Intruder detection method and apparatus

A detection method, an intruder technology, applied in the direction of instruments, computing, electrical digital data processing, etc., can solve problems such as blind spots, deceiving cameras to identify sensors, and inability to detect intruders

Active Publication Date: 2021-02-09
HUAWEI CLOUD COMPUTING TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, using only a single device may have blind spots and may not detect intruders in all areas
Additionally, individual devices may generate false alarms due to environmental changes or variability
If the user is wearing a hat and glasses, or if the appearance changes or changes, the camera may only partially recognize the user, or may even misidentify the user
Alternatively, intruders may use pictures or 2D / 3D masks to fool cameras or other identification sensors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intruder detection method and apparatus
  • Intruder detection method and apparatus
  • Intruder detection method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The detailed description follows with reference to the accompanying drawings, which form a part of this description and show by way of illustration specific embodiments in which the invention can be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention, it being understood that other embodiments may be utilized and structural, logical, and electrical changes may be made without departing from the scope of the invention. Accordingly, the exemplary embodiments described below are not to be taken as limiting, and the scope of the present invention is defined by the appended claims.

[0048] In one embodiment, the functions or algorithms described herein can be implemented in software. The software may include computer-executable instructions stored on a computer-readable medium or computer-readable storage device (eg, one or more non-transitory memories or other types of hardware-based local or network ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An intruder detection method is provided, comprising a security server sending a verification prompt to a device in a controlled-access area, based on an entry indication of an entrant into the controlled-access area, with the verification prompt indicating the entrant should perform a predefined verification action, the security server receiving entrant behavior information, the security server comparing the entrant behavior information to a behavior model of a set of authorized persons associated with the controlled-access area, with the behavior model including the verification prompt, andthe security server generating an intruder indication if the entrant behavior information does not match a behavior sequence included in the behavior model.

Description

[0001] field of invention [0002] The invention relates to smart home technology, in particular to intruder detection in a smart home system. Background technique [0003] Smart home technology is becoming more and more pervasive. With smart home technology, some or all of the devices in the home can be connected to a smart home network. An increasing number of home devices can be connected to smart home networks for smart home services and security, such as operating and / or communicating with home devices such as coffee makers, doorbells, voice gateways, smoke detectors , oven or other sensors or appliances. [0004] Smart home security is what smart home system customers want. Home security systems typically rely on information from home security devices or sensors to identify intruders, such as cameras with facial recognition, fingerprint readers, Bluetooth or geolocation information (e.g., GPS) that can be used by mobile phones, WiFi transceivers or Hubs, Bluetooth tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCG06F9/542G08B13/19613G08B13/00G08B15/00G08B21/22G08B27/005G08B21/182
Inventor 王晓波王宏磊霍志杰丁新民
Owner HUAWEI CLOUD COMPUTING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products