Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intrusion detection system and method

An intrusion detection system and intruder technology, applied in instruments, electrical alarms, anti-theft alarms, etc., can solve the problems of high maintenance costs and high investment in video detection systems, and achieve strong anti-destructive ability and convenient system construction. , to ensure the effect of concealment

Active Publication Date: 2009-05-20
INST OF AUTOMATION CHINESE ACAD OF SCI
View PDF0 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, traditional analog video detection requires monitors to monitor the screen for a long time without interruption. Even the latest digital video detection system that incorporates motion detection still requires good lighting conditions and is highly dependent on the reliability of the power supply system and transmission cables. The computing speed of the video processor and the efficiency of the video processing algorithm, these factors also determine the high investment and high maintenance cost of the video detection system
[0004] At present, there is no single intrusion detection technology that can simultaneously achieve complex environments without being affected by factors such as temperature, airflow, and light, and at the same time meet the application requirements of low cost of layout, transformation, and maintenance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection system and method
  • Intrusion detection system and method
  • Intrusion detection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The intrusion detection system and method of the present invention will be further described in detail below with reference to the accompanying drawings. It should be noted that the described embodiments are only intended to facilitate the understanding of the present invention, rather than limiting it in any way.

[0049] Such as figure 1 It shows a schematic block diagram of the structure of the embodiment of the present invention, including: detection network 31, detection network 32... The detection network 3n is located in the three-dimensional space of the prevention site 3, n=1, 2, 3... . The detection network is connected to the remote monitoring center 4 through the bus 8, which is used to detect whether there is an intrusion in the coverage area of ​​the detection network and the current approximate location of the intruder; the bus 8 is used to connect the detection networks distributed in different geographical locations to the remote monitoring center 4. Re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intrusion detection system and a method thereof. The system has a plurality of detection networks arranged on a guarding site; and a bus is used to connect the detection networks to a remote monitoring center. The method comprises the following steps: a wireless sensing module is added into a network established by a wireless data module and uploads a neighbor sheet after receiving a network address distributed by the wireless data module; a network topological graph is formed at the remote monitoring center end; broadcast is transmitted and received after the work parameters of the remote monitoring center are received; the radio signal strength of the broadcasting signal is acquired and is routed and uploaded to the wireless data module; the wireless data module carries out a decision algorithm according to the information so as to determine whether the intrusion behavior brings about the abnormality of the radio signal strength; in case of abnormity, the wireless data module gives off an alarm and determines the position of an intruder through the positioning algorithm in a sensitive area; and the position of the intruder and the alarm information are sent to the remote monitoring center. The intrusion detection system can identify the intrusion behavior, give off the alarm and determine the position of the intruder without being easily affected by environmental factors, as well as has a high interference killing capability and low cost.

Description

technical field [0001] The invention belongs to the technical field of safety monitoring, and relates to an intrusion detection system, which is mainly aimed at intrusion detection applications in environments where no personnel exist for a long time under normal conditions, such as residential buildings where family members go out, shopping malls and warehouses after get off work, and public places where personnel evacuate Abnormal personnel intrusion detection and intruder location tracking. The system can also be used as an add-on to an existing wireless network or as part of an existing surveillance system. Background technique [0002] The intrusion detection system is a special electronic system that converts the intrusion information of the protected site into an electronic signal and transmits it to the outside, and assists the personnel on duty to indicate the location of the intrusion area. As the front end of the entire security system, the intrusion detection sys...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G08B13/00G08B13/22G08B25/00
Inventor 姚庆明王飞跃汤淑敏高辉张步青刘斌张楠郑晓龙
Owner INST OF AUTOMATION CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products