Disclosure of Invention
Aiming at the defects of the prior art, the invention provides an intelligent security alarm system which comprises an intelligent security alarm platform and security nodes, wherein the intelligent security alarm platform is in communication connection with the security nodes;
the security protection intelligent alarm platform comprises a data acquisition module, a security protection identification module, a security protection authentication module, a security protection alarm module and a database, wherein the modules are in communication connection;
the data acquisition module acquires a first security data domain of a first security node and stores the first security data domain in a database; the first security data field comprises first authentication data and first protection zone data;
the security identification module analyzes whether a first trigger event occurs according to the first identification data, and acquires a second security data field of a second security node according to the first protection area data when the first trigger event occurs, wherein the second security data field comprises second identification data and second protection area data;
the security and protection identification module analyzes whether a second trigger event occurs according to the second identification data;
the security authentication module updates the first authentication data according to the second authentication data to obtain security authentication data, and analyzes a protection warning level according to the security authentication data;
the security authentication module obtains a security protection area list according to the first protection area data;
the security alarm module sends a protection alarm instruction to a corresponding security node according to the security protection area list;
and the security node responds to the received protection alarm instruction to execute security alarm operation.
According to a preferred embodiment, the security node comprises a microwave intrusion detector, an ultrasonic intrusion detector, an active infrared intrusion detector, a vibration sensor, a glass breakage detector, a space movement detector, a temperature-sensitive detector, an integrated camera, a high-speed dome camera and a web camera.
According to a preferred embodiment, the security authentication module analyzing whether the first trigger event occurs according to the first authentication data includes:
the security identification module obtains first state characteristic data according to the first identification data;
the security identification module acquires standard state characteristic data from the database;
the security and protection identification module obtains a first state change degree according to the first state characteristic data and the standard state characteristic data, and compares the first state change degree with a first state threshold value to judge whether a first trigger event occurs or not;
the state change degree is used for measuring the change degree of the environment in a target monitoring area of the security node;
when the first state change degree is larger than a first state threshold value, a first trigger event is generated, and a security identification module acquires a second security data domain according to the first protection area data;
when the first state change degree is smaller than the first state threshold value, the first triggering event does not occur, and the security protection intelligent alarm platform deletes the first security protection data domain.
According to a preferred embodiment, the first security data domain is a security data domain of a first security node, the second security data domain is a security data domain of a second security node, and the security data domain is used for performing security state detection and event analysis on the security nodes.
According to a preferred embodiment, the first guard area data is used for identifying all security nodes in a guard area where the first security node is located, and the first guard area data comprises a node identifier of the first security node and a node identifier of the second security node;
the first security node is a target security node; the second security protection node is the other security protection nodes except the first security protection node in the protection area where the first security protection node is located.
According to a preferred embodiment, the step of acquiring the second security data domain by the security authentication module according to the first protection zone data comprises:
the security identification module acquires a node identifier of a second security node according to the first protection area data;
the security and protection identification module sends a state judgment instruction to a second security and protection node according to the node identifier;
and the second security node responds to the received state judgment instruction and sends a second security data domain to the security identification module.
According to a preferred embodiment, the updating, by the security authentication module, the first authentication data according to the second authentication data to obtain the security authentication data includes:
the security authentication module obtains a node identifier of a second security node according to the first protection area data and sends an updating request instruction to the second security node according to the node identifier;
the second security node responds to the received updating request instruction and sends a second security data domain to the security authentication module;
and the security authentication module performs data fusion on the second identification data and the first identification data to obtain security authentication data.
According to a preferred embodiment, the rate of identification of the first trigger event is maximized to update the first state threshold:
maxR=(Gθ-Q)s.tα∈[x1,y1]β∈[x2,y2]
wherein R is the identification rate of the first trigger event, alpha is the lower limit of the first state threshold, beta is the upper limit of the first state threshold, G is the correct identification rate of the first trigger event, theta is the identification coefficient, Q is the false alarm rate of the first trigger event, and alpha belongs to [ x ]1,y1],β∈[x2,y2]Is a boundary constraint.
According to a preferred embodiment, the step of obtaining the security protection zone list according to the first protection zone data comprises the following steps:
the security authentication module obtains a node identifier of a first security node and a node identifier of a second security node according to the first protection area data;
and the security authentication module adds the node identifier of the first security node and the node identifier of the second security node to a security protection area list.
According to a preferred embodiment, the security protection area list is used for storing node identifiers of security nodes in a security node protection area where a trigger event occurs, and the security protection area list includes a node identifier of a first security node where a first trigger event occurs and a node identifier of a second security node where a second trigger event occurs.
According to a preferred embodiment, the security authentication module obtains a protection warning level according to the security authentication data; and when the protection warning level is not serious warning, storing the security authentication data in a database for the owner to check.
The invention has the following beneficial effects:
when the current security protection node generates a trigger event, the security protection intelligent alarm platform can also judge whether a second security protection node in the protection area where the security protection intelligent alarm platform is located generates the trigger event, so that cooperative alarm among all security protection nodes in the protection area is realized, the alarm result is accurate, and the security alert degree of the whole protection area is improved.
When a triggering event occurs, the security and protection intelligent alarm platform analyzes the protection alarm level, judges whether to alarm or not according to the protection alarm level, and automatically identifies certain unnecessary alarms so as to achieve intelligent alarm and reduce the consumption of human and material resources caused by false alarm.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present invention. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
Referring to fig. 1, in one embodiment, an intelligent security alarm system may include: the system comprises a security intelligent alarm platform and security nodes, wherein the security intelligent alarm platform is in communication connection with the security nodes;
the security protection intelligent alarm platform comprises a data acquisition module, a security protection identification module, a security protection authentication module, a security protection alarm module and a database, wherein the modules are in communication connection.
The data acquisition module acquires a first security data domain of a first security node and stores the first security data domain in a database; the first security data field comprises first authentication data and first protection zone data;
the security identification module analyzes whether a first trigger event occurs according to the first identification data, and acquires a second security data field of a second security node according to the first protection area data when the first trigger event occurs, wherein the second security data field comprises second identification data and second protection area data;
the security and protection identification module analyzes whether a second trigger event occurs according to the second identification data;
the security authentication module updates the first authentication data according to the second authentication data to obtain security authentication data, and analyzes a protection warning level according to the security authentication data;
the security authentication module obtains a security protection area list according to the first protection area data;
the security alarm module sends a protection alarm instruction to a corresponding security node according to the security protection area list;
and the security node responds to the received protection alarm instruction to execute security alarm operation.
The security node comprises a microwave intrusion detector, an ultrasonic intrusion detector, an active infrared intrusion detector, a vibration sensor, a glass breakage detector, a space movement detector, a temperature sensing detector, an integrated camera, a high-speed dome camera and a network camera.
Specifically, in an embodiment, the security alarm method executed by the intelligent security alarm system may include:
s1, the data acquisition module of the security protection intelligent alarm platform acquires a first security protection data domain of the first security protection node and stores the first security protection data domain in the database. The first security data domain is a security data domain of the first security node, and the first security data domain comprises first identification data and first protection area data.
Specifically, the security data domain is used for carrying out security state detection and event analysis on the security nodes; the first identification data comprises video stream data and sensing data. The first protection zone data is used for identifying all security nodes in a protection zone where the first security node is located, and the first protection zone data comprises a node identifier of the first security node and a node identifier of the second security node.
The first security node is a target security node, and the second security node is other security nodes except the first security node in a protection area where the first security node is located.
The video stream data is obtained by compressing and coding original video image data collected in a target monitoring area by a security node through a video compression technology.
Optionally, the security node is a device for checking the security state of a target monitoring area in the protection area, and includes a microwave intrusion detector, an ultrasonic intrusion detector, an active infrared intrusion detector, a vibration sensor, a glass breakage detector, a spatial movement detector, a temperature-sensitive detector, an integrated camera, a high-speed dome camera, and a web camera.
Optionally, the protection area is an area with a comprehensive precaution function, and the protection area is composed of one or more security nodes, where the security nodes may include one or more types.
S2, the security authentication module analyzes whether the first security node generates the first trigger event according to the first authentication data.
Specifically, the process that the security authentication module analyzes whether the first security node generates the first trigger event according to the first authentication data includes:
the security identification module obtains first state characteristic data according to the first identification data; the security identification module acquires standard state characteristic data from the database;
the security and protection identification module obtains a first state change degree according to the first state characteristic data and the standard state characteristic data, and compares the first state change degree with a first state threshold value. The state change degree is used for measuring the change degree of the environment in the target monitoring area of the security node.
Specifically, the feature extraction unit of the security identification module obtains a first state feature vector according to the first state feature data,
A=[a1,a2…an]
the feature extraction unit obtains a standard state feature vector according to the standard state feature data,
B=[b1,b2…bn]
a state change degree calculation unit of the security identification module calculates a first state change degree according to the first state feature vector and the standard state feature vector,
where n is the number of state features, i is the state feature index, c is the first state change degree, aiFirst state value of i-th state feature, biIs the standard state value of the ith state feature.
When the first state change degree is larger than a first state threshold value, a first trigger event is generated, and the security identification module acquires a second security data domain according to the first protection area data.
When the first state change degree is smaller than the first state threshold value, the first triggering event does not occur, and the security protection intelligent alarm platform deletes the first security protection data domain.
Optionally, the first state threshold is a critical value preset by an administrator to determine that the first trigger event occurs, and the first state change degree is used to measure the environmental similarity. The standard state characteristic data is data which is pre-configured by an administrator according to the equipment parameters of the security node in the normal state in the target monitoring area.
Optionally, the first trigger event is a change of an environment occurring in a target monitoring area of the first security node.
S3, when the first trigger event occurs, the security identification module obtains a second security data domain of the second security node according to the first protection area data.
Specifically, the process that the security identification module obtains the second security data domain according to the first protection area data comprises the following steps: the security identification module acquires a node identifier of a second security node according to the first protection area data; the security and protection identification module sends a state judgment instruction to a second security and protection node according to the node identifier; and the second security node responds to the received state judgment instruction and sends a second security data domain to the security identification module.
S4, the security protection identification module analyzes whether a second trigger event occurs according to second identification data, and the second security protection data field comprises second identification data and second protection area data.
Specifically, the process of analyzing whether the second trigger event occurs according to the second identification data by the security identification module includes: the security and protection identification module obtains second state characteristic data according to the second identification data; the security identification module acquires standard state characteristic data from the database; and the security and protection identification module obtains a second state change degree according to the second state characteristic data and the standard state characteristic data, and compares the second state change degree with a second state threshold value.
Specifically, the feature extraction unit of the security identification module obtains a second state feature vector according to the second state feature data,
D=[d1,d2…dn]
the feature extraction unit obtains a standard state feature vector according to the standard state feature data,
B=[b1,b2…bn]
the state change degree calculation unit of the security identification module calculates a second state change degree according to the second state feature vector and the standard state feature vector,
where n is the number of state features, i is the state feature index, t is the second state change degree, diSecond state value of i-th state feature, biIs the standard state value of the ith state feature.
When the second state change degree is smaller than the second state threshold value, the second triggering event is generated, the security authentication module updates the first identification data according to the second identification data to obtain security authentication data, and when the second state change degree is larger than the second state threshold value, the second triggering event is not generated.
Optionally, the security identification module analyzes and judges whether at least one second security node has a second trigger event according to second identification data in the second security data domain, and when none of the second security nodes has the second trigger event, the security identification module obtains a node identifier of the second security node according to the first protection area data, and sends security warning information to the second security node according to the node identifier.
Optionally, the second trigger event is a change of an environment in a target monitoring area of the second security node. The safety warning information is used for informing a second security protection node in the protection area where the first security protection node is located to improve the safety warning degree and strengthen the monitoring degree.
And S5, when a second trigger event occurs, the security authentication module updates the first authentication data according to the second authentication data to obtain security authentication data.
Specifically, the process of updating the first identification data by the security authentication module according to the second identification data to obtain the security authentication data includes:
the security authentication module obtains a node identifier of a second security node according to the first protection area data of the first security data domain, and the security authentication module sends an update request instruction to the second security node according to the node identifier.
The second security node responds to the received updating request instruction and sends a second security data domain to the security authentication module; and the security authentication module performs data fusion processing on the second identification data in the second security data domain and the first identification data to obtain security authentication data.
Optionally, the data fusion process includes: the security authentication module adds the node identifier of the first security node to video stream data and sensor data in the first authentication data according to the first security data domain; and the security authentication module adds the node identifier of the second security node to the video stream data and the sensor data in the second authentication data according to the second security data domain.
The security authentication module performs fusion processing on the video stream data added with the node identifier of the first security node and the video stream data added with the node identifier of the second security node to obtain first metadata; and the security authentication module performs fusion processing on the sensing data added with the node identifier of the first security node and the sensing data added with the node identifier of the second security node to obtain second metadata. And the security authentication module integrates the first metadata and the second metadata to obtain security authentication data.
S6, the security authentication module obtains a protection warning level according to the security authentication data, and the protection warning level comprises: no warning, ordinary warning and serious warning. And when the protection warning level is serious warning, obtaining a security protection area list according to the first protection area data and the second protection area data.
Specifically, the process of the security authentication module obtaining the protection warning level according to the security authentication data includes: the security authentication module obtains a dimension characteristic vector X ═ X according to the security authentication data
1,x
2,…,x
n](ii) a The security authentication data acquires alarm standard data from the database, and acquires a first characteristic vector Y according to the alarm standard data
1=[y
1,y
2,…,y
n]Second feature vector Y
2=[y
1,y
2,…,y
n]And a third feature vector Y
3=[y
1,y
2,…,y
n]. Calculating a first matching degree M of the dimension feature vector and the first feature vector
1Second degree of matching M of the dimensional feature vector with the second feature vector
2Third degree of matching M of the dimensional feature vector and the third feature vector
3. Wherein
Comparison M
1,M
2,M
3The size of (2). If M is
1At minimum, the protection alert level is no alert at this time, if M
2At the minimum, the protection warning level is the ordinary warning at this moment, if M
3At a minimum, the protection alert level is now a severe alert.
Specifically, the security authentication module obtains a protection warning level according to the security authentication data, and when the protection warning level is serious warning, the step of obtaining a security protection area list according to the first protection area data includes:
the security authentication module obtains a node identifier of a first security node and a node identifier of a second security node according to the first protection area data; and the security authentication module adds the node identifier of the first security node and the node identifier of the second security node to a security protection area list.
The security protection area list is used for storing node identifiers of security protection nodes in a security protection node protection area where trigger events occur, and the node identifiers comprise a node identifier of a first security protection node where a first trigger event occurs and a node identifier of a second security protection node where a second trigger event occurs.
Optionally, when the protection warning level is a serious warning, it is indicated that the trigger event in the target monitoring area of the security node meets the alarm condition, and the security authentication module obtains a security protection area list according to the first protection area data.
Optionally, when the protection warning level is not a serious warning, the security authentication module stores the security authentication data in the database for the owner to check.
S7, the security alarm module sends the protection alarm instruction to the corresponding security node according to the security protection area list, and the security node responds to the received protection alarm instruction to execute security alarm operation.
When the current security protection node generates a trigger event, the security protection intelligent alarm platform can judge whether a second security protection node in a protection area where the security protection intelligent alarm platform is located generates the trigger event or not, so that the condition of false alarm is prevented, and safety alarm information is sent to the second security protection node which does not generate the trigger event, so that the second security protection node can improve the monitoring force on a target area after receiving the safety alarm information, and the safety is ensured.
When the current security node generates a trigger event, the security intelligent alarm platform can also judge whether a second security node in the protection area where the current security node is positioned generates the trigger event, so that the cooperative alarm among all security nodes in the protection area is realized, the alarm result is ensured to be accurate, and the security degree of the whole protection area is improved.
In addition, when a triggering event occurs, the security and protection intelligent alarm platform analyzes the protection alarm level, judges whether to alarm or not according to the protection alarm level, and automatically identifies certain unnecessary alarms so as to achieve intelligent alarm and reduce the consumption of human and material resources caused by false alarm.
In another embodiment, after the security alarm is completed, the security intelligent alarm platform updates the first state threshold and the second state threshold respectively according to the security alarm result to obtain a first updated threshold and a second updated threshold, and the first updated threshold and the second updated threshold are used as the first state threshold and the second state threshold of the next security alarm to improve the accuracy of the next security alarm.
Specifically, the recognition rate of the first trigger event is maximized, and the threshold value at this time is taken as a first update threshold value:
maxR=(Gθ-Q)s.tα∈[x1,y1]β∈[x2,y2]
wherein R is the identification rate of the first trigger event, alpha is the lower limit of the first state threshold, beta is the upper limit of the first state threshold, G is the correct identification rate of the first trigger event, theta is the identification coefficient, Q is the false alarm rate of the first trigger event, and alpha belongs to [ x ]1,y1],β∈[x2,y2]Is a boundary constraint.
The method of updating the second state threshold to obtain the second updated threshold is the same as the method described above.
In the embodiment, after the security alarm is completed each time, the security intelligent alarm platform updates the first state threshold and the second state threshold, so that the identification rate of the trigger event is improved in the next security alarm, the more the security alarm times are, the higher the accuracy rate of the security alarm is, and the situations of false alarm and alarm missing are avoided.
In another embodiment, the process of the security authentication module obtaining the protection alert level according to the security authentication data includes: the security authentication module obtains target characteristic data according to the security authentication data, and the security authentication module obtains the number of target types according to the target characteristic data and compares the number with a target type threshold value;
when the number of the target types is smaller than the target type threshold value, the security authentication module obtains the number of the target behaviors according to the target characteristic information, compares the number of the target behaviors with the target behavior threshold value, and if the number of the target behaviors is smaller than the target behavior threshold value, the protection warning level is no warning; and if the number of the target behaviors is larger than the target behavior threshold value, the protection warning level is a common warning.
When the number of the target types is larger than the target type threshold value, the security authentication module obtains the number of the target behaviors according to the target characteristic information, compares the number of the target behaviors with the target behavior threshold value, and if the number of the target behaviors is smaller than the target behavior threshold value, the protection warning level is ordinary warning; and if the number of the target behaviors is larger than the target behavior threshold value, the protection warning level is serious warning.
The security protection intelligent alarm platform analyzes the target of the target monitoring area of the security protection node, whether the target in the target monitoring area meets the alarm condition is judged according to the preset index of the monitoring demand party, when the alarm condition is met, the corresponding security protection node executes the alarm action, and the characteristic information of the target is stored under the condition that the alarm condition is not met so as to be automatically checked by an owner, so that intelligent alarm is achieved, the owner is prevented from frequently going to and between the alarm points under the condition that certain trigger events do not need to alarm, and the consumption of manpower and material resources is reduced.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.