Security and protection monitoring method, electronic device and computer readable storage medium

A technology for security monitoring and electronic equipment, applied in the field of electronic equipment and computer-readable storage media, security monitoring, can solve the problems of large limitations and poor security of security monitoring, and achieve the effect of avoiding leakage of privacy

Inactive Publication Date: 2018-02-09
GD MIDEA AIR-CONDITIONING EQUIP CO LTD +1
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The main purpose of the present invention is to provide a security monitoring method, an electronic device and a computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security and protection monitoring method, electronic device and computer readable storage medium
  • Security and protection monitoring method, electronic device and computer readable storage medium
  • Security and protection monitoring method, electronic device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0046] The main solution of the embodiment of the present invention is: enable the infrared device, control the infrared device to scan according to the preset direction; obtain the infrared sensing value within the scanning range of the infrared device; Intruder; when there is an intruder, an alarm message will be sent.

[0047] Most of the current security monitoring is video monitoring, but video monitoring involves the leakage of privacy, which makes security monitoring unsafe and easy to leak privacy. Based on the above problems, the present invention performs security protection through infrared means, scans the environment according to the infrared device, obtains the thermal induction value after the infrared device scans, and judges that there is an intruder when the value is greater than or equal to the pres...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a security and protection monitoring method. The method includes the following steps that: an infrared device is activated and is controlled to perform scanning according to a preset direction; infrared sensing values in the scanning range of the infrared device are obtained; when the infrared sensing values are greater than or equal to a preset threshold value, itis judged that an intruder exists; and if the intruder exists, alarm information is issued. The present invention also discloses an electronic device and a computer readable storage medium. Accordingto the security and protection monitoring method, the electronic device and the computer readable storage medium of the invention, a camera is not required to start security and protection, and so theprivacy leakage of the camera can be avoided; the security of protection is improved; and the applicable scope of the security and protection is expanded.

Description

technical field [0001] The invention relates to the field of security technology, in particular to a security monitoring method, electronic equipment and a computer-readable storage medium. Background technique [0002] In the field of security monitoring, the most used technology is video monitoring. Generally, a mature monitoring system is composed of five parts: camera, transmission, control, display, and record registration. The camera transmits the video image to the control host through the coaxial video cable, and the control host then distributes the video signal to each monitor and video recording device, and simultaneously records the voice signal to be transmitted into the video recorder. The core function of video-based security is intrusion detection. At present, most security systems are based on video-based intrusion detection technology. Through the analysis of video images, it detects whether there are moving targets in the monitoring area and makes correspo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G08B13/19
CPCG08B13/19
Inventor 张新健
Owner GD MIDEA AIR-CONDITIONING EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products