Unlock instant, AI-driven research and patent intelligence for your innovation.

Boundary intrusion detection method, device, server and system

A border intrusion and detection method technology, applied to instruments, alarms, anti-theft alarms, etc., can solve problems such as false alarms, difficult installation and implementation, and high investment costs

Inactive Publication Date: 2019-08-09
GUANGZHOU HONGDU INFORMATION TECH
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the distance limitation of the radio, it is necessary to arrange a set of intrusion detection equipment at a certain distance. During the installation process, the strong and weak current lines need to be re-planned. There are problems of false alarms, high investment costs, and difficult installation and implementation.
[0004] Although multimedia intrusion detection methods have appeared on the market, the general multimedia intrusion detection requires manual participation in viewing and analyzing images and videos after the camera data is aggregated to the monitoring center, which increases the work content of personnel.
When monitoring personnel change shifts, leave their posts, or are fatigued, it is very likely that the video for analyzing intrusion behavior will be missed, and when a large number of monitoring videos are deployed, all the videos to be monitored cannot be viewed in real time, resulting in the inability to detect the intrusion in the first place when the incident occurs. Trigger an alarm at a time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Boundary intrusion detection method, device, server and system
  • Boundary intrusion detection method, device, server and system
  • Boundary intrusion detection method, device, server and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0045] see figure 1 , figure 1is a schematic flowchart of the border intrusion detection method provided by the first embodiment of the present invention.

[0046] The border intrusion detection method comprises the steps of:

[0047] S101. Receive a deployment and control task sent by a client, and configure an image acquisition system according to the deployment and control task.

[0048] In this example, if figure 2 as shown, figure 2 It is a schematic diagram of the architecture of the security system in the first embodiment of the present invention. Implementing the boundary intrusion detection method requires devices such as a client 201, a server 202 (the server includes a background management server 2021 and a video analysis server 2022), an image acquisition system 203, and a front-end alarm terminal 204. Wherein, the image acquisition system includes at least one camera 2031 and a switch 2032 corresponding to the camera 2031 . The client 201 sets the monitor...

no. 2 example

[0063] see image 3 , image 3 is a schematic structural diagram of a border intrusion detection device provided by the second embodiment of the present invention.

[0064] The border intrusion detection device includes:

[0065] The deployment and control unit 301 is configured to receive the deployment and control task sent by the client, and configure the image acquisition system according to the deployment and control task.

[0066] The video information analysis unit 302 is configured to acquire the video information of the image acquisition system, and use a deep learning algorithm to analyze the video information to obtain the contour information of the moving object in the preset monitoring area.

[0067] The target object locking unit 303 is configured to identify and lock the target object according to the outline information, and detect the position information and motion state of the target object in real time.

[0068] The intrusion judging unit 304 is configur...

Embodiment 3

[0077] This embodiment provides a boundary intrusion detection system, including: a client, a server, an image acquisition system, and a front-end alarm terminal.

[0078] The client is configured to send deployment and control tasks to the server.

[0079] The server end is configured to configure the image acquisition system according to the deployment and control task.

[0080] The image collection system is used to collect video information of a preset monitoring area.

[0081] In this example, if figure 2 as shown, figure 2 It is a schematic diagram of the architecture of the security system in the first embodiment of the present invention. Implementing the boundary intrusion detection method requires devices such as a client 201, a server 202 (the server includes a background management server 2021 and a video analysis server 2022), an image acquisition system 203, and a front-end alarm terminal 204. Wherein, the image acquisition system includes at least one camer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a boundary intrusion detection method, device, server and system. The method comprises steps: deployment and control management is carried out on an image acquisition system; adeep learning algorithm is used to analyze acquired video information, and the contour information of a moving object in a preset monitoring area is obtained; a target object is recognized and locked, and the position information and the moving state of the target object are detected in real time; and when the target object is judged to be in a preset forbidden area according to the position information, or, the target object is judged to meet a preset moving condition according to the moving state, alarm information is generated according to the video information and sent to a client and a front alarm terminal, and thus, the front alarm terminal triggers the alarm according to the alarm information. A boundary intrusion behavior can be judged in real time and an alarm can be timely triggered by using a security video analysis technology, the missing possibility of manual intrusion behavior monitoring and analysis can be overcome, and the boundary intrusion judgment reliability and the efficiency are improved.

Description

technical field [0001] The invention relates to the technical field of monitoring, in particular to a border intrusion detection method, device, server and system. Background technique [0002] Intrusion detection is the use of sensor technology and electronic information technology to detect and indicate illegal entry or attempted illegal entry into the fortified area, and then generate alarm information by issuing alarm sounds, triggering equipment, text or image displays, etc. [0003] Traditional intrusion monitoring methods include infrared beam-to-ray monitoring, microwave beam-to-ray monitoring, vibration fiber optic monitoring, etc., but the above intrusion monitoring methods trigger alarms for all objects passing through. Due to the distance limitation of the radio, a set of intrusion detection equipment needs to be arranged at a certain distance. During the installation process, the strong and weak current lines need to be re-planned. There are problems of false al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G08B13/196
CPCG08B13/19602G08B13/19608
Inventor 曾雄伟方榆李偲
Owner GUANGZHOU HONGDU INFORMATION TECH