WO2022127614A1 - 基于移动终端的安全监控方法、系统、设备及介质 - Google Patents

基于移动终端的安全监控方法、系统、设备及介质 Download PDF

Info

Publication number
WO2022127614A1
WO2022127614A1 PCT/CN2021/135239 CN2021135239W WO2022127614A1 WO 2022127614 A1 WO2022127614 A1 WO 2022127614A1 CN 2021135239 W CN2021135239 W CN 2021135239W WO 2022127614 A1 WO2022127614 A1 WO 2022127614A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
preset
distance
security monitoring
detection device
Prior art date
Application number
PCT/CN2021/135239
Other languages
English (en)
French (fr)
Inventor
贾秋玉
苏婷婷
Original Assignee
展讯通信(天津)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 展讯通信(天津)有限公司 filed Critical 展讯通信(天津)有限公司
Publication of WO2022127614A1 publication Critical patent/WO2022127614A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras

Definitions

  • the present invention relates to the field of monitoring, and in particular, to a mobile terminal-based security monitoring method, system, device and medium.
  • Conducting meetings is an unavoidable employee activity in a company that facilitates publicity, brainstorming, brainstorming, and more. In some special periods, it is necessary for participants to minimize direct contact and control the total number and distribution of people in an area. There is a lack of technology for monitoring the personnel and distribution in a specific area in the prior art, so that the safety of the personnel in the specific area cannot be guaranteed.
  • the technical problem to be solved by the present invention is to provide a mobile terminal-based security monitoring method and system in order to overcome the defect in the prior art that the personnel and distribution in a specific area cannot be monitored, resulting in the inability to guarantee the safety of the personnel in the specific area. , equipment and media.
  • a mobile terminal-based security monitoring method comprising:
  • the security monitoring method further includes:
  • the number of the detection devices is multiple;
  • the step of judging whether the distance between the mobile terminal and the detection device is within the first preset distance range specifically includes:
  • the security monitoring method further includes:
  • Each of the mobile terminals corresponds to a unique number
  • the duplicate parts are removed to count the number of the mobile terminals in the preset space, and an alarm is issued when the number exceeds a third preset threshold.
  • the security monitoring method further includes:
  • Person information corresponding to the mobile terminal is determined according to the serial number and the corresponding relationship.
  • the step of detecting the distance between the mobile terminal and other mobile terminals that enable the first scenario mode specifically includes:
  • the security monitoring method further includes:
  • the time line of the mobile terminal, the first time corresponding to the mobile terminal entering the preset space, and the second time corresponding to the mobile terminal leaving the preset space are recorded.
  • the security monitoring method further includes:
  • the distance between the mobile terminal and the detection device is within the first preset distance range, then determine whether the distance between the mobile terminal and the detection device is within the first preset distance range multiple times within a preset time. , and only open the first scene mode of the mobile terminal when the judgments are all yes.
  • a security monitoring system based on a mobile terminal comprising:
  • a distance judging module for judging whether the distance between the mobile terminal and the detection device is within a first preset distance range, wherein the detection device is located in a preset space;
  • the mode enabling module is used to enable the first scenario mode of the mobile terminal
  • a distance detection module for detecting the distance between the mobile terminal and other mobile terminals that open the first scenario mode
  • the first alarm module is configured to issue an alarm if there are other mobile terminals whose distance is less than the first preset threshold.
  • the safety monitoring system further includes:
  • a quantity statistics module configured to count the number of the mobile terminals within a second preset distance range from the detection device
  • the second alarm module is configured to issue an alarm if the number exceeds the second preset threshold.
  • the number of the detection devices is multiple;
  • the distance judging module is used for judging whether the distance between the mobile terminal and any of the detection devices is within a first preset distance range.
  • the safety monitoring system further includes:
  • Each of the mobile terminals corresponds to a unique number
  • the quantity statistics module specifically includes:
  • a number acquisition unit configured to acquire the numbers of all the mobile terminals within the first preset distance range corresponding to each of the detection devices
  • a statistical alarm unit used for summarizing the numbers of all mobile terminals obtained and removing duplicates to count the number of the mobile terminals in the preset space, and issuing an alarm when the number exceeds a third preset threshold .
  • the safety monitoring system further includes:
  • a preset module used to preset the correspondence between the number of the mobile terminal and the personnel
  • a personnel determination module configured to determine personnel information corresponding to the mobile terminal according to the serial number and the corresponding relationship.
  • the distance detection module specifically includes:
  • an acquisition unit configured to acquire all other mobile terminals within a third preset distance range from the mobile terminal
  • a distance detection unit configured to detect the distance between the mobile terminal and other mobile terminals that enable the first scene mode
  • the safety monitoring system also includes:
  • a recording module configured to record the time line of the mobile terminal, the first time corresponding to the mobile terminal entering the preset space, and the second time corresponding to the mobile terminal leaving the preset space.
  • the safety monitoring system further includes:
  • the first mode opening module is used to judge again whether the distance between the mobile terminal and the detection device is within the first preset time after judging that the distance between the mobile terminal and the detection device is within the first preset distance range. Within a preset distance range, and only when it is judged to be yes again will the first scenario mode of the mobile terminal be turned on;
  • the second mode enabling module is configured to determine whether the distance between the mobile terminal and the detection device is within the first preset distance for multiple times within a preset time after determining that the distance between the mobile terminal and the detection device is within the first preset distance range. Within a preset distance range, the first scene mode of the mobile terminal is turned on only when the judgments are all yes.
  • An electronic device comprising a memory, a processor and a computer program stored on the memory and running on the processor, the processor implements the mobile terminal-based security monitoring described in any of the above when the processor executes the computer program method.
  • the positive improvement effect of the present invention is that: the present invention controls the mobile terminal entering the preset space to open the first scene mode and obtains the distance with other mobile terminals, and alarms when the distance between the mobile terminals exceeds the preset threshold, which can ensure The personnel in the preset space maintain a safe distance, realize the safety monitoring of the personnel in the preset space, and ensure the safety of the personnel in the preset space.
  • FIG. 1 is a flowchart of a mobile terminal-based security monitoring method provided in Embodiment 1 of the present invention.
  • FIG. 2 is a partial flowchart of a mobile terminal-based security monitoring method provided in Embodiment 2 of the present invention.
  • FIG. 3 is a flowchart of another mobile terminal-based security monitoring method provided in Embodiment 2 of the present invention.
  • FIG. 4 is a schematic structural diagram of a mobile terminal-based security monitoring system provided in Embodiment 3 of the present invention.
  • FIG. 5 is a schematic structural diagram of a part of a mobile terminal-based security monitoring system provided in Embodiment 4 of the present invention.
  • FIG. 6 is a schematic structural diagram of another mobile terminal-based security monitoring system according to Embodiment 4 of the present invention.
  • FIG. 7 is a schematic structural diagram of an electronic device according to Embodiment 5 of the present invention.
  • This embodiment provides a mobile terminal-based security monitoring method, as shown in FIG. 1 , including the following steps:
  • Step 101 Determine whether the distance between the mobile terminal and the detection device is within a first preset distance range, wherein the detection device is located in a preset space. Specifically, it is determined whether the distance between the mobile terminal and the detection device is within the first preset distance range by means of Bluetooth, infrared or the like.
  • the range of the preset space covers the first preset distance range, and when the distance between the mobile terminal and the detection device is within the first preset distance range, it indicates that the mobile terminal is in the preset space Inside.
  • the preset space includes a conference room, an office area, a restaurant, etc., and the specific value of the first preset distance range can be set according to the actual size of the preset space.
  • the mobile terminal is a smart phone, and in other optional implementation manners, the mobile terminal may be other locatable electronic devices.
  • the detection device includes a smart terminal or other devices that can generate a network.
  • the network generated by the detection device includes WiFi (Wireless Internet Access) and Bluetooth, and the range covered by the network constitutes a first preset distance range.
  • WiFi Wireless Internet Access
  • Bluetooth Wireless Fidelity
  • step 102 If yes, go to step 102; if no, go to judge again whether the distance between the mobile terminal and the detection device is within the first preset distance range.
  • Step 102 Turn on the first scenario mode of the mobile terminal.
  • the first scenario mode is provided with a corresponding switch, and the switch is turned on by controlling to turn on the first scenario mode.
  • the first scenario mode of the mobile terminal can be turned on by sending a control command from the detection device, or a control command can be generated inside the mobile terminal to automatically turn on the first scenario mode to automatically turn on the first scenario mode, or the user of the mobile terminal can manually turn on the first scenario mode. , for more scenarios.
  • the first scenario mode is a conference mode of the mobile terminal.
  • the first scene mode includes any other preset mode.
  • Step 103 Detect the distance between the mobile terminal and other mobile terminals that enable the first scenario mode.
  • the presence of other mobile terminals is determined by detecting the Bluetooth signal, and the distance between the mobile terminal and other mobile terminals is determined by comparing the coordinates by acquiring GPS data of other mobile terminals and GPS data of itself. .
  • the distance between mobile terminals may also be determined by other methods, such as indoor positioning technology.
  • Step 104 If there are other mobile terminals whose distance is smaller than the first preset threshold, an alarm is issued.
  • the mobile terminal-based security monitoring method of the present embodiment controls the mobile terminal entering the preset space to open the first scene mode and obtains the distance with other mobile terminals, and alarms when the distance between the mobile terminals exceeds the preset threshold. It ensures that the personnel in the preset space maintain a safe distance, realizes the safety monitoring of the personnel in the preset space, and ensures the safety of the personnel in the preset space.
  • a mobile terminal-based security monitoring method provided in this embodiment is a further improvement on the basis of Embodiment 1. As shown in FIG. 2 , the mobile terminal-based security monitoring method in this embodiment further includes the following steps:
  • Step 105 Count the number of mobile terminals within a second preset distance range from the detection device.
  • the second preset distance range and the first preset distance range may be the same or different.
  • Step 106 If the number exceeds the second preset threshold, an alarm is issued.
  • the number of persons within a certain range can be controlled and the safety of the persons within a certain range can be ensured.
  • the security monitoring method further includes the following steps:
  • Step 107 Record the time line of the mobile terminal, the first time corresponding to the mobile terminal entering the preset space, and the second time corresponding to the mobile terminal leaving the preset space.
  • the location information of the mobile terminal can be recorded in real time by recording the time line of the mobile terminal.
  • the preset space is a conference room, by recording the first time when the mobile terminal enters the preset space and the second time when the mobile terminal leaves the preset space, the meeting time and the meeting time of the mobile terminal user can be automatically recorded.
  • step 101 specifically includes:
  • Step 1011 Determine whether the distance between the mobile terminal and any detection device is within the first preset distance range, if so, go to step 1021; if not, determine again whether the distance between the mobile terminal and any detection device after a preset time within the first preset distance range.
  • multiple detection devices are set, and multiple network ranges are generated by multiple detection devices to cover a large preset space, so as to ensure that the mobile terminal-based security monitoring method of this embodiment can also be used in a large space. Be applicable.
  • the mobile terminal-based security monitoring method further includes:
  • Step 1021 If it is determined that the distance between the mobile terminal and the detection device is within the first preset distance range, then after a preset time, it is judged again whether the distance between the mobile terminal and the detection device is within the first preset distance range, and The first scene mode of the mobile terminal is only turned on when it is determined to be yes again. After the distance between the mobile terminal and the detection device is within the range of the first preset distance, it indicates that the user of the mobile terminal has entered the preset space, and after the preset time, it is judged again whether the user of the mobile terminal is still in the preset space to eliminate accidental After the mobile terminal users, improve the accuracy of the results.
  • the mobile terminal-based security monitoring method further includes: if it is determined that the distance between the mobile terminal and the detection device is within a first preset distance range, multiple times within a preset time It is judged whether the distance between the mobile terminal and the detection device is within the first preset distance range, and the first scene mode of the mobile terminal is turned on only when the judgment is yes. After the distance between the mobile terminal and the detection device is within the first preset distance range, it indicates that the user of the mobile terminal has entered the preset space, and multiple times within the preset time to determine whether the mobile terminal is still within the preset space, so as to exclude Incidentally passing mobile terminal users, improving the accuracy of the results.
  • the mobile terminal pre-stores the account and password of the wireless network
  • the mobile terminal When the mobile terminal is connected to the wireless network, it is detected that the mobile terminal exists within the first preset range, and the mobile terminal is preset with the first scene mode, and the first scene mode of the mobile terminal is controlled to be turned on.
  • step 103 specifically includes:
  • Step 1031 Acquire all other mobile terminals within a third preset distance range from the mobile terminal. It should be noted that the third preset distance range is smaller than the first preset distance range, and the third preset distance range is to ensure a safe distance between persons.
  • Step 1032 Detect the distance between the mobile terminal and other mobile terminals that enable the first scenario mode.
  • the distance judgment of other mobile terminals other than the safe distance can be excluded, the number of judgments is reduced, and the accuracy of the judgment result is improved.
  • Step 104 is executed after step 1032:
  • Step 104 If there are other mobile terminals whose distance is smaller than the first preset threshold, an alarm is issued.
  • each mobile terminal corresponds to a unique number
  • step 105 specifically includes the following steps:
  • Step 1051 Acquire the serial numbers of all mobile terminals within the first preset distance range corresponding to each detection device.
  • the serial number corresponding to the mobile terminal includes the hardware identification code of the mobile terminal or other preset serial numbers, and the serial number of the mobile terminal is acquired by the detection device or the mobile terminal actively sends its own serial number to the detection device.
  • Step 1052 Summarize the acquired serial numbers of all mobile terminals and remove duplicates to count the number of mobile terminals in the preset space, and issue an alarm when the number exceeds a third preset threshold.
  • the network generated by the multiple detection devices will have intersecting parts.
  • multiple detection devices may repeatedly obtain the serial number of the same mobile terminal.
  • the general controller can summarize the numbers of all mobile terminals, and then remove the duplicate parts to count the number of mobile terminals. The number of all mobile terminals, and alarm when the number exceeds the preset threshold to control the number of personnel in the preset space and ensure personnel safety.
  • each detection apparatus will also issue an alarm when it detects that the number of mobile terminals within the corresponding network range exceeds a threshold, so as to avoid crowd gathering.
  • the mobile terminal-based security monitoring method further includes the following steps:
  • Step 108 preset the correspondence between the number of the mobile terminal and the person.
  • the corresponding relationship includes a personnel information table or other information that can indicate that the mobile terminal has a unique corresponding relationship with the corresponding personnel.
  • Step 109 Determine the personnel information corresponding to the mobile terminal according to the serial number and the corresponding relationship. Specifically, when the preset space is a conference room, the information of the personnel participating in the meeting can be confirmed through the obtained mobile phone number, and when an abnormal situation occurs, the relevant personnel can be quickly located, ensuring the timely processing of the abnormal situation. Under normal circumstances, it is also possible to automatically record the information of the participants.
  • a detection device is set up in the conference room, specifically a detector, and a wireless network is generated after the switch of the detector is turned on, and the mobile terminal is connected to
  • the corresponding network detects whether there is a detector in the specific range N1 (that is, whether there is a detector in the conference room).
  • the conference mode switch in the mobile terminal is directly turned on.
  • the mode is one of the first scenario modes, and records relevant information, including the movement of the mobile terminal and the time to participate in the meeting, etc.;
  • the value of this specific range N1 is the first preset distance range, and its value needs to be based on the The range to be detected, such as the location and size of the conference room, is comprehensively determined).
  • the mobile terminal disconnects the corresponding network, the conference mode is directly turned off, and the time of leaving the conference room is recorded.
  • the mobile terminal is connected to the corresponding network, when the mobile terminal detects the distance between the mobile terminal and other mobile terminals within the specific range N2, an alarm is issued when the distance is less than the specified value.
  • N2 needs to be comprehensively determined according to the scope of the required detection, such as the location and size of the conference room.
  • the prescribed value of the distance between the mobile terminals can be set by itself as required.
  • the mobile terminal-based security monitoring method of this embodiment can monitor the number of people in the preset space by counting the number of mobile terminals in the preset space, and alarm when the number exceeds a threshold, thereby ensuring the safety of the personnel. At the same time, it can record the arrival time, departure time, time line, personnel information, etc. of personnel in the preset space, realizing automatic monitoring of personnel information.
  • This embodiment provides a mobile terminal-based security monitoring system, as shown in FIG. 4 , including:
  • the distance judgment module 1 is used for judging whether the distance between the mobile terminal and the detection device is within a first preset distance range, wherein the detection device is located in a preset space. Specifically, it is determined whether the distance between the mobile terminal and the detection device is within the first preset distance range by means of Bluetooth, infrared or the like. Wherein, in the specific implementation process of the present invention, the range of the preset space covers the first preset distance range, and when the distance between the mobile terminal and the detection device is within the first preset distance range, it indicates that the mobile terminal is in the preset space Inside.
  • the preset space includes a conference room, an office area, a restaurant, etc., and the specific value of the first preset distance range can be set according to the actual size of the preset space.
  • the mobile terminal is a smart phone, and in other optional implementation manners, the mobile terminal may be other locatable electronic devices.
  • the detection device includes a smart terminal or other devices that can generate a network.
  • the network generated by the detection device includes WiFi (Wireless Internet Access) and Bluetooth, and the range covered by the network constitutes a first preset distance range.
  • WiFi Wireless Internet Access
  • Bluetooth Wireless Fidelity
  • the mode enabling module 2 is used for enabling the first scene mode of the mobile terminal.
  • the first scenario mode is provided with a corresponding switch, and the switch is turned on by controlling to turn on the first scenario mode.
  • the first scenario mode is a conference mode of the mobile terminal.
  • the first scene mode includes any other preset mode.
  • the distance detection module 3 is configured to detect the distance between the mobile terminal and other mobile terminals that have the first scenario mode turned on.
  • the presence of other mobile terminals is determined by detecting a Bluetooth signal, and the distance between the mobile terminal and other mobile terminals is determined through coordinate comparison by acquiring GPS data of other mobile terminals and GPS data of itself.
  • the distance between mobile terminals may also be determined by other methods, such as indoor positioning technology.
  • the first alarm module 4 is configured to issue an alarm if there are other mobile terminals whose distance is less than the first preset threshold.
  • the mobile terminal-based security monitoring system of this embodiment controls the mobile terminal entering the preset space to open the first scenario mode and obtains the distance with other mobile terminals, and alarms when the distance between the mobile terminals exceeds the preset threshold. It ensures that the personnel in the preset space maintain a safe distance, realizes the safety monitoring of the personnel in the preset space, and ensures the safety of the personnel in the preset space.
  • a mobile terminal-based security monitoring system provided by this embodiment is a further improvement on the basis of Embodiment 3. As shown in FIG. 5 , the mobile terminal-based security monitoring system in this embodiment further includes:
  • the quantity statistics module 5 is configured to count the number of mobile terminals within the second preset distance range from the detection device.
  • the second preset distance range and the first preset distance range may be the same or different.
  • the second alarm module 6 is configured to issue an alarm if the number exceeds the second preset threshold.
  • the number of persons within a certain range can be controlled and the safety of the persons within a certain range can be ensured.
  • the security monitoring system further includes the following steps:
  • the recording module 7 is used to record the time line of the mobile terminal, the first time corresponding to the mobile terminal entering the preset space, and the second time corresponding to the mobile terminal leaving the preset space.
  • the location information of the mobile terminal can be recorded in real time by recording the time line of the mobile terminal.
  • the preset space is a conference room
  • the meeting time and the meeting time of the mobile terminal user can be automatically recorded.
  • the number of detection devices is multiple.
  • the distance determination module 1 is specifically configured to determine whether the distance between the mobile terminal and any detection device is within the first preset distance range Inside.
  • multiple detection devices are set, and multiple network ranges are generated by the multiple detection devices to cover a larger preset space, so as to ensure that the security monitoring system based on the mobile terminal in this embodiment can also be used when the space is larger. applicable.
  • the mobile terminal-based security monitoring system includes:
  • the first mode opening module 21 after determining that the distance between the mobile terminal and the detection device is within the first preset distance range, after a preset time, it is judged again whether the distance between the mobile terminal and the detection device is within the first preset distance range. , and the first scene mode of the mobile terminal is turned on only when it is judged as yes again. After the distance between the mobile terminal and the detection device is within the range of the first preset distance, it indicates that the user of the mobile terminal has entered the preset space, and after the preset time, it is judged again whether the user of the mobile terminal is still in the preset space to eliminate accidental After the mobile terminal users, improve the accuracy of the results.
  • the mobile terminal-based security monitoring system includes: a second mode enabling module, configured to, after determining that the distance between the mobile terminal and the detection device is within the first preset distance range, pre- Whether the distance between the mobile terminal and the detection device is within the first preset distance range is judged multiple times within a set time, and the first scene mode of the mobile terminal is turned on only when the judgments are all yes. After the distance between the mobile terminal and the detection device is within the first preset distance range, it indicates that the user of the mobile terminal has entered the preset space, and multiple times within the preset time to determine whether the mobile terminal is still within the preset space, so as to exclude Incidentally passing mobile terminal users, improving the accuracy of the results.
  • a second mode enabling module configured to, after determining that the distance between the mobile terminal and the detection device is within the first preset distance range, pre- Whether the distance between the mobile terminal and the detection device is within the first preset distance range is judged multiple times within a set time, and the first scene mode of the mobile terminal is turned
  • the mobile terminal pre-stores the account and password of the wireless network
  • the mobile terminal When the mobile terminal is connected to the wireless network, it is detected that the mobile terminal exists within the first preset range, and the mobile terminal is preset with the first scene mode, and the first scene mode of the mobile terminal is controlled to be turned on.
  • the distance detection module 3 specifically includes:
  • the acquiring unit 301 is configured to acquire all other mobile terminals within a third preset distance range from the mobile terminal. It should be noted that the third preset distance range is smaller than the first preset distance range, and the third preset distance range is to ensure a safe distance between persons.
  • the distance detection unit 302 is configured to detect the distance between the mobile terminal and other mobile terminals that enable the first scene mode. By setting the third preset distance range, the distance judgment of other mobile terminals other than the safe distance can be excluded, the number of judgments is reduced, and the accuracy of the judgment result is improved.
  • each mobile terminal corresponds to a unique number
  • the quantity statistics module 5 specifically includes:
  • the serial number obtaining unit 51 is configured to obtain serial numbers of all mobile terminals within the first preset distance range corresponding to each detection device. It should be noted that the serial number corresponding to the mobile terminal includes the hardware identification code of the mobile terminal or other preset serial numbers, and the serial number of the mobile terminal is acquired by the detection device or the mobile terminal actively sends its own serial number to the detection device.
  • the statistical alarm unit 52 is used for summarizing the acquired numbers of all mobile terminals and removing duplicates to count the number of mobile terminals in the preset space, and issuing an alarm when the number exceeds a third preset threshold.
  • the network generated by the multiple detection devices may have intersecting parts. At this time, multiple detection devices may repeatedly obtain the serial number of the same mobile terminal.
  • After summarizing the numbers of the terminals remove the duplicate parts to count the number of all mobile terminals in the preset space.
  • the general controller can summarize the numbers of all mobile terminals, and then remove the duplicate parts to count the number of mobile terminals. The number of all mobile terminals, and alarm when the number exceeds the preset threshold to control the number of personnel in the preset space and ensure personnel safety.
  • each detection device in the mobile terminal-based security monitoring system will also issue an alarm when it detects that the number of mobile terminals within the corresponding network range exceeds a threshold, so as to avoid crowding.
  • the mobile terminal-based security monitoring system also includes the following modules:
  • the preset module 8 is used to preset the correspondence between the number of the mobile terminal and the person.
  • the corresponding relationship includes a personnel information table or other information that can indicate that the mobile terminal has a unique corresponding relationship with the corresponding personnel.
  • the personnel determination module 9 is used for determining personnel information corresponding to the mobile terminal according to the serial number and the corresponding relationship. Specifically, when the preset space is a conference room, the information of the personnel participating in the meeting can be confirmed through the obtained mobile phone number, and when an abnormal situation occurs, the relevant personnel can be quickly located, ensuring the timely processing of the abnormal situation. Under normal circumstances, it is also possible to automatically record the information of the participants.
  • a detection device is set up in the conference room, specifically a detector, and a wireless network is generated after the switch of the detector is turned on, and the mobile terminal is connected to
  • the corresponding network detects whether there is a detector in the specific range N1 (that is, whether there is a detector in the conference room).
  • the conference mode switch in the mobile terminal is directly turned on.
  • the mode is one of the first scenario modes, and records relevant information, including the movement of the mobile terminal and the time to participate in the meeting, etc.;
  • the value of this specific range N1 is the first preset distance range, and its value needs to be based on the The range to be detected, such as the location and size of the conference room, is comprehensively determined).
  • the mobile terminal disconnects the corresponding network, the conference mode is directly turned off, and the time of leaving the conference room is recorded.
  • the mobile terminal is connected to the corresponding network, when the mobile terminal detects the distance between the mobile terminal and other mobile terminals within the specific range N2, an alarm is issued when the distance is less than the specified value.
  • N2 needs to be comprehensively determined according to the required detection range, such as the location and size of the conference room.
  • the prescribed value of the distance between the mobile terminals can be set by itself as required.
  • the mobile terminal-based security monitoring system of this embodiment can monitor the number of people in the preset space by counting the number of mobile terminals in the preset space, and alarm when the number exceeds a threshold, thereby ensuring the safety of personnel. At the same time, it can record the arrival time, departure time, time line, personnel information, etc. of personnel in the preset space, realizing automatic monitoring of personnel information.
  • FIG. 7 is a schematic structural diagram of an electronic device implementing a mobile terminal-based security monitoring method according to Embodiment 5 of the present invention.
  • the electronic device includes a memory, a processor, and a computer program stored in the memory and running on the processor. When the processor executes the program, the mobile terminal-based security monitoring method of Embodiment 1 or 2 is implemented.
  • the electronic device 30 shown in FIG. 7 is only an example, and should not impose any limitation on the function and scope of use of the embodiments of the present invention.
  • the electronic device 30 may take the form of a general-purpose computing device, for example, it may be a server device.
  • Components of the electronic device 30 may include, but are not limited to, the above-mentioned at least one processor 31 , the above-mentioned at least one memory 32 , and a bus 33 connecting different system components (including the memory 32 and the processor 31 ).
  • the bus 33 includes a data bus, an address bus and a control bus.
  • Memory 32 may include volatile memory, such as random access memory (RAM) 321 and/or cache memory 322 , and may further include read only memory (ROM) 323 .
  • RAM random access memory
  • ROM read only memory
  • the memory 32 may also include a program/utility 325 having a set (at least one) of program modules 324 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, which An implementation of a network environment may be included in each or some combination of the examples.
  • the processor 31 executes various functional applications and data processing by running the computer program stored in the memory 32, such as the mobile terminal-based security monitoring method provided in Embodiment 1 or 2 of the present invention.
  • the electronic device 30 may also communicate with one or more external devices 34 (eg, keyboards, pointing devices, etc.). Such communication may take place through input/output (I/O) interface 35 .
  • the model-generating device 30 may also communicate with one or more networks (eg, a local area network (LAN), a wide area network (WAN), and/or a public network such as the Internet) through a network adapter 36 . As shown in FIG. 7 , the network adapter 36 communicates with other modules of the model generation device 30 via the bus 33 .
  • networks eg, a local area network (LAN), a wide area network (WAN), and/or a public network such as the Internet
  • model-generated device 30 may be used in conjunction with the model-generated device 30, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID (disk) array) systems, tape drives, and data backup storage systems.
  • This embodiment provides a computer-readable storage medium on which a computer program is stored.
  • the program is executed by a processor, the steps of the mobile terminal-based security monitoring method provided in Embodiment 1 or 2 are implemented.
  • the readable storage medium may include, but is not limited to, a portable disk, a hard disk, a random access memory, a read-only memory, an erasable programmable read-only memory, an optical storage device, a magnetic storage device, or any of the above suitable combination.
  • the present invention can also be implemented in the form of a program product, which includes program codes.
  • the program product runs on a terminal device, the program code is used to make the terminal device execute the implementation of Embodiment 1 or 2. Steps in a mobile terminal-based security monitoring method.
  • the program code for executing the present invention can be written in any combination of one or more programming languages, and the program code can be completely executed on the user equipment, partially executed on the user equipment, as an independent software
  • the package executes, partly on the user device, partly on the remote device, or entirely on the remote device.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Alarm Systems (AREA)

Abstract

本发明公开了一种基于移动终端的安全监控方法、系统、设备及介质,方法包括:判断移动终端与检测装置的距离是否在第一预设距离范围内,其中,检测装置位于一预设空间内;若是,则开启移动终端的第一情景模式;检测移动终端与开启第一情景模式的其他移动终端的距离;若存在距离小于第一预设阈值的其他移动终端,则发出报警。本发明通过控制进入预设空间的移动终端打开第一情景模式以获取与其他移动终端的距离,并在距离超过预设阈值时进行报警,可以对预设空间内的人员进行监控,保证预设空间内人员的安全。

Description

基于移动终端的安全监控方法、系统、设备及介质
本申请要求申请日为2020年12月18日的中国专利申请CN202011502242.2的优先权。本申请引用上述中国专利申请的全文。
技术领域
本发明涉及监控领域,尤其涉及一种基于移动终端的安全监控方法、系统、设备及介质。
背景技术
开展会议是一个公司不可避免的员工活动,便于宣导事宜、集体讨论、头脑风暴等。而在一些特殊时期,需要参会人们尽量减少直接接触,控制一片区域内人员总量和分布情况。现有技术中缺乏针对特定区域内的人员和分布进行监控的技术,导致无法保证特定区域内人员的安全。
发明内容
本发明要解决的技术问题是为了克服现有技术中无法对特定区域内的人员和分布进行监控,导致无法保证特定区域内人员的安全的缺陷,提供一种基于移动终端的安全监控方法、系统、设备及介质。
本发明是通过下述技术方案来解决上述技术问题:
一种基于移动终端的安全监控方法,包括:
判断移动终端与检测装置的距离是否在第一预设距离范围内,其中,所述检测装置位于一预设空间内;
若是,则开启所述移动终端的第一情景模式;
检测所述移动终端与开启所述第一情景模式的其他移动终端的距离;
若存在距离小于第一预设阈值的其他移动终端,则发出报警。
较佳地,所述安全监控方法还包括:
统计距所述检测装置在第二预设距离范围内的所述移动终端的数量;
若所述数量超过第二预设阈值,则发出报警。
较佳地,所述检测装置的数量为多个;
所述判断移动终端与检测装置的距离是否在第一预设距离范围内的步骤具体包括:
判断移动终端与任一所述检测装置的距离是否在第一预设距离范围内。
较佳地,所述安全监控方法还包括:
每个所述移动终端对应唯一的编号;
获取每个所述检测装置对应的所述第一预设距离范围内的所有所述移动终端的编号;
将获取的所有移动终端的编号汇总后去除重复部分以统计出所述预设空间内的所述移动终端的数量,并在所述数量超过第三预设阈值时发出报警。
较佳地,所述安全监控方法还包括:
预设所述移动终端的编号与人员的对应关系;
根据所述编号和所述对应关系确定所述移动终端对应的人员信息。
较佳地,所述检测所述移动终端与开启所述第一情景模式的其他移动终端的距离的步骤具体包括:
获取距所述移动终端在第三预设距离范围内的所有其他移动终端;
检测所述移动终端与开启所述第一情景模式的其他所述移动终端的距离;
和/或,
所述安全监控方法还包括:
记录所述移动终端的时间动线、所述移动终端进入所述预设空间对应的第一时间和所述移动终端离开所述预设空间对应的第二时间。
较佳地,所述安全监控方法还包括:
若判断出所述移动终端与检测装置的距离在第一预设距离范围内,则经预设时间后再次判断所述移动终端与所述检测装置的距离是否在第一预设距离范围内,并在再次判断为是时才开启所述移动终端的第一情景模式;
和/或,
若判断出所述移动终端与检测装置的距离在第一预设距离范围内,则在预设时间内多次判断所述移动终端与所述检测装置的距离是否在第一预设距离范围内,并在判断均为是时才开启所述移动终端的第一情景模式。
一种基于移动终端的安全监控系统,包括:
距离判断模块,用于判断移动终端与检测装置的距离是否在第一预设距离范围内,其中,所述检测装置位于一预设空间内;
若是,则调用模式开启模块;
所述模式开启模块,用于开启所述移动终端的第一情景模式;
距离检测模块,用于检测所述移动终端与开启所述第一情景模式的其他移动终端的 距离;
第一报警模块,用于若存在距离小于第一预设阈值的其他移动终端,则发出报警。
较佳地,所述安全监控系统还包括:
数量统计模块,用于统计距所述检测装置在第二预设距离范围内的所述移动终端的数量;
第二报警模块,用于若所述数量超过第二预设阈值,则发出报警。
较佳地,所述检测装置的数量为多个;
所述距离判断模块用于判断移动终端与任一所述检测装置的距离是否在第一预设距离范围内。
较佳地,所述安全监控系统还包括:
每个所述移动终端对应唯一的编号;
所述数量统计模块具体包括:
编号获取单元,用于获取每个所述检测装置对应的所述第一预设距离范围内的所有所述移动终端的编号;
统计报警单元,用于将获取的所有移动终端的编号汇总后去除重复部分以统计出所述预设空间内的所述移动终端的数量,并在所述数量超过第三预设阈值时发出报警。
较佳地,所述安全监控系统还包括:
预设模块,用于预设所述移动终端的编号与人员的对应关系;
人员确定模块,用于根据所述编号和所述对应关系确定所述移动终端对应的人员信息。
较佳地,所述距离检测模块具体包括:
获取单元,用于获取距所述移动终端在第三预设距离范围内的所有其他移动终端;
距离检测单元,用于检测所述移动终端与开启所述第一情景模式的其他所述移动终端的距离;
和/或,
所述安全监控系统还包括:
记录模块,用于记录所述移动终端的时间动线、所述移动终端进入所述预设空间对应的第一时间和所述移动终端离开所述预设空间对应的第二时间。
较佳地,所述安全监控系统还包括:
第一模式开启模块,用于在判断出移动终端与检测装置的距离在第一预设距离范围内之后,经预设时间后再次判断所述移动终端与所述检测装置的距离是否在第一预设距 离范围内,并在再次判断为是时才开启所述移动终端的第一情景模式;
和/或,
第二模式开启模块,用于在判断出移动终端与检测装置的距离在第一预设距离范围内之后,在预设时间内多次判断所述移动终端与所述检测装置的距离是否在第一预设距离范围内,并在判断均为是时才开启所述移动终端的第一情景模式。
一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现上述任一项所述的基于移动终端的安全监控方法。
一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现上述任一项所述的基于移动终端的安全监控方法的步骤。
本发明的积极进步效果在于:本发明通过控制进入预设空间的移动终端打开第一情景模式并获取与其他移动终端的距离,在移动终端之间的距离超过预设阈值时进行报警,可以保障预设空间内的人员之间保持安全距离,实现了预设空间内的人员的安全监控,保证了预设空间内人员的安全。
附图说明
图1为本发明实施例1提供的基于移动终端的安全监控方法的流程图。
图2为本发明实施例2提供的基于移动终端的安全监控方法的部分流程图。
图3为本发明实施例2提供的另一种基于移动终端的安全监控方法的流程图。
图4为本发明实施例3提供的基于移动终端的安全监控系统的结构示意图。
图5为本发明实施例4提供的基于移动终端的安全监控系统的部分结构示意图。
图6为本发明实施例4提供的另一种基于移动终端的安全监控系统的结构示意图。
图7为本发明实施例5提供的电子设备的结构示意图。
具体实施方式
下面通过实施例的方式进一步说明本发明,但并不因此将本发明限制在所述的实施例范围之中。
实施例1
本实施例提供一种基于移动终端的安全监控方法,如图1所示,包括以下步骤:
步骤101、判断移动终端与检测装置的距离是否在第一预设距离范围内,其中,检测装置位于一预设空间内。具体地,通过蓝牙、红外等方式判断移动终端与检测装置的距 离是否在第一预设距离范围内。其中,在本发明的具体实施过程中,所述预设空间的范围覆盖第一预设距离范围,当移动终端与检测装置的距离在第一预设距离范围内,表明移动终端在预设空间内。预设空间包括会议室、办公区域或餐厅等,而具体第一预设距离范围的取值大小可根据预设空间的实际尺寸进行设置。
步骤101可选的一种实施方式中,移动终端为智能手机,在其他可选的实施方式中移动终端可为其他可定位的电子设备。检测装置包括智能终端或其他可产生网络的设备。通过检测装置产生的网络包括WiFi(无线上网)和蓝牙等,该网络覆盖的范围构成第一预设距离范围。当移动终端进入检测装置产生的网络覆盖的范围则判断为移动终端与检测装置的距离小于第一预设距离范围。
若是,则执行步骤102;若否,则再次进行判断移动终端与检测装置的距离是否在第一预设距离范围内。
步骤102、开启移动终端的第一情景模式。具体地,第一情景模式设置有对应的开关,通过控制打开开关以打开第一情景模式。可通过检测装置发送控制指令开启移动终端的第一情景模式,也可以移动终端内部产生控制指令自动开启第一情景模式以实现自动打开第一情景模式,或是移动终端用户手动开启第一情景模式,以适用更多场景。
步骤102可选的一种实施方式中,第一情景模式为移动终端的会议模式。在其他可选的实施方式中,第一情景模式包括其他任何预设的模式。
步骤103、检测移动终端与开启第一情景模式的其他移动终端的距离。
步骤103可选的一种实施方式中,通过检测蓝牙信号确定存在其他移动终端,并通过获取其他移动终端的GPS数据和自身的GPS数据,通过坐标比较确定出该移动终端与其他移动终端的距离。在其他可选的实施方式中,也可通过其他方式,如室内定位技术确定移动终端之间的距离。
步骤104、若存在距离小于第一预设阈值的其他移动终端,则发出报警。
本实施例的基于移动终端的安全监控方法通过控制进入预设空间的移动终端打开第一情景模式并获取与其他移动终端的距离,在移动终端之间的距离超过预设阈值时进行报警,可以保障预设空间内的人员之间保持安全距离,实现了预设空间内的人员的安全监控,保证了预设空间内人员的安全。
实施例2
本实施例提供的一种基于移动终端的安全监控方法是在实施例1的基础上作的进一步改进,如图2所示,本实施例的基于移动终端的安全监控方法还包括以下步骤:
步骤105、统计距检测装置在第二预设距离范围内的移动终端的数量。该第二预设距 离范围与第一预设距离范围可以相同,也可以不相同。
步骤106、若数量超过第二预设阈值,则发出报警。
本实施方式中,通过统计第一预设范围内的移动终端的数量,并在数量超过阈值时进行报警,可以控制一定范围内的人员数量,保证一定范围内的人员的安全。
在可选的另一种实施方式中,安全监控方法还包括以下步骤:
步骤107、记录移动终端的时间动线、移动终端进入预设空间对应的第一时间和移动终端离开预设空间对应的第二时间。通过记录移动终端的时间动线可实时记录移动终端的位置信息。当预设空间为会议室时,通过记录移动终端进入预设空间的第一时间和离开预设空间的第二时间可自动记录移动终端用户的参加会议时间和离开会议时间。
在可选的另一种实施方式中,检测装置的数量为多个,如图3所示,步骤101具体包括:
步骤1011、判断移动终端与任一检测装置的距离是否在第一预设距离范围内,若是,则执行步骤1021,若否,经预设时间后再次判断移动终端与任一检测装置的距离是否在第一预设距离范围内。本实施方式通过设置多个检测装置,通过多个检测装置产生多个网络范围以覆盖较大的预设空间,以保证在空间较大的场合本实施例的基于移动终端的安全监控方法也能适用。
在可选的另一种实施方式中,基于移动终端的安全监控方法还包括:
步骤1021、若判断出所述移动终端与检测装置的距离在第一预设距离范围内,则经预设时间后再次判断移动终端与检测装置的距离是否在第一预设距离范围内,并在再次判断为是时才开启移动终端的第一情景模式。通过在移动终端与检测装置的距离在第一预设距离范围内后,表明移动终端用户已进入预设空间,经预设时间后再次判断移动终端用户是否还在预设空间内,以排除偶然经过的移动终端用户,提高结果的准确性。
在可选的另一种实施方式中,基于移动终端的安全监控方法还包括:若判断出所述移动终端与检测装置的距离在第一预设距离范围内,则在预设时间内多次判断移动终端与检测装置的距离是否在第一预设距离范围内,并在判断均为是时才开启移动终端的第一情景模式。通过在移动终端与检测装置的距离在第一预设距离范围内后,表明移动终端用户已进入预设空间,并在预设时间内多次判断移动终端是否然在预设空间内,以排除偶然经过的移动终端用户,提高结果的准确性。
在可选的另一种实施方式中,移动终端预存有无线网络的账号和密码;
移动终端连接上无线网络,则检测到第一预设范围内存在移动终端,移动终端预设有第一情景模式,则控制打开移动终端的第一情景模式。
可选的另一种实施方式,步骤103具体包括:
步骤1031、获取距移动终端在第三预设距离范围内的所有其他移动终端。需要说明的是,第三预设距离范围小于第一预设距离范围,第三预设距离范围为保证人员之间的安全距离。
步骤1032、检测移动终端与开启第一情景模式的其他移动终端的距离。通过设置第三预设距离范围,可排除安全距离之外的其他移动终端的距离判断,减少了判断次数,提高了判断结果的准确性。
步骤1032之后执行步骤104:
步骤104、若存在距离小于第一预设阈值的其他移动终端,则发出报警。
可选的另一种实施方式中,每个移动终端对应唯一的编号,步骤105具体包括以下步骤:
步骤1051、获取每个检测装置对应的第一预设距离范围内的所有移动终端的编号。需要说明的是,移动终端对应的编号包括移动终端的硬件标识码或其他预设的编号,通过检测装置获取移动终端的编号或移动终端主动发送自身的编号至检测装置。
步骤1052、将获取的所有移动终端的编号汇总后去除重复部分以统计出预设空间内的移动终端的数量,并在数量超过第三预设阈值时发出报警。需要说明的是,在存在多个检测装置的情况下,多个检测装置产生的网络会出现交叉部分,此时,会出现多个检测装置重复获取同一移动终端的编号的情况,通过将所有移动终端的编号汇总后去除重复部分以统计出预设空间内的所有移动终端的数量,具体的,可通过设置总控制器,通过总控制器汇总所有移动终端的编号,再去除重复部分以统计出所有移动终端的数量,并在数量超过预设阈值时进行报警,以控制预设空间内的人员数量,确保人员安全。
在另一可选的实施方式中,每个检测装置在检测到对应的网络范围内的移动终端的数量超过阈值时也会进行报警,以避免人员聚集。
在另一可选的实施方式中,基于移动终端的安全监控方法还包括以下步骤:
步骤108、预设移动终端的编号与人员的对应关系。具体地,该对应关系包括人员信息表或其他能表明移动终端与对应人员具有唯一对应关系的信息。比如,手机的编号与对应的手机持有人的姓名,部门,岗位等对应关系的信息表。
步骤109、根据编号和对应关系确定移动终端对应的人员信息。具体地,当预设空间为会议室时,通过获取的手机编号可以确认参加会议的人员信息,在出现异常情况时,可快速定位相关人员,确保了异常情况的及时处理。在正常情况下,也可实现自动记录参会人员信息。
下面通过举例说明本实施例的基于移动终端的安全监控方法的具体应用:在会议室中设置检测装置,具体为一检测器,通过该检测器开关打开后产生无线网络,移动终端通过是否连接到对应网络检测特定范围N1内是否存在检测器(即会议室内是否存在检测器),当特定范围N1内存在检测器,即连接上对应网络,则直接开启移动终端中的会议模式的开关,该会议模式即第一情景模式中的一种,并记录相关信息,包括移动终端的动线和参加会议时间等;(此特定范围N1的值即为第一预设距离范围,其值大小需要根据所需检测的范围,如会议室位置、大小进行综合判定)。当特定范围N1内不存在检测器,比如移动终端断开了对应网络,则直接关闭会议模式,并记录离开会议室的时间。当移动终端连接上对应的网络时,当移动终端检测到特定范围N2内与其他移动终端的间距,当间距小于规定值后发出报警。N2需要根据所需检测的范围,如会议室位置、大小进行综合判定。移动终端间的距离的规定值则可根据需要自行设定。检测器的开关打开后产生无线网络,并持续检测特定范围M内是否存在移动终端,如有新增移动终端则将移动终端内对应的会议模式的开关打开;检测器还用于统计特定范围M内的移动终端的数量,并在数量超过规定数量时发出报警。
本实施例的基于移动终端的安全监控方法通过统计预设空间内的移动终端的数量,可监控预设空间内人员的数量,并在数量超过阈值时进行报警,保证了人员安全。同时可记录预设空间内人员的到达时间、离开时间、时间动线、人员信息等,实现了人员的信息的自动监控。
实施例3
本实施例提供一种基于移动终端的安全监控系统,如图4所示,包括:
距离判断模块1,用于判断移动终端与检测装置的距离是否在第一预设距离范围内,其中,检测装置位于一预设空间内。具体地,通过蓝牙、红外等方式判断移动终端与检测装置的距离是否在第一预设距离范围内。其中,在本发明的具体实施过程中,所述预设空间的范围覆盖第一预设距离范围,当移动终端与检测装置的距离在第一预设距离范围内,表明移动终端在预设空间内。预设空间包括会议室、办公区域或餐厅等,而具体第一预设距离范围的取值大小可根据预设空间的实际尺寸进行设置。
可选的一种实施方式中,移动终端为智能手机,在其他可选的实施方式中移动终端可为其他可定位的电子设备。检测装置包括智能终端或其他可产生网络的设备。通过检测装置产生的网络包括WiFi(无线上网)和蓝牙等,该网络覆盖的范围构成第一预设距离范围。当移动终端进入检测装置产生的网络覆盖的范围则判断为移动终端与检测装置的距离小于第一预设距离范围。
若是,则调用模式开启模块2;
模式开启模块2,用于开启移动终端的第一情景模式。具体地,第一情景模式设置有对应的开关,通过控制打开开关以打开第一情景模式。
可选的一种实施方式中,第一情景模式为移动终端的会议模式。在其他可选的实施方式中,第一情景模式包括其他任何预设的模式。
距离检测模块3,用于检测移动终端与开启第一情景模式的其他移动终端的距离。
可选的一种实施方式中,通过检测蓝牙信号确定存在其他移动终端,并通过获取其他移动终端的GPS数据和自身的GPS数据,通过坐标比较确定出该移动终端与其他移动终端的距离。在其他可选的实施方式中,也可通过其他方式,如室内定位技术确定移动终端之间的距离。
第一报警模块4,用于若存在距离小于第一预设阈值的其他移动终端,则发出报警。
本实施例的基于移动终端的安全监控系统通过控制进入预设空间的移动终端打开第一情景模式并获取与其他移动终端的距离,在移动终端之间的距离超过预设阈值时进行报警,可以保障预设空间内的人员之间保持安全距离,实现了预设空间内的人员的安全监控,保证了预设空间内人员的安全。
实施例4
本实施例提供的一种基于移动终端的安全监控系统是在实施例3的基础上作的进一步改进,如图5所示,本实施例的基于移动终端的安全监控系统还包括:
数量统计模块5,用于统计距检测装置在第二预设距离范围内的移动终端的数量。具体的,第二预设距离范围与第一预设距离范围的可以相同,也可以不同。
第二报警模块6,用于若数量超过第二预设阈值,则发出报警。
本实施方式中,通过统计第一预设范围内的移动终端的数量,并在数量超过阈值时进行报警,可以控制一定范围内的人员数量,保证一定范围内的人员的安全。
在可选的另一种实施方式中,安全监控系统还包括以下步骤:
记录模块7,用于记录移动终端的时间动线、移动终端进入预设空间对应的第一时间和移动终端离开预设空间对应的第二时间。通过记录移动终端的时间动线可实时记录移动终端的位置信息。当预设空间为会议室时,通过记录移动终端进入预设空间的第一时间和离开预设空间的第二时间可自动记录移动终端用户的参加会议时间和离开会议时间。
在可选的另一种实施方式中,检测装置的数量为多个,如图6所示,距离判断模块1具体用于判断移动终端与任一检测装置的距离是否在第一预设距离范围内。本实施方式通过设置多个检测装置,通过多个检测装置产生多个网络范围以覆盖较大的预设空间, 以保证在空间较大的场合,本实施例的基于移动终端的安全监控系统也能适用。
在可选的另一种实施方式中,基于移动终端的安全监控系统包括:
第一模式开启模块21、在判断出移动终端与检测装置的距离在第一预设距离范围内之后,经预设时间后再次判断移动终端与检测装置的距离是否在第一预设距离范围内,并在再次判断为是时才开启移动终端的第一情景模式。通过在移动终端与检测装置的距离在第一预设距离范围内后,表明移动终端用户已进入预设空间,经预设时间后再次判断移动终端用户是否还在预设空间内,以排除偶然经过的移动终端用户,提高结果的准确性。
在可选的另一种实施方式中,基于移动终端的安全监控系统包括:第二模式开启模块,用于在判断出移动终端与检测装置的距离在第一预设距离范围内之后,在预设时间内多次判断移动终端与检测装置的距离是否在第一预设距离范围内,并在判断均为是时才开启移动终端的第一情景模式。通过在移动终端与检测装置的距离在第一预设距离范围内后,表明移动终端用户已进入预设空间,并在预设时间内多次判断移动终端是否然在预设空间内,以排除偶然经过的移动终端用户,提高结果的准确性。
在可选的另一种实施方式中,移动终端预存有无线网络的账号和密码;
移动终端连接上无线网络,则检测到第一预设范围内存在移动终端,移动终端预设有第一情景模式,则控制打开移动终端的第一情景模式。
可选的另一种实施方式,距离检测模块3具体包括:
获取单元301,用于获取距移动终端在第三预设距离范围内的所有其他移动终端。需要说明的是,第三预设距离范围小于第一预设距离范围,第三预设距离范围为保证人员之间的安全距离。
距离检测单元302,用于检测移动终端与开启第一情景模式的其他移动终端的距离。通过设置第三预设距离范围,可排除安全距离之外的其他移动终端的距离判断,减少了判断次数,提高了判断结果的准确性。
可选的另一种实施方式中,每个移动终端对应唯一的编号,数量统计模块5具体包括:
编号获取单元51,用于获取每个检测装置对应的第一预设距离范围内的所有移动终端的编号。需要说明的是,移动终端对应的编号包括移动终端的硬件标识码或其他预设的编号,通过检测装置获取移动终端的编号或移动终端主动发送自身的编号至检测装置。
统计报警单元52,用于将获取的所有移动终端的编号汇总后去除重复部分以统计出预设空间内的移动终端的数量,并在数量超过第三预设阈值时发出报警。需要说明的是, 在存在多个检测装置的情况下,多个检测装置产生的网络会出现交叉部分,此时,会出现多个检测装置重复获取同一移动终端的编号的情况,通过将所有移动终端的编号汇总后去除重复部分以统计出预设空间内的所有移动终端的数量,具体的,可通过设置总控制器,通过总控制器汇总所有移动终端的编号,再去除重复部分以统计出所有移动终端的数量,并在数量超过预设阈值时进行报警,以控制预设空间内的人员数量,确保人员安全。
在另一可选的实施方式中,基于移动终端的安全监控系统中每个检测装置在检测到对应的网络范围内的移动终端的数量超过阈值时也会进行报警,以避免人员聚集。
基于移动终端的安全监控系统还包括以下模块:
预设模块8,用于预设移动终端的编号与人员的对应关系。具体地,该对应关系包括人员信息表或其他能表明移动终端与对应人员具有唯一对应关系的信息。比如,手机的编号与对应的手机持有人的姓名,部门,岗位等对应关系的信息表。
人员确定模块9,用于根据编号和对应关系确定移动终端对应的人员信息。具体地,当预设空间为会议室时,通过获取的手机编号可以确认参加会议的人员信息,在出现异常情况时,可快速定位相关人员,确保了异常情况的及时处理。在正常情况下,也可实现自动记录参会人员信息。
下面通过举例说明本实施例的基于移动终端的安全监控系统的具体应用:在会议室中设置检测装置,具体为一检测器,通过该检测器开关打开后产生无线网络,移动终端通过是否连接到对应网络检测特定范围N1内是否存在检测器(即会议室内是否存在检测器),当特定范围N1内存在检测器,即连接上对应网络,则直接开启移动终端中的会议模式的开关,该会议模式即第一情景模式中的一种,并记录相关信息,包括移动终端的动线和参加会议时间等;(此特定范围N1的值即为第一预设距离范围,其值大小需要根据所需检测的范围,如会议室位置、大小进行综合判定)。当特定范围N1内不存在检测器,比如移动终端断开了对应网络,则直接关闭会议模式,并记录离开会议室的时间。当移动终端连接上对应的网络时,当移动终端检测到特定范围N2内与其他移动终端的间距,当间距小于规定值后发出报警。N2需要根据所需检测的范围,如会议室位置、大小进行综合判定。移动终端间的距离的规定值则可根据需要自行设定。检测器的开关打开后产生无线网络,并持续检测特定范围M内是否存在移动终端,如有新增移动终端则将移动终端内对应的会议模式的开关打开;检测器还用于统计特定范围M内的移动终端的数量,并在数量超过规定数量时发出报警。
本实施例的基于移动终端的安全监控系统通过统计预设空间内的移动终端的数量, 可监控预设空间内人员的数量,并在数量超过阈值时进行报警,保证了人员安全。同时可记录预设空间内人员的到达时间、离开时间、时间动线、人员信息等,实现了人员的信息的自动监控。
实施例5
图7为本发明实施例5提供的一种实现基于移动终端的安全监控方法的电子设备的结构示意图。电子设备包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,处理器执行程序时实现实施例1或2的基于移动终端的安全监控方法。图7显示的电子设备30仅仅是一个示例,不应对本发明实施例的功能和使用范围带来任何限制。
如图7所示,电子设备30可以以通用计算设备的形式表现,例如其可以为服务器设备。电子设备30的组件可以包括但不限于:上述至少一个处理器31、上述至少一个存储器32、连接不同系统组件(包括存储器32和处理器31)的总线33。
总线33包括数据总线、地址总线和控制总线。
存储器32可以包括易失性存储器,例如随机存取存储器(RAM)321和/或高速缓存存储器322,还可以进一步包括只读存储器(ROM)323。
存储器32还可以包括具有一组(至少一个)程序模块324的程序/实用工具325,这样的程序模块324包括但不限于:操作系统、一个或者多个应用程序、其它程序模块以及程序数据,这些示例中的每一个或某种组合中可能包括网络环境的实现。
处理器31通过运行存储在存储器32中的计算机程序,从而执行各种功能应用以及数据处理,例如本发明实施例1或2所提供的基于移动终端的安全监控方法。
电子设备30也可以与一个或多个外部设备34(例如键盘、指向设备等)通信。这种通信可以通过输入/输出(I/O)接口35进行。并且,模型生成的设备30还可以通过网络适配器36与一个或者多个网络(例如局域网(LAN),广域网(WAN)和/或公共网络,例如因特网)通信。如图7所示,网络适配器36通过总线33与模型生成的设备30的其它模块通信。应当明白,尽管图中未示出,可以结合模型生成的设备30使用其它硬件和/或软件模块,包括但不限于:微代码、设备驱动器、冗余处理器、外部磁盘驱动阵列、RAID(磁盘阵列)系统、磁带驱动器以及数据备份存储系统等。
应当注意,尽管在上文详细描述中提及了电子设备的若干单元/模块或子单元/模块,但是这种划分仅仅是示例性的并非强制性的。实际上,根据本发明的实施方式,上文描述的两个或更多单元/模块的特征和功能可以在一个单元/模块中具体化。反之,上文描述的一个单元/模块的特征和功能可以进一步划分为由多个单元/模块来具体化。
实施例6
本实施例提供了一种计算机可读存储介质,其上存储有计算机程序,程序被处理器执行时实现实施例1或2所提供的基于移动终端的安全监控方法步骤。
其中,可读存储介质可以采用的更具体可以包括但不限于:便携式盘、硬盘、随机存取存储器、只读存储器、可擦拭可编程只读存储器、光存储器件、磁存储器件或上述的任意合适的组合。
在可能的实施方式中,本发明还可以实现为一种程序产品的形式,其包括程序代码,当程序产品在终端设备上运行时,程序代码用于使终端设备执行实现实施例1或2的基于移动终端的安全监控方法中的步骤。
其中,可以以一种或多种程序设计语言的任意组合来编写用于执行本发明的程序代码,程序代码可以完全地在用户设备上执行、部分地在用户设备上执行、作为一个独立的软件包执行、部分在用户设备上部分在远程设备上执行或完全在远程设备上执行。
虽然以上描述了本发明的具体实施方式,但是本领域的技术人员应当理解,这仅是举例说明,本发明的保护范围是由所附权利要求书限定的。本领域的技术人员在不背离本发明的原理和实质的前提下,可以对这些实施方式做出多种变更或修改,但这些变更和修改均落入本发明的保护范围。

Claims (16)

  1. 一种基于移动终端的安全监控方法,其特征在于,包括:
    判断移动终端与检测装置的距离是否在第一预设距离范围内,其中,所述检测装置位于一预设空间内;
    若是,则开启所述移动终端的第一情景模式;
    检测所述移动终端与开启所述第一情景模式的其他移动终端的距离;
    若存在距离小于第一预设阈值的其他移动终端,则发出报警。
  2. 如权利要求1所述的基于移动终端的安全监控方法,其特征在于,所述安全监控方法还包括:
    统计距所述检测装置在第二预设距离范围内的所述移动终端的数量;
    若所述数量超过第二预设阈值,则发出报警。
  3. 如权利要求1所述的基于移动终端的安全监控方法,其特征在于,所述检测装置的数量为多个;
    所述判断移动终端与检测装置的距离是否在第一预设距离范围内的步骤具体包括:
    判断移动终端与任一所述检测装置的距离是否在第一预设距离范围内。
  4. 如权利要求3所述的基于移动终端的安全监控方法,其特征在于,所述安全监控方法还包括:
    每个所述移动终端对应唯一的编号;
    获取每个所述检测装置对应的所述第一预设距离范围内的所有所述移动终端的编号;
    将获取的所有移动终端的编号汇总后去除重复部分以统计出所述预设空间内的所述移动终端的数量,并在所述数量超过第三预设阈值时发出报警。
  5. 如权利要求4所述的基于移动终端的安全监控方法,其特征在于,所述安全监控方法还包括:
    预设所述移动终端的编号与人员的对应关系;
    根据所述编号和所述对应关系确定所述移动终端对应的人员信息。
  6. 如权利要求1所述的基于移动终端的安全监控方法,其特征在于,所述检测所述移动终端与开启所述第一情景模式的其他移动终端的距离的步骤具体包括:
    获取距所述移动终端在第三预设距离范围内的所有其他移动终端;
    检测所述移动终端与开启所述第一情景模式的其他所述移动终端的距离;
    和/或,
    所述安全监控方法还包括:
    记录所述移动终端的时间动线、所述移动终端进入所述预设空间对应的第一时间和所述移动终端离开所述预设空间对应的第二时间。
  7. 如权利要求1所述的基于移动终端的安全监控方法,其特征在于,所述安全监控方法还包括:
    若判断出所述移动终端与检测装置的距离在第一预设距离范围内,则经预设时间后再次判断所述移动终端与所述检测装置的距离是否在第一预设距离范围内,并在再次判断为是时才开启所述移动终端的第一情景模式;
    和/或,
    若判断出所述移动终端与检测装置的距离在第一预设距离范围内,则在预设时间内多次判断所述移动终端与所述检测装置的距离是否在第一预设距离范围内,并在判断均为是时才开启所述移动终端的第一情景模式。
  8. 一种基于移动终端的安全监控系统,其特征在于,包括:
    距离判断模块,用于判断移动终端与检测装置的距离是否在第一预设距离范围内,其中,所述检测装置位于一预设空间内;
    若是,则调用模式开启模块;
    所述模式开启模块,用于开启所述移动终端的第一情景模式;
    距离检测模块,用于检测所述移动终端与开启所述第一情景模式的其他移动终端的距离;
    第一报警模块,用于若存在距离小于第一预设阈值的其他移动终端,则发出报警。
  9. 如权利要求8所述的基于移动终端的安全监控系统,其特征在于,所述安全监控系统还包括:
    数量统计模块,用于统计距所述检测装置在第二预设距离范围内的所述移动终端的数量;
    第二报警模块,用于若所述数量超过第二预设阈值,则发出报警。
  10. 如权利要求9所述的基于移动终端的安全监控系统,其特征在于,所述检测装置的数量为多个;
    所述距离判断模块具体用于判断移动终端与任一所述检测装置的距离是否在第一预设距离范围内。
  11. 如权利要求10所述的基于移动终端的安全监控系统,其特征在于,所述安全监控系统还包括:
    每个所述移动终端对应唯一的编号;
    所述数量统计模块具体包括:
    编号获取单元,用于获取每个所述检测装置对应的所述第一预设距离范围内的所有所述移动终端的编号;
    统计报警单元,用于将获取的所有移动终端的编号汇总后去除重复部分以统计出所述预设空间内的所述移动终端的数量,并在所述数量超过第三预设阈值时发出报警。
  12. 如权利要求11所述的基于移动终端的安全监控系统,其特征在于,所述安全监控系统还包括:
    预设模块,用于预设所述移动终端的编号与人员的对应关系;
    人员确定模块,用于根据所述编号和所述对应关系确定所述移动终端对应的人员信息。
  13. 如权利要求8所述的基于移动终端的安全监控系统,其特征在于,所述距离检测模块具体包括:
    获取单元,用于获取距所述移动终端在第三预设距离范围内的所有其他移动终端;
    距离检测单元,用于检测所述移动终端与开启所述第一情景模式的其他所述移动终端的距离;
    和/或,
    所述安全监控系统还包括:
    记录模块,用于记录所述移动终端的时间动线、所述移动终端进入所述预设空间对应的第一时间和所述移动终端离开所述预设空间对应的第二时间。
  14. 如权利要求8所述的基于移动终端的安全监控系统,其特征在于,所述安全监控系统还包括:
    第一模式开启模块,用于在判断出移动终端与检测装置的距离在第一预设距离范围内之后,经预设时间后再次判断所述移动终端与所述检测装置的距离是否在第一预设距离范围内,并在再次判断为是时才开启所述移动终端的第一情景模式;
    和/或,
    第二模式开启模块,用于在判断出移动终端与检测装置的距离在第一预设距离范围内之后,在预设时间内多次判断所述移动终端与所述检测装置的距离是否在第一预设距离范围内,并在判断均为是时才开启所述移动终端的第一情景模式。
  15. 一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现权利要求1至7任一项 所述的基于移动终端的安全监控方法。
  16. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现权利要求1至7任一项所述的基于移动终端的安全监控方法的步骤。
PCT/CN2021/135239 2020-12-18 2021-12-03 基于移动终端的安全监控方法、系统、设备及介质 WO2022127614A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011502242.2 2020-12-18
CN202011502242.2A CN112788288A (zh) 2020-12-18 2020-12-18 基于移动终端的安全监控方法、系统、设备及介质

Publications (1)

Publication Number Publication Date
WO2022127614A1 true WO2022127614A1 (zh) 2022-06-23

Family

ID=75751142

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/135239 WO2022127614A1 (zh) 2020-12-18 2021-12-03 基于移动终端的安全监控方法、系统、设备及介质

Country Status (2)

Country Link
CN (1) CN112788288A (zh)
WO (1) WO2022127614A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112788288A (zh) * 2020-12-18 2021-05-11 展讯通信(天津)有限公司 基于移动终端的安全监控方法、系统、设备及介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105050045A (zh) * 2015-07-23 2015-11-11 深圳市金立通信设备有限公司 一种终端状态的控制方法及终端
CN108307463A (zh) * 2018-01-30 2018-07-20 江苏信源达科技有限公司 模式切换方法、系统及门禁系统
US10055967B1 (en) * 2017-05-25 2018-08-21 State Farm Mutual Automobile Insurance Company Attentiveness alert system for pedestrians
CN109698934A (zh) * 2017-10-23 2019-04-30 中移(苏州)软件技术有限公司 一种区域监控方法及装置
CN111582052A (zh) * 2020-04-17 2020-08-25 深圳市优必选科技股份有限公司 一种人群密集的预警方法、装置及终端设备
CN111627175A (zh) * 2020-05-27 2020-09-04 成都电科崇实科技有限公司 基于uwb和红外测温的人流控制系统
CN112788288A (zh) * 2020-12-18 2021-05-11 展讯通信(天津)有限公司 基于移动终端的安全监控方法、系统、设备及介质

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008113184A (ja) * 2006-10-30 2008-05-15 Nec Corp 位置監視システム、位置監視装置、位置監視方法及び移動端末
CN104574794A (zh) * 2014-12-19 2015-04-29 深圳市前海安测信息技术有限公司 安全监控系统及其监控方法
CN111755130A (zh) * 2020-06-02 2020-10-09 RealMe重庆移动通信有限公司 防控方法和装置、终端、防控系统和可读存储介质

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105050045A (zh) * 2015-07-23 2015-11-11 深圳市金立通信设备有限公司 一种终端状态的控制方法及终端
US10055967B1 (en) * 2017-05-25 2018-08-21 State Farm Mutual Automobile Insurance Company Attentiveness alert system for pedestrians
CN109698934A (zh) * 2017-10-23 2019-04-30 中移(苏州)软件技术有限公司 一种区域监控方法及装置
CN108307463A (zh) * 2018-01-30 2018-07-20 江苏信源达科技有限公司 模式切换方法、系统及门禁系统
CN111582052A (zh) * 2020-04-17 2020-08-25 深圳市优必选科技股份有限公司 一种人群密集的预警方法、装置及终端设备
CN111627175A (zh) * 2020-05-27 2020-09-04 成都电科崇实科技有限公司 基于uwb和红外测温的人流控制系统
CN112788288A (zh) * 2020-12-18 2021-05-11 展讯通信(天津)有限公司 基于移动终端的安全监控方法、系统、设备及介质

Also Published As

Publication number Publication date
CN112788288A (zh) 2021-05-11

Similar Documents

Publication Publication Date Title
AU2015343181B2 (en) Remote control of fire suppression systems
US10558917B2 (en) Artificial intelligence and natural language processing based building and fire systems management system
US11176803B1 (en) Mission critical signaling failover in cloud computing ecosystem
CN108039015A (zh) 一种核电厂火警联动视频监控系统
US10937295B2 (en) System and method for notifying detection of vaping, smoking, or potential bullying
WO2022127614A1 (zh) 基于移动终端的安全监控方法、系统、设备及介质
CN108806151A (zh) 监控报警方法、装置、服务器和存储介质
KR102399268B1 (ko) 인공 지능 연동 지능형 재난 안전 관리 방법 이러한 방법을 수행하는 시스템
CN110232366A (zh) 静电防护执行情况的检测方法、装置、服务器及介质
CN114338338A (zh) 一种基于大数据的5g机房智能化管理系统
CN114398354A (zh) 数据监测方法、装置、电子设备及存储介质
US9785505B1 (en) Communicative building management system for data loss prevention
US20200302352A1 (en) Cognitive system for automatic risk assessment, solution identification, and action enablement
CN113223222A (zh) 工业污染源智能监控系统
CN106663358A (zh) 利用BACnet对象的增强报警
WO2018014265A1 (zh) 一种智能加湿器控制系统
US20170091712A1 (en) Apparatus and Method for Employee Time Entry and Accounting
CN112422641B (zh) 物联网设备常态化防疫预警和联动控制方法、装置
CN109766816A (zh) 监控方法、装置与存储介质
US20230104639A1 (en) System and method for notifying detection of vaping, smoking, or potential bullying
US9612642B2 (en) Event-based power provisioning system
CN115685859A (zh) 一种信息机房可视化监控方法
CN113657474A (zh) 一种基于活动分布图的室内人员异常行为检测方法及系统
CN112383589A (zh) 移动试验车中管理系统的数据处理方法及装置
CN112804480A (zh) 监控警示系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21905543

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21905543

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 11-12-2023)