Safety alarm system based on energy block chain
A security alarm and block chain technology, applied in the block chain field, can solve problems such as low efficiency, loss, time-consuming and laborious, etc., and achieve the effect of high accuracy and efficiency, fast efficiency, and reduced loss
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0028] The host ensures its own power supply and network connection through power supply lines and signal lines. At the same time, it also establishes a connection with the display screen, so that all the contents of the host can be directly presented to the staff of the system; the signal lines on the host include network cables, network cables The transmission rate is greater than 500M per second, thus realizing the network transmission of a large number of 4K high-definition images in a short period of time.
Embodiment 2
[0030] The high-definition surveillance camera is a camera that can capture 4K image quality and can rotate freely 360 degrees. It is installed on the slide rail, and the high-definition camera can slide horizontally on the slide rail (the slide of the high-definition camera is controlled by the central computer, and when necessary Slide to expand the monitoring range, the above operation is the existing technology), in addition, it can rotate 360 degrees to achieve almost no dead angle monitoring within a certain range, and collect images of all kinds of people coming and going (especially faces). 4K high-definition images), and transmit the collected front or side images of each person to the central computer;
[0031] After the image is transmitted to the central computer, the data analysis is performed by the central computer, and the location, frequency and time of the relevant personnel activities in the image screen are collected within the scope covered by the energy ...
Embodiment 3
[0034] When the central computer analyzes the data and finds that there are relevant personnel among the personnel monitored by the monitoring module, the central computer immediately drives the communication module to work. At this time, the signal sending unit automatically calls the relevant department and informs the relevant personnel to go to the relevant personnel activity place. carry out processing;
[0035] When the relevant personnel are found and alarmed by other outsiders, the communication signal of the alarm will not only be transmitted to the relevant departments, but also be transmitted to the central computer through the signal receiving unit, and the central computer will then enter the area according to the signal to carry out the communication in the area. Signal search, that is, to monitor the area more closely through the monitoring module, and quickly transmit to the network of the relevant department through the signal transmission unit when relevant pe...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com