Wide-range perimeter security monitoring method and system

A security monitoring system and security monitoring technology, applied in the field of the Internet of Things, can solve problems such as waste of manpower, unrealistic security monitoring system, and low efficiency

Active Publication Date: 2017-10-20
SHENZHEN SHENGLU IOT COMM TECH CO LTD
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If a large-scale security monitoring system, such as a security monitoring system applied on the border, is still monitored and controlled through the above-mentioned system and method, numerous active devices will greatly increase the construction cost and operation and maintenance cost of the system, especially considering China has a vast territory, and it is not realistic to deploy a traditional security monitoring system on such a long borderline
In addition, there are also problems of wasting manpower and inefficiency through manual on-duty

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wide-range perimeter security monitoring method and system
  • Wide-range perimeter security monitoring method and system
  • Wide-range perimeter security monitoring method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In the following description, for purposes of illustration rather than limitation, specific details such as specific system architectures, interfaces, and techniques are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

[0041] Such as figure 1 as shown, figure 1 It is a structure diagram of a large-scale peripheral security monitoring system of the present invention. A wide-area perimeter security monitoring system including:

[0042] The monitoring sensing belt 3 is used to collect perturbation data at the boundary of the monitored area;

[0043] Monitoring center 1 for data processing and control;

[0044]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a wide-range perimeter security monitoring method and system. The method comprises the following steps: creating an intrusion feature library; acquiring perturbation data at the boundary of a monitored area; quantifying the perturbation data and obtaining a quantized amplitude, comparing the quantized amplitude with an intrusion data feature, and determining whether the monitored area is intruded and determining a corresponding intrusion event type; analyzing intrusion information of an intruder according to the perturbation data; and determining a processing scheme according to the intrusion event type and the intrusion information. The system comprises a monitoring induction band and a monitoring center; and the monitoring center comprises an intrusion feature library creation module, a quantification analysis module, an intrusion information analysis module and a scheme determination module. The perturbation data are acquired and processed through the above method and system, then whether the monitored area is invaded, the invasion event type and the intrusion information can be determined, so that the security of the monitored area can be ensured, thus the wide-range perimeter security monitoring method and the system provided by the invention have the advantages of being high in accuracy, good in monitoring effect and low in operation and maintenance cost and so on, and are especially suitable for wide-range security monitoring of border lines, etc..

Description

technical field [0001] The invention relates to the field of the Internet of Things, in particular to a large-scale peripheral security monitoring method and system. Background technique [0002] Safety is a major concern of the whole society, involving people's life and property safety. The development and progress of the security industry not only depends on the development and progress of science and technology, but also provides and creates a good social environment for the progress and development of science and technology. [0003] From the perspective of application scenarios, security monitoring systems can be divided into small-scale systems and large-scale systems. Small-scale security monitoring systems, such as security systems in residential areas, private areas, and public places, are mainly based on video collection and infrared intrusion alarms and other front-end equipment to collect data and send out alarm messages. Monitoring and control are easier to imp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/18H04L29/08G08B13/196
CPCG08B13/19615H04L67/12H04N7/18
Inventor 杜光东
Owner SHENZHEN SHENGLU IOT COMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products