主的房屋的出入口可以包括但不限于房屋的各个门,各个窗户以及各个阳台等可以与外界连通的入口。
判断单元103,用于判断所述第二照片相对于所述第一照片是否存在异常;
由于所述第二照片和所述第一照片是在两个不同的时间来拍摄的,所述第二照片和所述第一照片可以相同也可以不同。当所述业主的房屋的出入口在两个不同的时间内均没有任何人或物出现时,所述第二照片和所述第一照片是相同的,当所述业主的房屋的出入口在两个不同的时间内人或物出现时,所述第二照片和所述第一照片是不同的。
所述发送单元102,还用于当所述判断单元判断所述第二照片相对于所述第一照片存在异常时,发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。
本发明实施例中,当确定所述第二照片相对于所述第一照片存在异常时,安保设备可以发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。其中,所述业主的客户端可以包括但不限于个人计算机、平板电脑、智能手机、智能手环、智能手表、个人数字助理(Personal Digital Assistant,PDA)、交互式网络电视(Internet Protocol Television,IPTV)等。
所述业主的客户端接收到用于表示所述业主的房屋存在异常的信息后,所述业主可以根据该信息做判断,是否需要采取相应的措施,比如报警等。这样,有利于业主及早地发现异常信息,并及时地避免或减少财产的损失。
可选的,所述判断单元103判断所述第二照片相对于所述第一照片是否存在异常包括:
将所述第二照片中的所述业主的房屋的第二出入口图像与所述第一照片中的所述业主的房屋的第一出入口图像进行比对;
若所述第二出入口图像与所述第一出入口图像存在差异,则确定所述第二照片相对于所述第一照片存在异常。
在该可选的实施例中,安保设备可以将所述第二照片中的所述业主的房屋的第二出入口图像与所述第一照片中的所述业主的房屋的第一出入口图像进行比对,若所述第二出入口图像与所述第一出入口图像存在差异,表明在所述业主离家前后所述业主的房屋的出入口出现了人或物,这种情况下,安保设备可以确定所述第二照片相对于所述第一照片存在异常。
可选的,所述判断单元103判断所述第二照片相对于所述第一照片是否存在异常包括:
将所述第二照片中的所述业主的房屋的第二出入口图像与所述第一照片中的所述业主的房屋的第一出入口图像进行比对;
若所述第二出入口图像与所述第一出入口图像存在差异,判断存在差异的部分图像中是否包括人物图像;
若存在差异的部分图像中包括人物图像,则确定所述第二照片相对于所述第一照片存在异常。
在该可选的实施例中,若所述第二出入口图像与所述第一出入口图像存在差异,表明在所述业主离家前后所述业主的房屋的出入口出现了人或物,如果是物,比如猫经过阳台等,就不需要特别关注,如果是人,就可能存在是非法人员入室的可能性,故若所述第二出入口图像与所述第一出入口图像存在差异,安保设备还需要进一步判断存在差异的部分图像中是否包括人物图像,若存在差异的部分图像中包括人物图像,则安保设备可以确定所述第二照片相对于所述第一照片存在异常。
可选的,所述判断单元103判断所述第二照片相对于所述第一照片是否存在异常包括:
将所述第二照片中的所述业主的房屋的第二出入口图像与所述第一照片中的所述业主的房屋的第一出入口图像进行比对;
若所述第二出入口图像与所述第一出入口图像存在差异,判断存在差异的部分图像中是否包括人物图像;
若存在差异的部分图像中包括人物图像,识别所述人物图像的人物特征;
将识别的人物特征与预先存储的人物特征进行匹配;
若所述识别的人物特征与预先存储的人物特征不一致,则确定所述第二照片相对于所述第一照片存在异常。
在该可选的实施例中,由于业主的房屋的所有人通常有多个,经常会有不同的人出入,这些人是进出该房屋的合法人员,比如:业主的配偶,子女,父母等。为了区分合法人员和非法人员,安保设备在判断存在不同的部分图像为人物图像时,还需要进一步识别所述人物图像的人物特征,以对该人物图像做进一步地确认。
本发明实施例中,安保设备可以预先存储一些人的人物特征,比如业主的人物特征,业主的配偶的人物特征,业主的子女的人物特征,业主的父母的人物特征。
其中,人物特征可以为人脸特征。
若所述识别的人物特征与预先存储的人物特征不一致,表明所述部分图像 的人物特征所属的用户为非法人员,安保设备可以确定所述第二照片相对于所述第一照片存在异常。
所述发送单元,还用于将用于表示所述业主的房屋存在异常的信息发送至所述业主所属小区的管理人员的客户端。
本发明实施例中,安保设备还可以发送所述预警信息至所述业主所属小区的管理人员的客户端;或,其中,所述管理人员可以为小区的保安或小区的巡逻人员等,所述管理人员的客户端可以包括但不限于个人计算机、平板电脑、智能手机、智能手环、智能手表、个人数字助理(Personal Digital Assistant,PDA)、交互式网络电视(Internet Protocol Television,IPTV)等。
本发明实施例中,所述业主所属的小区的管理人员的客户端接收到安保设备发送的用于表示所述业主的房屋存在异常的信息之后,所述管理人员可以及时地去所述业主的房屋中查看,以便及时制止非法人员的非法操作,同时,所述管理人员还可以通知所述业主关于所述业主房屋中的相关信息。
可选的,图3描述的安全监控装置11还包括:
确定单元,用于在所述第二照片相对于所述第一照片存在异常的情况下,确定存在异常的部分图像;
控制单元,用于控制所述监控设备在预设时间内对所述部分图像进行抓拍,获得拍摄视频;
识别单元,用于识别所述拍摄视频;
所述发送单元102,具体用于若所述拍摄视频存在异常,发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。
在图3所描述的安全监控装置11中,可以接收业主的房屋状态信息;若所述房屋状态信息用于表示所述业主离家且房屋内无人,表明业主离家,屋内没人,可以将所述房屋状态信息发送至监控设备;在所述业主离家时所述监控设备对所述业主的房屋的出入口进行拍摄后,获得第一照片,在所述业主离家之后所述监控设备对所述业主的房屋的出入口进行拍摄,获得第二照片,并将第一照片以及第二照片发送至安保设备;进一步地,可以判断所述第二照片相对于所述第一照片是否存在异常;若是,表明业主的房屋的出入口可能出现了可疑人物,可以发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端,以便业主及时了解房屋存在异常的信息,及时发现是否有非法人员入室并采取相应的措施,从而可以实现居家防盗,避免财产损失。
上述以软件功能模块的形式实现的集成的单元,可以存储在一个计算机可读存储介质中。其中,该计算机可读存储介质可以存储计算机程序,该计算机程序在被处理器执行时,可实现上述各个方法实施例的步骤。其中,所述计算机程序包括计算机程序代码,所述计算机程序代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述计算机可读存储介质可以包括:能够携带所述计算机程序代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、电载波信号、电信信号以及软件分发介质等。需要说明的是,所述计算机可读存储介质包含的内容可以根据司法管辖区内立法和专利实践的要求进行适当的增减,例如在某些司法管辖区,根据立法和专利实践,计算机可读介质不包括电载波信号和电信信号。
如图4所示,图4是本发明实现安全监控方法的较佳实施例的安保设备 的结构示意图。所述安保设备1包括存储器12以及处理器13。本领域技术人员可以理解,所述图4所示的示意图仅仅是安保设备1的示例,并不构成对安保设备1的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如所述安保设备1还可以包括输入输出设备、网络接入设备、总线等。
所述安保设备1还包括但不限于任何一种可与用户通过键盘、鼠标、遥控器、触摸板或声控设备等方式进行人机交互的电子产品,例如,个人计算机、平板电脑、智能手机、个人数字助理(Personal Digital Assistant,PDA)、游戏机、交互式网络电视(Internet Protocol Television,IPTV)、智能式穿戴式设备等。所述安保设备1所处的网络包括但不限于互联网、广域网、城域网、局域网、虚拟专用网络(Virtual Private Network,VPN)等。
所述存储器12可选地包括一个或多个计算机可读存储介质,用于存储一种安全监控方法的程序和各种数据,并在运行过程中实现高速、自动地完成程序或数据的存取。所述存储器12可选地包括高速随机存取存储器,并且还可选地包括非易失性存储器,诸如一个或多个磁盘存储设备、闪存存储器设备、或其它非易失性固态存储器设备。
所述处理器13又称中央处理器(CPU,Central Processing Unit),是一块超大规模的集成电路,是安保设备1的运算核心(Core)和控制核心(Control Unit)。所述处理器13可执行所述安保设备1的操作系统以及安装的各类应用程序、程序代码等,例如安全监控装置11。
结合图1或图2,所述安保设备1中的所述存储器12存储多个指令以实现一种安全监控方法,所述处理器13可执行所述多个指令从而实现:
接收业主的房屋状态信息;
若所述房屋状态信息用于表示所述业主离家且房屋内无人,将所述房屋状态信息发送至监控设备;
接收在所述业主离家时所述监控设备对所述业主的房屋的出入口进行拍摄后发送的第一照片,以及接收在所述业主离家之后所述监控设备对所述业主的房屋的出入口进行拍摄后发送的第二照片;
判断所述第二照片相对于所述第一照片是否存在异常;
若是,发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。
在一种可选的实施方式中,所述判断所述第二照片相对于所述第一照片是否存在异常包括:
将所述第二照片中的所述业主的房屋的第二出入口图像与所述第一照片中的所述业主的房屋的第一出入口图像进行比对;
若所述第二出入口图像与所述第一出入口图像存在差异,则确定所述第二照片相对于所述第一照片存在异常。
在一种可选的实施方式中,所述判断所述第二照片相对于所述第一照片是否存在异常包括:
将所述第二照片中的所述业主的房屋的第二出入口图像与所述第一照片中的所述业主的房屋的第一出入口图像进行比对;
若所述第二出入口图像与所述第一出入口图像存在差异,判断存在差异的部分图像中是否包括人物图像;
若存在差异的部分图像中包括人物图像,则确定所述第二照片相对于所述 第一照片存在异常。
在一种可选的实施方式中,在判断所述部分图像中包括人物图像时,所述处理器13可执行所述多个指令从而实现:
识别所述人物图像的人物特征;
将识别的人物特征与预先存储的人物特征进行匹配;
若所述识别的人物特征与预先存储的人物特征不一致,则确定所述第二照片相对于所述第一照片存在异常。
在一种可选的实施方式中,所述处理器13可执行所述多个指令从而实现:
将用于表示所述业主的房屋存在异常的信息发送至所述业主所属小区的管理人员的客户端。
具体地,所述处理器13对上述指令的具体实现方法可参考图1或图2对应实施例中相关步骤的描述,在此不赘述。
在图4所描述的安保设备1中,安保设备可以接收业主的房屋状态信息;若所述房屋状态信息用于表示所述业主离家且房屋内无人,表明业主离家,屋内没人,安保设备可以将所述房屋状态信息发送至监控设备;在所述业主离家时所述监控设备对所述业主的房屋的出入口进行拍摄后,获得第一照片,在所述业主离家之后所述监控设备对所述业主的房屋的出入口进行拍摄,获得第二照片,并将第一照片以及第二照片发送至安保设备;进一步地,安保设备可以判断所述第二照片相对于所述第一照片是否存在异常;若是,表明业主的房屋的出入口可能出现了可疑人物,安保设备可以发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端,以便业主及时了解房屋存在异常的信息,及时发现是否有非法人员入室并采取相应的措施,从而可以避免财产损失。
请参见图5,图5是本发明实现安全监控方法的较佳实施例的安全监控系统的结构示意图。如图5所示,安全监控系统0包括智能门设备2、安保设备1以及监控设备3,其中:
所述智能门设备2,用于监测业主的房屋状态信息;将所述房屋状态信息发送至所述安保设备;
所述安保设备1,用于当所述房屋状态信息用于表示所述业主离家且房屋内无人时,将所述房屋状态信息发送至所述监控设备;
所述监控设备3,用于在所述业主离家时对所述业主的房屋的出入口进行拍摄,获得第一照片,以及在所述业主离家之后对所述业主的房屋的出入口进行拍摄,获得第二照片;将所述第一照片以及所述第二照片发送至所述安保设备;
所述安保设备1,还用于判断所述第二照片相对于所述第一照片是否存在异常;若是,发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。
在图5所描述的安全监控系统0中,智能门设备实时监测业主的房屋状态信息,并将所述房屋状态信息发送至所述安保设备,当所述房屋状态信息用于表示所述业主离家且房屋内无人时,所述安保设备将所述房屋状态信息发送至所述监控设备,监控设备在所述业主离家时对所述业主的房屋的出入口进行拍摄,获得第一照片,以及在所述业主离家之后对所述业主的房屋的出入口进行拍摄,获得第二照片,并将所述第一照片以及所述第二照片发送至所述安保设备,所述安保设备判断所述第二照片相对于所述第一照片是否存在异常;若是,发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端,以便 业主及时了解房屋存在异常的信息,及时发现是否有非法人员入室并采取相应的措施,从而可以实现居家防盗,避免财产损失。
在本发明所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能模块的形式实现。
对于本领域技术人员而言,显然本发明不限于上述示范性实施例的细节,而且在不背离本发明的精神或基本特征的情况下,能够以其他的具体形式实现本发明。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本发明的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本发明内。不应将权利要求中的任何附关联图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。系统权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第二等词语用来表示名称,而并不表示任何特定的顺序。
最后应说明的是,以上实施例仅用以说明本发明的技术方案而非限制,尽管参照较佳实施例对本发明进行了详细说明,本领域的普通技术人员应当理解,可以对本发明的技术方案进行修改或等同替换,而不脱离本发明技术方案的精神和范围。

Claims (11)

  1. 一种安全监控方法,应用于安保设备,其特征在于,所述方法包括:
    接收业主的房屋状态信息;
    若所述房屋状态信息表示所述业主离家且房屋内无人,将所述房屋状态信息发送至监控设备;
    接收在所述业主离家时所述监控设备对所述业主的房屋的出入口进行拍摄后发送的第一照片,以及接收在所述业主离家之后所述监控设备对所述业主的房屋的出入口进行拍摄后发送的第二照片,其中,所述第二照片是实时拍摄的或触发拍摄的;
    判断所述第二照片相对于所述第一照片是否存在异常;
    若所述第二照片相对于所述第一照片存在异常,发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。
  2. 根据权利要求1所述的方法,其特征在于,在所述第二照片相对于所述第一照片存在异常的情况下,所述方法还包括:
    确定存在异常的部分图像;
    控制所述监控设备在预设时间内对所述部分图像进行抓拍,获得拍摄视频;
    识别所述拍摄视频;
    若所述拍摄视频存在异常,则执行所述的发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。
  3. 根据权利要求1所述的方法,其特征在于,所述判断所述第二照片相对于所述第一照片是否存在异常包括:
    将所述第二照片中的所述业主的房屋的第二出入口图像与所述第一照片中的所述业主的房屋的第一出入口图像进行比对;
    若所述第二出入口图像与所述第一出入口图像存在差异,判断存在差异的部分图像中是否包括人物图像;
    若存在差异的部分图像中包括人物图像,确定所述第二照片相对于所述第一照片存在异常。
  4. 根据权利要求3所述的方法,其特征在于,在判断所述部分图像中包括人物图像时,所述方法还包括:
    识别所述人物图像的人物特征;
    将识别的人物特征与预先存储的人物特征进行匹配;
    若所述识别的人物特征与预先存储的人物特征不一致,确定所述第二照片相对于所述第一照片存在异常。
  5. 根据权利要求1至4任一项所述的方法,其特征在于,所述方法还包括:
    发送所述预警信息至所述业主所属小区的管理人员的客户端;或
    利用扬声器输出预设的预警音频。
  6. 一种安全监控装置,运行于安保设备,其特征在于,包括:
    接收单元,用于接收业主的房屋状态信息;
    发送单元,用于若所述房屋状态信息用于表示所述业主离家且房屋内无人,将所述房屋状态信息发送至监控设备;
    所述接收单元,还用于接收在所述业主离家时所述监控设备对所述业主的房屋的出入口进行拍摄后发送的第一照片,以及接收在所述业主离家之后所述监控设备对所述业主的房屋的出入口进行拍摄后发送的第二照片,其中,所述第二照片是实时拍摄的或触发拍摄的;
    判断单元,用于判断所述第二照片相对于所述第一照片是否存在异常;
    所述发送单元,还用于当所述判断单元判断所述第二照片相对于所述第一照片存在异常时,发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。
  7. 根据权利要求6所述的安全监控装置,其特征在于,所述安全监控装置还包括:
    确定单元,用于在所述第二照片相对于所述第一照片存在异常的情况下,确定存在异常的部分图像;
    控制单元,用于控制所述监控设备在预设时间内对所述部分图像进行抓拍,获得拍摄视频;
    识别单元,用于识别所述拍摄视频;
    所述发送单元,具体用于若所述拍摄视频存在异常,发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。
  8. 根据权利要求6所述的安全监控装置,其特征在于,所述判断单元判断所述第二照片相对于所述第一照片是否存在异常包括:
    将所述第二照片中的所述业主的房屋的第二出入口图像与所述第一照片中的所述业主的房屋的第一出入口图像进行比对;
    若所述第二出入口图像与所述第一出入口图像存在差异,判断存在差异的部分图像中是否包括人物图像;
    若存在差异的部分图像中包括人物图像,则确定所述第二照片相对于所述第一照片存在异常。
  9. 一种安保设备,其特征在于,所述安保设备包括处理器和存储器,所述处理器用于执行存储器中存储的计算机程序以实现如权利要求1至5中任意一项所述的安全监控方法。
  10. 一种安全监控系统,其特征在于,所述安全监控系统包括智能门设备、安保设备以及监控设备,其中:
    所述智能门设备,用于监测业主的房屋状态信息;将所述房屋状态信息发送至所述安保设备;
    所述安保设备,用于当所述房屋状态信息用于表示所述业主离家且房屋内无人时,将所述房屋状态信息发送至所述监控设备;
    所述监控设备,用于在所述业主离家时对所述业主的房屋的出入口进行拍摄,获得第一照片,以及在所述业主离家之后对所述业主的房屋的出入口进行拍摄,获得第二照片;将所述第一照片以及所述第二照片发送至所述安保设备;
    所述安保设备,还用于判断所述第二照片相对于所述第一照片是否存在异常;若所述第二照片相对于所述第一照片存在异常,发送用于表示所述业主的房屋存在异常的预警信息至所述业主的客户端。
  11. 一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求1至5中任意一项所述的安全监控方法。
PCT/CN2018/087750 2018-01-31 2018-05-22 安全监控方法、装置、安保设备及系统 WO2019148695A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810098844.2A CN108257344A (zh) 2018-01-31 2018-01-31 安全监控方法、装置、安保设备及系统
CN201810098844.2 2018-01-31

Publications (1)

Publication Number Publication Date
WO2019148695A1 true WO2019148695A1 (zh) 2019-08-08

Family

ID=62743749

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/087750 WO2019148695A1 (zh) 2018-01-31 2018-05-22 安全监控方法、装置、安保设备及系统

Country Status (2)

Country Link
CN (1) CN108257344A (zh)
WO (1) WO2019148695A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115086527B (zh) * 2022-07-04 2023-05-12 天翼数字生活科技有限公司 一种家庭视频跟踪监控方法、装置、设备和存储介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000126160A (ja) * 1998-10-23 2000-05-09 Toppan Printing Co Ltd セキュリティシステム
CN101964129A (zh) * 2010-09-03 2011-02-02 陕西科技大学 基于视频技术的防盗报警方法
CN103268680A (zh) * 2013-05-29 2013-08-28 北京航空航天大学 一种家庭智能监控防盗系统
CN103956014A (zh) * 2014-05-04 2014-07-30 福建创高安防技术股份有限公司 一种远程影像识别防盗方法及系统
CN104135642A (zh) * 2014-07-31 2014-11-05 青岛歌尔声学科技有限公司 一种智能监控方法及相关设备
CN204926374U (zh) * 2015-07-31 2015-12-30 佛山市父母通智能机器人有限公司 一种老人用的智能安防装置及智能机器人
CN106980310A (zh) * 2017-06-02 2017-07-25 广东汇泰龙科技有限公司 一种基于云锁的家具设备布防方法、系统

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN204650694U (zh) * 2015-03-19 2015-09-16 上海共联通信信息发展有限公司 一种用于基站区域防盗的图像监控设备
CN107313692A (zh) * 2016-04-27 2017-11-03 襄阳市第四十二中学 带远程摄像头的防盗门
CN106530547A (zh) * 2016-12-19 2017-03-22 北京联合大学 一种家居防盗系统
CN206497541U (zh) * 2017-01-24 2017-09-15 潘南红 防盗报警系统
CN107146350A (zh) * 2017-05-15 2017-09-08 刘铭皓 一种利用移动客户端实现实时防盗的远程控制方法

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000126160A (ja) * 1998-10-23 2000-05-09 Toppan Printing Co Ltd セキュリティシステム
CN101964129A (zh) * 2010-09-03 2011-02-02 陕西科技大学 基于视频技术的防盗报警方法
CN103268680A (zh) * 2013-05-29 2013-08-28 北京航空航天大学 一种家庭智能监控防盗系统
CN103956014A (zh) * 2014-05-04 2014-07-30 福建创高安防技术股份有限公司 一种远程影像识别防盗方法及系统
CN104135642A (zh) * 2014-07-31 2014-11-05 青岛歌尔声学科技有限公司 一种智能监控方法及相关设备
CN204926374U (zh) * 2015-07-31 2015-12-30 佛山市父母通智能机器人有限公司 一种老人用的智能安防装置及智能机器人
CN106980310A (zh) * 2017-06-02 2017-07-25 广东汇泰龙科技有限公司 一种基于云锁的家具设备布防方法、系统

Also Published As

Publication number Publication date
CN108257344A (zh) 2018-07-06

Similar Documents

Publication Publication Date Title
WO2020125406A1 (zh) 安全监护方法、装置、终端及计算机可读存储介质
CA2880597C (en) System and method of alerting central monitoring station and registered users about a potential duress situation using a mobile application
US9277250B2 (en) Network based video analytics through an application program interface (API) with metric triggered notifications
US10289917B1 (en) Sensor to characterize the behavior of a visitor or a notable event
US10986717B1 (en) Reduced false alarms for outdoor IP security cameras
US10762767B2 (en) Communicating with law enforcement agencies using client devices that are associated with audio/video recording and communication devices
US6744462B2 (en) Apparatus and methods for resolution of entry/exit conflicts for security monitoring systems
WO2016150045A1 (zh) 一种非法入室告警方法及装置
CN109872482A (zh) 智慧安防监管方法、系统以及存储介质
CN111212274A (zh) 一种智能楼宇安防系统
EP2779640A1 (en) Security system for tracking and surveilling an object determined as unrecognizable using a surveillance camera and method for providing security service using the system
KR20210029953A (ko) 안면인식 기능에 기초하여 5g 이동통신망의 이용이 가능한 통신 단말기를 통해 영상감시가 가능한 로비폰 제어 장치 및 방법
CN112211496B (zh) 一种基于智能门锁的监控方法、系统及智能门锁
WO2019148695A1 (zh) 安全监控方法、装置、安保设备及系统
KR101967430B1 (ko) 스마트 디지털 도어락 및 이의 제어방법
US11195358B2 (en) Disarming surveillance systems for authorized persons
KR20200060094A (ko) 출입문 보안 관리시스템
CA2933212A1 (en) System and method of smart incident analysis in control system using floor maps
KR101440477B1 (ko) 스마트 시큐리티 시스템 및 방법
US11523485B1 (en) Reduced false alarms for outdoor IP security cameras
CN114119297A (zh) 一种基于物联网的智慧社区管理系统
KR200199005Y1 (ko) 지능형 보안체제 시스템
CN117173847B (zh) 一种智能门窗防盗警报系统及其工作方法
US11080956B1 (en) Disarming surveillance systems for authorized persons
CN114038098B (zh) 一种尾随检测方法、装置、设备和可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18903553

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 30.11.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18903553

Country of ref document: EP

Kind code of ref document: A1