CN114913651A - Intelligent anti-theft alarm method based on visual identification, anti-theft device and anti-theft door - Google Patents

Intelligent anti-theft alarm method based on visual identification, anti-theft device and anti-theft door Download PDF

Info

Publication number
CN114913651A
CN114913651A CN202210360553.2A CN202210360553A CN114913651A CN 114913651 A CN114913651 A CN 114913651A CN 202210360553 A CN202210360553 A CN 202210360553A CN 114913651 A CN114913651 A CN 114913651A
Authority
CN
China
Prior art keywords
person
preset
instruction
method based
theft
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210360553.2A
Other languages
Chinese (zh)
Inventor
吴壮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yankan Technology Shenzhen Co ltd
Original Assignee
Yankan Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yankan Technology Shenzhen Co ltd filed Critical Yankan Technology Shenzhen Co ltd
Priority to CN202210360553.2A priority Critical patent/CN114913651A/en
Publication of CN114913651A publication Critical patent/CN114913651A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B7/00Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
    • G08B7/06Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Public Health (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Environmental & Geological Engineering (AREA)
  • Emergency Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The invention provides an intelligent anti-theft alarm method based on visual identification, which comprises the following steps: judging whether personnel exist in a preset first working range or not according to the monitoring video; when a person exists in a preset first working range, judging the advancing direction of the person according to the action of the person and acquiring the face data of the person; judging whether the traveling direction is a preset first direction or not; when the advancing direction is a preset first direction, judging whether the person is a preset person according to the face data; when the person is a preset person, executing a preset first instruction, wherein the preset first instruction comprises a sound production instruction; and when the person is not the preset person, executing a preset second instruction, wherein the preset second instruction comprises a sound-emitting instruction and/or an alarm instruction. The invention also provides an anti-theft device and an anti-theft door intelligent anti-theft alarm method based on visual identification, which realize the effect of intelligent anti-theft alarm by presetting the first working range and the second working range.

Description

Intelligent anti-theft alarm method based on visual identification, anti-theft device and anti-theft door
Technical Field
The invention relates to the technical field of public security, in particular to an intelligent anti-theft alarm method based on visual identification, an anti-theft device and an anti-theft door.
Background
With the faster and faster pace of society and the continuous penetration of science and technology, people need to process more and more matters, but the corresponding safety requirements are increased day by day. Along with the increasing travel range of people, the time of family will be less and less, and thus people have higher requirements on safety protection, and the demand of family intelligent anti-theft systems will be stronger and stronger. The existing household intelligent alarm system generally records a video by detecting a moving object. This approach has many limitations: the triggering condition is wide, so that the invalid working time is long, the valid working time is shortened, and the purpose of all-weather anti-theft alarm cannot be achieved; the anti-theft target is wide, and even if a video exists, the anti-theft target is difficult to quickly and accurately find; can not send out warning in time and even implement defensive measures, thus achieving real prevention.
Therefore, how to realize intelligent theft prevention is a problem which needs to be solved urgently.
Disclosure of Invention
The invention provides an intelligent anti-theft alarm method, an anti-theft device and an anti-theft door based on visual recognition, which can realize face recognition, human body recognition, face comparison, expression recognition, posture recognition and the like, and can actively send prompt information to a user or give an alarm through a wireless system such as WIFI/5G and the like.
In a first aspect, an embodiment of the present invention provides an intelligent burglar alarm method based on visual identification, where the intelligent burglar alarm method based on visual identification includes:
judging whether personnel exist in a preset first working range or not according to the monitoring video, wherein the monitoring video is acquired by camera equipment arranged at a preset position;
when a person exists in a preset first working range, acquiring the advancing direction of the person and face data of the person according to the action of the person;
judging whether the advancing direction is a preset first direction or not;
when the advancing direction is a preset first direction, judging whether the person is a preset person according to the face data;
when the person is a preset person, executing a preset first instruction, wherein the preset first instruction comprises a sound production instruction;
and when the person is not the preset person, executing a preset second instruction, wherein the preset second instruction comprises a sound-emitting instruction and/or an alarm instruction.
In a second aspect, an embodiment of the present invention provides an anti-theft device, where the anti-theft device includes a camera, and the anti-theft device further includes:
a memory for storing program instructions;
and the processor is used for executing the program instructions to enable the anti-theft device to realize the intelligent anti-theft alarm method based on the visual identification.
In a third aspect, an embodiment of the present invention provides a security door, including: the intelligent anti-theft alarm system comprises a door and an anti-theft device arranged on the door, so that the intelligent anti-theft alarm method based on visual identification is realized by the anti-theft door.
According to the method, the customized anti-theft alarm system can be used for face recognition, face comparison, expression recognition, gesture recognition and the like, and further, the sound-light alarm system is utilized, and meanwhile prompt information can be actively sent to a user or an alarm can be given through a wireless system such as WIFI/5G.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below. It is to be understood that the drawings in the following description are merely exemplary of the invention and that other drawings may be derived from the structure shown in the drawings by those skilled in the art without the exercise of inventive faculty.
Fig. 1 is a flowchart of an intelligent burglar alarm method based on visual recognition according to a first embodiment of the present invention.
Fig. 2 is a first sub-flowchart of an intelligent burglar alarm method based on visual recognition according to a first embodiment of the present invention.
Fig. 3 is a second sub-flowchart of the intelligent burglar alarm method based on visual recognition according to the first embodiment of the present invention.
Fig. 4 is a third sub-flowchart of an intelligent burglar alarm method based on visual recognition according to a fourth embodiment of the present invention.
Fig. 5 is a fourth sub-flowchart of an intelligent burglar alarm method based on visual recognition according to a fifth embodiment of the present invention.
Fig. 6 is a schematic view of an internal structure of an anti-theft device according to a first embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims of the present application and in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the description relating to "first", "second", etc. in the present invention is for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
Please refer to fig. 1, which is a flowchart of an intelligent burglar alarm method based on visual identification according to a first embodiment of the present invention. The intelligent anti-theft alarm method based on visual identification provided by the first embodiment of the invention specifically comprises the following steps.
Step S101, judging whether personnel exist in a preset first working range or not according to the monitoring video, wherein the monitoring video is acquired by the camera equipment arranged at a preset position. In this embodiment, the face of the family member is stored in advance. The method comprises the steps of defining a virtual fence according to a preset first distance and a preset second distance, and setting related welcome voice, inquiry voice and active defense measures, such as alarm sound.
In this embodiment, the first distance is configured according to hardware capability and applicable scenarios. The first working range is set to be the maximum capacity range of the hardware capacity, and further, a user can customize the first working range according to the actual environment. For example, in the entrance door of a general building, the range of the first working range setting is relatively small, 3m to 5m, considering the public area. If the area of the first working range is relatively large in an open area such as a cell gate or a villa, the settable range of the first working range is the capacity range of the device for acquiring the surveillance video, for example, the range that the device for acquiring the surveillance video can monitor is 10 meters, and the first working range may be set to be 1 meter to 10 meters. All data in this embodiment are by way of example only and not by way of limitation.
And S102, when a person exists in a preset first working range, acquiring the advancing direction of the person and the face data of the person according to the action of the person. In this embodiment, once a person enters the virtual fence at the first working distance, the device is immediately started to acquire the traveling direction of the person and the face information of the person, so as to analyze the behavior of the person.
Step S103, determining whether the traveling direction is a preset first direction. Firstly, acquiring a traveling direction of a person, and then judging whether the traveling direction of the person is a preset first direction, wherein the preset first direction refers to an equipment direction or a doorway direction for acquiring a monitoring video.
And step S104, judging whether the person is a preset person or not according to the face data when the advancing direction is a preset first direction. And comparing the captured face data of the personnel with prestored data to judge whether the personnel is preset personnel, wherein the prestored data comprises the face data of each family member collected in advance and clothing data, accessory data and hand-held article data of some service personnel.
And step S105, when the person is a preset person, executing a preset first instruction, wherein the preset first instruction comprises a sound production instruction. In this embodiment, if the face data is successfully acquired and belongs to a preset family member, a preset voice of "welcome home" is uttered. And recording the time of the family member going home according to the user configuration. The voice set in this embodiment is merely an example, and is not limited.
In some other possible embodiments, when a person is present in the first working range, the direction of the person is determined, and if the direction of the person is not the first preset direction, the person is determined to pass by. In this embodiment, if a person appears in the first working range and the traveling direction is not the first preset direction, it is determined as a neighbor of the person, and the person just passes through the first working range, so that the person can be directly ignored.
And S106, when the person is not a preset person, executing a preset second instruction, wherein the preset second instruction comprises a sound-emitting instruction and/or an alarm instruction. In the embodiment, if the user is not a preset family member, an identification mechanism is started, the user can see whether the user is an express boy, an aunt cleaning and the like according to clothes, accessories, hand-held articles, body postures and the like of personnel, meanwhile, the user can actively send out an inquiry, a prompt for the appearance of a stranger can be sent out to the user at the moment according to user configuration, and if the user is at home, the user can sound to confirm the inquiry or remotely confirm through a mobile phone and the like. After hearing the prompt tone, if the coming person is good, the coming person stops advancing and actively responds to the prompt of the machine; if the user continues to go forward without responding, the user should be temporarily determined to be suspect and a special mark prompt is required. For example, a prompt message is sent to the user's cell phone.
In the above embodiment, through the preset first working range, the person with the adverse suspicion is preliminarily identified, and the person with the adverse suspicion is prevented through a certain warning measure and the reminding information is timely sent to the user, so that the effect of providing a safe living environment for the user is achieved.
Please refer to fig. 2 in combination when the traveling direction is the predetermined first direction, which is a flowchart of the sub-steps of step S104 according to an embodiment of the present invention. And step S104, judging whether the person is a preset person or not according to the face data, wherein the face data comprises facial feature data. Step S104 specifically includes the following steps.
Step S1041, acquiring the data of the five sense organs and the data of the ornaments.
Step S1042, determining whether the data of five sense organs belongs to a preset family member.
And step S1043, when the five sense organs data belong to the preset family members, sending welcome voice to the family members. In this embodiment, if the face data is successfully acquired and belongs to a preset family member, a preset voice of "welcome home" is uttered. And recording the time of the family member going home according to the user configuration.
And step S1044, judging whether the staff is a service staff or not according to the ornament data when the five sense organs data does not belong to the preset family members.
In step S1045, when the person is a service person, an inquiry voice is issued to the service person. In this embodiment, if the accessory data is successfully acquired and belongs to the service person, a preset voice of "ask what work you want" is uttered. And recording the response of the service personnel and the presence time of the service personnel according to the user configuration.
When the person is not a predetermined person, please refer to fig. 3 in combination, which is a flowchart illustrating the sub-steps of step S106 according to an embodiment of the present invention. Step S106, executing a preset second instruction, where the preset second instruction includes a sound-emitting instruction and/or an alarm instruction, and the method specifically includes the following steps.
And step S1061, when the person is not the preset person, sending out an inquiry voice to the person according to the sound-emitting instruction. In this embodiment, a preset voice of "ask you what work to do" is issued. The speech sound provided in this embodiment is merely an example, and is not limited.
Step S1062, judging whether to obtain the response of the personnel.
In step S1063, when the response of the person is not obtained, it is determined that the person is suspected of being bad. In the present embodiment, if the face data is not captured for 3 consecutive times and the moving direction is the first preset direction, in combination with gesture recognition such as bowing, sideways, contracted, face covering, etc., it should be tentatively determined that there is a bad suspicion and a severe warning prompt is immediately issued, and a warning is given to the user to intrude.
Step S1064, an alarm is given according to the alarm instruction.
The difference between the intelligent burglar alarm method based on visual recognition according to the second embodiment of the present invention and the intelligent burglar alarm method based on visual recognition according to the first embodiment is that after determining whether the traveling direction is the preset first direction, the intelligent burglar alarm method based on visual recognition according to the second embodiment further includes saving the surveillance video when the traveling direction is not the preset first direction.
The difference between the intelligent anti-theft alarm method based on visual recognition provided by the third embodiment of the present invention and the intelligent anti-theft alarm method based on visual recognition provided by the first embodiment is that when the response of the person is not obtained, and after it is determined that the person is in a bad suspicion, the intelligent anti-theft alarm method based on visual recognition provided by the third embodiment further includes sending a prompt message to the mobile device of the user.
Please refer to fig. 4, which is a flowchart illustrating sub-steps of an intelligent burglar alarm method based on visual identification according to a fourth embodiment of the present invention. The intelligent anti-theft alarm method based on visual recognition provided by the fourth embodiment of the invention is different from the intelligent anti-theft alarm method based on visual recognition provided by the first embodiment in that when a person exists in the preset first working range and the person is not the preset person, and after the face data of the person is not acquired, the intelligent anti-theft alarm method based on visual recognition provided by the fourth embodiment further comprises the following steps.
Step S601, determining whether face data is acquired within a preset time.
Step S602, when the face data is not acquired within the preset time, it is judged that the person is in bad suspicion. In this embodiment, when the time for acquiring the face data is longer than the preset face acquisition time, it is determined that the person intentionally avoids monitoring, so that it is determined that the person is suspect.
Step S603, sending a reminder to the mobile device of the user.
Please refer to fig. 5, which is a flowchart illustrating sub-steps of an intelligent burglar alarm method based on visual identification according to a fifth embodiment of the present invention. The intelligent anti-theft alarm method based on visual recognition provided by the fifth embodiment of the present invention is different from the intelligent anti-theft alarm method based on visual recognition provided by the first embodiment in that, when a person exists in the preset first working range and when the person is not a preset person, and after the face data of the person is not acquired, the intelligent anti-theft alarm method based on visual recognition further includes the following steps.
Step S701, when a person exists in a preset second working range and the face data of the person is not obtained, obtaining posture information of the person, where the preset second working range is smaller than the preset first working range. In this embodiment, if the target continues to move forward, enters the second working distance and does not acquire the face data of the person, the expression recognition is started, and the body posture recognition is matched.
And step S702, judging whether the person is in bad suspicion or not according to the posture information.
Step S703 is to send intrusion information to the mobile device of the user when the person is suspected of being bad. In this embodiment, when the user can not get home in time to deal with the problem, the user can also directly make an alarm call through wireless systems such as WIFI/5G. When this personnel have bad suspicion, and when the warning before the ignorance continues to make a move forward, prevent through stricter reputation warning, can give the user the suggestion simultaneously, including remote suggestion. For example, a prompt call is dialed to a mobile phone of the user through a wireless system such as WIFI/5G, so that the user can pay attention to the current situation. And recording key image data and time. If the person is judged to be suspect according to the expression and the posture and is a non-preset member, the person can emit sound and light for simulating discharge and emit warning sounds, for example, the person is self-negative after going forward and risks being hurt by defensive means. The speech sound provided in this embodiment is merely an example, and is not limited.
In some other possible embodiments, different voices are set according to different regions and scenes. For example, in an environment with a yard, a voice of "there is a bad dog, do not enter" is set. The speech sound provided in this embodiment is merely an example, and is not limited.
In the above embodiment, the first working range and the second working range are preset, so that face recognition, face comparison, expression recognition, posture recognition and the like can be realized, and further, the alarm system is utilized and the wireless system such as WIFI/5G actively sends prompt information to the user or directly alarms to realize intelligent anti-theft alarm, so that the effect of providing a safe living environment for the user is achieved.
The difference between the intelligent anti-theft alarm method based on visual recognition provided by the sixth embodiment of the present invention and the intelligent anti-theft alarm method based on visual recognition provided by the first embodiment is that after the person is in a bad suspicion and intrusion information is sent to the mobile device of the user, the intelligent anti-theft alarm method based on visual recognition provided by the sixth embodiment further includes recording image data related to the person and stay time of the person.
The invention also provides an anti-theft device 900, wherein the anti-theft device 900 at least comprises a camera 910, a memory 901 and a processor 902. The memory 901 is used for storing program instructions of the intelligent burglar alarm method based on visual recognition. Processor 902 is configured to execute program instructions to cause a computer device to implement the intelligent burglar alarm method based on visual recognition described above. Please refer to fig. 6, which is a schematic diagram of an internal structure of an anti-theft device 900 according to an embodiment of the present invention.
The memory 901 includes at least one type of computer-readable storage medium, which includes flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, and the like. Memory 901 may be an internal storage unit of anti-theft device 900 in some embodiments, such as a hard disk of anti-theft device 900. The memory 901 may also be an external storage device of the anti-theft device 900 in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital Card (SD), a Flash memory Card (Flash Card), etc. provided on the anti-theft device 900. Further, the memory 901 may also include both an internal storage unit and an external storage device of the antitheft apparatus 900. The memory 901 may be used to store not only application software installed in the anti-theft device 900 and various types of data, such as program instructions of the intelligent anti-theft alarm method based on visual recognition, etc., but also data that has been output or is to be output, such as data generated by execution of the intelligent anti-theft alarm method based on visual recognition, etc., temporarily.
Processor 902 may be, in some embodiments, a Central Processing Unit (CPU), controller, microcontroller, microprocessor or other data Processing chip that executes program instructions or processes data stored in memory 901. Specifically, processor 902 executes program instructions of the intelligent burglar alarm method based on visual recognition to control antitheft device 900 to implement the intelligent burglar alarm method based on visual recognition.
Further, the anti-theft device 900 may further include a bus 903 which may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 6, but this is not intended to represent only one bus or type of bus.
Further, the anti-theft device 900 may also include a display assembly 904. The display component 904 may be an LED (Light Emitting Diode) display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light Emitting Diode) touch panel, or the like. The display component 904 may also be referred to as a display device or display unit, as appropriate, for displaying information processed in the anti-theft device 900 and for displaying a visual user interface, among other things.
Further, the anti-theft device 900 may further include a communication component 905, and the communication component 905 may optionally include a wired communication component and/or a wireless communication component (e.g., WI-FI communication component, bluetooth communication component, etc.), which are generally used to establish a communication connection between the anti-theft device 900 and other computer devices.
While FIG. 6 illustrates only the anti-theft device 900 having components 901, 905 and 910 and programmed instructions for implementing the intelligent visual identification-based burglar alarm method, those skilled in the art will appreciate that the configuration illustrated in FIG. 6 does not constitute a limitation of the anti-theft device 900 and may include fewer or more components than illustrated, or some components in combination, or a different arrangement of components. Since the anti-theft device 900 adopts all technical solutions of all the above embodiments, at least all the beneficial effects brought by the technical solutions of the above embodiments are achieved, and no further description is given here.
The invention also provides the anti-theft door. The anti-theft door comprises a door and an anti-theft device arranged on the door, and as the anti-theft door adopts all the technical schemes of all the embodiments, the anti-theft door at least has all the beneficial effects brought by the technical schemes of the embodiments, and the details are not repeated.
It can be clearly understood by those skilled in the art that, for convenience and simplicity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the above-described method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described embodiment of the intelligent burglar alarm method based on visual recognition is merely illustrative, for example, the division of the unit is only a logical division, and the actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a computer-readable storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method of the embodiments of the present application. And the aforementioned computer-readable storage medium comprises: a U disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program instructions.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, insofar as these modifications and variations of the invention fall within the scope of the claims of the invention and their equivalents, the invention is intended to include these modifications and variations.
The above-mentioned embodiments are only examples of the present invention, which should not be construed as limiting the scope of the present invention, and therefore, the present invention is not limited by the claims.

Claims (10)

1. An intelligent anti-theft alarm method based on visual recognition is characterized in that the intelligent anti-theft alarm method based on visual recognition comprises the following steps:
judging whether personnel exist in a preset first working range or not according to a monitoring video, wherein the monitoring video is acquired by a camera device arranged at a preset position;
when the person exists in the preset first working range, acquiring the advancing direction of the person and the face data of the person according to the action of the person;
judging whether the advancing direction is a preset first direction or not;
when the advancing direction is the preset first direction, judging whether the person is a preset person according to the face data;
when the person is the preset person, executing a preset first instruction, wherein the preset first instruction comprises a sound production instruction;
and when the person is not the preset person, executing a preset second instruction, wherein the preset second instruction comprises a sound-emitting instruction and/or an alarm instruction.
2. The intelligent burglar alarm method based on visual recognition as claimed in claim 1, wherein after determining whether said traveling direction is a preset first direction, said intelligent burglar alarm method based on visual recognition further comprises:
and when the traveling direction is not the preset first direction, storing the monitoring video.
3. The intelligent anti-theft alarm method based on visual recognition according to claim 1, wherein whether the person is the preset person is judged according to the face data, the face data comprises facial feature data and ornament data, and the method specifically comprises the following steps:
acquiring the five sense organs data and the ornament data;
judging whether the data of the five sense organs belong to preset family members or not;
when the five sense organs data belong to a preset family member, a welcome voice is sent to the family member;
when the five sense organs data do not belong to preset family members, judging whether the person is a service person or not according to the ornament data;
and when the person is a service person, sending out inquiry voice to the service person.
4. The intelligent burglar alarm method based on visual identification according to claim 1, wherein when said person is not said preset person, a preset second instruction is executed, said preset second instruction includes a sounding instruction and/or an alarm instruction, specifically including:
when the person is not the preset person, sending out inquiry voice to the person according to the voice command;
judging whether the response of the personnel is acquired;
when the response of the personnel is not obtained, judging that the personnel is in bad suspicion;
and sending out an alarm according to the alarm instruction.
5. The intelligent burglar alarm method based on visual recognition according to claim 4, wherein when the response of said person is not obtained, after it is determined that said person is suspect, further comprising:
and sending the reminding information to the mobile equipment of the user.
6. The intelligent burglar alarm method based on visual recognition according to claim 1, wherein when said person is not said preset person, the face data of said person is not acquired, further comprising:
judging whether the face data is acquired within a preset time;
when the face data is not acquired within a preset time, judging that the person is in a bad suspicion;
and sending the reminding information to the mobile equipment of the user.
7. The intelligent burglar alarm method based on visual recognition according to claim 6,
when the person exists in the preset first working range, after the face data of the person is not acquired, the method further comprises the following steps:
when the personnel exist in the preset second working range and the face data of the personnel are not acquired, acquiring the posture information of the personnel, wherein the preset second working range is smaller than the preset first working range;
judging whether the personnel have bad suspicion according to the posture information;
and when the personnel is in bad suspicion, sending intrusion information to the mobile equipment of the user.
8. The intelligent burglar alarm method based on visual recognition according to claim 7, wherein when said person is in bad suspicion, sending intrusion information to a mobile device of said user, further comprising:
image data relating to the person and the stay time for the person to appear are recorded.
9. An anti-theft device, the anti-theft device includes the camera, its characterized in that, the anti-theft device still includes: a memory for storing program instructions; and
a processor for executing the program instructions to cause the anti-theft device to implement the intelligent visual identification-based anti-theft alarm method according to any one of claims 1 to 8.
10. A security door, comprising: a door and an anti-theft device according to claim 9 provided on the door.
CN202210360553.2A 2022-04-07 2022-04-07 Intelligent anti-theft alarm method based on visual identification, anti-theft device and anti-theft door Pending CN114913651A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210360553.2A CN114913651A (en) 2022-04-07 2022-04-07 Intelligent anti-theft alarm method based on visual identification, anti-theft device and anti-theft door

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210360553.2A CN114913651A (en) 2022-04-07 2022-04-07 Intelligent anti-theft alarm method based on visual identification, anti-theft device and anti-theft door

Publications (1)

Publication Number Publication Date
CN114913651A true CN114913651A (en) 2022-08-16

Family

ID=82763392

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210360553.2A Pending CN114913651A (en) 2022-04-07 2022-04-07 Intelligent anti-theft alarm method based on visual identification, anti-theft device and anti-theft door

Country Status (1)

Country Link
CN (1) CN114913651A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117856054A (en) * 2024-01-06 2024-04-09 南通星宇电气有限公司 Switch cabinet with alarm function and use method thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101440676A (en) * 2008-12-22 2009-05-27 北京中星微电子有限公司 Intelligent anti-theft door lock based on cam and warning processing method thereof
CN107958562A (en) * 2016-10-14 2018-04-24 浩思八方科技(北京)有限公司 A kind of household safe Active Defending System Against and method
CN110647797A (en) * 2019-08-05 2020-01-03 深圳市大拿科技有限公司 Visitor detection method and device
CN210804566U (en) * 2019-12-02 2020-06-19 西安工程大学 Artificial intelligence indoor anti-theft monitoring device
CN111757069A (en) * 2020-07-10 2020-10-09 广州博冠智能科技有限公司 Monitoring anti-theft method and device based on intelligent doorbell
KR20210019218A (en) * 2019-08-12 2021-02-22 엘지전자 주식회사 Smart door

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101440676A (en) * 2008-12-22 2009-05-27 北京中星微电子有限公司 Intelligent anti-theft door lock based on cam and warning processing method thereof
CN107958562A (en) * 2016-10-14 2018-04-24 浩思八方科技(北京)有限公司 A kind of household safe Active Defending System Against and method
CN110647797A (en) * 2019-08-05 2020-01-03 深圳市大拿科技有限公司 Visitor detection method and device
KR20210019218A (en) * 2019-08-12 2021-02-22 엘지전자 주식회사 Smart door
CN210804566U (en) * 2019-12-02 2020-06-19 西安工程大学 Artificial intelligence indoor anti-theft monitoring device
CN111757069A (en) * 2020-07-10 2020-10-09 广州博冠智能科技有限公司 Monitoring anti-theft method and device based on intelligent doorbell

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117856054A (en) * 2024-01-06 2024-04-09 南通星宇电气有限公司 Switch cabinet with alarm function and use method thereof

Similar Documents

Publication Publication Date Title
WO2020125406A1 (en) Safety guardianship method, apparatus, terminal and computer readable storage medium
CN108412315B (en) Intelligent door lock warning system and control method thereof
US9911294B2 (en) Warning system and method using spatio-temporal situation data
US9802789B2 (en) Elevator security system
WO2017016283A1 (en) Video monitoring method, device and system
CN103794015A (en) Smart anti-theft system
KR101467352B1 (en) location based integrated control system
JP2004516556A (en) Method and apparatus for reducing false alarms in entry and exit situations for home security surveillance
CN113284274A (en) Trailing identification method and computer readable storage medium
JP2014197330A (en) Security device, security method and program
JP4866801B2 (en) Apartment house intercom system
CN114913651A (en) Intelligent anti-theft alarm method based on visual identification, anti-theft device and anti-theft door
KR20190044867A (en) Apparatus for elderly people who lives alone
CN109785487A (en) A kind of unit building entrance guard security system based on Computer Control Technology
JP2011145839A (en) Monitoring system, device, method and program
JP5139341B2 (en) Intercom device
KR101452874B1 (en) Home security system
CN114519906A (en) Building entrance guard control method and system based on smart home
EP3109837A1 (en) System and method of smart incident analysis in control system using floor maps
JP2017215805A (en) Crime prevention system
KR101440477B1 (en) System and method for smart security
JP2000295598A (en) Remote monitor system
CN205644854U (en) Security alarm system
CN107146347A (en) A kind of anti-theft door system
JP5210828B2 (en) Building security system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination