Security alarm system and security alarm method

A security alarm and security technology, applied in the direction of alarms, closed-circuit television systems, instruments, etc., can solve the problems of inability to centrally manage equipment, security gateways cannot control the action of network cameras, etc., to improve the level of intelligent management, increase security, The effect of unified management

Inactive Publication Date: 2010-05-19
GUANGDONG TRI SUN ELECTRONICS TECH
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the existing video-based security alarm system, the local detection equipment and the network camera are electrically connected, and a point-to-point method is adopted. The security gateway and the network video server are relatively independent, and there is no linkage between the security gateway and the video collection. The security gateway cannot control the action of the network camera, and cannot centrally manage the device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security alarm system and security alarm method
  • Security alarm system and security alarm method
  • Security alarm system and security alarm method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0028] The first example of the alarm process of the security alarm system is as follows:

[0029] The local monitoring device 1 detects the monitoring objects in the defense zone, and when an abnormal signal is detected, it sends an alarm signal to the security gateway 2;

[0030] The security gateway 2 receives the alarm signal sent by the local monitoring device 1, and determines the location of the alarm according to the ID number of the detection device that sent the alarm signal, and determines the location of the alarm according to the linkage logic of the detection device and the camera device configured by the user. The alarm signal detects the camera equipment corresponding to the equipment, and sends control information to the camera equipment, triggering the camera equipment to perform video capture of the surveillance object in the defense area. Among them, the designated transmission mode in the control information is JPEG image format BMP image format and other commo...

no. 2 example

[0034] The second implementation example of the alarm process of the security alarm system is as follows:

[0035] The second embodiment is similar to the flow of the above-mentioned first embodiment. The main difference is that after receiving the alarm signal of the local monitoring device 1, the security gateway 2 selects the correlation according to the linkage relationship between the detection device and the camera device configured by the user. The camera equipment is controlled to collect video of the monitored objects in the defense area, and the collected video information is returned to the security gateway 2. The security gateway 2 saves the video information returned by the camera device, and sends the device information and video information of the local monitoring device 1 to the security service platform 4; the security service platform 4 receives the device information and video information sent by the security gateway 2 and analyzes the monitoring objects in the ...

no. 3 example

[0036] The third implementation example of the alarm process of the security alarm system is as follows:

[0037] The process for remote users to query and access the security alarm system is as follows: the user queries the local monitoring equipment 1 through the WEB, WAP (Wireless Application Protocol) and client software of the user terminal 5, and the security service platform 4 receives the user terminal 5 After passing the security confirmation, the instruction is issued to the security gateway 2. The security gateway 2 verifies the legality of the information and executes the control action on the local monitoring device 1. After the execution is completed, the security gateway 2 transmits the execution result to the security gateway The service platform 4, the security service platform 4 then transmits the execution result to the service terminal 5.

[0038] The process for remote users to control the security alarm system for video capture is as follows: the user controls...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security alarm system and a security alarm method. The security alarm system comprises local detection equipment, a security gateway, network image pickup equipment, a security service platform and a user terminal. The local detection equipment is used for detecting the monitored object in the security zone and sending the alarm signal to the security gateway when the abnormal signal is detected; the security gateway is used for controlling the network image pickup equipment to collect the video of the monitored object and sending the obtained image pickup information to the security service platform after receiving the alarm signal; and the security service platform is used for analyzing the obtained alarm information according to the obtained video information and sending the alarm information to the user terminal through the communication network. The embodiment of the invention can realize the unified management of the equipment and the services.

Description

Technical field [0001] The invention relates to the technical field of security, in particular to a video type security alarm system and method. Background technique [0002] With the gradual maturity of smart homes in smart communities, the security alarm system has become an important part of the smart home smart system. It plays a very good role in deterring crime and maintaining social stability, bringing convenience and convenience to families. Add a sense of security. [0003] At present, video technology has been more and more widely used in security alarm systems. Video-type security alarm systems mainly include: security gateways, local detection equipment, network video servers, video capture cards, network cameras, and video via the Internet. The monitoring terminal connected to the server. Among them, the security gateway is mainly for data collection and processing of the monitoring system, and has the function of network access; the local detection equipment adopts ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G08B25/00H04N7/18
Inventor 宋宝云周健辉江超谢光义
Owner GUANGDONG TRI SUN ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products