Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Perimeter intrusion detection method

An intrusion detection and perimeter technology, applied in image data processing, instruments, computing, etc., can solve the problems of automatic detection of people in inaccessible areas, poor flexibility, and large limitations, achieving important application value and reducing various costs. Effect

Inactive Publication Date: 2019-02-12
江苏跃鑫科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Most of the current video surveillance is essentially a human monitoring method, that is, by recording the environment in the monitoring area, relying on the naked eyes of the monitoring personnel to find abnormalities, but cannot automatically detect people in the area, and cannot automatically Identify strangers and take appropriate security measures
This artificial monitoring method has high costs, poor flexibility, and large limitations, and cannot meet the real needs of users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Perimeter intrusion detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The following describes the implementation of the present invention through specific examples. Those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementations. , the details in this specification can also be modified or changed based on different viewpoints and applications without departing from the spirit of the present invention.

[0015] It should be noted that the diagrams provided in this embodiment are only schematically illustrating the basic ideas of the present invention, and only the components related to the present invention are shown in the schematic diagrams, and the layout of the components may be more complex during actual implementation. complex.

[0016] A perimeter intrusion detection method provided by the present invention comprises the following steps:

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a perimeter intrusion detection method. The method is characterized in that: step 1: an image acquisition module collects a video image; step 2: the target in a surveillance area is detected and tracked; step 3: a moving target enters a fortification area; step 4: the trajectory information of the moving target is recorded and the alarm information is transmitted; and step5: the terminal has an alarm. The perimeter intrusion detection method provided by the invention, can effectively detect the motion trajectory of the moving target, and can also effectively detect andsend the alarm information even if the moving target has a short static situation. The purpose of intelligently detecting the intrusion of the moving target in the fortification area is achieved, various costs are greatly reduced, the needs of a user are fully satisfied, and the application value is important.

Description

technical field [0001] The invention belongs to the technical field of security monitoring, in particular to a perimeter intrusion detection method. Background technique [0002] In order to better protect the property safety and information security of individuals, families and enterprises, many places are equipped with safety protection measures. Traditional security mainly relies on manpower, such as setting up guards for registration, organizing personnel to patrol, etc. Since this method cannot guarantee that there are guards in each area at any time, it is prone to security loopholes. In recent years, with the rapid development of computer, network, image processing and transmission technology, video surveillance technology has been widely used in various security and confidential occasions, such as home video surveillance, office area surveillance, etc. Through automatic video monitoring, it can timely, clearly and truly reflect the picture of the monitored object in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G08B13/196G06T7/20
CPCG08B13/19608G06T7/20G06T2207/10016G06T2207/30241
Inventor 邹逸群张华李勇
Owner 江苏跃鑫科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products