Unlock instant, AI-driven research and patent intelligence for your innovation.

Internet of things-based security monitoring method

A technology of security monitoring and Internet of Things, applied in anti-theft alarms, alarms with residential simulation, instruments, etc., can solve the problem of false alarms easily caused by visitor visits, and achieve the effect of avoiding repeated detection

Active Publication Date: 2020-02-11
仁怀市云侠网络科技有限公司
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention intends to provide a security monitoring method based on the Internet of Things, which can automatically identify the identity of indoor personnel, and solve the problem that the existing security monitoring system is prone to false alarms when visitors visit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of things-based security monitoring method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following is further described in detail through specific implementation methods:

[0036] The security monitoring method based on the Internet of Things of this embodiment uses such as figure 1 As shown in the security monitoring system, the system includes a personnel detection module, an analog playback module, a personnel analysis module, an authentication reminder module, an alarm reminder module and an indicator light adjustment module.

[0037] The personnel detection module is used to detect the location and identity of indoor personnel and determine whether there are unauthenticated personnel whose identities have not been verified.

[0038] In this embodiment, the human detection module includes a human sensing sub-module and a human identification sub-module, and the human sensing sub-module includes infrared sensors uniformly arranged indoors. The personnel recognition sub-module includes an image acquisition unit and a face recognition unit. The image ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the technical field of security monitoring methods, specifically a security monitoring method based on the Internet of Things. The method includes the following steps: a personnel detection step, detecting the position and identity of indoor personnel, and judging whether there are unauthenticated personnel whose identities have not been verified. , then perform the simulated playback step, if not, repeat the personnel detection step; the simulated playback step, play the preset scene simulation sound; the personnel analysis step, analyze the behavioral response of the unauthenticated personnel after hearing the scene simulation sound, and judge the unauthenticated Whether the response of the personnel is abnormal, if so, perform the alarm reminder step; the alarm reminder step is to send an alarm reminder to the preset user equipment. The security monitoring method based on the Internet of Things provided by the present invention can automatically identify the identities of indoor personnel, and solve the problem that the existing security monitoring system easily generates false alarms when visitors visit.

Description

technical field [0001] The invention relates to the technical field of security monitoring methods, in particular to a security monitoring method based on the Internet of Things. Background technique [0002] In recent years, with the continuous improvement of people's living standards, people pay more and more attention to the safety of family property. However, there are many hidden dangers in the traditional mechanical home defense system. The deficiencies and hidden dangers of traditional anti-theft doors and windows in terms of overall appearance and emergency escape are difficult to meet people's pursuit of a higher quality of life. [0003] At present, many families are equipped with surveillance systems, usually deploying cameras that can be connected to the network indoors to realize indoor video surveillance. However, this is only a simple video surveillance indoors and requires people to watch the video for real-time monitoring. , cannot automatically detect the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G08B15/00G07C9/00G06K9/00
CPCG08B15/002G07C9/37G06V40/166
Inventor 余洪科余忠保刘秋
Owner 仁怀市云侠网络科技有限公司