CN108109348A - Classifying alarm method and device - Google Patents

Classifying alarm method and device Download PDF

Info

Publication number
CN108109348A
CN108109348A CN201711310777.8A CN201711310777A CN108109348A CN 108109348 A CN108109348 A CN 108109348A CN 201711310777 A CN201711310777 A CN 201711310777A CN 108109348 A CN108109348 A CN 108109348A
Authority
CN
China
Prior art keywords
user
active user
safe class
alarm
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711310777.8A
Other languages
Chinese (zh)
Inventor
黄东
李良
仲兆峰
章飞
李基源
黄丹燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hitachi Building Technology Guangzhou Co Ltd
Original Assignee
Hitachi Building Technology Guangzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi Building Technology Guangzhou Co Ltd filed Critical Hitachi Building Technology Guangzhou Co Ltd
Priority to CN201711310777.8A priority Critical patent/CN108109348A/en
Publication of CN108109348A publication Critical patent/CN108109348A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/005Alarm destination chosen according to a hierarchy of available destinations, e.g. if hospital does not answer send to police station
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/182Level alarms, e.g. alarms responsive to variables exceeding a threshold

Landscapes

  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Public Health (AREA)
  • Alarm Systems (AREA)

Abstract

The present invention relates to a kind of classifying alarm method and devices.The described method includes:The image information of active user is obtained, extracts the biological information of active user in described image information;Default customer data base is inquired about according to the biological information, the image of multiple known users and safe class corresponding with each image are stored in the customer data base;The known users include dangerous user and validated user, and the danger user corresponds to different safe classes from validated user respectively;The safe class of active user is determined according to query result, corresponding alarm strategy is performed according to the safe class of active user.The present invention overcomes alarm mode in enclosed environment is single, without targetedly defect, while improve security, automatic identification identity is reached and has taken the technique effect of corresponding alarm strategy.

Description

Classifying alarm method and device
Technical field
The present invention relates to technical field of security and protection, more particularly to classifying alarm method, apparatus, computer readable storage medium And computer equipment.
Background technology
In the environment of closing, such as elevator, it is limited by signal, network and site environment, None- identified goes out user's body Part, dangerous material, to personal safety, property, there is bigger security risks.
In traditional technology, in the environment of closing, such as elevator, camera is provided with, by manually checking monitor screen, is sentenced It is disconnected whether dangerous, and trigger alarm system.
In the research and practice process to traditional technology, it is found that at least there are following technical problems in traditional technology:Consumption Take manpower, security is low;Automatic alarm is unable to, and alarm mode is single.
The content of the invention
Based on this, it is necessary to for alarm mode in enclosed environment in the prior art it is single the problem of, a kind of classification is provided Alarm method, device, computer readable storage medium and computer equipment.
A kind of classifying alarm method, including:
The image information of active user is obtained, extracts the biological information of active user in described image information;
Default customer data base is inquired about according to the biological information, be stored in the customer data base it is multiple Know the image of user and safe class corresponding with each image;The known users include dangerous user and validated user, institute It states dangerous user and corresponds to different safe classes respectively from validated user;
The safe class of active user is determined according to query result, corresponding report is performed according to the safe class of active user It is pithy to omit.
In one of the embodiments, it is described that default customer data base is inquired about according to the biological information, including:
Corresponding biological information in the image of each known users in extraction customer data base;
The biological information of active user is compared with the biological information of each known users, detection two Whether person matches.
In one of the embodiments, in the customer data base, the corresponding safe class of image of each danger user is The first estate, the corresponding safe class of image of each validated user is the tertiary gradient;
The safe class that active user is determined according to query result performs correspondence according to the safe class of active user Alarm strategy, including:
If query result is the biological information of active user and the biological information of a certain known users Match somebody with somebody, judge whether the known users are dangerous user, if so, the safe class for determining active user for the first estate, performs the The corresponding first alarm strategy of one grade;If it is not, determine that the safe class of active user for the tertiary gradient, performs the tertiary gradient pair The 3rd alarm strategy answered;
If query result is equal for the biological information and the biological information of arbitrary known users of active user It mismatches, it is determined that the safe class of active user is the second grade, performs the corresponding second alarm strategy of the second grade.
In one of the embodiments, before the default customer data base according to biological information inquiry, It further includes:
The step of establishing customer data base;The step includes:
The image information of the known users of interconnection Web realease is obtained by big data;
It is regular according to default classification, determine the corresponding safe class of image of each known users;
Customer data base is established according to the image of each known users and corresponding safe class.
In one of the embodiments, the classifying alarm method, further includes:Obtain the safety check machine testing knot of active user Fruit judges whether active user carries dangerous material according to screening machine testing result, if so, determining the safe class of active user For the first estate, the corresponding first alarm strategy of the first estate is performed.
In one of the embodiments, the first alarm strategy includes:Send short messages to setting the first telephone number and/ Or dial the first telephone number of setting;
The second alarm strategy includes:Send short messages to the second telephone number of setting and/or dial the second electricity of setting Talk about number.
In one of the embodiments, the safe class of the definite active user is the second grade, performs the second grade After corresponding second alarm strategy, further include:
If confirmation active user is validated user, by the image information storage of active user to the customer data base In, and the corresponding safe class of active user is set to be updated for the tertiary gradient to the customer data base;
If it is dangerous user to confirm active user, by the image information storage of active user to the customer data base In, and the corresponding safe class of active user is set to be updated for the first estate to the customer data base.
In one of the embodiments, the biological information includes face information, fingerprint, palm line, iris, view At least one of film, bodily form.
A kind of classifying alarm device, including:
Information extraction modules for obtaining the image information of active user, extract active user in described image information Biological information;
Enquiry module, for inquiring about default customer data base, the customer data base according to the biological information In be stored with the image of multiple known users and safe class corresponding with each image;The known users include dangerous user And validated user, the danger user correspond to different safe classes from validated user respectively;
Alarm module, for determining the safe class of active user according to query result, according to safety of active user etc. Grade performs corresponding alarm strategy.
A kind of elevator classifying alarm system, including:Camera, user data management unit and alarm unit;
The camera is used to shoot the image information of active user and uploads to the alarm unit;
The image that the user data management unit is used for the known users for obtaining interconnection Web realease by big data is believed Breath, it is regular according to default classification, determine the corresponding safe class of image of each known users;According to each known users Image and corresponding safe class establish customer data base, and the image of multiple known users is stored in the customer data base And safe class corresponding with each image;The known users include dangerous user and validated user, the danger user with Validated user corresponds to different safe classes respectively;
The alarm unit is used to obtain the image information of the active user of camera shooting, extracts in described image information The biological information of active user;Default customer data base is inquired about according to the biological information;According to query result It determines the safe class of active user, corresponding alarm strategy is performed according to the safe class of active user.
A kind of computer readable storage medium, is stored thereon with computer program, when which is executed by processor, realizes The step of classifying alarm method described above.
A kind of computer equipment can be run on a memory and on a processor including memory, processor and storage Computer program, when the processor performs described program, the step of realizing classifying alarm method described above.
Above-mentioned technical proposal by obtaining the image information of active user, extracts active user in described image information Biological information;Default customer data base is inquired about according to the biological information, is stored in the customer data base The image of multiple known users and safe class corresponding with each image;The known users include dangerous user and legal use Family, the danger user correspond to different safe classes from validated user respectively;The peace of active user is determined according to query result Congruent grade performs corresponding alarm strategy according to the safe class of active user.It is single to overcome alarm mode in enclosed environment, Without targetedly defect, while improve security, automatic identification identity is reached and has taken the skill of corresponding alarm strategy Art effect.
Description of the drawings
Fig. 1 is the schematic flow chart of the classifying alarm method of an embodiment;
Fig. 2 is the schematic flow chart of the classifying alarm method of an embodiment;
Fig. 3 is the schematic flow chart of the classifying alarm method of another embodiment;
Fig. 4 is the network topological diagram of the elevator classifying alarm of an embodiment;
Fig. 5 is the schematic diagram of the classifying alarm device of an embodiment;
Fig. 6 is the schematic diagram of the elevator classifying alarm system of an embodiment.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, it is right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
Although the step in the present invention is arranged with label, it is not used to limit the precedence of step, unless Specify the order of step or based on the execution of certain step needs other steps, otherwise the relative rank of step is It is adjustable.
Present invention could apply to the elevators and its safety-protection system in the public residence such as cell, villa, residential quarter.
Fig. 1 is the schematic flow chart of the classifying alarm method of an embodiment;As shown in Figure 1, the classification in the present embodiment Alarm method comprises the following steps:
Step S101 obtains the image information of active user, extracts the biological characteristic of active user in described image information Information.
In this step, the image information of active user refers to the biological information of active user by with the shape of image Formula shows that described image information contains the biological information of active user.Wherein, biological characteristic refers to each individual and has , can uniquely measure or can automatic identification and verification physiological property, refer in particular to the intrinsic physiological property of human body.
Specifically, the image information of active user can be gathered by picture pick-up device, and uploads to processing system, image is believed Breath is detected, pretreatment operation, extracts the biological information of active user in described image information.
Step S102 inquires about default customer data base according to the biological information, is deposited in the customer data base Contain the image of multiple known users and safe class corresponding with each image;The known users include dangerous user and conjunction Method user, the danger user correspond to different safe classes from validated user respectively.
In this step, customer data base refers to coming tissue, storage and the storehouse for managing user data according to data structure Storehouse, the main image for storing user and safe class corresponding with each image.Wherein, safe class with according to active user's Image information identifies that the identity of active user is related, such as:The criminal that Netcom seizes be dangerous person, corresponding peace Congruent grade is danger classes;Ordinary household is validated user, and safe class is legal grade;For stranger, safety etc. Grade can be strange grade.
Specifically, the image of multiple known users and peace corresponding with each image are stored in default customer data base Congruent grade, the known users include dangerous user and validated user, and the danger user corresponds to different respectively from validated user Safe class.According to the biological information extracted, in default customer data base, searched by computer equipment Rope matches, and judges whether the pre-stored image in customer data base has and believes matched image with the biological characteristic.Above-mentioned steps, gram Taken traditional artificial checking monitoring equipment and the defects of labor intensive, for corresponding alarm strategy is taken to provide foundation below.
Step S103 determines the safe class of active user according to query result, is held according to the safe class of active user The corresponding alarm strategy of row.
In this step, it is described default to refer to whether the biological information of inquiry active user is stored in for query result Customer data base in and draw as a result, alarm strategy refer to transferring specific warning message by communication To relevant personnel or mechanism.
Specifically, the query result whether being stored according to the biological information of active user in customer data base, with And default classification rule, it identifies the identity of active user, determines the safe class of active user, so as to take with safety etc. The corresponding alarm strategy of grade, relevant personnel or mechanism are passed to by specific warning message by communication.
Wherein, default classification rule includes:If user is dangerous user, the safe class of user is the first estate; If user is validated user, the safe class of user is the tertiary gradient;If user neither dangerous user nor legal use Family, it is determined that for non-hierarchic user, safe class is the second grade.
Above example by obtaining the image information of active user, extracts the life of active user in described image information Object characteristic information;Default customer data base is inquired about according to the biological information;Active user is determined according to query result Safe class, according to the safe class of active user perform it is corresponding alarm strategy.Overcome alarm mode in enclosed environment It is single, without targetedly defect, while improve security, reach automatic identification identity and taken corresponding alarm strategy Technique effect.
In one embodiment, it is described that default number of users is inquired about according to the biological information in above-mentioned steps S102 According to storehouse, including:Corresponding biological information in the image of each known users in extraction customer data base;By the institute of active user The biological information that biological information is stated with each known users is compared, and whether both detections match.It specifically includes:Institute Stating biological information includes at least one of face information, fingerprint, palm line, iris, retina, bodily form, the figure of user As information includes above-mentioned biological information.In customer data base, the biological information for extracting each known users is included Face information, fingerprint, palm line, iris, retina, at least one of the bodily form, it is special with the corresponding biology of active user Reference breath is compared, detect each known users biological information whether with the corresponding biological nature information of active user Matching.Above-described embodiment by a variety of alignments, can overcome traditional artificial look into the identity of automatic identification active user See monitoring screen, the defects of inefficiency is susceptible to and fails to judge and judge by accident, brings very big security risk, accuracy is high, in real time Property is strong.
Fig. 2 is the schematic flow chart of the classifying alarm method of an embodiment.
In one embodiment, in above-mentioned steps S102, in the customer data base, the corresponding peace of image of each danger user Congruent grade is the first estate, and the corresponding safe class of image of each validated user is the tertiary gradient.It is described true according to query result Determine the safe class of active user, corresponding alarm strategy is performed according to the safe class of active user, including:If query result For the biological information of active user and the biometric information matches of a certain known users, judge that the known users are No is dangerous user, if so, determining the safe class of active user as the first estate, performs the first estate corresponding first and alarms Strategy;If it is not, determining the safe class of active user as the tertiary gradient, the corresponding 3rd alarm strategy of the tertiary gradient is performed;If Query result mismatches for the biological information and the biological information of arbitrary known users of active user, then really The safe class of active user is determined for the second grade, shows the user as unknown subscriber, performs corresponding second report of the second grade It is pithy to omit.
In one embodiment, as shown in Fig. 2, the classifying alarm method comprises the following steps:
Whether step S201, the biological information for inquiring about active user are believed with the biological characteristics of a certain known users Breath matching.
Specifically, according to query result, the safe class of active user is determined.
Step S202 judges whether active user is known users.
Specifically, judge active user biological information whether the biometric information matches with known users.
Step S203, it is not known users to determine active user, performs the second alarm strategy.
Specifically, active user is not known users, i.e. active user is not classified, and the safe class of active user is second Grade performs the second alarm strategy, for example, notifying Security Personnel, scene confirms the identity of active user.
Step S204, it is known users to determine active user, judges whether known users are dangerous user.
Specifically, the biological information of active user and the biometric information matches of a certain known users, i.e., Active user is the known users to prestore in customer data base, judges whether the known users are dangerous user.
Step S205 if the known users are dangerous users, performs the first alarm strategy.
Specifically, if the known users are dangerous users, can determine active user is dangerous user, i.e. active user Safe class is the first estate, performs the first alarm strategy, for example, dialing 110 to public security department, calling police assists.
Step S206 if the known users are not dangerous users, performs the 3rd alarm strategy.
Specifically, if the known users are not dangerous users, can determine active user is not dangerous user, but user The safe class of the validated user to prestore in database, i.e. active user is the tertiary gradient, performs the 3rd alarm strategy.
Above-described embodiment, using classifying alarm method, it is single to overcome traditional alert pattern, without targetedly defect, Security is improved simultaneously, reduces the consuming of manpower.
In one embodiment, it is described that default number of users is inquired about according to the biological information in above-mentioned steps S102 Before storehouse, further include:The step of establishing customer data base.The step includes:Interconnection Web realease is obtained by big data The image information of known users;It is regular according to default classification, determine the corresponding safe class of image of each known users;According to The image of each known users and corresponding safe class establish customer data base.By establishing customer data base, to distinguish The identity of other active user provides foundation, while improves security.
Wherein, default classification rule includes:If user is dangerous user, the safe class of user is the first estate; If user is validated user, the safe class of user is the tertiary gradient;If user neither dangerous user nor legal use Family, it is determined that for non-hierarchic user, safe class is the second grade.
In one embodiment, by big data obtain interconnection Web realease known users information, such as validated user, The various information such as the image of wanted criminal or suspect, ID card No., name, height, fingerprint, sound, are taken by data analysis Business device analyzes the various information of known users, the identity of known users is determined, so that it is determined that the safe class of known users.Root Identity information and corresponding safe class according to known users, establish customer data base, and the database purchase has known users Identity information and corresponding safe class.Further, after some time, for example, 1 month, internet is reacquired For same user, number of users is covered using the user images information of reacquisition for the image information of the known users of upper issue According to the original image information of middle the user, according to actual conditions, the safe class of the user can be also redefined, and is extended in time The memory of customer data base, the information for the customer data base that upgrades in time.Original known users of user data library storage and new Increase the image information of known users and corresponding safe class.Above-described embodiment by establishing customer data base, and upgrades in time The information of customer data base can improve the accuracy and timeliness for distinguishing user identity, avoid judging by accident, misjudge the safety brought Hidden danger for automatic identification user identity and takes corresponding alarm strategy to provide guarantee.
In one embodiment, the classifying alarm method may also include:Obtain the screening machine testing result of active user, root Judge whether active user carries dangerous material according to screening machine testing result, if so, determining the safe class of active user for the One grade performs the corresponding first alarm strategy of the first estate.Thus whether detection active user carries dangerous goods, into one Step improves security.
Specifically:The image information of active user is obtained, the safe class of active user is determined according to image information and is held The corresponding alarm strategy of row, the screening machine testing result with obtaining active user perform corresponding alarm plan according to the testing result Slightly, between the two without point of specific sequencing, i.e. the two can be performed independently.Pass through comprehensive descision active user Image information and screening machine testing result, determine the identity of active user and corresponding safe class, take correspondence automatically Alarm strategy.
In one embodiment, the image information of active user is first obtained, then obtains the screening machine testing result of active user, By the image information of comprehensive descision active user and screening machine testing result, the identity of active user and corresponding peace are determined Congruent grade takes corresponding alarm strategy automatically.
In one embodiment, the screening machine testing result of active user is first obtained, then obtains the image information of active user, By the image information of comprehensive descision active user and screening machine testing result, the identity of active user and corresponding peace are determined Congruent grade takes corresponding alarm strategy automatically.
Further, while the image information of active user and screening machine testing result are obtained, it is current by comprehensive descision The image information of user and screening machine testing result determine the identity of active user and corresponding safe class, take automatically Corresponding alarm strategy.
Whether above-described embodiment, screening machine carry dangerous material, make as a kind of ancillary technique means, detection active user For the Rule of judgment of dangerous user, be conducive to improve security and confirm the accuracy of identity.
In above each embodiment, the first alarm strategy includes:Send short messages to the first telephone number of setting and/or Dial the first telephone number of setting;For example, send short message, make a telephone call to the public security departments such as 110, local police station, calling police association It helps.The second alarm strategy includes:Send short messages to the second telephone number of setting and/or dial the second phone number of setting Code;For example, sending short message, property of making a telephone call to security personnel or property correlation security department, security personnel's on-site verification is notified The identity of active user.The 3rd alarm strategy includes:The time that active user was logged image information last time is obtained, if working as Preceding user's last time is logged the time of image information more than default time, such as 1 year, then records the image information of active user Access customer database, to replace the original image information of the user in customer data base;Alternatively, it obtains current in customer data base The matching degree of the corresponding image information of user and the user's present image information, if matching degree is less than default matching value, Such as 50 percent, then by the image information typing customer data base of active user, to replace the user in customer data base Original image information.
It sets, is conducive to above by the particular content to the first alarm strategy, the second alarm strategy, the 3rd alarm strategy Security, and the data for the customer data base that upgrades in time as the case may be are improved, ensures high accuracy, avoids misjudging, judge by accident The security risk brought, to distinguish that user identity takes corresponding alarm strategy to provide guarantee.
In one embodiment, the safe class of the definite active user is the second grade, and it is corresponding to perform the second grade After second alarm strategy, further include:If confirmation active user is validated user, the image information storage of active user is arrived In the customer data base, and the corresponding safe class of active user is set to be carried out for the tertiary gradient to the customer data base Update;If it is dangerous user to confirm active user, the image information of active user is stored into the customer data base, and It is the first estate to set the corresponding safe class of active user, and the customer data base is updated.Above-described embodiment, if really The safe class of active user is determined for the second grade, continues to judge that active user is validated user or dangerous user, and to institute It states customer data base to be updated, security, the accuracy of automatic identification identity can be improved, be conducive to the data that upgrade in time Storehouse.
In a specific embodiment, as shown in figure 3, Fig. 3 is the schematic of the classifying alarm method of another embodiment Flow chart, the classifying alarm method comprise the following steps:
Step S301 is classified boarding user by big data analysis system, is carried out according to different grades different Alarm strategy.
Specifically, the safe class of boarding user is divided into the first order, the second level, the third level, the fourth stage, level V.Its In, safe class is that the boarding user of the first order is hazard class, including the identified suspect of system, wanted criminal or carries danger The user of dangerous product.Safe class is that the boarding user of the third level is guest level, including the user by registration.Safe class is The boarding user of level Four is internal staff's grade, the employee including infrastructure management company.Safe class is the boarding user of level V For validated user grade, include the user of system typing data.Safe class is that the boarding user of the second level is unknown grade, including Not identified in addition to above four ranks or the user that can not identified.
Wherein, alarm strategy is divided into level-one alarm, secondary alarm, three-level alarm.If current boarding user is hazard class, Level-one alarm is performed, dials 110 to public security departments such as local police stations, calling police assists.If current boarding user is unknown grade, Secondary alarm is performed, sends short message, property of making a telephone call to security personnel, the identity of the property security personnel current boarding user of on-site verification.If Current boarding user is any one in internal staff's grade, validated user grade, guest level, then performs three-level alarm, adopt again Collect some image information of current boarding user, and judge its figure corresponding with current boarding user in pre-set user database As the matching degree of information.For example, the face characteristic for calculating current boarding user and current boarding use in pre-set user database The matching value of the corresponding face characteristic in family, if matching value is less than 50 percent, by the figure of the active user resurveyed As data input customer data base, to replace the original image information of the user in customer data base, and used according to above-mentioned boarding The safety status classification rule at family, redefines the safe class of current boarding user, and customer data base is updated.Institute State the image information that current boarding user is stored in customer data base and corresponding safe class.
Step S302, judges whether current boarding user is not classified, if current boarding user has been classified, jumps to step Rapid S305.
Specifically, judge whether current boarding user does not pass through system level.
Step S303, current boarding user are not classified, and system sends secondary alarm and ensures public security to property automatically.
Specifically, it is determined that current boarding user is not classified, secondary alarm is performed for example, sending short message, property of making a telephone call to Security personnel notify property security personnel.
Step S304, property security personnel verify the identity of current boarding user.
Specifically, the information such as name, ID card No., photograph of the property security personnel current boarding user of on-site verification.
Step S305 judges whether current boarding user is hazard class.
Specifically, judge whether current boarding user is the suspect or wanted criminal announced on internet.
Step S306, it is not hazard class to determine current boarding user, then performs three-level alarm.
Specifically, it is determined that current boarding user is not the suspect or wanted criminal announced on internet, then by current boarding The information of user and corresponding safe class record achieve.
Step S307, it is hazard class to determine active user, then performs level-one alarm.
Specifically, it is determined that active user is the suspect or wanted criminal announced on internet, level-one alarm is performed, is sent short Believe, make a telephone call to the public security departments such as 110, local police station.
In above-described embodiment, boarding user is classified by big data analysis system, is carried out according to different grades Different alarms.It is single to overcome alarm mode in enclosed environment, without targetedly defect, while improve security, reaches It has arrived automatic identification identity and has taken the technique effect of corresponding alarm strategy.
Fig. 4 is the network topological diagram of the elevator classifying alarm of an embodiment;
In one embodiment, as shown in figure 4, the classifying alarm method includes:Obtain the screening machine of current boarding user Testing result and image information, judge whether current boarding user carries dangerous material, if so, determining current boarding user for danger Dangerous grade performs the corresponding level-one alarm of hazard class, passes through the public security departments such as 110, local police station that send short messages, make a telephone call to.By comprehensive Conjunction judges the image information of current boarding user and screening machine testing result, determines the identity of current boarding user and corresponding Safe class takes corresponding alarm strategy automatically.
Specifically, the image information of acquisition and typing active user is extracted the biological information in image information, is passed through Data analytics server detection active user biological information whether the life with known users in default customer data base Object characteristic information matches, and identifies the identity of active user, then active user is classified by tiered server, and takes phase The alarm strategy answered stores the image of active user and safe class corresponding with image to Database Systems.
Further, by data analytics server detect active user biological information whether with default user In database before the biometric information matches of known users, the step of establishing customer data base is further included.The step bag It includes:Acquisition and the basic data and feature of typing user according to default classification rule, determine the corresponding safety of each known users Grade;Customer data base is established according to the basic data of each known users, feature and corresponding safe class.
Specifically, the basic data and feature of acquisition and typing user, including:Typing known users, such as internal staff Grade, validated user grade, the basic data of hazard class and feature, such as the information such as name, ID card No., photograph;Gather user, Such as the basic data and feature of hazard class, by big data algorithm, in internet, acquisition has been issued as suspect or wanted criminal Basic data and feature.
Above-described embodiment, by obtaining the image information of current boarding user and screening machine testing result, by safety check machine examination Result is surveyed as a kind of auxiliary characteristics, image information is analyzed, current boarding user is classified, performed according to different grades Different alarm strategies.It is single to overcome alarm mode in enclosed environment, without targetedly defect, while improve safety Property, reach automatic identification identity and take the technique effect of corresponding alarm strategy.
It it should be noted that for foregoing each method embodiment, describes, it is all expressed as a series of for simplicity Combination of actions, but those skilled in the art should know, the present invention and from the limitation of described sequence of movement, because according to According to the present invention, some steps may be employed other orders or be carried out at the same time.
Based on the thought identical with the classifying alarm method in above-described embodiment, the present invention also provides classifying alarm system, The system can be used for performing above-mentioned classifying alarm method.For convenience of description, the schematic structure of classifying alarm system embodiment In figure, illustrate only with the relevant part of the embodiment of the present invention, it will be understood by those skilled in the art that schematic structure not structure The restriction of paired systems can include either combining some components or different components than illustrating more or fewer components Arrangement.
Fig. 5 is the schematic diagram of the classifying alarm device of an embodiment, and the classifying alarm device includes:
Information extraction modules 510 for obtaining the image information of active user, extract active user in described image information Biological information;
Enquiry module 520, for inquiring about default customer data base, the user data according to the biological information The image of multiple known users and safe class corresponding with each image are stored in storehouse;The known users include dangerous use Family and validated user, the danger user correspond to different safe classes from validated user respectively;
Alarm module 530, for determining the safe class of active user according to query result, according to the safety of active user Grade performs corresponding alarm strategy.
In one embodiment, for enquiry module 520, it can be also used for the figure of each known users in extraction customer data base The corresponding biological information as in;By the biological information of active user and the biological information of each known users It is compared, whether both detections match.
In one embodiment, for enquiry module 520, in the customer data base, the image of each danger user is corresponding Safe class is the first estate, and the corresponding safe class of image of each validated user is the tertiary gradient.For alarm module 530, It can be also used for:If query result is the biological information of active user and the biological information of a certain known users Matching, judges whether the known users are dangerous user, if so, determining that the safe class of active user for the first estate, performs The corresponding first alarm strategy of the first estate;If it is not, determine that the safe class of active user for the tertiary gradient, performs the tertiary gradient Corresponding 3rd alarm strategy;If query result is the biological information of active user and the biology of arbitrary known users Characteristic information mismatches, it is determined that the safe class of active user is the second grade, performs corresponding second report of the second grade It is pithy to omit.
In one embodiment, for enquiry module 520, can also be further used for establishing customer data base.The foundation The step of customer data base, includes:The image information of the known users of interconnection Web realease is obtained by big data;According to default Classification rule, determine the corresponding safe classes of image of each known users;According to the image of each known users and right The safe class answered establishes customer data base.
In one embodiment, for information extraction modules 510, it can be also used for the safety check machine testing knot of acquisition active user Fruit judges whether active user carries dangerous material according to screening machine testing result, if so, determining the safe class of active user For the first estate, the corresponding first alarm strategy of the first estate is performed.
Above-mentioned all embodiments by obtaining the image information of active user, extract active user in described image information Biological information;Default customer data base is inquired about according to the biological information;It is determined currently according to query result The safe class of user performs corresponding alarm strategy according to the safe class of active user.It overcomes in enclosed environment and alarms Pattern is single, without targetedly defect, while improve security, has reached automatic identification identity and has taken corresponding alarm The technique effect of strategy.
Fig. 6 is the schematic diagram of the elevator classifying alarm system of an embodiment.
In one embodiment, as shown in fig. 6, the elevator classifying alarm system includes:Camera 610, user data pipe Manage unit 620 and alarm unit 630.The camera 610 is used to shoot the image information of active user and upload to described Alarm unit 630.The user data management unit 620 is used to obtain the known users for interconnecting Web realease by big data Image information;It is regular according to default classification, determine the corresponding safe class of image of each known users;According to it is described it is each known to The image of user and corresponding safe class establish customer data base, and multiple known users are stored in the customer data base Image and safe class corresponding with each image.The known users include dangerous user and validated user, the danger User corresponds to different safe classes from validated user respectively.The alarm unit 630 is used to obtain the current of camera shooting The image information of user extracts the biological information of active user in described image information;According to the biological information Inquire about default customer data base;The safe class of active user is determined according to query result, according to safety of active user etc. Grade performs corresponding alarm strategy.
Specifically, the user data management unit 620 includes information acquisition module 621, Database module 622. Wherein, information acquisition module 621 is connected with internet 700, for obtaining the known use issued on internet 700 by big data The image information at family, it is regular according to default classification, determine the corresponding safe class of image of each known users.Database Module 622 is connected with information acquisition module 621, for the image information of the known users gathered according to information acquisition module 621 And corresponding safe class establishes customer data base, be stored in the customer data base multiple known users image and Safe class corresponding with each image.The known users include dangerous user and validated user, the danger user with it is legal User corresponds to different safe classes respectively.
Further, the alarm unit 630 includes information extraction modules 510, enquiry module 520, alarm module 530. Wherein, information extraction modules 510 are connected with camera 610, for obtaining the image letter of the active user of the shooting of camera 610 Breath extracts the biological information of active user in described image information.The enquiry module respectively with information extraction modules 510th, Database module 622 connects, for the biological information inquiry extracted according to information extraction modules 510 Default customer data base in Database module 622.Alarm module 530 is connected with enquiry module 520, for according to inquiry The query result of module 520 determines the safe class of active user, and corresponding alarm is performed according to the safe class of active user Strategy.
Above-described embodiment shoots the image information of active user by camera and uploads to the alarm unit, passes through The alarm unit determines the safe class of active user, and different alarm strategies is performed according to different safe classes.Overcome Alarm mode is single in enclosed environment, without targetedly defect, while improve security, has reached automatic identification identity With the technique effect for taking corresponding alarm strategy.
It should be noted that in the embodiment of the classifying alarm system of above-mentioned example, the information between each module/unit The contents such as interaction, implementation procedure, due to preceding method embodiment of the present invention be based on same design, the technique effect brought with Preceding method embodiment of the present invention is identical, and particular content can be found in the narration in the method for the present invention embodiment, and details are not described herein again.
In addition, in the embodiment of the classifying alarm system of above-mentioned example, the logical partitioning of each program module is only citing Illustrate, can be as needed in practical application, such as examined for the facility of the realization of the configuration requirement or software of corresponding hardware Consider, above-mentioned function distribution by different program modules is completed, i.e., is divided into the internal structure of the classifying alarm system not Same program module, to complete all or part of function described above.
It will appreciated by the skilled person that realizing all or part of flow in above-described embodiment method, being can Relevant hardware to be instructed to complete by computer program, the program can be stored in a computer-readable storage and be situated between In matter, production marketing or use are independent.Described program upon execution, can perform the complete of such as embodiment of above-mentioned each method Portion or part steps.In addition, the storage medium may also be disposed in a kind of computer equipment, also wrapped in the computer equipment Include processor, when the processor performs the program in the storage medium, can realize above-mentioned each method embodiment it is complete Portion or part steps.Wherein, the storage medium can be magnetic disc, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
In the above-described embodiments, all emphasize particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiments.It is appreciated that wherein used term " first ", " second " etc. are at this For distinguishing object in text, but these objects should not be limited by these terms.
Embodiment described above only expresses the several embodiments of the present invention, it is impossible to be interpreted as to the scope of the claims of the present invention Limitation.It should be pointed out that for those of ordinary skill in the art, without departing from the inventive concept of the premise, Various modifications and improvements can be made, these belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention It should be determined by the appended claims.

Claims (10)

  1. A kind of 1. classifying alarm method, which is characterized in that including:
    The image information of active user is obtained, extracts the biological information of active user in described image information;
    Default customer data base is inquired about according to the biological information, multiple known use are stored in the customer data base The image at family and safe class corresponding with each image;The known users include dangerous user and validated user, the danger Dangerous user corresponds to different safe classes from validated user respectively;
    The safe class of active user is determined according to query result, corresponding alarm plan is performed according to the safe class of active user Slightly.
  2. 2. classifying alarm method according to claim 1, which is characterized in that described to be inquired about according to the biological information Default customer data base, including:
    Corresponding biological information in the image of each known users in extraction customer data base;
    The biological information of active user is compared with the biological information of each known users, both detections are No matching.
  3. 3. classifying alarm method according to claim 2, which is characterized in that in the customer data base, each danger user The corresponding safe class of image for the first estate, the corresponding safe class of image of each validated user is the tertiary gradient;
    The safe class that active user is determined according to query result performs corresponding report according to the safe class of active user It is pithy to omit, including:
    If query result is the biological information of active user and the biometric information matches of a certain known users, sentence Whether the known users of breaking are dangerous user, if so, determining that the safe class of active user for the first estate, performs the first estate Corresponding first alarm strategy;If it is not, the safe class for determining active user for the tertiary gradient, performs the tertiary gradient corresponding the Three alarm strategies;
    If query result for the biological information and the arbitrary known users of active user biological information not Match somebody with somebody, it is determined that the safe class of active user is the second grade, performs the corresponding second alarm strategy of the second grade.
  4. 4. classifying alarm method according to claim 1, which is characterized in that described to be inquired about according to the biological information Before default customer data base, further include:
    The step of establishing customer data base;The step includes:
    The image information of the known users of interconnection Web realease is obtained by big data;
    It is regular according to default classification, determine the corresponding safe class of image of each known users;
    Customer data base is established according to the image of each known users and corresponding safe class.
  5. 5. classifying alarm method according to claim 3, which is characterized in that further include:
    The screening machine testing result of active user is obtained, it is dangerous to judge whether active user carries according to screening machine testing result Product if so, determining the safe class of active user as the first estate, perform the corresponding first alarm strategy of the first estate.
  6. 6. classifying alarm method according to claim 5, which is characterized in that
    The first alarm strategy includes:Send short messages to the first telephone number of setting and/or dial the first phone number of setting Code;
    The second alarm strategy includes:Send short messages to the second telephone number of setting and/or dial the second phone number of setting Code;
    And/or
    The safe class of the definite active user is the second grade, after performing the corresponding second alarm strategy of the second grade, It further includes:
    If confirmation active user is validated user, the image information of active user is stored into the customer data base, and It is the tertiary gradient to set the corresponding safe class of active user, and the customer data base is updated;
    If it is dangerous user to confirm active user, the image information of active user is stored into the customer data base, and It is the first estate to set the corresponding safe class of active user, and the customer data base is updated.
  7. 7. classifying alarm method according to any one of claims 1 to 6, which is characterized in that the biological information includes At least one of face information, fingerprint, palm line, iris, retina, bodily form.
  8. 8. a kind of classifying alarm device, which is characterized in that including:
    Information extraction modules for obtaining the image information of active user, extract the biology of active user in described image information Characteristic information;
    Enquiry module for inquiring about default customer data base according to the biological information, is deposited in the customer data base Contain the image of multiple known users and safe class corresponding with each image;The known users include dangerous user and conjunction Method user, the danger user correspond to different safe classes from validated user respectively;
    Alarm module for determining the safe class of active user according to query result, is held according to the safe class of active user The corresponding alarm strategy of row.
  9. 9. a kind of elevator classifying alarm system, which is characterized in that including:Camera, user data management unit and alarm are single Member;
    The camera is used to shoot the image information of active user and uploads to the alarm unit;
    The user data management unit is used to obtain the image information of the known users of interconnection Web realease by big data;Root It is regular according to default classification, determine the corresponding safe class of image of each known users;According to the image of each known users And corresponding safe class establishes customer data base, be stored in the customer data base multiple known users image and Safe class corresponding with each image;The known users include dangerous user and validated user, the danger user with it is legal User corresponds to different safe classes respectively;
    The alarm unit is used to obtain the image information of the active user of camera shooting, extracts current in described image information The biological information of user;Default customer data base is inquired about according to the biological information;It is determined according to query result The safe class of active user performs corresponding alarm strategy according to the safe class of active user.
  10. 10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor During execution, any one of realization claim 1-7 the step of classifying alarm method.
CN201711310777.8A 2017-12-11 2017-12-11 Classifying alarm method and device Pending CN108109348A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711310777.8A CN108109348A (en) 2017-12-11 2017-12-11 Classifying alarm method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711310777.8A CN108109348A (en) 2017-12-11 2017-12-11 Classifying alarm method and device

Publications (1)

Publication Number Publication Date
CN108109348A true CN108109348A (en) 2018-06-01

Family

ID=62208324

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711310777.8A Pending CN108109348A (en) 2017-12-11 2017-12-11 Classifying alarm method and device

Country Status (1)

Country Link
CN (1) CN108109348A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109626154A (en) * 2018-12-28 2019-04-16 住友富士电梯有限公司 A kind of assisting safeguard of public order elevator control method, system and elevator
CN110491084A (en) * 2019-09-05 2019-11-22 佛山市云米电器科技有限公司 A kind of intelligent and safe alarm method based on bio signal
CN111581636A (en) * 2020-03-26 2020-08-25 大连交通大学 Network security monitoring equipment
CN112446982A (en) * 2019-08-10 2021-03-05 云丁网络技术(北京)有限公司 Method, device, computer readable medium and equipment for controlling intelligent lock
CN114202833A (en) * 2021-12-10 2022-03-18 珠海格力电器股份有限公司 Intelligent door lock alarm method, device, equipment and storage medium
US11417159B2 (en) 2019-08-02 2022-08-16 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for controlling a smart lock
CN115294680A (en) * 2022-08-16 2022-11-04 杭州萤石软件有限公司 Method and equipment for realizing personal safety protection function

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003085662A (en) * 2001-07-06 2003-03-20 Rando Business:Kk Crime prevention system, crime prevention management device, crime prevention method, crime prevention management method and computer program
WO2008096433A1 (en) * 2007-02-08 2008-08-14 Mitsubishi Electric Corporation Elevator security system
CN101790487A (en) * 2008-01-15 2010-07-28 三菱电机株式会社 Elevator control system and elevator controller
CN103647953A (en) * 2013-12-25 2014-03-19 句容云影响软件技术开发有限公司 Intelligent monitoring system and method
CN205158082U (en) * 2015-11-05 2016-04-13 杭州冷倍冠科技有限公司 Moving staircase control system
CN106384285A (en) * 2016-09-14 2017-02-08 浙江维融电子科技股份有限公司 Intelligent self-service bank system
CN106698118A (en) * 2016-12-09 2017-05-24 成都焦点合安物联网有限公司 Elevator control method and system based on face recognition
CN206421481U (en) * 2016-11-18 2017-08-18 北京海鑫科金高科技股份有限公司 Movable security inspection system
CN206557873U (en) * 2017-03-02 2017-10-13 叶云龙 A kind of anti-entrance system of intelligent security based on recognition of face
CN107369235A (en) * 2017-07-25 2017-11-21 中控智慧科技股份有限公司 The control method and wisdom system of a kind of gate
CN107403155A (en) * 2017-07-26 2017-11-28 北京声迅电子股份有限公司 A kind of rapid classification sorting technique and device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003085662A (en) * 2001-07-06 2003-03-20 Rando Business:Kk Crime prevention system, crime prevention management device, crime prevention method, crime prevention management method and computer program
WO2008096433A1 (en) * 2007-02-08 2008-08-14 Mitsubishi Electric Corporation Elevator security system
CN101600640A (en) * 2007-02-08 2009-12-09 三菱电机株式会社 The safety system of elevator
CN101790487A (en) * 2008-01-15 2010-07-28 三菱电机株式会社 Elevator control system and elevator controller
CN103647953A (en) * 2013-12-25 2014-03-19 句容云影响软件技术开发有限公司 Intelligent monitoring system and method
CN205158082U (en) * 2015-11-05 2016-04-13 杭州冷倍冠科技有限公司 Moving staircase control system
CN106384285A (en) * 2016-09-14 2017-02-08 浙江维融电子科技股份有限公司 Intelligent self-service bank system
CN206421481U (en) * 2016-11-18 2017-08-18 北京海鑫科金高科技股份有限公司 Movable security inspection system
CN106698118A (en) * 2016-12-09 2017-05-24 成都焦点合安物联网有限公司 Elevator control method and system based on face recognition
CN206557873U (en) * 2017-03-02 2017-10-13 叶云龙 A kind of anti-entrance system of intelligent security based on recognition of face
CN107369235A (en) * 2017-07-25 2017-11-21 中控智慧科技股份有限公司 The control method and wisdom system of a kind of gate
CN107403155A (en) * 2017-07-26 2017-11-28 北京声迅电子股份有限公司 A kind of rapid classification sorting technique and device

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109626154A (en) * 2018-12-28 2019-04-16 住友富士电梯有限公司 A kind of assisting safeguard of public order elevator control method, system and elevator
US11417159B2 (en) 2019-08-02 2022-08-16 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for controlling a smart lock
US11928904B2 (en) 2019-08-02 2024-03-12 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for controlling a smart lock
CN112446982A (en) * 2019-08-10 2021-03-05 云丁网络技术(北京)有限公司 Method, device, computer readable medium and equipment for controlling intelligent lock
CN110491084A (en) * 2019-09-05 2019-11-22 佛山市云米电器科技有限公司 A kind of intelligent and safe alarm method based on bio signal
CN110491084B (en) * 2019-09-05 2021-07-13 佛山市云米电器科技有限公司 Intelligent safety alarm method based on biological signal
CN111581636A (en) * 2020-03-26 2020-08-25 大连交通大学 Network security monitoring equipment
CN114202833A (en) * 2021-12-10 2022-03-18 珠海格力电器股份有限公司 Intelligent door lock alarm method, device, equipment and storage medium
CN115294680A (en) * 2022-08-16 2022-11-04 杭州萤石软件有限公司 Method and equipment for realizing personal safety protection function

Similar Documents

Publication Publication Date Title
CN108109348A (en) Classifying alarm method and device
CN108537922B (en) Visitor early warning method and system based on face recognition
CN108053111A (en) Elevator shunt method and system
CN206557873U (en) A kind of anti-entrance system of intelligent security based on recognition of face
CN109980781A (en) A kind of transformer substation intelligent monitoring system
CN107688884A (en) Safety check centralized management system
CN108777703A (en) A kind of abnormal behaviour processing method and system based on block chain
CN109089160A (en) A kind of colleges and universities dining room food processing unlawful practice video analytic system and method
CN109657624A (en) Monitoring method, the device and system of target object
CN205068549U (en) A equipment and system for managing public place personnel that get into
CN108597566A (en) Mobile electron medical records system based on recognition of face and implementation method
CN103714631A (en) ATM intelligent monitoring system based on human face recognition
CN105809759A (en) Borehole operation safety guarantee and attendance platform
CN201993822U (en) School safety management system
CN106529373A (en) Human face recognition monitoring alarm method and system
CN108932760A (en) Work attendance method and terminal based on recognition of face
CN106390217A (en) One-stop plasma collection automatic supervision system and method
CN108171123A (en) Dangerous user's identification and the method and apparatus of alarm
CN108163654A (en) Call the method and device of ladder response together
CN113794819A (en) Intelligent management method, system, device and medium for epidemic prevention place
CN106161443A (en) A kind of monitoring method and device of game service
CN102682283A (en) Dynamic face recognition system
CN107506727A (en) A kind of intelligent video supervisory systems based on Internet of Things
CN110012079A (en) Intelligent Community system and its application method
CN106571971A (en) Empty shell website detection method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180601

RJ01 Rejection of invention patent application after publication