CN116951683A - Security monitoring method and device, intelligent household device and storage medium - Google Patents

Security monitoring method and device, intelligent household device and storage medium Download PDF

Info

Publication number
CN116951683A
CN116951683A CN202210387483.XA CN202210387483A CN116951683A CN 116951683 A CN116951683 A CN 116951683A CN 202210387483 A CN202210387483 A CN 202210387483A CN 116951683 A CN116951683 A CN 116951683A
Authority
CN
China
Prior art keywords
moving target
moving
security monitoring
monitoring method
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210387483.XA
Other languages
Chinese (zh)
Inventor
徐改霞
赵宁
孙璐璐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Haier Air Conditioner Gen Corp Ltd
Qingdao Haier Air Conditioning Electric Co Ltd
Haier Smart Home Co Ltd
Original Assignee
Qingdao Haier Air Conditioner Gen Corp Ltd
Qingdao Haier Air Conditioning Electric Co Ltd
Haier Smart Home Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Haier Air Conditioner Gen Corp Ltd, Qingdao Haier Air Conditioning Electric Co Ltd, Haier Smart Home Co Ltd filed Critical Qingdao Haier Air Conditioner Gen Corp Ltd
Priority to CN202210387483.XA priority Critical patent/CN116951683A/en
Priority to PCT/CN2023/085864 priority patent/WO2023197896A1/en
Publication of CN116951683A publication Critical patent/CN116951683A/en
Pending legal-status Critical Current

Links

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F24HEATING; RANGES; VENTILATING
    • F24FAIR-CONDITIONING; AIR-HUMIDIFICATION; VENTILATION; USE OF AIR CURRENTS FOR SCREENING
    • F24F11/00Control or safety arrangements
    • F24F11/62Control or safety arrangements characterised by the type of control or by internal processing, e.g. using fuzzy logic, adaptive control or estimation of values
    • F24F11/63Electronic processing
    • F24F11/64Electronic processing using pre-stored data
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F24HEATING; RANGES; VENTILATING
    • F24FAIR-CONDITIONING; AIR-HUMIDIFICATION; VENTILATION; USE OF AIR CURRENTS FOR SCREENING
    • F24F11/00Control or safety arrangements
    • F24F11/30Control or safety arrangements for purposes related to the operation of the system, e.g. for safety or monitoring
    • F24F11/32Responding to malfunctions or emergencies
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F24HEATING; RANGES; VENTILATING
    • F24FAIR-CONDITIONING; AIR-HUMIDIFICATION; VENTILATION; USE OF AIR CURRENTS FOR SCREENING
    • F24F11/00Control or safety arrangements
    • F24F11/50Control or safety arrangements characterised by user interfaces or communication
    • F24F11/61Control or safety arrangements characterised by user interfaces or communication using timers
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F24HEATING; RANGES; VENTILATING
    • F24FAIR-CONDITIONING; AIR-HUMIDIFICATION; VENTILATION; USE OF AIR CURRENTS FOR SCREENING
    • F24F11/00Control or safety arrangements
    • F24F11/89Arrangement or mounting of control or safety devices
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F24HEATING; RANGES; VENTILATING
    • F24FAIR-CONDITIONING; AIR-HUMIDIFICATION; VENTILATION; USE OF AIR CURRENTS FOR SCREENING
    • F24F13/00Details common to, or for air-conditioning, air-humidification, ventilation or use of air currents for screening
    • F24F13/24Means for preventing or suppressing noise
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/02Systems using reflection of radio waves, e.g. primary radar systems; Analogous systems
    • G01S13/06Systems determining position data of a target
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/02Systems using reflection of radio waves, e.g. primary radar systems; Analogous systems
    • G01S13/06Systems determining position data of a target
    • G01S13/08Systems for measuring distance only
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/886Radar or analogous systems specially adapted for specific applications for alarm systems
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S7/00Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
    • G01S7/02Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
    • G01S7/41Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00 using analysis of echo signal for target characterisation; Target signature; Target cross-section
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S7/00Details of systems according to groups G01S13/00, G01S15/00, G01S17/00
    • G01S7/02Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00
    • G01S7/41Details of systems according to groups G01S13/00, G01S15/00, G01S17/00 of systems according to group G01S13/00 using analysis of echo signal for target characterisation; Target signature; Target cross-section
    • G01S7/414Discriminating targets with respect to background clutter
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F24HEATING; RANGES; VENTILATING
    • F24FAIR-CONDITIONING; AIR-HUMIDIFICATION; VENTILATION; USE OF AIR CURRENTS FOR SCREENING
    • F24F2110/00Control inputs relating to air properties
    • F24F2110/30Velocity
    • F24F2110/32Velocity of the outside air
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F24HEATING; RANGES; VENTILATING
    • F24FAIR-CONDITIONING; AIR-HUMIDIFICATION; VENTILATION; USE OF AIR CURRENTS FOR SCREENING
    • F24F2110/00Control inputs relating to air properties
    • F24F2110/50Air quality properties
    • F24F2110/64Airborne particle content
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F24HEATING; RANGES; VENTILATING
    • F24FAIR-CONDITIONING; AIR-HUMIDIFICATION; VENTILATION; USE OF AIR CURRENTS FOR SCREENING
    • F24F2120/00Control inputs relating to users or occupants
    • F24F2120/10Occupancy
    • F24F2120/12Position of occupants
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F24HEATING; RANGES; VENTILATING
    • F24FAIR-CONDITIONING; AIR-HUMIDIFICATION; VENTILATION; USE OF AIR CURRENTS FOR SCREENING
    • F24F2120/00Control inputs relating to users or occupants
    • F24F2120/10Occupancy
    • F24F2120/14Activity of occupants
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Remote Sensing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mechanical Engineering (AREA)
  • General Engineering & Computer Science (AREA)
  • Combustion & Propulsion (AREA)
  • Chemical & Material Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Electromagnetism (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Signal Processing (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Alarm Systems (AREA)

Abstract

The invention provides a security monitoring method, security monitoring equipment, intelligent household equipment and storage media, which comprise the steps of obtaining the current position of a moving target when detecting that the behavior of the moving target is abnormal; determining a marking range to which the current position belongs; and outputting alarm information corresponding to the marking range to the user side, so that the user can know whether the important object exists in the marking range or not only according to the alarm information while knowing invasion of strangers, and the practicability of the intelligent household equipment is improved.

Description

Security monitoring method and device, intelligent household device and storage medium
Technical Field
The invention relates to the technical field of intelligent home, and particularly provides a security monitoring method, security monitoring equipment, intelligent home equipment and a storage medium.
Background
With the improvement of life quality and the rapid development of household appliance networking technology, intelligent household equipment such as air conditioners gradually enter the field of view of the public. The functional demands of people on intelligent home equipment are also increasing. Safety issues are becoming an increasingly important issue.
More and more intelligent household equipment moves through millimeter radar wave detection personnel, so that the function of carrying out remote security alarm on a user is realized through intelligent household.
However, the existing security alarm mode generally only outputs single alarm information, so that a user has less knowledge of security information of a monitored area, and the practicability of the intelligent household equipment is reduced.
Disclosure of Invention
In order to overcome the defects, the invention provides a security monitoring method, security monitoring equipment, smart home equipment and storage medium for solving or at least partially solving the technical problems that the prior security alarm mode usually only outputs single alarm information, so that a user has less knowledge of security information of a monitored area and the practicability of the smart home equipment is reduced.
In a first aspect, the present invention provides a security monitoring method, including:
when detecting that the behavior of a moving target is abnormal, acquiring the current position of the moving target;
determining a marking range to which the current position belongs; the marking ranges are user-defined ranges, and each marking range corresponds to different alarm information;
and outputting alarm information corresponding to the marking range to the user terminal.
Further, the security monitoring method further includes:
collecting data of a held object at a designated part of the moving target when the moving target is in the marking range;
constructing a holding article model according to the holding article data;
comparing the holding object model with a preset holding object model corresponding to the marking range to obtain a comparison result;
and sending the comparison result to the user side.
Further, the security monitoring method further includes:
if the comparison result shows that the comparison result is inconsistent, outputting first local alarm information through a local alarm terminal;
and if the comparison results are consistent in representation, outputting second local alarm information through the local alarm terminal.
Further, the security monitoring method further includes:
acquiring physiological state change information of the moving target when the moving target is in the marking range;
determining the acquisition result of the target object of the moving target in the marking range according to the physiological state change information;
and sending the acquisition result of the target object to the user side.
Further, in the security monitoring method, the physiological state change information includes respiratory rate change information of the moving target and/or heart rate change information of the moving target.
Further, in the security monitoring method, the condition of abnormal behavior of the moving target includes:
in a preset time period, the continuous moving time of the moving target is longer than the preset time, the moving distance of the moving target is longer than the preset distance, and the moving quantity of the moving target is in the moving process.
Further, the security monitoring method further includes:
and acquiring the continuous moving duration of the moving target, the moving distance of the moving target and the quantity of motion in the moving process of the moving target through a millimeter radar arranged on the intelligent household equipment.
In a second aspect, the present invention provides a security monitoring device comprising a processor and a storage means, the storage means being adapted to store a plurality of program codes, the program codes being adapted to be loaded and run by the processor to perform the security monitoring method of any one of the above.
In a third aspect, an intelligent home device is provided, including the security monitoring device described above.
In a fourth aspect, there is provided a computer readable storage medium having stored therein a plurality of program codes adapted to be loaded and executed by a processor to perform the security monitoring method of any of the above claims.
The technical scheme provided by the invention has at least one or more of the following beneficial effects:
in the technical scheme of the invention, when the behavior abnormality of the moving target is detected, the marking range of the current position is determined after the current position of the moving target is obtained, and the alarm information corresponding to the marking range is output to the user side, so that the user can know whether an important object exists in the marking range or not only according to the alarm information while knowing the invasion of strangers, and the practicability of the intelligent household equipment is improved.
Drawings
The present disclosure will become more readily understood with reference to the accompanying drawings. As will be readily appreciated by those skilled in the art: the drawings are for illustrative purposes only and are not intended to limit the scope of the present invention. Moreover, like numerals in the figures are used to designate like parts, wherein:
FIG. 1 is a flow chart of the main steps of a security monitoring method according to one embodiment of the present invention;
fig. 2 is a main structural block diagram of a security monitoring device according to an embodiment of the present invention.
Detailed Description
Some embodiments of the invention are described below with reference to the accompanying drawings. It should be understood by those skilled in the art that these embodiments are merely for explaining the technical principles of the present invention, and are not intended to limit the scope of the present invention.
In the description of the present invention, a "module," "processor" may include hardware, software, or a combination of both. A module may comprise hardware circuitry, various suitable sensors, communication ports, memory, or software components, such as program code, or a combination of software and hardware. The processor may be a central processor, a microprocessor, an image processor, a digital signal processor, or any other suitable processor. The processor has data and/or signal processing functions. The processor may be implemented in software, hardware, or a combination of both. Non-transitory computer readable storage media include any suitable medium that can store program code, such as magnetic disks, hard disks, optical disks, flash memory, read-only memory, random access memory, and the like. The term "a and/or B" means all possible combinations of a and B, such as a alone, B alone or a and B. The term "at least one A or B" or "at least one of A and B" has a meaning similar to "A and/or B" and may include A alone, B alone or A and B. The singular forms "a", "an" and "the" include plural referents.
Referring to fig. 1, fig. 1 is a schematic flow chart of main steps of a security monitoring method according to an embodiment of the present invention. As shown in FIG. 1, the security monitoring method in the embodiment of the invention mainly comprises the following steps 101-103.
Step 101, when detecting that the behavior of a moving target is abnormal, acquiring the current position of the moving target;
in one specific implementation, the conditions for moving object behavioral anomalies may include, but are not limited to, the following conditions:
in a preset time period, the continuous moving time of the moving target is longer than the preset time, the moving distance of the moving target is longer than the preset distance, and the moving quantity of the moving target is in the moving process.
The continuous moving duration of the moving target, the moving distance of the moving target and the quantity of motion in the moving process of the moving target can be obtained through millimeter radars arranged on intelligent household equipment.
In a specific implementation process, personnel intrusion can be detected through the millimeter wave radar board, and the distance is transmitted through a communication protocol defined by the millimeter wave radar board and a main board of the intelligent household equipment. Once the main board receives the distance detection data from the radar board, people continuously exist for 20 seconds, meanwhile, the starting position, the ending position and the distance of the people are recorded to calculate the moving track of the people, and then the movement quantity is combined to carry out multidirectional accurate security alarm. Therefore, not only is 20s continuously detected by people, but also the synchronous judgment and addition of the personnel flight path and the motion quantity are realized, the false alarm rate is reduced, and a safe living environment is provided for the user more accurately.
In one implementation, the current position of the moving target may be further acquired by a millimeter radar.
102, determining a marking range to which the current position belongs;
in a specific implementation process, a user may place different articles at different positions, and the importance degrees of the different articles may be different from those of the user, so that the user can customize a placement range (hereinafter referred to as a user-customized range) according to the importance degree of each article, and set different alarm information for different user-customized ranges, so that the alarm information carries a corresponding user-customized range.
And 103, outputting alarm information corresponding to the marking range to a user side.
In a specific implementation process, after determining the current position of the moving target, the user can output alarm information corresponding to the marking range to the user, so that the user only needs to know the current position of the moving target according to the alarm information, and whether the important object exists in the marking range or not is known.
According to the security monitoring method, when the abnormal behavior of the moving target is detected, after the current position of the moving target is obtained, the marking range of the current position is determined, and alarm information corresponding to the marking range is output to the user side, so that the user can know whether an important object exists in the marking range or not only according to the alarm information while knowing invasion of strangers, and the practicability of the intelligent household equipment is improved.
In a specific implementation process, the above embodiment enables a user to know whether an object important to the user exists at the current position of the moving object, but does not enable the user to know whether the object within the marking range is taken away, so that the following technical scheme is provided to solve the above technical problem.
The first scheme is as follows:
(1) Collecting data of a held object at a designated part of the moving target when the moving target is in the marking range;
in one specific implementation, the designated location in the moving target may be a hand, and the held object data of the hand, such as the outline of the held object, may be acquired by millimeter radar.
(2) Constructing a holding article model according to the holding article data;
in a specific implementation process, the holding object can be drawn according to the collected holding object data to obtain a holding object model.
(3) Comparing the holding object model with a preset holding object model corresponding to the marking range to obtain a comparison result;
in one implementation, the comparison may include that the holding item model is inconsistent with the preset holding item model, or that the holding item model is consistent with the preset holding item model.
(4) And sending the comparison result to the user side.
In a specific implementation process, the comparison result is sent to the user side, so that a user can know whether the objects in the marking range are taken away according to the comparison result, and the user can know the behavior of the moving target more clearly.
In a specific implementation process, if the comparison result shows that the comparison result is inconsistent, outputting first local alarm information through a local alarm terminal; and if the comparison results are consistent in representation, outputting second local alarm information through the local alarm terminal. Thus, different warning can be given to the moving target through different local warning information.
The second scheme is as follows:
(11) Acquiring physiological state change information of the moving target when the moving target is in the marking range;
in one implementation, the physiological state of the moving object prior to acquiring the item is generally different from the physiological state of the moving object when the item is acquired. The physiological state of the moving object when the moving object acquires the object is usually excited, and the respiration rate and/or the heartbeat of the moving object change at the moment, so that the respiration rate change information of the moving object and/or the heart rate change information of the moving object when the moving object is in the marked range can be acquired.
In one specific implementation procedure, the process of acquiring the respiration rate of the moving target and the heart rate of the moving target corresponding to each time may be as follows:
firstly, aiming at a moving target, selecting an FMCW radar to transmit M linear frequency modulation pulse train signals to the moving target; each pulse echo signal received by the radar comprises a human body target echo signal and clutter; after the echo signals under each pulse are subjected to declinizing treatment and sampling, discrete signals of all the pulses are formed into a sampling matrix;
then, respectively performing fast Fourier transform on each row of the sampling matrix to obtain a time-distance image Rp (m, n); each column of the time-distance image Rp is used as a distance unit, and clutter of all the distance units is eliminated by utilizing the center of a constellation diagram;
then, calculating the noise power of each distance unit, taking an average value as a judgment threshold, and detecting a target existing in each distance unit by adopting a unit average constant false alarm;
finally, doppler demodulation is carried out according to the position of the target in each distance unit, and the demodulation result is utilized to reconstruct the separated waveform of respiration and heartbeat by utilizing an improved Empirical Mode Decomposition (EMD); performing period estimation on single breath or heartbeat by using a period short-time average amplitude difference function AMDF; and finally outputting the respiratory heartbeat waveform and the real-time frequency estimation of the M pulse signals.
After the respiration rate of the moving object and the heart rate of the moving object corresponding to each time are obtained, calculation can be performed to obtain the respiration rate change information of the moving object and/or the heart rate change information of the moving object when the moving object is in the marked range,
(12) Determining the acquisition result of the target object of the moving target in the marking range according to the physiological state change information;
in a specific implementation process, if the physiological state change information is changed in a positive proportion, it can be determined that the acquisition result of the target object of the moving target in the marking range is acquired, otherwise, if the physiological state change information is changed in a negative proportion, it can be determined that the acquisition result of the target object of the moving target in the marking range is not acquired.
(13) And sending the acquisition result of the target object to the user side.
In a specific implementation process, the obtained result is sent to the user side, so that a user can know whether the object in the marking range is taken away or not according to the obtained result, and the user can know the behavior of the moving target more clearly.
It should be noted that the two schemes may be implemented independently or may be implemented in combination, and the embodiment is not limited in particular.
It should be noted that, although the foregoing embodiments describe the steps in a specific order, it will be understood by those skilled in the art that, in order to achieve the effects of the present invention, the steps are not necessarily performed in such an order, and may be performed simultaneously (in parallel) or in other orders, and these variations are within the scope of the present invention.
Further, the invention also provides a security monitoring device.
Referring to fig. 2, fig. 2 is a main structural block diagram of a security monitoring device according to an embodiment of the present invention. As shown in fig. 2, the security monitoring device according to the embodiment of the present invention may include a detection module 20, a determination module 21, and a monitoring module 22.
A detection module 20, configured to obtain a current position of a moving target when detecting that a behavior of the moving target is abnormal;
in one specific implementation, the conditions for moving object behavioral anomalies may include, but are not limited to, the following conditions:
in a preset time period, the continuous moving time of the moving target is longer than the preset time, the moving distance of the moving target is longer than the preset distance, and the moving quantity of the moving target is in the moving process.
The continuous moving duration of the moving target, the moving distance of the moving target and the quantity of motion in the moving process of the moving target can be obtained through millimeter radars arranged on intelligent household equipment.
A determining module 21, configured to determine a marker range to which the current position belongs;
in a specific implementation process, a user may place different articles at different positions, and the importance degrees of the different articles may be different from those of the user, so that the user can customize a placement range (hereinafter referred to as a user-customized range) according to the importance degree of each article, and set different alarm information for different user-customized ranges, so that the alarm information carries a corresponding user-customized range.
And the monitoring module 22 is used for outputting alarm information corresponding to the marking range to the user side.
In a specific implementation process, after determining the current position of the moving target, the user can output alarm information corresponding to the marking range to the user, so that the user only needs to know the current position of the moving target according to the alarm information, and whether the important object exists in the marking range or not is known.
According to the security monitoring device, when the behavior of the moving target is abnormal, the current position of the moving target is obtained, the marking range of the current position is determined, and the alarm information corresponding to the marking range is output to the user side, so that the user can know whether an important object exists in the marking range or not only according to the alarm information while knowing invasion of strangers, and the practicability of the intelligent household equipment is improved.
In one specific implementation, the monitoring module 22 is further configured to:
collecting data of a held object at a designated part of the moving target when the moving target is in the marking range;
constructing a holding article model according to the holding article data;
comparing the holding object model with a preset holding object model corresponding to the marking range to obtain a comparison result;
and sending the comparison result to the user side.
In one specific implementation, the monitoring module 22 is further configured to:
if the comparison result shows that the comparison result is inconsistent, outputting first local alarm information through a local alarm terminal;
and if the comparison results are consistent in representation, outputting second local alarm information through the local alarm terminal.
In one specific implementation, the monitoring module 22 is further configured to:
acquiring physiological state change information of the moving target when the moving target is in the marking range; wherein the physiological state change information comprises respiratory rate change information of a moving target and/or heart rate change information of the moving target.
Determining the acquisition result of the target object of the moving target in the marking range according to the physiological state change information;
and sending the acquisition result of the target object to the user side.
The technical principles of the two embodiments, the technical problems to be solved, and the technical effects to be produced are similar, and those skilled in the art can clearly understand that, for convenience and brevity of description, the specific working process and related description of the security monitoring device can refer to the description of the embodiments of the security monitoring method, and are not repeated herein.
It will be appreciated by those skilled in the art that the present invention may implement all or part of the above-described methods according to the above-described embodiments, or may be implemented by means of a computer program for instructing relevant hardware, where the computer program may be stored in a computer readable storage medium, and where the computer program may implement the steps of the above-described embodiments of the method when executed by a processor. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable storage medium may include: any entity or device, medium, usb disk, removable hard disk, magnetic disk, optical disk, computer memory, read-only memory, random access memory, electrical carrier wave signals, telecommunications signals, software distribution media, and the like capable of carrying the computer program code. It should be noted that the computer readable storage medium may include content that is subject to appropriate increases and decreases as required by jurisdictions and by jurisdictions in which such computer readable storage medium does not include electrical carrier signals and telecommunications signals.
Further, the invention also provides security monitoring equipment. In one embodiment of the security monitoring device according to the present invention, the security monitoring device includes a processor and a storage device, the storage device may be configured to store a program for executing the security monitoring method of the above method embodiment, and the processor may be configured to execute the program in the storage device, including but not limited to the program for executing the security monitoring method of the above method embodiment. For convenience of explanation, only those portions of the embodiments of the present invention that are relevant to the embodiments of the present invention are shown, and specific technical details are not disclosed, please refer to the method portions of the embodiments of the present invention. The security monitoring device may be a control device formed by various electronic devices.
Further, the invention also provides a computer readable storage medium. In one embodiment of the computer readable storage medium according to the present invention, the computer readable storage medium may be configured to store a program for performing the security monitoring method of the above-described method embodiment, which may be loaded and executed by a processor to implement the security monitoring method described above. For convenience of explanation, only those portions of the embodiments of the present invention that are relevant to the embodiments of the present invention are shown, and specific technical details are not disclosed, please refer to the method portions of the embodiments of the present invention. The computer readable storage medium may be a storage device including various electronic devices, and optionally, the computer readable storage medium in the embodiments of the present invention is a non-transitory computer readable storage medium.
Further, it should be understood that, since the respective modules are merely set to illustrate the functional units of the apparatus of the present invention, the physical devices corresponding to the modules may be the processor itself, or a part of software in the processor, a part of hardware, or a part of a combination of software and hardware. Accordingly, the number of individual modules in the figures is merely illustrative.
Those skilled in the art will appreciate that the various modules in the apparatus may be adaptively split or combined. Such splitting or combining of specific modules does not cause the technical solution to deviate from the principle of the present invention, and therefore, the technical solution after splitting or combining falls within the protection scope of the present invention.
Thus far, the technical solution of the present invention has been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of protection of the present invention is not limited to these specific embodiments. Equivalent modifications and substitutions for related technical features may be made by those skilled in the art without departing from the principles of the present invention, and such modifications and substitutions will fall within the scope of the present invention.

Claims (10)

1. The security monitoring method is characterized by comprising the following steps of:
when detecting that the behavior of a moving target is abnormal, acquiring the current position of the moving target;
determining a marking range to which the current position belongs; the marking ranges are user-defined ranges, and each marking range corresponds to different alarm information;
and outputting alarm information corresponding to the marking range to the user terminal.
2. The security monitoring method of claim 1, further comprising:
collecting data of a held object at a designated part of the moving target when the moving target is in the marking range;
constructing a holding article model according to the holding article data;
comparing the holding object model with a preset holding object model corresponding to the marking range to obtain a comparison result;
and sending the comparison result to the user side.
3. The security monitoring method of claim 2, further comprising:
if the comparison result shows that the comparison result is inconsistent, outputting first local alarm information through a local alarm terminal;
and if the comparison results are consistent in representation, outputting second local alarm information through the local alarm terminal.
4. The security monitoring method of claim 1, further comprising:
acquiring physiological state change information of the moving target when the moving target is in the marking range;
determining the acquisition result of the target object of the moving target in the marking range according to the physiological state change information;
and sending the acquisition result of the target object to the user side.
5. The security monitoring method according to claim 4, wherein the physiological state change information includes respiratory rate change information of a moving target and/or heart rate change information of the moving target.
6. The security monitoring method according to claim 1, wherein the condition of abnormal behavior of the moving object comprises:
in a preset time period, the continuous moving time of the moving target is longer than the preset time, the moving distance of the moving target is longer than the preset distance, and the moving quantity of the moving target is in the moving process.
7. The security monitoring method of claim 6, further comprising:
and acquiring the continuous moving duration of the moving target, the moving distance of the moving target and the quantity of motion in the moving process of the moving target through a millimeter radar arranged on the intelligent household equipment.
8. A security monitoring device comprising a processor and a storage means, the storage means being adapted to store a plurality of program code, characterised in that the program code is adapted to be loaded and run by the processor to perform the security monitoring method of any of claims 1 to 7.
9. An intelligent home device comprising the security monitoring device of claim 8.
10. A computer readable storage medium having stored therein a plurality of program codes, wherein the program codes are adapted to be loaded and executed by a processor to perform the security monitoring method of any one of claims 1 to 7.
CN202210387483.XA 2022-04-13 2022-04-13 Security monitoring method and device, intelligent household device and storage medium Pending CN116951683A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210387483.XA CN116951683A (en) 2022-04-13 2022-04-13 Security monitoring method and device, intelligent household device and storage medium
PCT/CN2023/085864 WO2023197896A1 (en) 2022-04-13 2023-04-03 Security monitoring method and device, and smart home device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210387483.XA CN116951683A (en) 2022-04-13 2022-04-13 Security monitoring method and device, intelligent household device and storage medium

Publications (1)

Publication Number Publication Date
CN116951683A true CN116951683A (en) 2023-10-27

Family

ID=88328900

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210387483.XA Pending CN116951683A (en) 2022-04-13 2022-04-13 Security monitoring method and device, intelligent household device and storage medium

Country Status (2)

Country Link
CN (1) CN116951683A (en)
WO (1) WO2023197896A1 (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101872536A (en) * 2010-06-24 2010-10-27 北京航空航天大学 System for monitoring intrusion on basis of wireless sensor network
CN104821056B (en) * 2015-04-30 2018-03-20 湖南华诺星空电子技术有限公司 Intelligent warning method based on radar and video fusion
CN106781169A (en) * 2017-03-08 2017-05-31 天津梅迪亚科技有限公司 Three-dimensional digital garden safety defense monitoring system based on virtual reality Yu internet
CN107277443B (en) * 2017-06-23 2019-12-10 深圳市盛路物联通讯技术有限公司 Large-range peripheral safety monitoring method and system
CN111275921A (en) * 2019-08-19 2020-06-12 深圳市鸿合创新信息技术有限责任公司 Behavior monitoring method and device and electronic equipment
CN110933478A (en) * 2019-12-19 2020-03-27 深圳创维-Rgb电子有限公司 Security protection system

Also Published As

Publication number Publication date
WO2023197896A1 (en) 2023-10-19

Similar Documents

Publication Publication Date Title
CN112998668B (en) Millimeter wave-based non-contact far-field multi-human-body respiration heart rate monitoring method
WO2019103620A3 (en) System, sensor and method for monitoring health related aspects of a patient
CN112998701A (en) Vital sign detection and identity recognition system and method based on millimeter wave radar
US20210267551A1 (en) Noise detection method and apparatus
US11660023B2 (en) Fall detection systems and methods
CN108401415B (en) Monitoring method and monitoring device
CN105142516A (en) Apparatus and method for determining vital sign information from a subject
CN114469076B (en) Identity-feature-fused fall identification method and system for solitary old people
CN108261176A (en) Fetal heart monitoring data processing method, device, system, storage medium and computer equipment
KR101679597B1 (en) System for managing objects and method thereof
CN109239707A (en) Behavior state detection device and method
US8949072B2 (en) Novelty detection with missing parameters
Goldfine et al. Respiratory rate monitoring in clinical environments with a contactless ultra-wideband impulse radar-based sensor system
CN106772299A (en) A kind of PD radar weak target Dynamic Programming detection methods based on distance matching
CN111657971A (en) Non-contact lie detection system and method based on micro-Doppler and visual perception fusion
CN116990773A (en) Low-speed small target detection method and device based on self-adaptive threshold and storage medium
Schroth et al. Emergency response person localization and vital sign estimation using a semi-autonomous robot mounted SFCW radar
CN116951683A (en) Security monitoring method and device, intelligent household device and storage medium
Nuti et al. Doppler radar occupancy sensor for small-range motion detection
CN116831540B (en) Millimeter wave-based non-contact vital sign monitoring method and system
RU2384860C2 (en) Method of detecting people and moving objects behind barrier and device for realising said method
CN116509382A (en) Human body activity intelligent detection method and health monitoring system based on millimeter wave radar
CN115204221B (en) Method, device and storage medium for detecting physiological parameters
CN117153168A (en) Whale echo positioning signal detection and extraction method, system, equipment and medium
CN114509749A (en) Indoor positioning detection system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination