CN108109348A - Classifying alarm method and device - Google Patents
Classifying alarm method and device Download PDFInfo
- Publication number
- CN108109348A CN108109348A CN201711310777.8A CN201711310777A CN108109348A CN 108109348 A CN108109348 A CN 108109348A CN 201711310777 A CN201711310777 A CN 201711310777A CN 108109348 A CN108109348 A CN 108109348A
- Authority
- CN
- China
- Prior art keywords
- user
- active user
- safe class
- alarm
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/005—Alarm destination chosen according to a hierarchy of available destinations, e.g. if hospital does not answer send to police station
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/18—Status alarms
- G08B21/182—Level alarms, e.g. alarms responsive to variables exceeding a threshold
Landscapes
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Public Health (AREA)
- Alarm Systems (AREA)
Abstract
The present invention relates to a kind of classifying alarm method and devices.The described method includes:The image information of active user is obtained, extracts the biological information of active user in described image information;Default customer data base is inquired about according to the biological information, the image of multiple known users and safe class corresponding with each image are stored in the customer data base;The known users include dangerous user and validated user, and the danger user corresponds to different safe classes from validated user respectively;The safe class of active user is determined according to query result, corresponding alarm strategy is performed according to the safe class of active user.The present invention overcomes alarm mode in enclosed environment is single, without targetedly defect, while improve security, automatic identification identity is reached and has taken the technique effect of corresponding alarm strategy.
Description
Technical field
The present invention relates to technical field of security and protection, more particularly to classifying alarm method, apparatus, computer readable storage medium
And computer equipment.
Background technology
In the environment of closing, such as elevator, it is limited by signal, network and site environment, None- identified goes out user's body
Part, dangerous material, to personal safety, property, there is bigger security risks.
In traditional technology, in the environment of closing, such as elevator, camera is provided with, by manually checking monitor screen, is sentenced
It is disconnected whether dangerous, and trigger alarm system.
In the research and practice process to traditional technology, it is found that at least there are following technical problems in traditional technology:Consumption
Take manpower, security is low;Automatic alarm is unable to, and alarm mode is single.
The content of the invention
Based on this, it is necessary to for alarm mode in enclosed environment in the prior art it is single the problem of, a kind of classification is provided
Alarm method, device, computer readable storage medium and computer equipment.
A kind of classifying alarm method, including:
The image information of active user is obtained, extracts the biological information of active user in described image information;
Default customer data base is inquired about according to the biological information, be stored in the customer data base it is multiple
Know the image of user and safe class corresponding with each image;The known users include dangerous user and validated user, institute
It states dangerous user and corresponds to different safe classes respectively from validated user;
The safe class of active user is determined according to query result, corresponding report is performed according to the safe class of active user
It is pithy to omit.
In one of the embodiments, it is described that default customer data base is inquired about according to the biological information, including:
Corresponding biological information in the image of each known users in extraction customer data base;
The biological information of active user is compared with the biological information of each known users, detection two
Whether person matches.
In one of the embodiments, in the customer data base, the corresponding safe class of image of each danger user is
The first estate, the corresponding safe class of image of each validated user is the tertiary gradient;
The safe class that active user is determined according to query result performs correspondence according to the safe class of active user
Alarm strategy, including:
If query result is the biological information of active user and the biological information of a certain known users
Match somebody with somebody, judge whether the known users are dangerous user, if so, the safe class for determining active user for the first estate, performs the
The corresponding first alarm strategy of one grade;If it is not, determine that the safe class of active user for the tertiary gradient, performs the tertiary gradient pair
The 3rd alarm strategy answered;
If query result is equal for the biological information and the biological information of arbitrary known users of active user
It mismatches, it is determined that the safe class of active user is the second grade, performs the corresponding second alarm strategy of the second grade.
In one of the embodiments, before the default customer data base according to biological information inquiry,
It further includes:
The step of establishing customer data base;The step includes:
The image information of the known users of interconnection Web realease is obtained by big data;
It is regular according to default classification, determine the corresponding safe class of image of each known users;
Customer data base is established according to the image of each known users and corresponding safe class.
In one of the embodiments, the classifying alarm method, further includes:Obtain the safety check machine testing knot of active user
Fruit judges whether active user carries dangerous material according to screening machine testing result, if so, determining the safe class of active user
For the first estate, the corresponding first alarm strategy of the first estate is performed.
In one of the embodiments, the first alarm strategy includes:Send short messages to setting the first telephone number and/
Or dial the first telephone number of setting;
The second alarm strategy includes:Send short messages to the second telephone number of setting and/or dial the second electricity of setting
Talk about number.
In one of the embodiments, the safe class of the definite active user is the second grade, performs the second grade
After corresponding second alarm strategy, further include:
If confirmation active user is validated user, by the image information storage of active user to the customer data base
In, and the corresponding safe class of active user is set to be updated for the tertiary gradient to the customer data base;
If it is dangerous user to confirm active user, by the image information storage of active user to the customer data base
In, and the corresponding safe class of active user is set to be updated for the first estate to the customer data base.
In one of the embodiments, the biological information includes face information, fingerprint, palm line, iris, view
At least one of film, bodily form.
A kind of classifying alarm device, including:
Information extraction modules for obtaining the image information of active user, extract active user in described image information
Biological information;
Enquiry module, for inquiring about default customer data base, the customer data base according to the biological information
In be stored with the image of multiple known users and safe class corresponding with each image;The known users include dangerous user
And validated user, the danger user correspond to different safe classes from validated user respectively;
Alarm module, for determining the safe class of active user according to query result, according to safety of active user etc.
Grade performs corresponding alarm strategy.
A kind of elevator classifying alarm system, including:Camera, user data management unit and alarm unit;
The camera is used to shoot the image information of active user and uploads to the alarm unit;
The image that the user data management unit is used for the known users for obtaining interconnection Web realease by big data is believed
Breath, it is regular according to default classification, determine the corresponding safe class of image of each known users;According to each known users
Image and corresponding safe class establish customer data base, and the image of multiple known users is stored in the customer data base
And safe class corresponding with each image;The known users include dangerous user and validated user, the danger user with
Validated user corresponds to different safe classes respectively;
The alarm unit is used to obtain the image information of the active user of camera shooting, extracts in described image information
The biological information of active user;Default customer data base is inquired about according to the biological information;According to query result
It determines the safe class of active user, corresponding alarm strategy is performed according to the safe class of active user.
A kind of computer readable storage medium, is stored thereon with computer program, when which is executed by processor, realizes
The step of classifying alarm method described above.
A kind of computer equipment can be run on a memory and on a processor including memory, processor and storage
Computer program, when the processor performs described program, the step of realizing classifying alarm method described above.
Above-mentioned technical proposal by obtaining the image information of active user, extracts active user in described image information
Biological information;Default customer data base is inquired about according to the biological information, is stored in the customer data base
The image of multiple known users and safe class corresponding with each image;The known users include dangerous user and legal use
Family, the danger user correspond to different safe classes from validated user respectively;The peace of active user is determined according to query result
Congruent grade performs corresponding alarm strategy according to the safe class of active user.It is single to overcome alarm mode in enclosed environment,
Without targetedly defect, while improve security, automatic identification identity is reached and has taken the skill of corresponding alarm strategy
Art effect.
Description of the drawings
Fig. 1 is the schematic flow chart of the classifying alarm method of an embodiment;
Fig. 2 is the schematic flow chart of the classifying alarm method of an embodiment;
Fig. 3 is the schematic flow chart of the classifying alarm method of another embodiment;
Fig. 4 is the network topological diagram of the elevator classifying alarm of an embodiment;
Fig. 5 is the schematic diagram of the classifying alarm device of an embodiment;
Fig. 6 is the schematic diagram of the elevator classifying alarm system of an embodiment.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, it is right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
Although the step in the present invention is arranged with label, it is not used to limit the precedence of step, unless
Specify the order of step or based on the execution of certain step needs other steps, otherwise the relative rank of step is
It is adjustable.
Present invention could apply to the elevators and its safety-protection system in the public residence such as cell, villa, residential quarter.
Fig. 1 is the schematic flow chart of the classifying alarm method of an embodiment;As shown in Figure 1, the classification in the present embodiment
Alarm method comprises the following steps:
Step S101 obtains the image information of active user, extracts the biological characteristic of active user in described image information
Information.
In this step, the image information of active user refers to the biological information of active user by with the shape of image
Formula shows that described image information contains the biological information of active user.Wherein, biological characteristic refers to each individual and has
, can uniquely measure or can automatic identification and verification physiological property, refer in particular to the intrinsic physiological property of human body.
Specifically, the image information of active user can be gathered by picture pick-up device, and uploads to processing system, image is believed
Breath is detected, pretreatment operation, extracts the biological information of active user in described image information.
Step S102 inquires about default customer data base according to the biological information, is deposited in the customer data base
Contain the image of multiple known users and safe class corresponding with each image;The known users include dangerous user and conjunction
Method user, the danger user correspond to different safe classes from validated user respectively.
In this step, customer data base refers to coming tissue, storage and the storehouse for managing user data according to data structure
Storehouse, the main image for storing user and safe class corresponding with each image.Wherein, safe class with according to active user's
Image information identifies that the identity of active user is related, such as:The criminal that Netcom seizes be dangerous person, corresponding peace
Congruent grade is danger classes;Ordinary household is validated user, and safe class is legal grade;For stranger, safety etc.
Grade can be strange grade.
Specifically, the image of multiple known users and peace corresponding with each image are stored in default customer data base
Congruent grade, the known users include dangerous user and validated user, and the danger user corresponds to different respectively from validated user
Safe class.According to the biological information extracted, in default customer data base, searched by computer equipment
Rope matches, and judges whether the pre-stored image in customer data base has and believes matched image with the biological characteristic.Above-mentioned steps, gram
Taken traditional artificial checking monitoring equipment and the defects of labor intensive, for corresponding alarm strategy is taken to provide foundation below.
Step S103 determines the safe class of active user according to query result, is held according to the safe class of active user
The corresponding alarm strategy of row.
In this step, it is described default to refer to whether the biological information of inquiry active user is stored in for query result
Customer data base in and draw as a result, alarm strategy refer to transferring specific warning message by communication
To relevant personnel or mechanism.
Specifically, the query result whether being stored according to the biological information of active user in customer data base, with
And default classification rule, it identifies the identity of active user, determines the safe class of active user, so as to take with safety etc.
The corresponding alarm strategy of grade, relevant personnel or mechanism are passed to by specific warning message by communication.
Wherein, default classification rule includes:If user is dangerous user, the safe class of user is the first estate;
If user is validated user, the safe class of user is the tertiary gradient;If user neither dangerous user nor legal use
Family, it is determined that for non-hierarchic user, safe class is the second grade.
Above example by obtaining the image information of active user, extracts the life of active user in described image information
Object characteristic information;Default customer data base is inquired about according to the biological information;Active user is determined according to query result
Safe class, according to the safe class of active user perform it is corresponding alarm strategy.Overcome alarm mode in enclosed environment
It is single, without targetedly defect, while improve security, reach automatic identification identity and taken corresponding alarm strategy
Technique effect.
In one embodiment, it is described that default number of users is inquired about according to the biological information in above-mentioned steps S102
According to storehouse, including:Corresponding biological information in the image of each known users in extraction customer data base;By the institute of active user
The biological information that biological information is stated with each known users is compared, and whether both detections match.It specifically includes:Institute
Stating biological information includes at least one of face information, fingerprint, palm line, iris, retina, bodily form, the figure of user
As information includes above-mentioned biological information.In customer data base, the biological information for extracting each known users is included
Face information, fingerprint, palm line, iris, retina, at least one of the bodily form, it is special with the corresponding biology of active user
Reference breath is compared, detect each known users biological information whether with the corresponding biological nature information of active user
Matching.Above-described embodiment by a variety of alignments, can overcome traditional artificial look into the identity of automatic identification active user
See monitoring screen, the defects of inefficiency is susceptible to and fails to judge and judge by accident, brings very big security risk, accuracy is high, in real time
Property is strong.
Fig. 2 is the schematic flow chart of the classifying alarm method of an embodiment.
In one embodiment, in above-mentioned steps S102, in the customer data base, the corresponding peace of image of each danger user
Congruent grade is the first estate, and the corresponding safe class of image of each validated user is the tertiary gradient.It is described true according to query result
Determine the safe class of active user, corresponding alarm strategy is performed according to the safe class of active user, including:If query result
For the biological information of active user and the biometric information matches of a certain known users, judge that the known users are
No is dangerous user, if so, determining the safe class of active user as the first estate, performs the first estate corresponding first and alarms
Strategy;If it is not, determining the safe class of active user as the tertiary gradient, the corresponding 3rd alarm strategy of the tertiary gradient is performed;If
Query result mismatches for the biological information and the biological information of arbitrary known users of active user, then really
The safe class of active user is determined for the second grade, shows the user as unknown subscriber, performs corresponding second report of the second grade
It is pithy to omit.
In one embodiment, as shown in Fig. 2, the classifying alarm method comprises the following steps:
Whether step S201, the biological information for inquiring about active user are believed with the biological characteristics of a certain known users
Breath matching.
Specifically, according to query result, the safe class of active user is determined.
Step S202 judges whether active user is known users.
Specifically, judge active user biological information whether the biometric information matches with known users.
Step S203, it is not known users to determine active user, performs the second alarm strategy.
Specifically, active user is not known users, i.e. active user is not classified, and the safe class of active user is second
Grade performs the second alarm strategy, for example, notifying Security Personnel, scene confirms the identity of active user.
Step S204, it is known users to determine active user, judges whether known users are dangerous user.
Specifically, the biological information of active user and the biometric information matches of a certain known users, i.e.,
Active user is the known users to prestore in customer data base, judges whether the known users are dangerous user.
Step S205 if the known users are dangerous users, performs the first alarm strategy.
Specifically, if the known users are dangerous users, can determine active user is dangerous user, i.e. active user
Safe class is the first estate, performs the first alarm strategy, for example, dialing 110 to public security department, calling police assists.
Step S206 if the known users are not dangerous users, performs the 3rd alarm strategy.
Specifically, if the known users are not dangerous users, can determine active user is not dangerous user, but user
The safe class of the validated user to prestore in database, i.e. active user is the tertiary gradient, performs the 3rd alarm strategy.
Above-described embodiment, using classifying alarm method, it is single to overcome traditional alert pattern, without targetedly defect,
Security is improved simultaneously, reduces the consuming of manpower.
In one embodiment, it is described that default number of users is inquired about according to the biological information in above-mentioned steps S102
Before storehouse, further include:The step of establishing customer data base.The step includes:Interconnection Web realease is obtained by big data
The image information of known users;It is regular according to default classification, determine the corresponding safe class of image of each known users;According to
The image of each known users and corresponding safe class establish customer data base.By establishing customer data base, to distinguish
The identity of other active user provides foundation, while improves security.
Wherein, default classification rule includes:If user is dangerous user, the safe class of user is the first estate;
If user is validated user, the safe class of user is the tertiary gradient;If user neither dangerous user nor legal use
Family, it is determined that for non-hierarchic user, safe class is the second grade.
In one embodiment, by big data obtain interconnection Web realease known users information, such as validated user,
The various information such as the image of wanted criminal or suspect, ID card No., name, height, fingerprint, sound, are taken by data analysis
Business device analyzes the various information of known users, the identity of known users is determined, so that it is determined that the safe class of known users.Root
Identity information and corresponding safe class according to known users, establish customer data base, and the database purchase has known users
Identity information and corresponding safe class.Further, after some time, for example, 1 month, internet is reacquired
For same user, number of users is covered using the user images information of reacquisition for the image information of the known users of upper issue
According to the original image information of middle the user, according to actual conditions, the safe class of the user can be also redefined, and is extended in time
The memory of customer data base, the information for the customer data base that upgrades in time.Original known users of user data library storage and new
Increase the image information of known users and corresponding safe class.Above-described embodiment by establishing customer data base, and upgrades in time
The information of customer data base can improve the accuracy and timeliness for distinguishing user identity, avoid judging by accident, misjudge the safety brought
Hidden danger for automatic identification user identity and takes corresponding alarm strategy to provide guarantee.
In one embodiment, the classifying alarm method may also include:Obtain the screening machine testing result of active user, root
Judge whether active user carries dangerous material according to screening machine testing result, if so, determining the safe class of active user for the
One grade performs the corresponding first alarm strategy of the first estate.Thus whether detection active user carries dangerous goods, into one
Step improves security.
Specifically:The image information of active user is obtained, the safe class of active user is determined according to image information and is held
The corresponding alarm strategy of row, the screening machine testing result with obtaining active user perform corresponding alarm plan according to the testing result
Slightly, between the two without point of specific sequencing, i.e. the two can be performed independently.Pass through comprehensive descision active user
Image information and screening machine testing result, determine the identity of active user and corresponding safe class, take correspondence automatically
Alarm strategy.
In one embodiment, the image information of active user is first obtained, then obtains the screening machine testing result of active user,
By the image information of comprehensive descision active user and screening machine testing result, the identity of active user and corresponding peace are determined
Congruent grade takes corresponding alarm strategy automatically.
In one embodiment, the screening machine testing result of active user is first obtained, then obtains the image information of active user,
By the image information of comprehensive descision active user and screening machine testing result, the identity of active user and corresponding peace are determined
Congruent grade takes corresponding alarm strategy automatically.
Further, while the image information of active user and screening machine testing result are obtained, it is current by comprehensive descision
The image information of user and screening machine testing result determine the identity of active user and corresponding safe class, take automatically
Corresponding alarm strategy.
Whether above-described embodiment, screening machine carry dangerous material, make as a kind of ancillary technique means, detection active user
For the Rule of judgment of dangerous user, be conducive to improve security and confirm the accuracy of identity.
In above each embodiment, the first alarm strategy includes:Send short messages to the first telephone number of setting and/or
Dial the first telephone number of setting;For example, send short message, make a telephone call to the public security departments such as 110, local police station, calling police association
It helps.The second alarm strategy includes:Send short messages to the second telephone number of setting and/or dial the second phone number of setting
Code;For example, sending short message, property of making a telephone call to security personnel or property correlation security department, security personnel's on-site verification is notified
The identity of active user.The 3rd alarm strategy includes:The time that active user was logged image information last time is obtained, if working as
Preceding user's last time is logged the time of image information more than default time, such as 1 year, then records the image information of active user
Access customer database, to replace the original image information of the user in customer data base;Alternatively, it obtains current in customer data base
The matching degree of the corresponding image information of user and the user's present image information, if matching degree is less than default matching value,
Such as 50 percent, then by the image information typing customer data base of active user, to replace the user in customer data base
Original image information.
It sets, is conducive to above by the particular content to the first alarm strategy, the second alarm strategy, the 3rd alarm strategy
Security, and the data for the customer data base that upgrades in time as the case may be are improved, ensures high accuracy, avoids misjudging, judge by accident
The security risk brought, to distinguish that user identity takes corresponding alarm strategy to provide guarantee.
In one embodiment, the safe class of the definite active user is the second grade, and it is corresponding to perform the second grade
After second alarm strategy, further include:If confirmation active user is validated user, the image information storage of active user is arrived
In the customer data base, and the corresponding safe class of active user is set to be carried out for the tertiary gradient to the customer data base
Update;If it is dangerous user to confirm active user, the image information of active user is stored into the customer data base, and
It is the first estate to set the corresponding safe class of active user, and the customer data base is updated.Above-described embodiment, if really
The safe class of active user is determined for the second grade, continues to judge that active user is validated user or dangerous user, and to institute
It states customer data base to be updated, security, the accuracy of automatic identification identity can be improved, be conducive to the data that upgrade in time
Storehouse.
In a specific embodiment, as shown in figure 3, Fig. 3 is the schematic of the classifying alarm method of another embodiment
Flow chart, the classifying alarm method comprise the following steps:
Step S301 is classified boarding user by big data analysis system, is carried out according to different grades different
Alarm strategy.
Specifically, the safe class of boarding user is divided into the first order, the second level, the third level, the fourth stage, level V.Its
In, safe class is that the boarding user of the first order is hazard class, including the identified suspect of system, wanted criminal or carries danger
The user of dangerous product.Safe class is that the boarding user of the third level is guest level, including the user by registration.Safe class is
The boarding user of level Four is internal staff's grade, the employee including infrastructure management company.Safe class is the boarding user of level V
For validated user grade, include the user of system typing data.Safe class is that the boarding user of the second level is unknown grade, including
Not identified in addition to above four ranks or the user that can not identified.
Wherein, alarm strategy is divided into level-one alarm, secondary alarm, three-level alarm.If current boarding user is hazard class,
Level-one alarm is performed, dials 110 to public security departments such as local police stations, calling police assists.If current boarding user is unknown grade,
Secondary alarm is performed, sends short message, property of making a telephone call to security personnel, the identity of the property security personnel current boarding user of on-site verification.If
Current boarding user is any one in internal staff's grade, validated user grade, guest level, then performs three-level alarm, adopt again
Collect some image information of current boarding user, and judge its figure corresponding with current boarding user in pre-set user database
As the matching degree of information.For example, the face characteristic for calculating current boarding user and current boarding use in pre-set user database
The matching value of the corresponding face characteristic in family, if matching value is less than 50 percent, by the figure of the active user resurveyed
As data input customer data base, to replace the original image information of the user in customer data base, and used according to above-mentioned boarding
The safety status classification rule at family, redefines the safe class of current boarding user, and customer data base is updated.Institute
State the image information that current boarding user is stored in customer data base and corresponding safe class.
Step S302, judges whether current boarding user is not classified, if current boarding user has been classified, jumps to step
Rapid S305.
Specifically, judge whether current boarding user does not pass through system level.
Step S303, current boarding user are not classified, and system sends secondary alarm and ensures public security to property automatically.
Specifically, it is determined that current boarding user is not classified, secondary alarm is performed for example, sending short message, property of making a telephone call to
Security personnel notify property security personnel.
Step S304, property security personnel verify the identity of current boarding user.
Specifically, the information such as name, ID card No., photograph of the property security personnel current boarding user of on-site verification.
Step S305 judges whether current boarding user is hazard class.
Specifically, judge whether current boarding user is the suspect or wanted criminal announced on internet.
Step S306, it is not hazard class to determine current boarding user, then performs three-level alarm.
Specifically, it is determined that current boarding user is not the suspect or wanted criminal announced on internet, then by current boarding
The information of user and corresponding safe class record achieve.
Step S307, it is hazard class to determine active user, then performs level-one alarm.
Specifically, it is determined that active user is the suspect or wanted criminal announced on internet, level-one alarm is performed, is sent short
Believe, make a telephone call to the public security departments such as 110, local police station.
In above-described embodiment, boarding user is classified by big data analysis system, is carried out according to different grades
Different alarms.It is single to overcome alarm mode in enclosed environment, without targetedly defect, while improve security, reaches
It has arrived automatic identification identity and has taken the technique effect of corresponding alarm strategy.
Fig. 4 is the network topological diagram of the elevator classifying alarm of an embodiment;
In one embodiment, as shown in figure 4, the classifying alarm method includes:Obtain the screening machine of current boarding user
Testing result and image information, judge whether current boarding user carries dangerous material, if so, determining current boarding user for danger
Dangerous grade performs the corresponding level-one alarm of hazard class, passes through the public security departments such as 110, local police station that send short messages, make a telephone call to.By comprehensive
Conjunction judges the image information of current boarding user and screening machine testing result, determines the identity of current boarding user and corresponding
Safe class takes corresponding alarm strategy automatically.
Specifically, the image information of acquisition and typing active user is extracted the biological information in image information, is passed through
Data analytics server detection active user biological information whether the life with known users in default customer data base
Object characteristic information matches, and identifies the identity of active user, then active user is classified by tiered server, and takes phase
The alarm strategy answered stores the image of active user and safe class corresponding with image to Database Systems.
Further, by data analytics server detect active user biological information whether with default user
In database before the biometric information matches of known users, the step of establishing customer data base is further included.The step bag
It includes:Acquisition and the basic data and feature of typing user according to default classification rule, determine the corresponding safety of each known users
Grade;Customer data base is established according to the basic data of each known users, feature and corresponding safe class.
Specifically, the basic data and feature of acquisition and typing user, including:Typing known users, such as internal staff
Grade, validated user grade, the basic data of hazard class and feature, such as the information such as name, ID card No., photograph;Gather user,
Such as the basic data and feature of hazard class, by big data algorithm, in internet, acquisition has been issued as suspect or wanted criminal
Basic data and feature.
Above-described embodiment, by obtaining the image information of current boarding user and screening machine testing result, by safety check machine examination
Result is surveyed as a kind of auxiliary characteristics, image information is analyzed, current boarding user is classified, performed according to different grades
Different alarm strategies.It is single to overcome alarm mode in enclosed environment, without targetedly defect, while improve safety
Property, reach automatic identification identity and take the technique effect of corresponding alarm strategy.
It it should be noted that for foregoing each method embodiment, describes, it is all expressed as a series of for simplicity
Combination of actions, but those skilled in the art should know, the present invention and from the limitation of described sequence of movement, because according to
According to the present invention, some steps may be employed other orders or be carried out at the same time.
Based on the thought identical with the classifying alarm method in above-described embodiment, the present invention also provides classifying alarm system,
The system can be used for performing above-mentioned classifying alarm method.For convenience of description, the schematic structure of classifying alarm system embodiment
In figure, illustrate only with the relevant part of the embodiment of the present invention, it will be understood by those skilled in the art that schematic structure not structure
The restriction of paired systems can include either combining some components or different components than illustrating more or fewer components
Arrangement.
Fig. 5 is the schematic diagram of the classifying alarm device of an embodiment, and the classifying alarm device includes:
Information extraction modules 510 for obtaining the image information of active user, extract active user in described image information
Biological information;
Enquiry module 520, for inquiring about default customer data base, the user data according to the biological information
The image of multiple known users and safe class corresponding with each image are stored in storehouse;The known users include dangerous use
Family and validated user, the danger user correspond to different safe classes from validated user respectively;
Alarm module 530, for determining the safe class of active user according to query result, according to the safety of active user
Grade performs corresponding alarm strategy.
In one embodiment, for enquiry module 520, it can be also used for the figure of each known users in extraction customer data base
The corresponding biological information as in;By the biological information of active user and the biological information of each known users
It is compared, whether both detections match.
In one embodiment, for enquiry module 520, in the customer data base, the image of each danger user is corresponding
Safe class is the first estate, and the corresponding safe class of image of each validated user is the tertiary gradient.For alarm module 530,
It can be also used for:If query result is the biological information of active user and the biological information of a certain known users
Matching, judges whether the known users are dangerous user, if so, determining that the safe class of active user for the first estate, performs
The corresponding first alarm strategy of the first estate;If it is not, determine that the safe class of active user for the tertiary gradient, performs the tertiary gradient
Corresponding 3rd alarm strategy;If query result is the biological information of active user and the biology of arbitrary known users
Characteristic information mismatches, it is determined that the safe class of active user is the second grade, performs corresponding second report of the second grade
It is pithy to omit.
In one embodiment, for enquiry module 520, can also be further used for establishing customer data base.The foundation
The step of customer data base, includes:The image information of the known users of interconnection Web realease is obtained by big data;According to default
Classification rule, determine the corresponding safe classes of image of each known users;According to the image of each known users and right
The safe class answered establishes customer data base.
In one embodiment, for information extraction modules 510, it can be also used for the safety check machine testing knot of acquisition active user
Fruit judges whether active user carries dangerous material according to screening machine testing result, if so, determining the safe class of active user
For the first estate, the corresponding first alarm strategy of the first estate is performed.
Above-mentioned all embodiments by obtaining the image information of active user, extract active user in described image information
Biological information;Default customer data base is inquired about according to the biological information;It is determined currently according to query result
The safe class of user performs corresponding alarm strategy according to the safe class of active user.It overcomes in enclosed environment and alarms
Pattern is single, without targetedly defect, while improve security, has reached automatic identification identity and has taken corresponding alarm
The technique effect of strategy.
Fig. 6 is the schematic diagram of the elevator classifying alarm system of an embodiment.
In one embodiment, as shown in fig. 6, the elevator classifying alarm system includes:Camera 610, user data pipe
Manage unit 620 and alarm unit 630.The camera 610 is used to shoot the image information of active user and upload to described
Alarm unit 630.The user data management unit 620 is used to obtain the known users for interconnecting Web realease by big data
Image information;It is regular according to default classification, determine the corresponding safe class of image of each known users;According to it is described it is each known to
The image of user and corresponding safe class establish customer data base, and multiple known users are stored in the customer data base
Image and safe class corresponding with each image.The known users include dangerous user and validated user, the danger
User corresponds to different safe classes from validated user respectively.The alarm unit 630 is used to obtain the current of camera shooting
The image information of user extracts the biological information of active user in described image information;According to the biological information
Inquire about default customer data base;The safe class of active user is determined according to query result, according to safety of active user etc.
Grade performs corresponding alarm strategy.
Specifically, the user data management unit 620 includes information acquisition module 621, Database module 622.
Wherein, information acquisition module 621 is connected with internet 700, for obtaining the known use issued on internet 700 by big data
The image information at family, it is regular according to default classification, determine the corresponding safe class of image of each known users.Database
Module 622 is connected with information acquisition module 621, for the image information of the known users gathered according to information acquisition module 621
And corresponding safe class establishes customer data base, be stored in the customer data base multiple known users image and
Safe class corresponding with each image.The known users include dangerous user and validated user, the danger user with it is legal
User corresponds to different safe classes respectively.
Further, the alarm unit 630 includes information extraction modules 510, enquiry module 520, alarm module 530.
Wherein, information extraction modules 510 are connected with camera 610, for obtaining the image letter of the active user of the shooting of camera 610
Breath extracts the biological information of active user in described image information.The enquiry module respectively with information extraction modules
510th, Database module 622 connects, for the biological information inquiry extracted according to information extraction modules 510
Default customer data base in Database module 622.Alarm module 530 is connected with enquiry module 520, for according to inquiry
The query result of module 520 determines the safe class of active user, and corresponding alarm is performed according to the safe class of active user
Strategy.
Above-described embodiment shoots the image information of active user by camera and uploads to the alarm unit, passes through
The alarm unit determines the safe class of active user, and different alarm strategies is performed according to different safe classes.Overcome
Alarm mode is single in enclosed environment, without targetedly defect, while improve security, has reached automatic identification identity
With the technique effect for taking corresponding alarm strategy.
It should be noted that in the embodiment of the classifying alarm system of above-mentioned example, the information between each module/unit
The contents such as interaction, implementation procedure, due to preceding method embodiment of the present invention be based on same design, the technique effect brought with
Preceding method embodiment of the present invention is identical, and particular content can be found in the narration in the method for the present invention embodiment, and details are not described herein again.
In addition, in the embodiment of the classifying alarm system of above-mentioned example, the logical partitioning of each program module is only citing
Illustrate, can be as needed in practical application, such as examined for the facility of the realization of the configuration requirement or software of corresponding hardware
Consider, above-mentioned function distribution by different program modules is completed, i.e., is divided into the internal structure of the classifying alarm system not
Same program module, to complete all or part of function described above.
It will appreciated by the skilled person that realizing all or part of flow in above-described embodiment method, being can
Relevant hardware to be instructed to complete by computer program, the program can be stored in a computer-readable storage and be situated between
In matter, production marketing or use are independent.Described program upon execution, can perform the complete of such as embodiment of above-mentioned each method
Portion or part steps.In addition, the storage medium may also be disposed in a kind of computer equipment, also wrapped in the computer equipment
Include processor, when the processor performs the program in the storage medium, can realize above-mentioned each method embodiment it is complete
Portion or part steps.Wherein, the storage medium can be magnetic disc, CD, read-only memory (Read-Only
Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
In the above-described embodiments, all emphasize particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiments.It is appreciated that wherein used term " first ", " second " etc. are at this
For distinguishing object in text, but these objects should not be limited by these terms.
Embodiment described above only expresses the several embodiments of the present invention, it is impossible to be interpreted as to the scope of the claims of the present invention
Limitation.It should be pointed out that for those of ordinary skill in the art, without departing from the inventive concept of the premise,
Various modifications and improvements can be made, these belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention
It should be determined by the appended claims.
Claims (10)
- A kind of 1. classifying alarm method, which is characterized in that including:The image information of active user is obtained, extracts the biological information of active user in described image information;Default customer data base is inquired about according to the biological information, multiple known use are stored in the customer data base The image at family and safe class corresponding with each image;The known users include dangerous user and validated user, the danger Dangerous user corresponds to different safe classes from validated user respectively;The safe class of active user is determined according to query result, corresponding alarm plan is performed according to the safe class of active user Slightly.
- 2. classifying alarm method according to claim 1, which is characterized in that described to be inquired about according to the biological information Default customer data base, including:Corresponding biological information in the image of each known users in extraction customer data base;The biological information of active user is compared with the biological information of each known users, both detections are No matching.
- 3. classifying alarm method according to claim 2, which is characterized in that in the customer data base, each danger user The corresponding safe class of image for the first estate, the corresponding safe class of image of each validated user is the tertiary gradient;The safe class that active user is determined according to query result performs corresponding report according to the safe class of active user It is pithy to omit, including:If query result is the biological information of active user and the biometric information matches of a certain known users, sentence Whether the known users of breaking are dangerous user, if so, determining that the safe class of active user for the first estate, performs the first estate Corresponding first alarm strategy;If it is not, the safe class for determining active user for the tertiary gradient, performs the tertiary gradient corresponding the Three alarm strategies;If query result for the biological information and the arbitrary known users of active user biological information not Match somebody with somebody, it is determined that the safe class of active user is the second grade, performs the corresponding second alarm strategy of the second grade.
- 4. classifying alarm method according to claim 1, which is characterized in that described to be inquired about according to the biological information Before default customer data base, further include:The step of establishing customer data base;The step includes:The image information of the known users of interconnection Web realease is obtained by big data;It is regular according to default classification, determine the corresponding safe class of image of each known users;Customer data base is established according to the image of each known users and corresponding safe class.
- 5. classifying alarm method according to claim 3, which is characterized in that further include:The screening machine testing result of active user is obtained, it is dangerous to judge whether active user carries according to screening machine testing result Product if so, determining the safe class of active user as the first estate, perform the corresponding first alarm strategy of the first estate.
- 6. classifying alarm method according to claim 5, which is characterized in thatThe first alarm strategy includes:Send short messages to the first telephone number of setting and/or dial the first phone number of setting Code;The second alarm strategy includes:Send short messages to the second telephone number of setting and/or dial the second phone number of setting Code;And/orThe safe class of the definite active user is the second grade, after performing the corresponding second alarm strategy of the second grade, It further includes:If confirmation active user is validated user, the image information of active user is stored into the customer data base, and It is the tertiary gradient to set the corresponding safe class of active user, and the customer data base is updated;If it is dangerous user to confirm active user, the image information of active user is stored into the customer data base, and It is the first estate to set the corresponding safe class of active user, and the customer data base is updated.
- 7. classifying alarm method according to any one of claims 1 to 6, which is characterized in that the biological information includes At least one of face information, fingerprint, palm line, iris, retina, bodily form.
- 8. a kind of classifying alarm device, which is characterized in that including:Information extraction modules for obtaining the image information of active user, extract the biology of active user in described image information Characteristic information;Enquiry module for inquiring about default customer data base according to the biological information, is deposited in the customer data base Contain the image of multiple known users and safe class corresponding with each image;The known users include dangerous user and conjunction Method user, the danger user correspond to different safe classes from validated user respectively;Alarm module for determining the safe class of active user according to query result, is held according to the safe class of active user The corresponding alarm strategy of row.
- 9. a kind of elevator classifying alarm system, which is characterized in that including:Camera, user data management unit and alarm are single Member;The camera is used to shoot the image information of active user and uploads to the alarm unit;The user data management unit is used to obtain the image information of the known users of interconnection Web realease by big data;Root It is regular according to default classification, determine the corresponding safe class of image of each known users;According to the image of each known users And corresponding safe class establishes customer data base, be stored in the customer data base multiple known users image and Safe class corresponding with each image;The known users include dangerous user and validated user, the danger user with it is legal User corresponds to different safe classes respectively;The alarm unit is used to obtain the image information of the active user of camera shooting, extracts current in described image information The biological information of user;Default customer data base is inquired about according to the biological information;It is determined according to query result The safe class of active user performs corresponding alarm strategy according to the safe class of active user.
- 10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor During execution, any one of realization claim 1-7 the step of classifying alarm method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711310777.8A CN108109348A (en) | 2017-12-11 | 2017-12-11 | Classifying alarm method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711310777.8A CN108109348A (en) | 2017-12-11 | 2017-12-11 | Classifying alarm method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108109348A true CN108109348A (en) | 2018-06-01 |
Family
ID=62208324
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711310777.8A Pending CN108109348A (en) | 2017-12-11 | 2017-12-11 | Classifying alarm method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108109348A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109626154A (en) * | 2018-12-28 | 2019-04-16 | 住友富士电梯有限公司 | A kind of assisting safeguard of public order elevator control method, system and elevator |
CN110491084A (en) * | 2019-09-05 | 2019-11-22 | 佛山市云米电器科技有限公司 | A kind of intelligent and safe alarm method based on bio signal |
CN111581636A (en) * | 2020-03-26 | 2020-08-25 | 大连交通大学 | Network security monitoring equipment |
CN112446982A (en) * | 2019-08-10 | 2021-03-05 | 云丁网络技术(北京)有限公司 | Method, device, computer readable medium and equipment for controlling intelligent lock |
CN114202833A (en) * | 2021-12-10 | 2022-03-18 | 珠海格力电器股份有限公司 | Intelligent door lock alarm method, device, equipment and storage medium |
US11417159B2 (en) | 2019-08-02 | 2022-08-16 | Yunding Network Technology (Beijing) Co., Ltd. | Methods and systems for controlling a smart lock |
CN115294680A (en) * | 2022-08-16 | 2022-11-04 | 杭州萤石软件有限公司 | Method and equipment for realizing personal safety protection function |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003085662A (en) * | 2001-07-06 | 2003-03-20 | Rando Business:Kk | Crime prevention system, crime prevention management device, crime prevention method, crime prevention management method and computer program |
WO2008096433A1 (en) * | 2007-02-08 | 2008-08-14 | Mitsubishi Electric Corporation | Elevator security system |
CN101790487A (en) * | 2008-01-15 | 2010-07-28 | 三菱电机株式会社 | Elevator control system and elevator controller |
CN103647953A (en) * | 2013-12-25 | 2014-03-19 | 句容云影响软件技术开发有限公司 | Intelligent monitoring system and method |
CN205158082U (en) * | 2015-11-05 | 2016-04-13 | 杭州冷倍冠科技有限公司 | Moving staircase control system |
CN106384285A (en) * | 2016-09-14 | 2017-02-08 | 浙江维融电子科技股份有限公司 | Intelligent self-service bank system |
CN106698118A (en) * | 2016-12-09 | 2017-05-24 | 成都焦点合安物联网有限公司 | Elevator control method and system based on face recognition |
CN206421481U (en) * | 2016-11-18 | 2017-08-18 | 北京海鑫科金高科技股份有限公司 | Movable security inspection system |
CN206557873U (en) * | 2017-03-02 | 2017-10-13 | 叶云龙 | A kind of anti-entrance system of intelligent security based on recognition of face |
CN107369235A (en) * | 2017-07-25 | 2017-11-21 | 中控智慧科技股份有限公司 | The control method and wisdom system of a kind of gate |
CN107403155A (en) * | 2017-07-26 | 2017-11-28 | 北京声迅电子股份有限公司 | A kind of rapid classification sorting technique and device |
-
2017
- 2017-12-11 CN CN201711310777.8A patent/CN108109348A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003085662A (en) * | 2001-07-06 | 2003-03-20 | Rando Business:Kk | Crime prevention system, crime prevention management device, crime prevention method, crime prevention management method and computer program |
WO2008096433A1 (en) * | 2007-02-08 | 2008-08-14 | Mitsubishi Electric Corporation | Elevator security system |
CN101600640A (en) * | 2007-02-08 | 2009-12-09 | 三菱电机株式会社 | The safety system of elevator |
CN101790487A (en) * | 2008-01-15 | 2010-07-28 | 三菱电机株式会社 | Elevator control system and elevator controller |
CN103647953A (en) * | 2013-12-25 | 2014-03-19 | 句容云影响软件技术开发有限公司 | Intelligent monitoring system and method |
CN205158082U (en) * | 2015-11-05 | 2016-04-13 | 杭州冷倍冠科技有限公司 | Moving staircase control system |
CN106384285A (en) * | 2016-09-14 | 2017-02-08 | 浙江维融电子科技股份有限公司 | Intelligent self-service bank system |
CN206421481U (en) * | 2016-11-18 | 2017-08-18 | 北京海鑫科金高科技股份有限公司 | Movable security inspection system |
CN106698118A (en) * | 2016-12-09 | 2017-05-24 | 成都焦点合安物联网有限公司 | Elevator control method and system based on face recognition |
CN206557873U (en) * | 2017-03-02 | 2017-10-13 | 叶云龙 | A kind of anti-entrance system of intelligent security based on recognition of face |
CN107369235A (en) * | 2017-07-25 | 2017-11-21 | 中控智慧科技股份有限公司 | The control method and wisdom system of a kind of gate |
CN107403155A (en) * | 2017-07-26 | 2017-11-28 | 北京声迅电子股份有限公司 | A kind of rapid classification sorting technique and device |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109626154A (en) * | 2018-12-28 | 2019-04-16 | 住友富士电梯有限公司 | A kind of assisting safeguard of public order elevator control method, system and elevator |
US11417159B2 (en) | 2019-08-02 | 2022-08-16 | Yunding Network Technology (Beijing) Co., Ltd. | Methods and systems for controlling a smart lock |
US11928904B2 (en) | 2019-08-02 | 2024-03-12 | Yunding Network Technology (Beijing) Co., Ltd. | Methods and systems for controlling a smart lock |
CN112446982A (en) * | 2019-08-10 | 2021-03-05 | 云丁网络技术(北京)有限公司 | Method, device, computer readable medium and equipment for controlling intelligent lock |
CN110491084A (en) * | 2019-09-05 | 2019-11-22 | 佛山市云米电器科技有限公司 | A kind of intelligent and safe alarm method based on bio signal |
CN110491084B (en) * | 2019-09-05 | 2021-07-13 | 佛山市云米电器科技有限公司 | Intelligent safety alarm method based on biological signal |
CN111581636A (en) * | 2020-03-26 | 2020-08-25 | 大连交通大学 | Network security monitoring equipment |
CN114202833A (en) * | 2021-12-10 | 2022-03-18 | 珠海格力电器股份有限公司 | Intelligent door lock alarm method, device, equipment and storage medium |
CN115294680A (en) * | 2022-08-16 | 2022-11-04 | 杭州萤石软件有限公司 | Method and equipment for realizing personal safety protection function |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108109348A (en) | Classifying alarm method and device | |
CN108537922B (en) | Visitor early warning method and system based on face recognition | |
CN108053111A (en) | Elevator shunt method and system | |
CN206557873U (en) | A kind of anti-entrance system of intelligent security based on recognition of face | |
CN109980781A (en) | A kind of transformer substation intelligent monitoring system | |
CN107688884A (en) | Safety check centralized management system | |
CN108777703A (en) | A kind of abnormal behaviour processing method and system based on block chain | |
CN109089160A (en) | A kind of colleges and universities dining room food processing unlawful practice video analytic system and method | |
CN109657624A (en) | Monitoring method, the device and system of target object | |
CN205068549U (en) | A equipment and system for managing public place personnel that get into | |
CN108597566A (en) | Mobile electron medical records system based on recognition of face and implementation method | |
CN103714631A (en) | ATM intelligent monitoring system based on human face recognition | |
CN105809759A (en) | Borehole operation safety guarantee and attendance platform | |
CN201993822U (en) | School safety management system | |
CN106529373A (en) | Human face recognition monitoring alarm method and system | |
CN108932760A (en) | Work attendance method and terminal based on recognition of face | |
CN106390217A (en) | One-stop plasma collection automatic supervision system and method | |
CN108171123A (en) | Dangerous user's identification and the method and apparatus of alarm | |
CN108163654A (en) | Call the method and device of ladder response together | |
CN113794819A (en) | Intelligent management method, system, device and medium for epidemic prevention place | |
CN106161443A (en) | A kind of monitoring method and device of game service | |
CN102682283A (en) | Dynamic face recognition system | |
CN107506727A (en) | A kind of intelligent video supervisory systems based on Internet of Things | |
CN110012079A (en) | Intelligent Community system and its application method | |
CN106571971A (en) | Empty shell website detection method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180601 |
|
RJ01 | Rejection of invention patent application after publication |