CN114078301A - Security system, security protection method, security protection device and electronic equipment - Google Patents

Security system, security protection method, security protection device and electronic equipment Download PDF

Info

Publication number
CN114078301A
CN114078301A CN202010824959.2A CN202010824959A CN114078301A CN 114078301 A CN114078301 A CN 114078301A CN 202010824959 A CN202010824959 A CN 202010824959A CN 114078301 A CN114078301 A CN 114078301A
Authority
CN
China
Prior art keywords
target area
alarm
detection
user
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010824959.2A
Other languages
Chinese (zh)
Inventor
林坪
康清向
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Leedarson Lighting Co Ltd
Original Assignee
Leedarson Lighting Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leedarson Lighting Co Ltd filed Critical Leedarson Lighting Co Ltd
Priority to CN202010824959.2A priority Critical patent/CN114078301A/en
Publication of CN114078301A publication Critical patent/CN114078301A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The application provides a security system, a security method, a security device and an electronic device, which are applicable to the technical field of security, wherein the security system comprises: the intrusion detection equipment detects an intrusion event in a target area and sends a detection instruction to the user detection equipment after detecting the intrusion event; after receiving the detection instruction, the user detection equipment detects the user in the target area, and when detecting that an illegal user exists in the target area, the user detection equipment sends a first alarm instruction to the first lighting equipment and sends a second alarm instruction to the alarm; after receiving the first alarm instruction, the first lighting equipment irradiates light to the target area; and after receiving the second alarm instruction, the alarm plays an alarm audio to the target area. According to the embodiment of the application, the illegal portion can be identified, and the illegal portion is exposed and warned in a light and sound mode. Therefore, the method can form a more effective deterrent effect on the illegal shares and improve the property safety of the user.

Description

Security system, security protection method, security protection device and electronic equipment
Technical Field
The application belongs to the technical field of security and particularly relates to a security and protection system, a security and protection method, a security and protection device and electronic equipment.
Background
In real life, users often leave their houses for various reasons. And the illegal persons often use the time when the users are not at home to carry out illegal activities such as theft and the like, thereby causing property loss of the users.
Therefore, there is a need in the art for a security measure to prevent the property loss of the user due to illegal actions such as theft of illegal members.
Disclosure of Invention
In view of this, embodiments of the present application provide a security system, a security method, a security device, and an electronic device, which can solve the problem of low property security of a user.
A first aspect of an embodiment of the present application provides a security system, including in the security system: the system comprises intrusion detection equipment, user detection equipment, first lighting equipment and an alarm, wherein the security system is arranged in a target area;
the intrusion detection equipment detects the intrusion event of the target area;
if an intrusion event is detected, the intrusion detection equipment sends a detection instruction to the user detection equipment;
after receiving the detection instruction, the user detection equipment performs user detection on the target area;
if the user detection result indicates that an illegal user exists in the target area, the user detection equipment sends a first alarm instruction to the first lighting equipment and sends a second alarm instruction to the alarm;
after receiving the first alarm instruction, the first lighting equipment irradiates light to the target area;
and after receiving the second alarm instruction, the alarm plays an alarm audio to the target area.
A second aspect of the embodiments of the present application provides a security method, applied to an electronic device, including:
acquiring an intrusion event detection result of a target area;
if the intrusion event detection result indicates that an intrusion event exists, controlling user detection equipment to perform user detection on the target area;
and if the user detection result shows that an illegal user exists in the target area, controlling first lighting equipment to illuminate light on the target area, and controlling an alarm to play an alarm audio to the target area.
A third aspect of an embodiment of the present application provides a security device, including:
the acquisition module is used for acquiring an intrusion event detection result of the target area;
the detection module is used for controlling user detection equipment to perform user detection on the target area when the intrusion event detection result indicates that an intrusion event exists;
and the alarm module is used for controlling the first lighting equipment to irradiate light on the target area and controlling the alarm to play an alarm audio to the target area when the user detection result shows that an illegal user exists in the target area.
A fourth aspect of the embodiments of the present application provides an electronic device, where the electronic device includes a memory and a processor, where the memory stores a computer program that can be executed on the processor, and the processor implements the steps of the security method according to the second aspect when executing the computer program.
A fifth aspect of an embodiment of the present application provides a computer-readable storage medium, including: a computer program is stored, characterized in that the computer program, when being executed by a processor, carries out the steps of the security method according to the second aspect as described above.
A sixth aspect of the embodiments of the present application provides a computer program product, which, when running on an electronic device, causes the electronic device to execute the security protection method according to the second aspect.
Compared with the prior art, the embodiment of the application has the advantages that: according to the embodiment of the application, the security system can be installed in the target area to be subjected to property protection. And in the operation process of the security system, the intrusion detection equipment can detect the intrusion event of the target area. If the intrusion event is detected, user detection is carried out on the target area by using user detection equipment, and the first lighting equipment and the alarm are informed when the illegal user is detected. The first lighting device illuminates the target area so that the illegal portion is exposed to the light. The alarm can play an alarm audio to the target area so as to deter illegal copies. Therefore, the embodiment of the application can realize timely and effective identification of the illegal portioning, and can actively expose the illegal portioning in a light and sound mode and warn. Therefore, the method can form a more effective deterrent effect on the illegal shares, further prevent illegal behaviors such as theft and robbery of the method shares and the like, and improve the security of the property of the user.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic system structure diagram of a security system provided in an embodiment of the present application;
fig. 2 is a schematic flow chart illustrating an implementation process of user detection performed by a user detection device according to an embodiment of the present application;
fig. 3 is a schematic flow chart illustrating an implementation process of user detection performed by a user detection device according to an embodiment of the present application;
fig. 4 is a schematic flow chart illustrating an implementation of lighting by a first lighting device according to an embodiment of the present application;
fig. 5 is a schematic view of an implementation flow of a security method provided in the embodiment of the present application;
FIG. 6 is a schematic structural diagram of a security device according to an embodiment of the present disclosure;
fig. 7 is a schematic diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
For the sake of understanding, the embodiments of the present application will be briefly described herein:
in real life, users often leave their houses for various reasons. And the illegal persons often use the time when the users are not at home to carry out illegal activities such as theft and the like, thereby causing property loss of the users.
In order to improve the security of user property, a monitoring camera is installed outside a house in the related art to deter illegal shares. However, in practical applications, even though the monitoring camera can shoot the illegal shares, the shot contents are all used retrospectively (namely, after an event such as theft occurs, the illegal shares are determined according to the shot contents). The deterrence force to illegal shares is very limited, and the safety of the property of the user is difficult to be effectively guaranteed.
In order to improve the safety of user property, the security system can be installed in a target area to be subjected to property protection in the embodiment of the application. The security system comprises intrusion detection equipment, user detection equipment, first lighting equipment and an alarm. In the operation process of the security system, the intrusion detection equipment can detect the intrusion event of the target area, namely, whether someone invades the target area is judged. If the intrusion event is detected, user detection is carried out on the target area by using user detection equipment, and when the existence of an illegal user is detected (the illegal user is treated as an illegal part in the embodiment of the application), the first lighting equipment and the alarm are informed. The first lighting device illuminates the target area so that the illegal portion is exposed to the light. The alarm can play an alarm audio to the target area so as to deter illegal copies. Therefore, the embodiment of the application can realize timely and effective identification of the illegal portioning, and can actively expose the illegal portioning in a light and sound mode and warn. Therefore, the method can form a more effective deterrent effect on the illegal shares, further prevent illegal behaviors such as theft and robbery of the method shares and the like, and improve the security of the property of the user.
Meanwhile, some terms that may be referred to in the embodiments of the present application are described as follows:
target area: the method refers to a space region where security protection (hereinafter referred to as security protection) needs to be performed in the embodiment of the application. In particular, the type and size of the target area may be determined by a skilled person according to the actual application scenario requirements. For example, when the embodiment of the present application is applied to security precautions of a house, the target area may be a space area outside the house or a space area inside the house. Or a space area inside the house plus outside the house. For example, when the embodiment of the present invention is applied to security protection of a building such as an office building or a warehouse, the target area may be a space area outside the building or a space area inside the building. Or a space area inside the building and outside the building.
An intrusion detection device: in the embodiment of the application, a main user of the intrusion detection device detects whether a person intrudes into a target area. The embodiment of the application does not excessively limit the specific equipment types, the specific equipment numbers and the specific detection methods of the intrusion detection equipment, and can be set by technical personnel according to actual requirements. For example, a motion sensor may be used as the intrusion detection device. At this time, the moving sensor detects a moving object in the target area, and when the moving object is detected, it is determined that a person invades the target area. For example, a glass breakage sensor may be used to detect whether or not glass in the target region is broken. And if the glass is broken, judging that a person invades the target area.
And (3) intrusion event: in the embodiment of the present application, an event that an intrusion detection device detects that someone intrudes into a target area is collectively referred to as an intrusion event.
The user detection device: the method is used for carrying out user detection on the target area and judging whether illegal copies exist or not. In the embodiment of the present application, the specific device type and the detection manner of the user detection device are not limited too much, and may be set by a technician according to the actual situation. For example, the user detection may be performed by using image recognition or the like, in which case the user detection device is a device including a camera. A sensor having a human body detection function such as a pyroelectric infrared sensor may be used as the user detection device.
First and second lighting devices: in this application embodiment, the second lighting device is used for illuminating the target area to improve the detection effect of the intrusion detection device. The first lighting device is used for exposing illegal seeds to a target area in a mode of strong light, flickering or red light and the like and giving a warning. The embodiment of the application does not excessively limit the types and the number of the first lighting equipment and the second lighting equipment, and technicians can set the types and the number according to actual conditions. For example, a floodlight or a spotlight, etc. The number may be one or more. Meanwhile, in this embodiment of the application, the first lighting device and the second lighting device may be the same lighting device.
An alarm: in the embodiment of the present application, the alarm is used to sound a warning. The specific type and number of the alarm devices and the content of the sound generated are not limited herein. Can be set by technicians according to actual requirements. For example, the sound content may be a bark sound or a pre-stored warning voice. The alarm is a device capable of playing the sound content, such as a buried sound box or a loudspeaker.
In addition, the execution subject of the security protection method provided by the embodiment of the present application is described as follows:
the execution main body of the safety precaution method provided by the embodiment of the application is the electronic equipment, wherein the device type of the electronic equipment is not limited too much in the embodiment of the application, and the safety precaution method can be set by technical staff according to the actual situation. For example, the mobile terminal may be a mobile terminal such as a mobile phone, a tablet computer or wearable equipment, or the server may also be an internet of things device in a target area, for example, an intelligent gateway, a user detection device or a computer.
In order to explain the technical solution of the present application, a target area is taken as an example of the outside of a house, and the following description is given by way of specific examples.
Fig. 1 shows a schematic system structure diagram of a security system provided in an embodiment of the present application, where the security system includes an intrusion detection device, a user detection device, a first lighting device, and an alarm. In the embodiment of the application, all the devices in the security system are installed in the target area to realize the detection of the target area and the output of light and sound. According to the embodiment of the application, the specific installation position of each device in the target area is not limited too much, and the specific installation position can be set by technical personnel according to actual requirements.
The security process of the security system to the target area is detailed as follows:
s101, intrusion detection equipment detects an intrusion event of a target area and sends a detection instruction to user detection equipment when the intrusion event is detected.
In consideration of practical application, in order to realize accurate detection of the illegal portion, the detection requirement of the user detection device is generally high, and the user detection process is long (the illegal portion may not leave for a long time). Especially, when the user detection device performs detection based on images or videos, the workload of user detection is larger, and the requirements on storage and calculation of the user detection device are higher. And further, the cost of the user detection device for user detection is high. In order to reduce the requirement for user detection by the user detection device. In the embodiment of the application, the user detection device is generally in a low power consumption or standby state. And meanwhile, detecting whether a person invades by using the invasion detection equipment in the target area, and awakening the user detection equipment when the person invades is detected.
The embodiment of the application does not excessively limit the specific device types and the number of the intrusion detection devices, and can be set by technical personnel according to actual requirements. In theory, any device capable of detecting whether a person invades a target area may be used as the invasion detection device in the embodiment of the present application. For example, in some alternative embodiments, passive triggering detection devices, such as motion sensors, may be selected as the intrusion detection device. Therefore, the workload of intrusion event detection is reduced, and the equipment cost is reduced.
As an alternative embodiment of the present application, the intrusion detection device comprises at least one of a movement sensor, a glass break sensor and a door magnet.
The movement sensor is a sensor capable of detecting a moving object. Considering that an illegal object moves in a target area when entering the target area, an event that a moving object exists in the target area is regarded as an intrusion event for the movement sensor. The operation of the mobile sensor for intrusion event detection is as follows:
and detecting a moving object in the target area, and if the moving object is detected, determining that the intrusion event is detected.
The function that utilizes the motion sensor can detect moving object can arouse user detection equipment in time and detect when moving object appears in the target area. Further detection whether the moving object is an illegal part is realized. Meanwhile, the mobile sensor also has the advantages of low power consumption, low cost and the like.
The glass breakage sensor is a sensor which can detect glass breakage based on sound or vibration generated when glass is broken. In the present embodiment, the glass break sensor is mounted on or near the glass in the target area. In order to deal with illegal persons entering a house by door and window glass breaking and the like, the embodiment of the application monitors whether glass in a target area is damaged or not by using a glass breakage sensor. And would treat the glass break event as an intrusion event. The glass breaking sensor performs intrusion event detection by the following operations:
the glass breaking sensor detects glass breaking of the target area, and if glass breaking is detected, the intrusion event is judged to be detected.
The function of glass breakage can be detected by using the glass breakage sensor, and when glass is damaged in a target area, the user detection equipment can be awakened, so that whether a moving object is an illegal part or not can be further detected. Meanwhile, the glass breaking sensor is a passive triggering sensor and has the advantages of low power consumption, low cost and the like.
The door magnetism can detect whether door and window is opened. In the embodiment of the application, the door magnet is installed on the door and window in the target area. In order to deal with the situation that an illegal member enters a house in an illegal door and window opening mode, the embodiment of the application monitors whether the door and window in the target area are opened or not by using the door magnet. And the door and window open event is regarded as an intrusion event. The door sensor performs intrusion event detection by the following operations:
and the door magnet performs door and window opening detection on the target area, and if the door and window are detected to be opened, the intrusion event is determined to be detected.
In practical application, a technician can select any one or more of a sensor, a glass breaking sensor and a door sensor to realize the detection of the intrusion event. When a plurality of devices are simultaneously selected for intrusion event detection, the intrusion event can be determined to be detected as long as any one device detects the intrusion event.
After the intrusion event is detected, the intrusion detection equipment sends a detection instruction to the user detection equipment to inform the user detection equipment that a person invades the target area currently.
S102, after receiving the detection instruction, the user detection equipment detects the target area, and when the detection result of the user indicates that an illegal user exists in the target area, the user detection equipment sends a first alarm instruction to the first lighting equipment and sends a second alarm instruction to the alarm.
After receiving the detection instruction, the user detection device starts to perform user detection on the target area. Only the presence of illegal copies (i.e. illegal users) within the target area is identified. The embodiment of the application does not limit the specific device type of the user detection device and the user detection mode, and can be set by a technician according to the actual situation. For example, the device may be an outdoor camera or a visual doorbell, and the like having a camera, and in this case, the identification of the illegal copy in the target area may be implemented by using an image recognition technology.
As an alternative embodiment of the present application, the user detection device is a device having a camera. Referring to fig. 2, the operation of performing user detection on a target area in the embodiment of the present application specifically includes:
s201, acquiring an image of a target area through a camera.
And S202, carrying out face identity recognition on the image.
And S203, if the face identity recognition result is an unknown identity, judging that an illegal user exists in the target area.
In the embodiment of the application, the illegal parts are identified by utilizing an image identification technology. Specifically, the user detection device may acquire an image of the target area through the camera after receiving the detection instruction. And then, carrying out face positioning (namely finding out a face from the target area) and face identity recognition on the image. And further determining whether the users existing in the target area are illegal shares. In order to distinguish the illegal identity, the embodiment of the application presets the faces of some legal users. When the face identity is identified, if the identified face does not belong to the faces of the legal users, the face is considered as an unknown identity, namely, the face is an illegal identity. Where legitimate users may be one or more of the owners of the premises and some guests the owners are allowed to access the premises. The setting can be carried out by technicians or users according to requirements. Meanwhile, the embodiment of the application does not excessively limit the specific used face positioning and face identity recognition method, and can be set by technical personnel according to actual requirements. For example, some recognition models designed based on a neural network may be adopted, or some methods for performing face positioning based on key points may also be adopted, and face matching is performed based on the key points, so as to realize face identification.
As another alternative embodiment of the present application, it is considered that in practical applications, persons with special occupations such as couriers and takeout persons often appear outside the user's house, but they are not illegal members. Therefore, if the embodiment shown in fig. 2 is used, it is very likely that these persons will be judged as illegal parts, and thus unreasonable alarms will be given. Therefore, in order to improve the accuracy of identifying the illegal copy, the embodiment of the present application is adjusted to a certain extent on the basis of the embodiment shown in fig. 2. Referring to fig. 3, the operation of performing user detection on the target area in the embodiment of the present application specifically includes:
s301, acquiring an image of the target area through the camera.
S302, carrying out face identity recognition on the image, and carrying out article recognition on the image.
And S303, if the face identity recognition result is unknown identity and the first article is not recognized, judging that an illegal user exists in the target area.
In view of the fact that persons with special occupations, such as couriers and takeoffs, will generally have items with specific characteristics (i.e., first items). For example, couriers typically wear clothing and hats of the courier company. These garments often have certain text, graphics or color schemes. On the other hand, couriers often hold express boxes or express bags and the like when delivering express. For example, a takeaway operator will typically wear the clothing and hats of the corresponding takeaway company while holding one or more takeaway items. Therefore, the identification of the special professionals can be realized by identifying clothes and caps with specific characters, patterns or color matching and identifying whether goods such as express boxes, express bags or takeouts exist or not in theory.
In the embodiment of the present application, the part for identifying the face identity is the same as that in the embodiment shown in fig. 2, and therefore, details are not repeated, and specific reference may be made to the description of the embodiment shown in fig. 2. For the identification of the first item, a corresponding identification method can be set by a technician in advance according to the characteristics of the first item. For example, to set certain text, patterns or color schemes. And identifies the item having the text, pattern or color as the first item.
If the face identification result is unknown, but the first object is identified, it indicates that the person entering the target area is most likely to be a special professional, such as a courier, a takeout person, and the like. Therefore, the embodiment of the present application may determine that there is no illegal copy in the target area. And if the face identification result is unknown, the first article is not identified. It is indicated that the person entering the target area is not identifiable and is not a person of a particular profession, such as a courier or a take-out. At this time, it is determined that an illegal child exists in the target area.
As an alternative embodiment of the present application, it is considered that in practical applications, illegal persons often perform illegal activities in such a dark time period as night. At this time, if the embodiment shown in fig. 2 and fig. 3 is used for face recognition and article recognition, light in the target area is poor, so that the quality of the image acquired by the user detection device is often poor. Which in turn may lead to poor recognition of illegal shares. Therefore, in order to improve the image quality, in the embodiment of the present application, the security system further includes a second lighting device.
Accordingly, the intrusion detection device also sends an illumination instruction to the second lighting device after detecting the intrusion event. And the second lighting equipment illuminates the target area after receiving the illumination instruction.
By illuminating the target area in time when the intrusion of a person into the target area is detected, the embodiment shown in fig. 2 and 3 can acquire images with higher quality. And further, the recognition effect on the human face and the object is better, and the recognition effect on the illegal copy is better.
After the illegal copy is identified, the security system needs to warn about the illegal copy. The user detection device will therefore send a first alarm instruction and a second alarm instruction to the first light device and the alarm, respectively, to inform both that a light and sound warning is required.
S103, after the first light equipment receives the first alarm instruction, the first light equipment irradiates light to the target area.
And after receiving the first alarm instruction, the first light equipment irradiates light to the target area to expose the illegal portionsto the light, so that a deterrent warning effect on the illegal portionsis formed. The specific light irradiation scheme of the first light device is not limited too much in the embodiment of the application, and the specific light irradiation scheme can be set by technical personnel according to actual requirements. For example, it may be set to be strong light irradiation, flickering light irradiation, or light irradiation with a red lamp.
As an optional embodiment of the present application, the light irradiation of different strategies may be performed according to different time periods, so as to achieve a more effective deterrent warning effect. Referring to fig. 4, S103 may be replaced with:
s401, the first lighting device irradiates light with intensity larger than a first threshold value to the target area, and timing is started.
S402, after the timed first time length reaches a first time length threshold value, the first light equipment irradiates light flickering at a preset frequency to the target area.
And S403, after the timed first time length reaches a second time length threshold value, the first lighting device irradiates red lighting to the target area.
In the embodiment of the present application, the light irradiation warning is divided into three stages, which are:
the first stage is as follows: and after receiving the first alarm instruction, starting to irradiate the first time length threshold.
And a second stage: the first duration threshold to the second duration threshold.
And a third stage: after the second duration threshold.
In the first stage, the embodiment of the application irradiates strong light to the target area so as to fully expose the illegal ingredient in the target area, and thus a deterrent warning for the illegal ingredient is formed. In the embodiment of the application, a first threshold value is set, and the light with the irradiation intensity greater than the first threshold value is regarded as strong light. The specific size of the first threshold is not limited herein, and may be set by a technician according to actual needs.
After the intense light strikes a segment, if the illegal portion is not left, it is not enough to merely expose the deterrent. Therefore, the embodiment of the application adopts a mode of flash light irradiation to irradiate the target area in the second stage. The twinkling light is easy to attract the visual attention of people. Therefore, people around the target area can be attracted to the attention, so that the illegal parts are easier to be found by people, and further greater deterrence is formed for the illegal parts. The embodiment of the application does not excessively limit the preset frequency of the light flicker and the specific light intensity of the irradiation lamp during the light flicker. Can be set by technicians according to actual requirements. For example, may be set twice per second. The intensity of the lamp light may be continuously used in the first stage, or may be adjusted.
After the flash is carried out for a period of time, if the illegal portion is not left, the flash is not attracted to surrounding people to find the illegal portion, so that the deterrence of the illegal portion by continuing the flash is reduced. It is considered that red light is generally used for warning in daily life, for example, a red light of a traffic light, an emergency red light of a factory or the like in a public area. Therefore, the third stage of the embodiment of the present application uses red light for illumination. To implement a warning of illegal shares. Meanwhile, the red light is easy to attract the attention of people around the target area, so that further deterrent warning for illegal parts can be formed.
The specific values of the first duration threshold and the second duration threshold are not excessively limited in the embodiment of the application, and can be set by a technician or a user according to actual requirements. For example, a first duration threshold of 20 seconds and a second duration threshold of 50 seconds may be set, where the first phase duration is at most 20 seconds and the second phase duration is at most 30 seconds. A specific time value may be set for the duration of the third stage, and the red lamp light irradiation is stopped when the time value is reached. Or the time length value is not set specifically, and the consistency is continued until the illegal copy leaves the target area.
In the embodiment of the application, a plurality of light warning stages are arranged, and light warning of different degrees is used in sequence according to the time sequence characteristics. Therefore, effective deterrence of illegal parts is achieved, and compared with the mode that only single lamplight is used for irradiation, the lamplight deterrence effect is better.
As an alternative embodiment of the present application, the embodiment shown in fig. 4 may be combined with the embodiment of the second lighting device described above. In an embodiment of the application, the first lighting device and the second lighting device are the same lighting device. At this time, the first lighting device further includes, before the first stage: and after receiving the illumination instruction, illuminating the target area. And after receiving the first warning instruction, the system enters a first stage to irradiate the target area with strong light.
And S104, after receiving the second alarm instruction, the alarm plays an alarm audio to the target area.
When the light is irradiated, the embodiment of the application can warn illegal parts through the alarm. Specifically, the alarm will play an alarm audio to the target area after receiving the second alarm instruction. The specific content of the alarm audio is not limited herein, and can be set by a technician according to the actual requirement. For example, it may be a beep from some animal, or some audio that is pre-recorded.
As an alternative embodiment of the present application, the alert audio is a bark sound audio of the dog.
Considering that the illegal portion mostly performs illegal behaviors at night, when the illegal portion is suddenly irradiated by light, the illegal portion can be briefly dazzled visually, so that the target area is difficult to see by the illegal portion. In order to better match the effect, the embodiment of the application adopts a method of playing barking dogs (namely barking sounds of dogs) to deter illegal copies, and the illegal copies are regarded as dogs in the target area, so that the effective matching of light and sound is realized, and the deterrent effect is improved.
In the embodiment of the application, in the operation process of the security system, the intrusion detection equipment can detect the intrusion event of the target area, namely, whether someone intrudes the target area is judged. If the intrusion event is detected, user detection is carried out on the target area by using user detection equipment, and when the illegal copy is detected, the first lighting equipment and the alarm are informed. The first lighting device illuminates the target area so that the illegal portion is exposed to the light. The alarm can play an alarm audio to the target area so as to deter illegal copies. Therefore, the embodiment of the application can realize timely and effective identification of the illegal portioning, and can actively expose the illegal portioning in a light and sound mode and warn. Therefore, the method can form a more effective deterrent effect on the illegal shares, further prevent illegal behaviors such as theft and robbery of the method shares and the like, and improve the security of the property of the user.
As an alternative embodiment of the present application, it is considered that the deterrence of playing the alarm audio is reduced if the illegal person does not leave for a long time. In order to improve the deterrence of illegal parts, the method comprises the following steps:
and the user detection equipment monitors the illegal user and counts the second time length of the illegal user in the target area according to the monitoring result.
And if the second duration is greater than the third duration threshold, sending a third alarm instruction to the alarm.
And after receiving the third alarm instruction, the alarm plays an alarm voice to the target area.
In the embodiment of the present application, the user detection device may continuously monitor the illegal portion, and count the existence duration (i.e., the second duration) of the illegal portion in the target area. If the existing time is long, the alarm is informed. When the alarm knows that the illegal copy exists in a longer size, the alarm can be converted into a broadcast alarm voice. The warning voice is a pre-recorded voice of the user, such as a warning voice recorded by the user. Or real-time voice content sent by the house owner through the terminal. The specific value of the third duration threshold is not limited herein. Can be set by technicians according to actual requirements. For example, 60 seconds may be set.
As an alternative embodiment of the present application, it may be provided that the third duration threshold is greater than the sum of the first duration threshold and the second duration threshold.
As another alternative embodiment of the present application, consider that in practice an illegal part may leave the target area during the lighting process. When the illegal portion leaves the target area, the lighting and the alarm are not needed. Therefore, in the embodiment of the present application, the method further includes:
and the user detection equipment monitors the illegal user, and if the illegal user is monitored to leave the target area, an alarm stopping instruction is sent to the first lighting equipment and the alarm.
And the first lighting equipment stops lighting the target area after receiving the alarm stopping instruction.
And the alarm stops playing the alarm audio after receiving the alarm stopping instruction.
In the embodiment of the application, the user detection device can continuously monitor the illegal copies. And when the illegal portion is detected to leave the target area, the first lighting equipment and the alarm are informed in time. And the first lighting equipment and the alarm stop alarming in time after knowing that the illegal copy leaves.
When the embodiment of the application is combined with the embodiment shown in fig. 4, the illumination of the first lighting device can be stopped even when an illegal portioning unit leaves. At this time, the irradiation is stopped regardless of the stage of the first lighting device.
As another alternative embodiment of the present application, on the basis of the above embodiments, the alarm may also perform user simulation during the period when no person invades the target area, so as to play a role of guarding against illegal share. The method specifically comprises the following steps:
and the alarm plays preset audio within a preset time period before receiving the second alarm instruction.
And regarding the alarm, if the alarm does not receive the second alarm instruction, the target area is considered not to be invaded by people currently. At this time, the embodiment of the present application may play the preset audio content within the preset time period. Therefore, when the owner is not at home, the effect that people in the house are at home can be simulated. The specific condition of the preset time period is not limited herein, and can be set by a technician or a user according to actual requirements. For example, 9 to 10 am, 11 to 12 am, 2 to 3 pm, and 4 to 5 am of each day. Meanwhile, the embodiment of the application does not excessively limit the audio content of the preset audio, and technicians or users can set the audio content according to actual requirements. Such as a bark sound or a recorded human voice, etc.
Fig. 5 shows a flowchart of a security method provided in the embodiment of the present application, which is detailed as follows:
s501, an intrusion event detection result of the target area is obtained.
And S502, if the intrusion event detection result indicates that an intrusion event exists, controlling user detection equipment to perform user detection on the target area.
And S503, if the user detection result shows that an illegal user exists in the target area, controlling the first lighting device to illuminate light on the target area, and controlling the alarm to play an alarm audio to the target area.
The principle of the embodiment of the present application is substantially the same as that of the embodiment shown in fig. 1, and therefore, details of the principle and the operation of the embodiment of the present application are not described herein, and reference may be made to the description of the embodiment shown in fig. 1 and other embodiments related to fig. 1 (such as the embodiments shown in fig. 2 to fig. 4). Only the differences between the embodiments of the present application and the embodiment shown in fig. 1 will be described here.
In the embodiment shown in fig. 1, the security system is composed of devices such as an intrusion detection device, a user detection device, a first lighting device and an alarm, and linkage can be realized among the devices through data interaction. In an embodiment of the present application, in one case, the electronic device serving as the security method execution main body may be a user detection device. At this time, S501 refers to the user detection device obtaining the detection result of the intrusion detection device on the target area intrusion event. S502 indicates that the user detection device performs user detection on the target area after knowing that someone has invaded the target area. S503 is that the user detection device controls the first lighting device and the alarm to output light and sound by sending the first alarm command and the second alarm command.
Alternatively, the electronic device may be other than an intrusion detection device, a user detection device, a first light device and an alarm. And the electronic equipment can be equipment in the security system and can also be equipment outside the security system. When the electronic device is a device in the security system, the security system further comprises the electronic device, and the electronic device can be a computer or an intelligent gateway or other devices. When the electronic device is a device outside the security system, for example, the electronic device may be a mobile phone or a tablet computer, the electronic device needs to have a capability of performing remote communication with each device in the security system. Correspondingly, when the operations of S501-S504 are performed, S501 refers to the electronic device obtaining the detection result of the intrusion detection device on the target area intrusion event. S502 is that the electronic device controls the user detection device to perform user detection on the target area after knowing that a person invades the target area. S503 is that the electronic device sends the first alarm instruction and the second alarm instruction to the first lighting device and the alarm to control the first lighting device and the alarm to output light and sound when it is known that the illegal copy exists in the detection result of the user detection device.
As an alternative embodiment of the present application, when the electronic device is a user detection device, the embodiment shown in fig. 2 and the embodiment shown in fig. 3 may be applied in combination with the embodiment of the present application. The electronic device now comprises a camera. The embodiment of the present application corresponds to the embodiment shown in fig. 2 and includes:
the electronic equipment acquires the image of the target area through the camera.
And the electronic equipment identifies the face of the image.
And if the face identity recognition result is an unknown identity, the electronic equipment judges that an illegal user exists in the target area.
The embodiment of the present application corresponds to the embodiment shown in fig. 3 and includes:
the electronic equipment acquires the image of the target area through the camera.
The electronic equipment carries out face identity recognition on the image and carries out article recognition on the image.
And if the face identity recognition result is unknown identity and the first article is not recognized, the electronic equipment judges that an illegal user exists in the target area.
For details of the principle and operation, reference may be made to the embodiment shown in fig. 2 and the embodiment shown in fig. 3, which are not described herein again.
As an optional embodiment of the present application, in the embodiment of the present application, the electronic device may control the first lighting device to perform lighting specifically. The method specifically comprises the following steps:
and controlling the first lamp light equipment to irradiate the lamp light with the intensity greater than the first threshold value to the target area, and starting timing.
And after the timed first time length reaches a first time length threshold value, controlling the first light equipment to irradiate light flickering at a preset frequency to the target area.
And after the timed first time length reaches a second time length threshold value, controlling the first light equipment to irradiate red light to the target area.
The principle of the embodiment of the present application is the same as that of the embodiment shown in fig. 4, and therefore, details thereof are not repeated, and reference may be made to the embodiment shown in fig. 4. The difference is that in the embodiment of the application, the electronic device is used for controlling the first lighting device to perform lighting irradiation with different strategies in different time periods, so as to achieve a more effective deterrent warning effect.
Fig. 6 shows a block diagram of a safety protection device provided in the embodiment of the present application, which corresponds to the method in the above embodiment, and only shows the relevant parts in the embodiment of the present application for convenience of description. The security device illustrated in fig. 6 may be an execution subject of the security method provided in the first embodiment.
Referring to fig. 6, the safety precaution device includes:
the obtaining module 61 is configured to obtain an intrusion event detection result for the target area.
And the detection module 62 is configured to control the user detection device to perform user detection on the target area when the intrusion event detection result indicates that an intrusion event exists.
And an alarm module 63, configured to control the first lighting device to illuminate light to the target area and control the alarm to play an alarm audio to the target area when the user detection result indicates that an illegal user exists in the target area.
As an embodiment of the present application, the alarm module 63 includes:
the first control module is used for controlling the first light equipment to irradiate the light with the intensity larger than the first threshold value to the target area and starting timing.
And the second control module is used for controlling the first light equipment to irradiate the light flickering at the preset frequency to the target area after the timed first time reaches the first time threshold.
And the second control module is used for controlling the first light equipment to irradiate red light to the target area after the timed first time reaches a second time threshold.
The process of implementing each function by each module in the security device provided in the embodiment of the present application may specifically refer to the description of the embodiment shown in fig. 5, and is not described herein again.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance. It will also be understood that, although the terms first, second, etc. may be used herein to describe various elements in some embodiments of the application, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first table may be named a second table, and similarly, a second table may be named a first table, without departing from the scope of various described embodiments. The first table and the second table are both tables, but they are not the same table.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
The safety precaution method provided by the embodiment of the application can be applied to electronic devices such as mobile phones, tablet computers, wearable devices, vehicle-mounted devices, Augmented Reality (AR)/Virtual Reality (VR) devices, notebook computers, ultra-mobile personal computers (UMPCs), netbooks, Personal Digital Assistants (PDAs), and the like, and the embodiment of the application does not limit the specific types of the electronic devices at all.
By way of example and not limitation, when the electronic device is a wearable device, the wearable device may also be a generic term for intelligently designing daily wear, developing wearable devices, such as glasses, gloves, watches, clothing, shoes, and the like, applying wearable technology. A wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction and cloud interaction. The generalized wearable intelligent device has the advantages that the generalized wearable intelligent device is complete in function and large in size, can realize complete or partial functions without depending on a smart phone, such as a smart watch or smart glasses, and only is concentrated on a certain application function, and needs to be matched with other devices such as the smart phone for use, such as various smart bracelets for monitoring physical signs, smart jewelry and the like.
Fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 7, the electronic apparatus 7 of this embodiment includes: at least one processor 70 (only one shown in fig. 7), a memory 71, the memory 71 having stored therein a computer program 72 executable on the processor 70. The steps in the various embodiments of the security method described above, such as steps 501 to 504 shown in fig. 5, are implemented when the computer program 72 is executed by the processor 70. Alternatively, the processor 70, when executing the computer program 72, implements the functions of the various modules/units in the various device embodiments described above, such as the functions of the modules 61 to 63 shown in fig. 6.
The electronic device 7 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The electronic device may include, but is not limited to, a processor 70, a memory 71. It will be appreciated by those skilled in the art that fig. 7 is merely an example of the electronic device 7 and does not constitute a limitation of the electronic device 7 and may comprise more or less components than shown, or some components may be combined, or different components, e.g. the electronic device may further comprise an input transmitting device, a network access device, a bus, etc.
The Processor 70 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 71 may in some embodiments be an internal storage unit of the electronic device 7, such as a hard disk or a memory of the electronic device 7. The memory 71 may also be an external storage device of the electronic device 7, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the electronic device 7. Further, the memory 71 may also include both an internal storage unit and an external storage device of the electronic device 7. The memory 71 is used for storing an operating system, an application program, a BootLoader (BootLoader), data, and other programs, such as program codes of the computer program. The memory 71 may also be used to temporarily store data that has been transmitted or is to be transmitted.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps in the above-mentioned method embodiments.
The embodiments of the present application provide a computer program product, which when running on an electronic device, enables the electronic device to implement the steps in the above method embodiments when executed.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer-readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application, and are intended to be included within the scope of the present application.

Claims (13)

1. The security system is characterized in that the security system comprises: the system comprises intrusion detection equipment, user detection equipment, first lighting equipment and an alarm, wherein the security system is arranged in a target area;
the intrusion detection equipment detects the intrusion event of the target area;
if an intrusion event is detected, the intrusion detection equipment sends a detection instruction to the user detection equipment;
after receiving the detection instruction, the user detection equipment performs user detection on the target area;
if the user detection result indicates that an illegal user exists in the target area, the user detection equipment sends a first alarm instruction to the first lighting equipment and sends a second alarm instruction to the alarm;
after receiving the first alarm instruction, the first lighting equipment irradiates light to the target area;
and after receiving the second alarm instruction, the alarm plays an alarm audio to the target area.
2. The security system of claim 1, wherein the intrusion detection device comprises at least one of a motion sensor, a glass break sensor, and a door sensor;
correspondingly, the intrusion detection device performs intrusion event detection on the target area, and includes at least one of the following detection operations:
the mobile sensor detects a mobile object in the target area, and if the mobile object is detected, the mobile sensor determines that an intrusion event is detected;
the glass breaking sensor is used for carrying out glass breaking detection on the target area, and if glass breaking is detected, the intrusion event is judged to be detected;
and the door magnet detects the opening of the door and the window of the target area, and if the door and the window are detected to be opened, the intrusion event is determined to be detected.
3. The security system of claim 1, wherein the user detection device comprises a camera, and the user detection device performs user detection on the target area, comprising:
the user detection equipment acquires an image of the target area through the camera;
the user detection equipment carries out face identity recognition on the image and carries out article recognition on the image;
and if the face identity recognition result is an unknown identity and the first article which is not recognized by the article recognition is detected, the user detection equipment judges that an illegal user exists in the target area.
4. The security system of claim 3, further comprising: a second lighting device; after the intrusion detection device detects the intrusion event of the target area, the intrusion detection device further includes:
if an intrusion event is detected, the intrusion detection equipment sends an illumination instruction to the second lighting equipment;
and the second lighting equipment illuminates the target area after receiving the illumination instruction.
5. The security system of claim 1, wherein the first lighting device illuminates the target area, comprising:
the first lighting equipment irradiates light with intensity larger than a first threshold value to the target area and starts timing;
after the timed first time length reaches a first time length threshold value, the first lighting equipment irradiates light flickering at a preset frequency to the target area;
and after the timed first duration reaches a second duration threshold, the first lighting equipment irradiates red light to the target area.
6. The security system of claim 1, wherein the user detection device, after sending the first alert instruction to the first light device, further comprises:
the user detection equipment monitors the illegal user and counts a second time length of the illegal user in the target area according to a monitoring result;
if the second duration is greater than a third duration threshold, sending a third alarm instruction to the alarm;
and after receiving the third alarm instruction, the alarm plays an alarm voice to the target area.
7. The security system of claim 1, wherein the alarm audio is a bark sound audio of the dog.
8. The security system of claim 1, further comprising:
and the alarm plays preset audio within a preset time period before receiving the second alarm instruction.
9. A safety precaution method is applied to electronic equipment and comprises the following steps:
acquiring an intrusion event detection result of a target area;
if the intrusion event detection result indicates that an intrusion event exists, controlling user detection equipment to perform user detection on the target area;
and if the user detection result shows that an illegal user exists in the target area, controlling first lighting equipment to illuminate light on the target area, and controlling an alarm to play an alarm audio to the target area.
10. The safety precaution method of claim 9, wherein said controlling a first lighting device to illuminate said target area comprises:
controlling the first lighting equipment to irradiate light with intensity larger than a first threshold value to the target area, and starting timing;
after the timed first time length reaches a first time length threshold value, controlling the first lighting equipment to irradiate light flickering at a preset frequency to the target area;
and after the timed first duration reaches a second duration threshold, controlling the first lighting equipment to irradiate red light to the target area.
11. A security device, comprising:
the acquisition module is used for acquiring an intrusion event detection result of the target area;
the detection module is used for controlling user detection equipment to perform user detection on the target area when the intrusion event detection result indicates that an intrusion event exists;
and the alarm module is used for controlling the first lighting equipment to irradiate light on the target area and controlling the alarm to play an alarm audio to the target area when the user detection result shows that an illegal user exists in the target area.
12. An electronic device, characterized in that the electronic device comprises a memory, a processor, a computer program being stored on the memory and being executable on the processor, the processor implementing the steps of the method according to claim 9 or 10 when executing the computer program.
13. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to claim 9 or 10.
CN202010824959.2A 2020-08-17 2020-08-17 Security system, security protection method, security protection device and electronic equipment Pending CN114078301A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010824959.2A CN114078301A (en) 2020-08-17 2020-08-17 Security system, security protection method, security protection device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010824959.2A CN114078301A (en) 2020-08-17 2020-08-17 Security system, security protection method, security protection device and electronic equipment

Publications (1)

Publication Number Publication Date
CN114078301A true CN114078301A (en) 2022-02-22

Family

ID=80281052

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010824959.2A Pending CN114078301A (en) 2020-08-17 2020-08-17 Security system, security protection method, security protection device and electronic equipment

Country Status (1)

Country Link
CN (1) CN114078301A (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103198595A (en) * 2013-03-11 2013-07-10 成都百威讯科技有限责任公司 Intelligent door and window anti-invasion system
CN105279873A (en) * 2015-09-29 2016-01-27 小米科技有限责任公司 Prompt method and device
CN106054739A (en) * 2016-07-15 2016-10-26 横店集团得邦照明股份有限公司 Intelligent control system with lighting and security combined and realization method thereof
CN107393246A (en) * 2017-08-12 2017-11-24 宋彦震 Internet of things intelligent household monitoring system
US20180174413A1 (en) * 2016-10-26 2018-06-21 Ring Inc. Customizable intrusion zones associated with security systems
CN108665591A (en) * 2018-05-08 2018-10-16 温仕鑫 The public security burglary-resisting system of identity-based identification
CN108806155A (en) * 2018-06-29 2018-11-13 仁怀市云侠网络科技有限公司 Security-protecting and monitoring method based on Internet of Things
CN108806137A (en) * 2018-06-14 2018-11-13 北京奇虎科技有限公司 A kind of control method and device of intelligent doorbell, intelligent doorbell
CN110290353A (en) * 2019-06-28 2019-09-27 Oppo广东移动通信有限公司 Monitoring method and device, electronic equipment and storage medium
CN110335381A (en) * 2019-06-18 2019-10-15 广东汇泰龙科技股份有限公司 The method of user is reminded based on colour change function and using its cloud lock system
CN111105577A (en) * 2020-01-08 2020-05-05 厦门盈趣科技股份有限公司 Scene simulation anti-theft system and device thereof
CN111127836A (en) * 2020-02-14 2020-05-08 深圳市美舜科技有限公司 Traffic safety early warning monitoring alarm device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103198595A (en) * 2013-03-11 2013-07-10 成都百威讯科技有限责任公司 Intelligent door and window anti-invasion system
CN105279873A (en) * 2015-09-29 2016-01-27 小米科技有限责任公司 Prompt method and device
CN106054739A (en) * 2016-07-15 2016-10-26 横店集团得邦照明股份有限公司 Intelligent control system with lighting and security combined and realization method thereof
US20180174413A1 (en) * 2016-10-26 2018-06-21 Ring Inc. Customizable intrusion zones associated with security systems
CN107393246A (en) * 2017-08-12 2017-11-24 宋彦震 Internet of things intelligent household monitoring system
CN108665591A (en) * 2018-05-08 2018-10-16 温仕鑫 The public security burglary-resisting system of identity-based identification
CN108806137A (en) * 2018-06-14 2018-11-13 北京奇虎科技有限公司 A kind of control method and device of intelligent doorbell, intelligent doorbell
CN108806155A (en) * 2018-06-29 2018-11-13 仁怀市云侠网络科技有限公司 Security-protecting and monitoring method based on Internet of Things
CN110335381A (en) * 2019-06-18 2019-10-15 广东汇泰龙科技股份有限公司 The method of user is reminded based on colour change function and using its cloud lock system
CN110290353A (en) * 2019-06-28 2019-09-27 Oppo广东移动通信有限公司 Monitoring method and device, electronic equipment and storage medium
CN111105577A (en) * 2020-01-08 2020-05-05 厦门盈趣科技股份有限公司 Scene simulation anti-theft system and device thereof
CN111127836A (en) * 2020-02-14 2020-05-08 深圳市美舜科技有限公司 Traffic safety early warning monitoring alarm device

Similar Documents

Publication Publication Date Title
US11196907B1 (en) Automatic greetings by outdoor IP security cameras
US9685071B1 (en) eReceptionist and eNeighborhood watch system for crime prevention and/or verification
US10936655B2 (en) Security video searching systems and associated methods
Tanwar et al. An advanced internet of thing based security alert system for smart home
US10986717B1 (en) Reduced false alarms for outdoor IP security cameras
US11196966B2 (en) Identifying and locating objects by associating video data of the objects with signals identifying wireless devices belonging to the objects
US10555393B1 (en) Face recognition systems with external stimulus
US9728077B1 (en) eReceptionist and eNeighborhood watch system for crime prevention and/or verification
US20180247504A1 (en) Identification of suspicious persons using audio/video recording and communication devices
US11341825B1 (en) Implementing deterrent protocols in response to detected security events
US10212778B1 (en) Face recognition systems with external stimulus
US9277121B2 (en) Integrating a 360 degree panoramic camera within a fire pull station
US10713928B1 (en) Arming security systems based on communications among a network of security systems
US10957174B2 (en) Communication-linked floodlight controllers with audio/video recording and communication features
US11062145B2 (en) Camera device for the exterior region of a building
US11678011B1 (en) Mobile distributed security response
US10887562B2 (en) Camera device for the exterior region of a building
US11523485B1 (en) Reduced false alarms for outdoor IP security cameras
US10609342B1 (en) Multi-channel sensing system with embedded processing
Arifin et al. Automation security system with laser lights alarm on web pages and mobile apps
RU78742U1 (en) COMPLEX OF MONITORING AND SECURITY DEVICES
CN114078301A (en) Security system, security protection method, security protection device and electronic equipment
CN111723598A (en) Machine vision system and implementation method thereof
CN115718445A (en) Intelligent Internet of things management system suitable for museum
CN115457717A (en) Optical cable perimeter security alarm system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination