CN111862509A - Intelligent security system based on Internet of things - Google Patents

Intelligent security system based on Internet of things Download PDF

Info

Publication number
CN111862509A
CN111862509A CN202010753946.0A CN202010753946A CN111862509A CN 111862509 A CN111862509 A CN 111862509A CN 202010753946 A CN202010753946 A CN 202010753946A CN 111862509 A CN111862509 A CN 111862509A
Authority
CN
China
Prior art keywords
information
module
people
safety
dangerous
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010753946.0A
Other languages
Chinese (zh)
Inventor
武新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing College of Electronic Engineering
Original Assignee
Chongqing College of Electronic Engineering
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing College of Electronic Engineering filed Critical Chongqing College of Electronic Engineering
Priority to CN202010753946.0A priority Critical patent/CN111862509A/en
Publication of CN111862509A publication Critical patent/CN111862509A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19665Details related to the storage of video surveillance data
    • G08B13/19669Event triggers storage or change of storage policy
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines

Landscapes

  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)

Abstract

The invention relates to the technical field of Internet of things, and provides an intelligent security system based on the Internet of things, which aims to solve the problems that in the existing security system, when an illegal invasion behavior is monitored, an alarm system directly gives an alarm, and an intruder is easily disturbed to cause an injury event, wherein the intelligent security system comprises an entrance guard subsystem, a monitoring subsystem and an alarm subsystem; the monitoring subsystem comprises an acquisition module, a face recognition module and a face recognition module, wherein the acquisition module is used for acquiring real-time face images of all people indoors and obtaining real-time face information; the storage module is prestored with safety figure information; the identification module is used for identifying the collected real-time face information and the safety figure information; the marking module is used for marking safety people and dangerous people; and the operation module is used for counting the number of the safe people and the number of the dangerous people, comparing the number of the safe people with the number of the dangerous people, generating defense information when the number of the safe people is more than the number of the dangerous people, and generating avoidance information when the number of the safe people is less than or equal to the number of the dangerous people.

Description

Intelligent security system based on Internet of things
Technical Field
The invention relates to the technical field of Internet of things, in particular to an intelligent security system based on the Internet of things.
Background
With the continuous progress of science and technology, the national economy is continuously improved, and under the increasing demand of people for security protection, the high humanization and the integration of various services of intelligent security protection will be the future development direction. At present, intelligent security systems are widely used in enterprises and residential districts. The main connotations of the intelligent security technology are informatization of related contents and services, transmission and storage of images, storage and processing of data and the like. In terms of intelligent security, a complete intelligent security system mainly comprises three system parts of entrance guard, alarm and monitoring. During the use, access control system manages the personnel of going out to the threshold, and monitored control system monitors the condition of cominging in and going out, and when monitoring to have abnormal conditions, if access control system suffered illegal invasion, alarm system reported to the police.
However, because the existing alarm systems usually adopt a voice alarm mode, when an illegal intrusion occurs, the voice alarm of the alarm system not only informs the resident of the illegal intrusion, but also frightens the illegal intruder. For some illegal intruders, the intruders usually choose to escape after being discovered, thereby avoiding theft and the like and ensuring the property safety of residents. However, after the intruder is found, if there are residents in the room, the intruder may even fight with the residents in the room, and a personal injury event occurs, so that a great potential safety hazard exists.
Disclosure of Invention
The invention aims to provide an intelligent security system based on the Internet of things, and aims to solve the problems that in the existing security system, when an illegal invasion behavior is monitored, an alarm system directly gives an alarm, and an intruder is easily disturbed to cause an injury event.
The basic scheme provided by the invention is as follows: the intelligent security system based on the Internet of things comprises an entrance guard subsystem for managing the entrance and exit conditions of a door, a monitoring subsystem for monitoring the entrance and exit conditions and an alarm subsystem for alarming when the monitoring subsystem monitors that abnormal conditions occur;
wherein: the monitoring subsystem comprises an acquisition module, a face recognition module and a face recognition module, wherein the acquisition module is used for acquiring real-time face images of all people in a room and acquiring real-time face information when monitoring that an abnormal condition occurs;
the storage module is prestored with safety figure information;
the identification module is used for identifying the collected real-time face information and the safety figure information;
the marking module is used for marking the person corresponding to the real-time face information as a safety person when the real-time face information identical to the safety person information is identified, and marking the person corresponding to the real-time face information as a dangerous person when the real-time face information different from the safety person information is identified;
the operation module is used for counting the number of the safety people to obtain the number of the safety people, counting the number of the dangerous people to obtain the number of the dangerous people, comparing the number of the safety people and the number of the dangerous people, generating defense information when the number of the safety people is larger than the number of the dangerous people, and generating avoidance information when the number of the safety people is smaller than or equal to the number of the dangerous people;
the alarm subsystem comprises a communication module used for sending the generated defense information or the avoidance information to a security figure.
The basic scheme has the working principle and the beneficial effects that: compared with the existing security system, in the scheme, when the abnormal situation is monitored, the situation of indoor personnel is judged, different modes of alarming are carried out according to the judgment result, when the safety personnel is more than the dangerous personnel, the safety personnel has the advantages of the personnel number, defense can be carried out under the situation, therefore, the operation module generates defense information at the moment, when the safety personnel is less than the dangerous personnel, the safety personnel is inferior, in the situation, in order to avoid injuring accidents, the safety personnel can avoid the front conflict with the dangerous personnel, at the moment, the operation module generates the avoidance information, namely, corresponding measures can be taken pertinently according to the statistical situation of the safety personnel and the dangerous personnel, and the personal safety and the property safety of the safety personnel can be protected.
The first preferred scheme is as follows: preferably, the acquisition module is further configured to acquire location information of all persons in the room, and the communication module sends the location information to the security personnel. Has the advantages that: in this scheme, utilize collection module to acquire indoor all people's positional information after, give safe personage with positional information by communication module, the position of dangerous personage then can be known to safe personage to be convenient for defend or avoid.
The preferred scheme II is as follows: preferably, as a first preferred scheme, the alarm subsystem further comprises an alarm module, the alarm module comprises a first alarm unit installed indoors and a second alarm unit installed outdoors, the first alarm unit alarms when receiving the defense information, and the second alarm unit alarms when receiving the avoidance information. Has the advantages that: when the safety number is greater than the danger number, indoor safety figure is greater than the number of people of danger figure promptly, report to the police by setting up the first alarm unit in indoor this moment, indoor warning promptly, although indoor warning can frighten danger figure, but under the number advantage, danger figure generally will choose to flee the scene, thereby play the effect of security protection, and when the safety number is less than or equal to the danger number, under this condition, danger figure is someone number dominant, if frightened danger figure probably appears hindering the people incident, consequently report to the police by setting up at outdoor second alarm unit, outdoor warning promptly, thereby can report to the police under the condition of not frightening indoor danger figure, thereby avoid the emergence of incident, the personal safety of indoor safety figure has been guaranteed.
The preferable scheme is three: preferably, the access control subsystem includes door lock modules installed on each door in the room, and when the operation module generates the avoidance information, the door lock modules lock the corresponding room according to the position information of the dangerous person. Has the advantages that: utilize the lock module of lock in this scheme with the room locking at dangerous personage place to stranded dangerous personage in the room the inside, thereby avoid dangerous personage to contact safe personage and the wounded accident appears, guaranteed indoor safe personage's personal safety.
The preferable scheme is four: preferably, the identification module is further configured to identify a character type of a corresponding character according to the real-time face information, and the operation module does not count the corresponding safety character when the character type corresponding to the real-time face information is identified as a child or an old person. Has the advantages that: considering that old man or child's defence ability is weaker, does not possess oneself defence ability even, can not protect oneself when facing dangerous personage, consequently do not make statistics of old man and child when making statistics of safe personage in this scheme, the safe number of people who makes statistics out under this condition all is that to possess defence ability, can protect oneself when facing dangerous personage to avoid the emergence of incident.
The preferable scheme is five: preferably, the storage module further stores dangerous instrument information, the acquisition module is further used for acquiring a person image of a dangerous person and obtaining dangerous person information, the identification module further identifies the dangerous person information, when the dangerous person information is identified to contain the dangerous instrument information, reminding information is generated, and the communication module sends the reminding information to the safety person. Has the advantages that: in the scheme, when the dangerous character information is identified to contain dangerous instrument information, the dangerous character carries dangerous instruments, and the reminding information is sent to the safety character at the moment so as to remind the corresponding dangerous condition of the safety character and further guarantee the personal safety of the safety character.
The preferable scheme is six: preferably, the storage module further stores the on-flight information, the recognition module generates warning information when the recognition module recognizes that the real-time face information is consistent with the on-flight information, and the communication module sends the warning information to the security figure. Has the advantages that: in the scheme, when the real-time face information is identified to be in accordance with the information of the escapement, the warning information is sent at the moment to remind the safety character of the escapement in the room, and the safety character is prevented from being in frontal contact with the safety character, so that the personal safety of the safety character is guaranteed.
The preferable scheme is seven: preferably, in the sixth preferred embodiment, when the recognition module generates the warning information, the computation module directly generates the avoidance information and does not count up the safety person and the dangerous person. Has the advantages that: under the condition of identifying the escaped persons, in order to guarantee the personal safety of the indoor safety persons, the safety persons are prevented from contacting with dangerous persons even if the safety persons have the advantages of the number of persons, so that the calculation module directly generates the evasive information at the moment without counting the number of persons, and the power consumption of the calculation module is reduced.
The preferable scheme is eight: preferably, as a sixth preferred scheme, when the recognition module recognizes that the real-time face information conforms to the information of the escaped person, the recognition module further generates alarm information, and the communication module sends the alarm information to the property management department. Has the advantages that: in the scheme, when the identification module identifies the information of escaping, the communication module is used for giving an alarm to the property management department, and under the condition, the property management department can move professional security personnel to corresponding residents for defense, so that the personal safety of the residents is further guaranteed.
The preferable scheme is nine: preferably, the monitoring subsystem further comprises a modification module for inputting security modification information and updating the stored security figure information in real time according to the security modification information. Has the advantages that: according to the scheme, the stored safety figure information is updated in real time by using the modification module, so that the accuracy of the identification result is ensured.
Drawings
Fig. 1 is a block diagram of modules of a first embodiment of an intelligent security system based on the internet of things.
Detailed Description
The following is further detailed by way of specific embodiments:
example one
Substantially as shown in figure 1: the intelligent security system based on the Internet of things comprises an entrance guard subsystem for managing the entrance and exit conditions of a door, a monitoring subsystem for monitoring the entrance and exit conditions and an alarm subsystem for alarming when the monitoring subsystem monitors that abnormal conditions occur;
the monitoring subsystem comprises an acquisition module, a face recognition module and a face recognition module, wherein the acquisition module is used for acquiring real-time face images of all people in a room and acquiring real-time face information when monitoring that an abnormal condition occurs;
the storage module is prestored with safety figure information, dangerous apparatus information and information of escaping from the life;
the identification module is used for identifying the collected real-time face information and the safety figure information;
the marking module is used for marking the person corresponding to the real-time face information as a safety person when the real-time face information identical to the safety person information is identified, and marking the person corresponding to the real-time face information as a dangerous person when the real-time face information different from the safety person information is identified;
the operation module is used for counting the number of the safety people to obtain the number of the safety people, counting the number of the dangerous people to obtain the number of the dangerous people, comparing the number of the safety people and the number of the dangerous people, generating defense information when the number of the safety people is larger than the number of the dangerous people, and generating avoidance information when the number of the safety people is smaller than or equal to the number of the dangerous people;
the identification module is also used for identifying the figure type of the corresponding figure according to the real-time face information, and when the figure type corresponding to the real-time face information is identified to be children or old people, the operation module does not count the corresponding safety figure;
the alarm subsystem comprises a communication module used for sending the generated defense information or avoidance information to a security figure; the acquisition module is also used for acquiring the position information of all people in the room, and the communication module sends the position information to the safety figure;
the acquisition module is also used for acquiring a person image of a dangerous person and obtaining dangerous person information, the identification module is also used for identifying the dangerous person information, when the dangerous person information is identified to contain dangerous instrument information, reminding information is generated, and the communication module sends the reminding information to a safety person;
when the identification module identifies that the real-time face information is consistent with the information of the escapement, the identification module generates warning information, and the communication module sends the warning information to the safety figure; when the recognition module generates the warning information, the operation module directly generates the avoidance information and does not count safety characters and dangerous characters.
The alarm subsystem also comprises an alarm module, the alarm module comprises a first alarm unit arranged indoors and a second alarm unit arranged outdoors, the first alarm unit alarms when the first alarm unit receives defense information, and the second alarm unit alarms when the second alarm unit receives avoidance information;
the entrance guard subsystem comprises door lock modules installed on all doors in a room, and when the operation module generates the avoiding information, the door lock modules lock the corresponding room according to the position information of dangerous people.
The monitoring subsystem also comprises a modification module which is used for inputting the safety modification information and updating the stored safety figure information in real time according to the safety modification information.
The specific implementation process is as follows: when the system is used, the entrance guard subsystem manages the entrance and exit conditions of a room gate, the entrance guard subsystem in the embodiment adopts a password verification mode, and the entrance guard subsystems in other embodiments adopt a fingerprint identification or entrance guard card identification mode; since password authentication or fingerprint identification and entrance guard card identification all belong to prior art, detailed description is not given in this embodiment.
When the monitoring subsystem monitors that an abnormal condition occurs, the embodiment takes illegal intrusion as an example, at the moment, the acquisition module acquires real-time face images of all people in a room and obtains real-time face information, the identification module identifies the obtained real-time face information, if the real-time face information is identified to be the same as the stored safe face information, the corresponding people are shown to be safe people, the marking module marks the corresponding people as safe people, otherwise, if the corresponding real-time face information is not identified in the stored safe face, the corresponding people are shown to be not belong to the safe people, the corresponding people are defaulted to be dangerous people, and at the moment, the marking module marks the corresponding people as dangerous people.
And the operation module respectively counts the marked safety people and dangerous people to obtain the number of the safety people and the number of the dangerous people. The counted safe number is set as S, and the dangerous number is set as D. When the number of the safety people is larger than the number of the dangerous people, namely S is larger than D, the number of the safety people is larger than the number of the dangerous people, so that the safety people can perform self-defense at the moment, the operation module generates defense information at the moment, the communication module sends the defense information to the safety people, and the safety people can perform self-protection after receiving the defense information at the moment. And when the number of the safe persons is less than or equal to the number of the dangerous persons, namely S is less than or equal to D, in this case, the safe person group is considered to be in a disadvantage and is not suitable for being in front contact with the dangerous persons, so the operation module generates the avoidance information in this case, and the communication module sends the avoidance information to the safe persons.
The acquisition module can also acquire the position information of all indoor people, the communication module sends the position information to the safety figure, and the safety figure can judge the position of the dangerous figure through the position information, so that the protection or the avoidance can be carried out.
In order to better judge the protection capability of the safety people group, when counting the number of safety people, if the identification module identifies the people type or the old people or the children corresponding to the real-time face information, the old people or the children are considered not to have good self-protection capability, so that in this case, the counting module does not count the old people or the children when counting the number of safety people.
The acquisition module is also used for acquiring dangerous figure information of dangerous figures, and when the dangerous figure information is identified to contain dangerous instrument information, the identification module generates reminding information, wherein the reminding information is text information, specifically, the situation that an intruder holds dangerous instruments and takes caution is! ". After the communication module sends the reminding information to the safety figure, the safety figure needs to be careful after knowing whether the safety figure is defended or avoided so as to ensure personal safety of the person.
In the identification process, the identification module also identifies whether the real-time face information is consistent with the information of the escaped intruders, if so, the condition indicates that the intruders have the escaped intruders, and under the condition, the identification module directly generates warning information, and if the warning information is text information, the warning information specifically indicates that the intruders have the escaped intruders and please avoid in time. Meanwhile, the operation module does not count the number of safety figures and dangerous figures.
In the identification process, when the operation module generates defense information, the first alarm unit arranged indoors gives an alarm, and when the operation module generates avoidance information, the second alarm unit arranged outdoors gives an alarm, and meanwhile, the door lock module of the door control subsystem locks a room where dangerous people are located. If the intruder enters the secondary bedroom, the acquisition module acquires that the danger information of the dangerous figure in the room is 'the intruder sneaks into the secondary bedroom', the door lock of the secondary bedroom door in the access control subsystem is closed, the intruder is trapped in the secondary bedroom, if the intruder enters the living room or other places without the independent door, the doors of other rooms connected with the living room are closed, and if the living room is communicated with the secondary bedroom, the secondary bedroom door is closed when the intruder intrudes the living room.
Example two
The difference from the first embodiment is that in the present embodiment, when the recognition module recognizes that the real-time face information matches the information of the escapement, the recognition module further generates alarm information, and the communication module sends the alarm information to the property management department. In the scheme, when the identification module identifies the information of escaping, the communication module is used for giving an alarm to the property management department, and under the condition, the property management department can move professional security personnel to corresponding residents for defense, so that the personal safety of the residents is further guaranteed.
The foregoing is merely an example of the present invention, and common general knowledge in the field of known specific structures and characteristics is not described herein in any greater extent than that known in the art at the filing date or prior to the priority date of the application, so that those skilled in the art can now appreciate that all of the above-described techniques in this field and have the ability to apply routine experimentation before this date can be combined with one or more of the present teachings to complete and implement the present invention, and that certain typical known structures or known methods do not pose any impediments to the implementation of the present invention by those skilled in the art. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (10)

1. The intelligent security system based on the Internet of things comprises an entrance guard subsystem for managing the entrance and exit conditions of a door, a monitoring subsystem for monitoring the entrance and exit conditions and an alarm subsystem for alarming when the monitoring subsystem monitors that abnormal conditions occur;
the method is characterized in that: the monitoring subsystem comprises an acquisition module, a face recognition module and a face recognition module, wherein the acquisition module is used for acquiring real-time face images of all people in a room and acquiring real-time face information when monitoring that an abnormal condition occurs;
the storage module is prestored with safety figure information;
the identification module is used for identifying the collected real-time face information and the safety figure information;
the system comprises a marking module, a judging module and a judging module, wherein the marking module is used for marking the figure corresponding to the real-time human face information as a safety figure when the real-time human face information same as the safety figure information is identified, and marking the figure corresponding to the real-time human face information as a dangerous figure when the real-time human face information different from the safety figure information is identified;
the operation module is used for counting the safety people to obtain the number of the safety people, counting the dangerous people to obtain the number of the dangerous people, comparing the counted number of the safety people with the number of the dangerous people, generating defense information when the number of the safety people is larger than the number of the dangerous people, and generating avoidance information when the number of the safety people is smaller than or equal to the number of the dangerous people;
the alarm subsystem comprises a communication module used for sending the generated defense information or the avoidance information to a security figure.
2. The intelligent security system based on the internet of things according to claim 1, wherein: the acquisition module is further used for acquiring the position information of all indoor persons, and the communication module sends the position information to the safety person.
3. The intelligent security system based on the internet of things according to claim 1, wherein: the alarm subsystem further comprises an alarm module, the alarm module comprises a first alarm unit installed indoors and a second alarm unit installed outdoors, when the first alarm unit alarms when defense information is received, and when evasion information is received, the second alarm unit alarms.
4. The intelligent security system based on the internet of things according to claim 2, wherein: the entrance guard subsystem comprises a door lock module arranged on an indoor room door, and when the operation module generates avoidance information, the door lock module locks a corresponding room according to the position information of the dangerous people.
5. The intelligent security system based on the internet of things according to claim 1, wherein: the identification module is further used for identifying the figure type of the corresponding figure according to the real-time face information, and when the figure type corresponding to the real-time face information is identified to be a child or an old person, the operation module does not count the corresponding safety figure.
6. The intelligent security system based on the internet of things according to claim 1, wherein: the storage module is used for storing dangerous instrument information, the acquisition module is further used for acquiring the character image of the dangerous character and obtaining dangerous character information, the identification module is used for identifying the dangerous character information, reminding information is generated when the dangerous character information containing the dangerous instrument information is identified, and the communication module is used for sending the reminding information to a safety character.
7. The intelligent security system based on the internet of things according to claim 1, wherein: the storage module also stores the information of the escapement, when the identification module identifies that the real-time face information is consistent with the information of the escapement, the identification module generates warning information, and the communication module sends the warning information to a security figure.
8. The intelligent security system based on the internet of things according to claim 7, wherein: when the recognition module generates the warning information, the operation module directly generates avoidance information and does not count the safety people and the dangerous people.
9. The intelligent security system based on the internet of things according to claim 7, wherein: when the identification module identifies that the real-time face information accords with the information of the escapement, the identification module further generates alarm information, and the communication module sends the alarm information to a property management department.
10. The intelligent security system based on the internet of things according to claim 1, wherein: the monitoring subsystem also comprises a modification module which is used for inputting safety modification information and updating the stored safety figure information in real time according to the safety modification information.
CN202010753946.0A 2020-07-30 2020-07-30 Intelligent security system based on Internet of things Withdrawn CN111862509A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010753946.0A CN111862509A (en) 2020-07-30 2020-07-30 Intelligent security system based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010753946.0A CN111862509A (en) 2020-07-30 2020-07-30 Intelligent security system based on Internet of things

Publications (1)

Publication Number Publication Date
CN111862509A true CN111862509A (en) 2020-10-30

Family

ID=72946323

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010753946.0A Withdrawn CN111862509A (en) 2020-07-30 2020-07-30 Intelligent security system based on Internet of things

Country Status (1)

Country Link
CN (1) CN111862509A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114782884A (en) * 2022-03-10 2022-07-22 慧之安信息技术股份有限公司 Enhanced identification method and device based on security video monitoring
CN116778668A (en) * 2023-08-15 2023-09-19 深圳市兴通铭电子科技有限公司 Intelligent security system based on Internet of things

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114782884A (en) * 2022-03-10 2022-07-22 慧之安信息技术股份有限公司 Enhanced identification method and device based on security video monitoring
CN114782884B (en) * 2022-03-10 2023-03-24 慧之安信息技术股份有限公司 Enhanced identification method and device based on security video monitoring
CN116778668A (en) * 2023-08-15 2023-09-19 深圳市兴通铭电子科技有限公司 Intelligent security system based on Internet of things
CN116778668B (en) * 2023-08-15 2023-10-20 深圳市兴通铭电子科技有限公司 Intelligent security system based on Internet of things

Similar Documents

Publication Publication Date Title
JP4611915B2 (en) Security device and security method
CN111862509A (en) Intelligent security system based on Internet of things
CN103530967A (en) Security alarm system for residential area
KR101841882B1 (en) Unmanned Crime Prevention System and Method
CN111028473B (en) Campus safety monitoring linkage identification system
EP3834184B1 (en) Public places surveillance system
CN106652293A (en) Intelligent district online safety and protection monitoring system
CN107578600A (en) Safe campus intelligent management system
CN111986423A (en) Anti-trailing security alarm system
AU2011383787B2 (en) System and method for alerting and tracking with improved confidentiality
CN109472966A (en) A kind of security protection alarming method and security system using internet information
CN112203052A (en) Security protection monitoring platform
CN207319396U (en) A kind of intelligent security protection system
CN108320442A (en) A kind of method of community security defence detection
CN108986263A (en) A kind of household safe management method and system
CN104853169A (en) Complement and perfection for personal portable mobile monitoring and domestic service platform
CN112104978A (en) Mass data processing system based on 5G
US20090152347A1 (en) Device for securing an enclosed space by identification
CN201927139U (en) National networking anti-theft system for neighborhood security
Pretorius Armed robbery, violent assault and perceptions of personal insecurity and society as a risk
Briskman et al. Creating criminals: Australia’s response to asylum seekers and refugees
Obiekwe et al. Security measures adopted by principals in the management of safety in secondary schools in Anambra state
Dixon Jr Tech and No-Tech Security Considerations for Judges
ODAUDU Cases of Kidnapping in The Federal Capital Territory of Nigeria: Proffering Architectural and other Security Measures against their Re-occurrences
CN102426736A (en) Anti-climbing system for buildings

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20201030