[go: up one dir, main page]

CN112422885B - A security detection method, device and cloud server - Google Patents

A security detection method, device and cloud server Download PDF

Info

Publication number
CN112422885B
CN112422885B CN201910780155.4A CN201910780155A CN112422885B CN 112422885 B CN112422885 B CN 112422885B CN 201910780155 A CN201910780155 A CN 201910780155A CN 112422885 B CN112422885 B CN 112422885B
Authority
CN
China
Prior art keywords
central control
target
alarm
security central
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910780155.4A
Other languages
Chinese (zh)
Other versions
CN112422885A (en
Inventor
毛宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201910780155.4A priority Critical patent/CN112422885B/en
Publication of CN112422885A publication Critical patent/CN112422885A/en
Application granted granted Critical
Publication of CN112422885B publication Critical patent/CN112422885B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/78Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/783Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • G06F16/7837Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content using objects detected or recognised in the video content
    • G06F16/784Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content using objects detected or recognised in the video content the detected or recognised objects being people
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/19Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using infrared-radiation detection systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N17/00Diagnosis, testing or measuring for television systems or their details
    • H04N17/002Diagnosis, testing or measuring for television systems or their details for television cameras
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Library & Information Science (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

The embodiment of the invention discloses a security detection method and device and a cloud server, and relates to the technical field of communication. According to the method, the cloud server can acquire detection information from the security central control equipment when the security central control equipment controls the target alarm equipment to alarm based on the detection information, and determine whether the security central control equipment fails according to the detection information, so that the detection information determined by the security central control equipment can be verified and checked for the second time, whether the security central control equipment fails is determined, and the detection precision of the security central control equipment is improved.

Description

Security detection method and device and cloud server
Technical Field
The invention relates to the technical field of communication, in particular to a security detection method and device and a cloud server.
Background
Along with the development of technology, the application of the internet of things technology is more and more widespread. Nowadays, more and more families benefit from the technology of the internet of things, wherein the intelligent security technology formed based on the internet of things is favored by most families. However, the verification of the security detection result is difficult to realize in the prior art.
Disclosure of Invention
In view of the foregoing, the present invention is directed to providing a security detection method, a security detection device, and a cloud server that overcome or at least partially solve the foregoing problems.
The invention provides a security detection method applied to a cloud server, which comprises the following steps:
when the security central control equipment controls the target alarm equipment to alarm based on detection information, the detection information is acquired from the security central control equipment, wherein the detection information is determined by the security central control equipment according to the real-time video uploaded by the target camera;
And determining whether the security central control equipment fails according to the detection information.
Optionally, the cloud server pre-stores a plurality of identification groups, wherein each identification group comprises an identification of one alarm device and an identification of one camera, the detection information comprises a first identification of the target alarm device and a second identification of the target camera, and the determining whether the security central control device fails according to the detection information comprises:
Searching whether a target identification group exists in the plurality of identification groups, wherein the identification of the alarm equipment in the target identification group is the same as the first identification, and the identification of the camera in the target identification group is the same as the second identification;
And if the target identification group does not exist in the plurality of identification groups, judging that the security central control equipment fails.
Optionally, the cloud server pre-stores a portrait library, the detection information includes a target image, the target image is obtained from the real-time video by the security central control device, the target image includes a portrait to be detected determined by the security central control device, and the determining whether the security central control device fails according to the detection information includes:
Searching whether the to-be-detected human images exist in the human image library;
And if the to-be-detected human images exist in the human image library, judging that the security central control equipment fails.
Optionally, the determining whether the security central control device is faulty according to the detection information includes:
acquiring the total number of all the portraits in the target image and the number of the portraits to be detected in the target image;
judging whether the total number is the same as the number, and if the total number is different from the number, judging that the security central control equipment fails.
Optionally, the detection information includes a target image, where the target image is acquired by the security central control device from the real-time video, the target image includes a to-be-detected portrait determined by the security central control device, and determining, according to the detection information, whether the security central control device fails includes:
Acquiring an actual alarm category when the target alarm equipment alarms;
analyzing the target image to obtain an analysis result;
judging the analysis result according to a preset condition set to obtain a judgment result;
determining a target alarm category of the target alarm equipment according to the judging result;
And judging whether the target alarm category is the same as the actual alarm category, and if not, judging that the security central control equipment fails.
Optionally, the determining, according to the determination result, a target alarm category of the target alarm device includes:
When the judgment result represents that the analysis result does not meet all preset conditions in the preset condition set, determining the target alarm category as early warning, otherwise, determining the target alarm category as alarm;
The preset condition set comprises one or more of a first preset condition that the to-be-detected portrait is located in a set area in the target image, a second preset condition that the uploading moment of the target image is located in a set period, and a third preset condition that the gesture of the to-be-detected portrait is a set gesture.
Optionally, the determining whether the target alarm category is the same as the actual alarm category, if not, determining that the security central control device has a fault includes:
if the target alarm category is early warning and the actual alarm category is alarm, judging that the security central control equipment fails;
And if the target alarm type is alarm and the actual alarm type is early warning, judging that the security central control equipment fails.
Optionally, the method further comprises:
acquiring a parameter configuration request sent by the security central control equipment;
and transmitting a setting parameter to the security central control equipment according to the parameter configuration request, wherein the setting parameter is uploaded by a user terminal, and the setting parameter comprises a detection rule which is adopted by the security central control equipment when the detection information is determined according to the real-time video.
The second aspect of the present invention provides a security detection device, applied to a cloud server, the device comprising:
The detection information acquisition module is used for acquiring detection information from the security central control equipment when the security central control equipment controls the target alarm equipment to alarm based on the detection information, wherein the detection information is determined by the security central control equipment according to the real-time video uploaded by the target camera;
And the fault determining module is used for determining whether the security central control equipment is faulty or not according to the detection information.
Optionally, the cloud server pre-stores a plurality of identification groups, wherein each identification group comprises an identification of an alarm device and an identification of a camera, the detection information comprises a first identification of the target alarm device and a second identification of the target camera, and the fault determining module is used for:
Searching whether a target identification group exists in the plurality of identification groups, wherein the identification of the alarm equipment in the target identification group is the same as the first identification, and the identification of the camera in the target identification group is the same as the second identification;
And if the target identification group does not exist in the plurality of identification groups, judging that the security central control equipment fails.
Optionally, the cloud server pre-stores a portrait library, the detection information includes a target image, the target image is obtained from the real-time video by the security central control device, the target image includes a portrait to be detected determined by the security central control device, and the fault determining module is configured to:
Searching whether the to-be-detected human images exist in the human image library;
And if the to-be-detected human images exist in the human image library, judging that the security central control equipment fails.
Optionally, the fault determining module is configured to:
acquiring the total number of all the portraits in the target image and the number of the portraits to be detected in the target image;
judging whether the total number is the same as the number, and if the total number is different from the number, judging that the security central control equipment fails.
Optionally, the detection information includes a target image, where the target image is acquired by the security central control device from the real-time video, the target image includes a to-be-detected image determined by the security central control device, and the fault determining module is configured to:
Acquiring an actual alarm category when the target alarm equipment alarms;
analyzing the target image to obtain an analysis result;
judging the analysis result according to a preset condition set to obtain a judgment result;
determining a target alarm category of the target alarm equipment according to the judging result;
And judging whether the target alarm category is the same as the actual alarm category, and if not, judging that the security central control equipment fails.
Optionally, the fault determining module is configured to:
When the judgment result represents that the analysis result does not meet all preset conditions in the preset condition set, determining the target alarm category as early warning, otherwise, determining the target alarm category as alarm;
The preset condition set comprises one or more of a first preset condition that the to-be-detected portrait is located in a set area in the target image, a second preset condition that the uploading moment of the target image is located in a set period, and a third preset condition that the gesture of the to-be-detected portrait is a set gesture.
Optionally, the fault determining module is configured to:
if the target alarm category is early warning and the actual alarm category is alarm, judging that the security central control equipment fails;
And if the target alarm type is alarm and the actual alarm type is early warning, judging that the security central control equipment fails.
Optionally, the apparatus further comprises:
The security central control equipment comprises a parameter configuration module, a parameter configuration module and a security central control equipment, wherein the parameter configuration module is used for acquiring a parameter configuration request sent by the security central control equipment, and issuing a set parameter to the security central control equipment according to the parameter configuration request, wherein the set parameter is uploaded by a user terminal and comprises a detection rule adopted by the security central control equipment when determining the detection information according to the real-time video
In a third aspect of the present invention, there is provided a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the security detection method described above.
In a fourth aspect of the present invention, a cloud server is provided, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor implements the steps of the security detection method described above when executing the program.
The technical scheme provided by the embodiment of the application has at least the following technical effects or advantages:
In the scheme, the cloud server can acquire detection information from the security central control equipment when the security central control equipment controls the target alarm equipment to alarm based on the detection information, and determine whether the security central control equipment fails according to the detection information, so that the detection information determined by the security central control equipment can be verified and checked for the second time, whether the security central control equipment fails is determined, and the detection precision of the security central control equipment is improved.
The foregoing description is only an overview of the present invention, and is intended to be implemented in accordance with the teachings of the present invention in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present invention more readily apparent.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to designate like parts throughout the figures. In the drawings:
Fig. 1 shows a block diagram of a security detection system according to an embodiment of the present invention.
Fig. 2 shows a flowchart of a security detection method according to an embodiment of the present invention.
Fig. 3 shows a schematic diagram of a user residence provided in accordance with one embodiment of the present invention.
Fig. 4 shows a schematic diagram of an event trigger provided according to an embodiment of the invention.
Fig. 5 shows a block diagram of a security detection device according to an embodiment of the present invention.
Icon:
100-security detection system, 101-cloud server, 102-security central control equipment, 103-camera, 104-infrared correlation device, 105-alarm equipment and 106-user terminal;
the system comprises a security detection device 200, a detection information acquisition module 211, a fault determination module 212 and a parameter setting module 213;
301-yard and 302-house.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The embodiment of the invention provides a security detection method and device and a cloud server, which are used for solving the technical problem that the security detection result is difficult to verify in the existing security detection technology.
As an alternative embodiment, fig. 1 is a block diagram of a security detection system 100 according to an embodiment of the present invention.
As can be seen from fig. 1, the security detection system 100 includes a cloud server 101, a security central control device 102, a camera 103, an infrared transponder 104, an alarm device 105, and a user terminal 106.
In the embodiment of the present application, the security central control device 102 is an independent control device, which is different from the existing desktop/notebook computer, smart phone, tablet computer, server, etc. The security central control device 102 can provide a set of smart home security solution, can provide a security detection method to the outside, realize intelligent protection, and can provide an intelligent home control method to the inside, realize intelligent control of home.
With continued reference to fig. 1, the security central control device 102 is communicatively connected to the camera 103, the infrared emitter 104 and the alarm device 105, so that the security central control device 102 can obtain real-time monitoring information around the home based on the camera 103 and the infrared emitter 104, and control the alarm device 105 to alarm based on the real-time monitoring information.
Further, the security central control device 102 is further in communication connection with the cloud server 101, so that the security central control device 102 can send the determined detection information to the cloud server 101, the cloud server 101 can perform asynchronous verification and secondary auditing on the detection information, so that whether the detection information determined by the security central control device 102 is wrong or not is judged, whether the security central control device 102 fails or not is judged, the failure of the security central control device 102 can be timely found based on the detection information, a message of the failure of the security central control device 102 can be sent to the user terminal 106, and accordingly the fact that the security central control device 102 with the failure always outputs the wrong detection information is avoided, and the detection precision of the security central control device 102 is guaranteed.
With continued reference to fig. 1, the user terminal 106 may be in communication connection with the security central control device 102 through the cloud server 101, or may be directly in communication connection with the security central control device 102. For example, when the user terminal 106 and the security central control device 102 are in the same WIFI local area network, the user terminal 106 may directly perform communication connection with the security central control device 102, so as to implement data interaction. For another example, when the user terminal 106 and the security central control device 102 are not in the same WIFI local area network, the user terminal 106 may be in communication connection with the security central control device 102 through the cloud server 101, and realize data interaction based on the cloud server 101.
In an embodiment of the present application, the user terminal 106 may be a mobile phone or a tablet. For example, the mobile phone may be indirectly connected to the security central control device 102 through the cloud server 101, and the tablet may be directly connected to the security central control device 102 through the WIFI local area network. It should be appreciated that in the implementation, the method of communication connection is not limited to the several methods of communication connection listed above.
It can be appreciated that the cloud server 101 in the security detection system 100 can realize verification and secondary audit of detection information in the security detection process, so as to timely judge whether the security central control device 102 fails or not, and improve the detection precision of the security central control device 102.
Referring to fig. 2 in combination, a flowchart of a security detection method according to an embodiment of the present invention is provided, and the method is applied to the cloud server 101 in fig. 1, and the following details of the steps included in the method are described below:
s21, when the security central control equipment controls the target alarm equipment to alarm based on the detection information, the detection information is acquired from the security central control equipment.
In the embodiment of the application, the security central control device 102 determines detection information according to the real-time video uploaded by the target camera, and controls the target alarm device to alarm based on the detection information. It can be appreciated that when the security central control device 102 controls the target alarm device to alarm, the cloud server 101 obtains detection information from the security central control device 102.
Optionally, when the security central control device 102 controls the target alarm device to alarm, the security central control device 102 may also automatically upload the detection information to the cloud server 101, so that the cloud server 101 performs verification and secondary audit.
In the embodiment of the present application, the detection information includes a plurality of information, and in the embodiment of the present application, the detection information includes, but is not limited to, the following information:
1) A first identifier of the target alarm device and a second identifier of the target camera;
2) A target image;
3) The actual alarm category of the target alarm device.
It can be appreciated that the cloud server 101 can verify and secondarily audit the detection information of the security central control device 102 according to the above information, so as to determine whether the detection information is accurate, and further determine whether the security central control device 102 fails, so that the detection accuracy and reliability of the security central control device 102 can be improved.
The entire security detection system 100 will be described below first with specific examples:
referring to fig. 3 in combination, a plurality of infrared reflectors 104 are disposed around a courtyard 301 of a user, and two adjacent infrared reflectors 104 form an infrared "detection wall" through which an object can trigger the infrared reflectors 104. In an embodiment of the present application, the number of infrared reflectors 104 may be 4, and more specifically, in an embodiment of the present application, there are 4 "detection walls".
Further, a plurality of cameras 103 are disposed around the residence 302 of the user, in the implementation of the present application, the number of cameras 103 may be 4, and the 4 cameras 103 can monitor the courtyard 301 of the user in real time.
Still further, a plurality of alarm devices 105 are disposed about the user's residence 302.
In this embodiment, each camera 103, each infrared correlation device 104, and each alarm device 105 are all in communication connection with the security central control device 102, so as to implement security detection on the courtyard 301 and the residence 302 of the user.
Further, the 4 cameras 103 can shoot respective areas in real time, acquire real-time videos, and then send the real-time videos to the security central control device 102.
For convenience of description, taking one of the cameras as an example, and more specifically referring to fig. 3, for describing the camera 103 monitoring the area a, in the embodiment of the present application, the camera 103 monitoring the area a may be understood as a target camera, and the alarm device 105 in the area a may be understood as a target alarm device.
Further, the security central control device 102 receives the real-time video uploaded by the camera 103, and it can be understood that the real-time video is a real-time video of the area a.
Further, the security central control device 102 determines detection information according to the real-time video, controls the alarm device 105 to alarm according to the detection information, and sends the detection information to the cloud server 101.
S22, determining whether the central control equipment fails according to the detection information.
It can be understood that when the cloud server 101 obtains the detection information, multiple kinds of information in the detection information are verified, and further verification and secondary verification of the detection information are achieved from multiple dimensions, so as to determine whether the security central control device 102 fails (whether the detection information determined by the security central control device 102 is wrong).
In the embodiment of the present application, the cloud server 101 determines whether the central control device for security protection is failed according to the detection information, which specifically includes the following three cases, however, in the specific implementation process, the method is not limited to the following three cases:
And Case1, verifying detection information based on the first identification of the target alarm device and the second identification of the target camera.
It can be understood that the cameras 103 and the alarm devices 105 in the same area are in one-to-one correspondence, if the security central control device 102 determines that an alarm is required according to the real-time video uploaded by the cameras 103 in the area a, the security central control device 102 should control the alarm devices 105 in the area a to alarm, otherwise, it can be determined that the security central control device 102 is faulty.
In this case, the detection information includes a first identifier of the target alarm device and a second identifier of the target camera, and further, a plurality of identifier groups are pre-stored in the cloud server 101, where each identifier group includes an identifier of one alarm device and an identifier of one camera. Referring to fig. 3 in combination, the cloud server 101 may include 4 identification groups, where each identification group includes an identification of an alarm device and an identification of a camera in the same area. As another example, the identification of the alarm device in the area a is P A, the identification of the camera in the area a is C A, and it is understood that 4 identification groups included in the cloud server 101 may be (P A,CA)、(PB,CB)、(PC,CC) and (P D,CD).
In the embodiment of the application, the first identifier of the target alarm device is P X, and the second identifier of the target camera is C X.
Specifically, the cloud server 101 determines, according to the detection information, whether the central control device 102 for security protection is faulty, including:
Searching whether the target identification group exists or not from a plurality of identification groups. The identification of the alarm equipment in the target identification group is the same as the first identification, the identification of the camera in the target identification group is the same as the second identification, and if the target identification group does not exist in the plurality of identification groups, the fault of the central control equipment is judged.
Referring to fig. 3 in combination, if the first identifier P X is P A and the second identifier C X is C A, the target identifier group (P A,CA) exists in the plurality of identifier groups, which indicates that the target alarm device and the target camera are located in the same area, it may be determined that the detection information is correct, and the security central control device 102 has no fault.
For another example, if the first identifier P X is P B and the second identifier C X is C A, the target identifier group (P B,CA) is not present in the plurality of identifier groups, which indicates that the target alarm device and the target camera are not located in the same area, and therefore, it is determined that the detection information is wrong, and the security central control device 102 fails. Further, the failure of the security central control device 102 may be understood that when the security central control device 102 determines that the alarm device in the area a needs to be controlled to alarm according to the real-time video uploaded by the camera in the area a, but the alarm device in the area B is controlled to alarm by mistake, so in this case, the cloud server 101 determines that the security central control device 102 has the failure.
Case2, verifying the detection information based on the target image.
In this case, the detection information includes a target image, where the target image includes a portrait to be detected determined by the security central control device 102, and further, a portrait library is pre-stored in the cloud server 101.
In the embodiment of the application, the cloud server 101 determines whether the security central control device 102 fails according to the detection information, including searching whether a to-be-detected portrait exists in a portrait library, and if the to-be-detected portrait exists in the portrait library, determining that the security central control device 102 fails.
In this embodiment, the figures in the figure library are uploaded to the cloud server 101 by the user terminal 106, for example, the user terminal 106 may upload custom figures to the cloud server 101 for storage, and for example, the user terminal 106 may upload figures of family members, friends, classmates or colleagues to the cloud server 101 for storage, and the cloud server 101 may detect the figures to be detected in the target image based on the figures in the figure library.
If the cloud server 101 finds the to-be-detected portrait in the target image in the portrait library, which indicates that the to-be-detected portrait is recognized (authorized) by the user terminal 106, the security central control device 102 controls the alarm device 105 to alarm in this case, which indicates that the security central control device 102 has a problem in detection, and more specifically, the cloud server 101 may determine that the security central control device 102 has a fault according to the target image in the detection information.
Optionally, the cloud server 101 determines whether the central control device 102 fails according to the detection information, and further includes acquiring the total number of all the images in the target image and the number of the images to be detected in the target image, judging whether the total number is the same as the number, and if the total number is different from the number, judging that the central control device fails.
In the embodiment of the present application, the security central control device 102 determines the to-be-detected portrait according to the target image, and when determining the to-be-detected portrait according to the target image, a false detection or omission situation may occur, so the cloud server 101 needs to perform two audits on the target image to determine whether the to-be-detected portrait identification algorithm of the security central control device 102 is accurate.
In the implementation process, the possible false detection or missing detection situation of the security central control device 102 may be specifically described by the following two scenarios, and of course, the implementation process is not limited to the following two scenarios:
Scene 1:
One cat enters the area a, the infrared correlation device 104 is triggered, the security central control device 102 acquires a target image of the cat entering the area a, marks the cat, and the security central control device 102 mismarks the cat as a figure to be detected.
When the cloud server 101 obtains the target image, it is detected that the object marked in the target image is not a person but a cat, the total number of all the person images in the target image obtained by the cloud server 101 is 0, and the number of person images to be detected in the target image is 1, in this case, the cloud server 101 determines that the security central control device 102 fails, specifically, the cloud server 101 determines that the security central control device 102 fails when identifying the person images to be detected in the target image.
Scene 2:
Passer-by P1 and passer-by P2 enter the area A at the same time, the passer-by P1 approaches the window edge in the area A, and the security central control equipment 101 acquires target images of the passer-by P1 and the passer-by P2 entering the area A, wherein the target images also show that the passer-by P1 approaches the window edge in the area A. The security central control apparatus 101 may only mark the passer-by P2, but not mark the passer-by P1 when determining the to-be-detected person in the target image.
Further, the cloud server 101 obtains that the total number of all the images in the target image is 2, and the number of the images to be detected in the target image is 1, and at this time, the cloud server 101 determines that the security central control device 102 fails when identifying the images to be detected in the target image.
It can be appreciated that the cloud server 101 compares the total number of all the portraits in the target image with the number of portraits to be detected in the target image, and then determines whether the security central control device 101 fails, so that an algorithm error of the security central control device 102 when determining the portraits to be detected can be timely found, the algorithm error can be timely known, the occurrence of false detection and omission detection is avoided, and the detection precision of the security central control device 102 is improved.
And Case3, verifying detection information based on the actual alarm category of the target alarm equipment.
In this case, the detection information includes a target image, where the target image includes a figure to be detected determined by the security central control device, and further, the cloud server 101 determines, according to the detection information, whether the security central control device 102 fails, including:
Acquiring an actual alarm category when the target alarm equipment alarms;
Analyzing the target image to obtain an analysis result;
judging the analysis result according to a preset condition set to obtain a judgment result;
determining a target alarm category of the target alarm equipment according to the judging result;
And judging whether the target alarm category is the same as the actual alarm category, and if not, judging that the security central control equipment fails.
In the embodiment of the present application, the cloud server 101 determines, according to the determination result, a target alarm category of a target alarm device, which specifically includes the following contents:
and when the analysis result represented by the judgment result does not meet all preset conditions in the preset condition set, determining the target alarm category as early warning, otherwise, determining the target alarm category as alarm.
Specifically, the analysis result may include an uploading time of the target image, an area where the to-be-detected portrait in the target image is located, a gesture of the to-be-detected portrait in the target image, and the like.
Specifically, the set of preset conditions includes one or more combinations of three preset conditions:
1) The first preset condition is that the portrait to be detected is positioned in a set area in the target image;
2) The second preset condition is that the uploading time of the target image is positioned in a set period;
3) And a third preset condition that the gesture of the human image to be detected is a set gesture.
In the embodiment of the present application, the set area may be a window edge or a door front, and in general, if the person to be detected is located at the window edge or the door front, there is a certain security risk in the case that the person to be detected is likely to be in the exploring house 302. The set period may be night or early morning, for example, the set period may be 00:00:00-6:00:00, and if the uploading time of the target image is in the period, the probability of security risk is high. The set postures can be the postures of climbing, prying, smashing windows and the like, and it can be understood that if the person to be detected has the postures, the existence of security risks can be judged.
In the embodiment of the present application, the judgment result may include the following 7 cases:
the method comprises the following steps that 1, a judgment result represents an analysis result and simultaneously meets a first preset condition, a second preset condition and a third preset condition;
2, the judgment result represents the analysis result and simultaneously meets the first preset condition and the second preset condition, but does not meet the third preset condition;
3, the judgment result represents the analysis result and simultaneously meets the first preset condition and the third preset condition, but does not meet the second preset condition;
the judgment result represents the analysis result and simultaneously meets the second preset condition and the third preset condition, but does not meet the first preset condition;
5, judging that the analysis result of the result representation only meets a first preset condition;
in the case 6, the analysis result represented by the judgment result only meets a second preset condition;
And 7, the judgment result represents that the analysis result only meets a third preset condition.
It can be understood that if the judgment result is one of the above 7 cases, the target alarm category is determined to be an alarm. And if the judgment result is not any one of 7 conditions, determining the target alarm type as early warning.
It can be understood that the security level of the early warning is lower than the security level of the warning.
In the embodiment of the present application, the cloud server 101 determines whether the target alarm category and the actual alarm category are the same, and if not, determines that the security central control device has a fault, which specifically includes:
If the target alarm type is early warning and the actual alarm type is alarm, judging that the central control equipment 102 fails;
if the target alarm type is alarm and the actual alarm type is early warning, the fault of the central control equipment 102 is judged.
It can be understood that when the security central control device 102 controls the alarm device 105 to alarm, the situation that the actual alarm category and the target alarm category are different may occur, by using the method, the cloud server 101 can determine the target alarm category according to the target image, and determine whether the security central control device 102 fails when sending the alarm control instruction to the alarm device 105 based on the actual alarm category, so that verification and secondary audit can be performed on the detection information, the alarm control instruction sending failure of the security central control device 102 can be determined in time, and the detection precision of the security central control device 102 is improved.
Optionally, the cloud server 101 determines, according to the detection information, whether the central control device 102 fails, and further includes one of the following cases:
Case4:
the cloud server 101 verifies the detection information in a period of time, so as to determine whether the detection algorithm of the security central control device 102 fails, for example, the cloud server 101 obtains a plurality of pieces of detection information uploaded by the security central control device 102 for the area a in a period of time, where each piece of detection information includes a target image.
Further, if the same person to be detected exists in each target image, it indicates that the person to be detected does not leave the monitoring area of the camera 103 in the area a within the period of time, but the cloud server 101 receives a plurality of pieces of detection information at this time, which indicates that the security central control device 102 alarms based on the real-time video of the camera 103 in the area a for multiple times, in this case, the cloud server 101 can determine that the security central control device 102 has a fault when executing the detection rule, so that the execution fault of the detection rule of the security central control device 102 can be found in time, thereby improving the detection accuracy of the security central control device 102.
It should be understood that, when determining whether the central security control device 102 is faulty according to the detection information, the cloud server 101 may determine that the central security control device 102 is faulty as long as it determines that 1 of the above 4 fault conditions exist in the central security control device 102.
Optionally, the cloud server 101 may further perform device management and rule management on the security central control device 102, specifically, the cloud server 101 obtains a parameter configuration request sent by the security central control device, and issues the set parameter to the security central control device according to the parameter configuration request.
In the embodiment of the present application, the setting parameters are uploaded by the user terminal 106, and the setting parameters include a detection rule, etc., where the detection rule is adopted by the security central control device 102 when determining the detection information according to the real-time video.
More specifically, the cloud server 101 can send the setting parameters uploaded by the user terminal 106 to the security central control device 102, so that the security central control device 102 can directly configure the camera 103, the infrared correlation device 104 and the alarm device 105 based on the setting parameters, and thus, when the security central control device 102 is restarted under the conditions of damage and abnormality, the setting parameters can be directly obtained from the cloud server 101, the user is prevented from manually configuring again, and the restorability and reusability of the security central control device 102 are improved.
Alternatively, in the implementation process, the security central control device 102 may acquire the target image from the real-time video through a plurality of methods, and two methods for acquiring the target image from the real-time video are listed below, which, of course, are not limited to the following two methods in the implementation process.
The first method for acquiring a target image from a real-time video is that the security central control device 102 acquires the moment when the infrared emitter 104 sends a trigger signal, acquires an image corresponding to the moment from the real-time video, and determines the image corresponding to the moment as the target image.
Referring to fig. 4 in combination, for example, when a person enters the yard 301 from the left side of fig. 4, the two infrared transmitters 104 on the left side of fig. 4 are triggered, and since the security central control apparatus 102 is communicatively connected to the two infrared transmitters 104, the security central control apparatus 102 can obtain a time when the two infrared transmitters 104 send out alarm signals, for example, the time may be 9:05:16.
Further, the security central control device 102 acquires an image corresponding to a time 9:05:16 from the real-time video, and determines the image corresponding to the time 9:05:16 as a target image.
It can be understood that the infrared correlation device 104 is triggered to characterize triggering of an event, more specifically, when the security central control device 102 obtains the time when the two infrared correlation devices 104 send out the trigger signals, it can determine that the event has been triggered, and when this time, the security central control device 102 obtains a target image from the real-time video uploaded by the camera 103 according to the time when the event triggers (the time when the two infrared correlation devices 104 send out the alarm signals).
The second method for obtaining the target image from the real-time video is that the security central control device 102 detects whether a human figure exists in the current frame image of the real-time video, if the human figure exists in the current frame image, detects whether the human figure exists in the previous frame image of the current frame image, and if the human figure does not exist in the previous frame image, obtains the current frame image, and determines the current frame image as the target image.
It may be appreciated that the real-time video acquired by the security central control device 102 is uploaded by the camera 103 in a manner of each frame image, and the security central control device 102 may detect the received current frame image to determine whether the current frame image triggers an event, so as to acquire the target image.
Specifically, the security central control device 102 detects whether a portrait exists in the current frame image, and if so, detects whether the portrait exists in the previous frame image of the current frame image:
If the image does not exist in the previous frame image, the condition that the image of the current frame image records the image entering the area A is indicated, the triggering of an event is represented, at this time, the security central control device 102 acquires the image of the current frame, and the image of the current frame is determined as a target image.
If the image exists in the previous frame image, which indicates that the image is always in the area A, it can be determined that one of the previous frame images is already determined as the target image, and the current frame image is not required to be determined as the target image. More specifically, if a person is within the area a after entering the area a, the security center control apparatus 102 takes only an image corresponding to the person when the camera 103 is photographed to enter the area a as a target image. Further, if a person enters the area a and then leaves the area a, the security central control apparatus 102 takes the image corresponding to the person twice entering the area a as the target image.
As an alternative embodiment, fig. 5 shows a block diagram of a security detection device 200 according to an embodiment of the present invention, where the security detection device 200 includes:
The detection information acquisition module 201 is configured to acquire detection information from a security central control device when the security central control device controls a target alarm device to alarm based on the detection information, where the detection information is determined by the security central control device according to a real-time video uploaded by a target camera;
the fault determining module 202 is configured to determine whether the security central control device is faulty according to the detection information.
Further, the fault determining module 202 is configured to find whether a target identifier group exists in the plurality of identifier groups, where an identifier of an alarm device in the target identifier group is the same as the first identifier, an identifier of a camera in the target identifier group is the same as the second identifier, and determine that the security central control device has a fault if the target identifier group does not exist in the plurality of identifier groups.
Further, the fault determining module 202 is configured to search for whether the to-be-detected portrait exists in the portrait library, and determine that the security central control device has a fault if the to-be-detected portrait exists in the portrait library.
Further, the fault determining module 202 is configured to obtain a total number of all the portraits in the target image and a number of portraits to be detected in the target image, determine whether the total number is the same as the number, and if the total number is not the same as the number, determine that the security central control device has a fault.
Further, the fault determining module 202 is configured to obtain an actual alarm category of the target alarm device when the target alarm device alarms, parse the target image to obtain a parsed result, determine the parsed result according to a preset condition set to obtain a determination result, determine the target alarm category of the target alarm device according to the determination result, determine whether the target alarm category is the same as the actual alarm category, and if not, determine that the security central control device has a fault.
Further, the fault determining module 202 is configured to determine that the target alarm category is an early warning when the analysis result represented by the determination result does not satisfy all preset conditions in the preset condition set, otherwise determine that the target alarm category is an alarm, where the preset condition set includes one or more combinations of a first preset condition that the to-be-detected portrait is located in a set area in the target image, a second preset condition that an uploading time of the target image is located in a set period, and a third preset condition that a pose of the to-be-detected portrait is a set pose.
Further, the fault determining module 202 is configured to determine that the security central control device has a fault if the target alarm class is an early warning and the actual alarm class is an alarm, and determine that the security central control device has a fault if the target alarm class is an alarm and the actual alarm class is an early warning.
Further, the security detection device 200 further includes:
the security central control device comprises a parameter configuration module 203, a parameter configuration module and a security central control module, wherein the parameter configuration module is used for acquiring a parameter configuration request sent by the security central control device, and issuing a set parameter to the security central control device according to the parameter configuration request, wherein the set parameter is uploaded by a user terminal and comprises a detection rule which is adopted by the security central control device when determining the detection information according to the real-time video.
Based on the same inventive concept as in the previous embodiments, embodiments of the present invention also provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of any of the methods described above.
Based on the same inventive concept as in the foregoing embodiments, the embodiments of the present invention further provide a cloud server, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the steps of any of the methods described above when executing the program.
The technical scheme provided by the embodiment of the application has at least the following technical effects or advantages:
According to the security detection method, the security detection device and the cloud server, when the security central control equipment controls the target alarm equipment to alarm based on the detection information, the cloud server can acquire the detection information from the security central control equipment and determine whether the security central control equipment fails according to the detection information, so that the detection information determined by the security central control equipment can be verified and checked for the second time, whether the security central control equipment fails is determined, and the detection precision of the security central control equipment is improved.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual system, or other apparatus. Various general-purpose systems may also be used with the teachings herein. The required structure for a construction of such a system is apparent from the description above. In addition, the present invention is not directed to any particular programming language. It will be appreciated that the teachings of the present invention described herein may be implemented in a variety of programming languages, and the above description of specific languages is provided for disclosure of enablement and best mode of the present invention.
In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. This method of disclosure, however, is not to be interpreted as reflecting an intention that the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the apparatus of the embodiments may be adaptively changed and disposed in one or more apparatuses different from the embodiments. The modules or units or components of the embodiments may be combined into one module or unit or component and, furthermore, they may be divided into a plurality of sub-modules or sub-units or sub-components. Any combination of all features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or units of any method or apparatus so disclosed, may be used in combination, except insofar as at least some of such features and/or processes or units are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings), may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments herein include some features but not others included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments can be used in any combination.
Various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that some or all of the functions of some or all of the components in a gateway, proxy server, system according to embodiments of the present invention may be implemented in practice using a microprocessor or Digital Signal Processor (DSP). The present invention can also be implemented as an apparatus or device program (e.g., a computer program and a computer program product) for performing a portion or all of the methods described herein. Such a program embodying the present invention may be stored on a computer readable medium, or may have the form of one or more signals. Such signals may be downloaded from an internet website, provided on a carrier signal, or provided in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The use of the words first, second, third, etc. do not denote any order. These words may be interpreted as names.
The invention discloses a method for preparing a composite material, which comprises the following steps:
a1, a security detection method is characterized by being applied to a cloud server, and comprises the following steps:
When the security central control equipment controls the target alarm equipment to alarm based on detection information, the detection information is acquired from the security central control equipment, wherein the detection information is determined by the security central control equipment according to a real-time video uploaded by a target camera;
And determining whether the security central control equipment fails according to the detection information.
The method of claim A2, wherein the cloud server pre-stores a plurality of identification groups, each identification group comprises an identification of an alarm device and an identification of a camera, the detection information comprises a first identification of the target alarm device and a second identification of the target camera, and the determining whether the security central control device fails according to the detection information comprises:
Searching whether a target identification group exists in the plurality of identification groups, wherein the identification of the alarm equipment in the target identification group is the same as the first identification, and the identification of the camera in the target identification group is the same as the second identification;
And if the target identification group does not exist in the plurality of identification groups, judging that the security central control equipment fails.
A3, the method according to claim A1, wherein the cloud server pre-stores a portrait library, the detection information includes a target image, the target image is obtained from the real-time video by the security central control device, the target image includes a portrait to be detected determined by the security central control device, and the determining whether the security central control device fails according to the detection information includes:
Searching whether the to-be-detected human images exist in the human image library;
And if the to-be-detected human images exist in the human image library, judging that the security central control equipment fails.
A4. the method according to claim A3, wherein the determining whether the security central control device is faulty according to the detection information includes:
acquiring the total number of all the portraits in the target image and the number of the portraits to be detected in the target image;
judging whether the total number is the same as the number, and if the total number is different from the number, judging that the security central control equipment fails.
A5, the method according to claim A1, wherein the detection information comprises a target image, the target image is obtained from the real-time video by the security central control equipment, the target image comprises a figure to be detected determined by the security central control equipment, and the determining whether the security central control equipment fails according to the detection information comprises:
Acquiring an actual alarm category when the target alarm equipment alarms;
analyzing the target image to obtain an analysis result;
judging the analysis result according to a preset condition set to obtain a judgment result;
determining a target alarm category of the target alarm equipment according to the judging result;
And judging whether the target alarm category is the same as the actual alarm category, and if not, judging that the security central control equipment fails.
The method according to claim A5, wherein determining the target alarm category of the target alarm device according to the determination result includes:
When the judgment result represents that the analysis result does not meet all preset conditions in the preset condition set, determining the target alarm category as early warning, otherwise, determining the target alarm category as alarm;
The preset condition set comprises one or more of a first preset condition that the to-be-detected portrait is located in a set area in the target image, a second preset condition that the uploading moment of the target image is located in a set period, and a third preset condition that the gesture of the to-be-detected portrait is a set gesture.
A7. the method according to claim A6, wherein the determining whether the target alarm category and the actual alarm category are the same, if not, determining that the security central control equipment has a fault comprises:
if the target alarm category is early warning and the actual alarm category is alarm, judging that the security central control equipment fails;
And if the target alarm type is alarm and the actual alarm type is early warning, judging that the security central control equipment fails.
A8. the method according to claim A1, characterized in that the method further comprises:
acquiring a parameter configuration request sent by the security central control equipment;
and transmitting a setting parameter to the security central control equipment according to the parameter configuration request, wherein the setting parameter is uploaded by a user terminal, and the setting parameter comprises a detection rule which is adopted by the security central control equipment when the detection information is determined according to the real-time video.
B9, a security protection detection device, its characterized in that is applied to high in the clouds server, the device includes:
The detection information acquisition module is used for acquiring detection information from the security central control equipment when the security central control equipment controls the target alarm equipment to alarm based on the detection information, wherein the detection information is determined by the security central control equipment according to the real-time video uploaded by the target camera;
And the fault determining module is used for determining whether the security central control equipment is faulty or not according to the detection information.
The apparatus of claim B10, wherein the cloud server pre-stores a plurality of identification groups, each of which includes an identification of an alarm device and an identification of a camera, the detection information includes a first identification of the target alarm device and a second identification of the target camera, and the fault determining module is configured to:
Searching whether a target identification group exists in the plurality of identification groups, wherein the identification of the alarm equipment in the target identification group is the same as the first identification, and the identification of the camera in the target identification group is the same as the second identification;
And if the target identification group does not exist in the plurality of identification groups, judging that the security central control equipment fails.
The apparatus of claim B11, wherein the cloud server pre-stores a portrait library, the detection information includes a target image, the target image is obtained from the real-time video by the security central control device, and the target image includes a portrait to be detected determined by the security central control device, and the fault determining module is configured to:
Searching whether the to-be-detected human images exist in the human image library;
And if the to-be-detected human images exist in the human image library, judging that the security central control equipment fails.
B12, the apparatus of claim B11, wherein the fault determination module is configured to:
acquiring the total number of all the portraits in the target image and the number of the portraits to be detected in the target image;
judging whether the total number is the same as the number, and if the total number is different from the number, judging that the security central control equipment fails.
B13, the apparatus of claim B9, wherein the detection information includes a target image, the target image is obtained from the real-time video by the security central control device, the target image includes a to-be-detected figure determined by the security central control device, and the fault determining module is configured to:
Acquiring an actual alarm category when the target alarm equipment alarms;
analyzing the target image to obtain an analysis result;
judging the analysis result according to a preset condition set to obtain a judgment result;
determining a target alarm category of the target alarm equipment according to the judging result;
And judging whether the target alarm category is the same as the actual alarm category, and if not, judging that the security central control equipment fails.
B14, the apparatus of claim B13 wherein the fault determination module is configured to:
When the judgment result represents that the analysis result does not meet all preset conditions in the preset condition set, determining the target alarm category as early warning, otherwise, determining the target alarm category as alarm;
The preset condition set comprises one or more of a first preset condition that the to-be-detected portrait is located in a set area in the target image, a second preset condition that the uploading moment of the target image is located in a set period, and a third preset condition that the gesture of the to-be-detected portrait is a set gesture.
B15. the apparatus of claim B14, wherein the fault determination module is configured to:
if the target alarm category is early warning and the actual alarm category is alarm, judging that the security central control equipment fails;
And if the target alarm type is alarm and the actual alarm type is early warning, judging that the security central control equipment fails.
B16, the apparatus of claim B9, wherein the apparatus further comprises:
The security central control device comprises a parameter configuration module, a parameter configuration module and a security central control device, wherein the parameter configuration module is used for acquiring a parameter configuration request sent by the security central control device, and issuing a set parameter to the security central control device according to the parameter configuration request, wherein the set parameter is uploaded by a user terminal and comprises a detection rule which is adopted by the security central control device when determining the detection information according to the real-time video.
C17. a computer readable storage medium, having stored thereon a computer program which when executed by a processor implements the steps of the security detection method of any of claims A1-A8.
D18. a cloud server, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the security detection method according to any of claims A1-A8 when the program is executed.

Claims (12)

1. The security detection method is characterized by being applied to a cloud server, and comprises the following steps:
When the security central control equipment controls the target alarm equipment to alarm based on detection information, the detection information is acquired, wherein the detection information is determined by the security central control equipment according to real-time video uploaded by the target camera;
determining whether the security central control equipment fails according to the detection information;
The cloud server pre-stores a plurality of identification groups, wherein each identification group comprises an identification of one alarm device and an identification of one camera, the detection information comprises a first identification of the target alarm device and a second identification of the target camera, and the determining whether the security central control device fails according to the detection information comprises the following steps:
Searching whether a target identification group exists in the plurality of identification groups, wherein the identification of the alarm equipment in the target identification group is the same as the first identification, and the identification of the camera in the target identification group is the same as the second identification;
And if the target identification group does not exist in the plurality of identification groups, judging that the security central control equipment fails.
2. The method of claim 1, wherein the detection information includes a target image, the target image is obtained by the security central control device from the real-time video, the target image includes a figure to be detected determined by the security central control device, and the determining whether the security central control device fails according to the detection information includes:
Acquiring an actual alarm category when the target alarm equipment alarms;
analyzing the target image to obtain an analysis result;
judging the analysis result according to a preset condition set to obtain a judgment result;
determining a target alarm category of the target alarm equipment according to the judging result;
And judging whether the target alarm category is the same as the actual alarm category, and if not, judging that the security central control equipment fails.
3. The method of claim 2, wherein the determining the target alert category of the target alert device based on the determination comprises:
When the judgment result represents that the analysis result does not meet all preset conditions in the preset condition set, determining the target alarm category as early warning, otherwise, determining the target alarm category as alarm;
The preset condition set comprises one or more of a first preset condition that the to-be-detected portrait is located in a set area in the target image, a second preset condition that the uploading moment of the target image is located in a set period, and a third preset condition that the gesture of the to-be-detected portrait is a set gesture.
4. The method of claim 3, wherein said determining whether the target alert category and the actual alert category are the same, and if not, determining that the security central control device is malfunctioning comprises:
if the target alarm category is early warning and the actual alarm category is alarm, judging that the security central control equipment fails;
And if the target alarm type is alarm and the actual alarm type is early warning, judging that the security central control equipment fails.
5. The method of claim 1, wherein the method further comprises:
acquiring a parameter configuration request sent by the security central control equipment;
and transmitting a setting parameter to the security central control equipment according to the parameter configuration request, wherein the setting parameter is uploaded by a user terminal, and the setting parameter comprises a detection rule which is adopted by the security central control equipment when the detection information is determined according to the real-time video.
6. A security detection device, characterized in that is applied to cloud server, the device includes:
The detection information acquisition module is used for acquiring detection information when the security central control equipment controls the target alarm equipment to alarm based on the detection information, wherein the detection information is determined by the security central control equipment according to the real-time video uploaded by the target camera;
the fault determining module is used for determining whether the security central control equipment is faulty or not according to the detection information;
The cloud server pre-stores a plurality of identification groups, wherein each identification group comprises an identification of one alarm device and an identification of one camera, the detection information comprises a first identification of the target alarm device and a second identification of the target camera, and the fault determination module is used for:
Searching whether a target identification group exists in the plurality of identification groups, wherein the identification of the alarm equipment in the target identification group is the same as the first identification, and the identification of the camera in the target identification group is the same as the second identification;
And if the target identification group does not exist in the plurality of identification groups, judging that the security central control equipment fails.
7. The apparatus of claim 6, wherein the detection information includes a target image, the target image being obtained by the security central control device from the real-time video, the target image including a figure to be detected determined by the security central control device, and the fault determining module is configured to:
Acquiring an actual alarm category when the target alarm equipment alarms;
analyzing the target image to obtain an analysis result;
judging the analysis result according to a preset condition set to obtain a judgment result;
determining a target alarm category of the target alarm equipment according to the judging result;
And judging whether the target alarm category is the same as the actual alarm category, and if not, judging that the security central control equipment fails.
8. The apparatus of claim 7, wherein the fault determination module is to:
When the judgment result represents that the analysis result does not meet all preset conditions in the preset condition set, determining the target alarm category as early warning, otherwise, determining the target alarm category as alarm;
The preset condition set comprises one or more of a first preset condition that the to-be-detected portrait is located in a set area in the target image, a second preset condition that the uploading moment of the target image is located in a set period, and a third preset condition that the gesture of the to-be-detected portrait is a set gesture.
9. The apparatus of claim 8, wherein the fault determination module is to:
if the target alarm category is early warning and the actual alarm category is alarm, judging that the security central control equipment fails;
And if the target alarm type is alarm and the actual alarm type is early warning, judging that the security central control equipment fails.
10. The apparatus of claim 6, wherein the apparatus further comprises:
The security central control device comprises a parameter configuration module, a parameter configuration module and a security central control device, wherein the parameter configuration module is used for acquiring a parameter configuration request sent by the security central control device, and issuing a set parameter to the security central control device according to the parameter configuration request, wherein the set parameter is uploaded by a user terminal and comprises a detection rule which is adopted by the security central control device when determining the detection information according to the real-time video.
11. A computer readable storage medium, having stored thereon a computer program which when executed by a processor performs the steps of the security detection method of any of claims 1 to 5.
12. A cloud server comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the security detection method of any of claims 1-5 when the program is executed.
CN201910780155.4A 2019-08-22 2019-08-22 A security detection method, device and cloud server Active CN112422885B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910780155.4A CN112422885B (en) 2019-08-22 2019-08-22 A security detection method, device and cloud server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910780155.4A CN112422885B (en) 2019-08-22 2019-08-22 A security detection method, device and cloud server

Publications (2)

Publication Number Publication Date
CN112422885A CN112422885A (en) 2021-02-26
CN112422885B true CN112422885B (en) 2025-03-25

Family

ID=74778952

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910780155.4A Active CN112422885B (en) 2019-08-22 2019-08-22 A security detection method, device and cloud server

Country Status (1)

Country Link
CN (1) CN112422885B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114461863A (en) * 2021-12-29 2022-05-10 浙江大华技术股份有限公司 Anomaly detection method, device, electronic device and storage medium for intelligent equipment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106327738A (en) * 2016-08-26 2017-01-11 特斯联(北京)科技有限公司 Intelligent grading monitoring system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201465242U (en) * 2009-06-12 2010-05-12 上海新联纬讯科技发展有限公司 Intelligent video frequency monitoring system capable of filtering false alarm
CN104700535B (en) * 2014-12-31 2018-09-28 大亚湾核电运营管理有限责任公司 A kind of video for illegal invasion nuclear power plant checks alarm method and device
JP2018196021A (en) * 2017-05-18 2018-12-06 日本電気株式会社 Fault management device, fault management system and processing method
KR20190046310A (en) * 2017-10-26 2019-05-07 주식회사 이엠맵정보 CCTV Camera Video Fault Management System

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106327738A (en) * 2016-08-26 2017-01-11 特斯联(北京)科技有限公司 Intelligent grading monitoring system

Also Published As

Publication number Publication date
CN112422885A (en) 2021-02-26

Similar Documents

Publication Publication Date Title
US12081595B2 (en) Monitoring system for securing networks from hacker drones
US11854357B2 (en) Object tracking using disparate monitoring systems
US20210124914A1 (en) Training method of network, monitoring method, system, storage medium and computer device
US10424175B2 (en) Motion detection system based on user feedback
KR101987241B1 (en) Complexed event processing base smart monitoring platform and smart monitoring method
EP2998945A1 (en) System for auto-configuration of devices in a building information model using bluetooth low energy
US10755543B1 (en) Bridge device supporting alarm format
CN109544870B (en) Alarm judgment method for intelligent monitoring system and intelligent monitoring system
US20140211003A1 (en) Safety monitoring device and method
CN113888826A (en) Monitoring processing method, device and system, computer equipment and storage medium
CN110505438B (en) Queuing data acquisition method and camera
CN112422885B (en) A security detection method, device and cloud server
CN206656471U (en) Air conditioner and monitoring system based on air conditioner
EP4148538A1 (en) Action association method based on internet of things, and electronic device and storage medium
CN109712355A (en) Building safety monitoring method, smart machine and door lock
CN113591641A (en) Security monitoring method, electronic device, air conditioner and computer readable storage medium
JP7300958B2 (en) IMAGING DEVICE, CONTROL METHOD, AND COMPUTER PROGRAM
JP2021111201A (en) Face authentication system and face authentication method
KR102367584B1 (en) Automatic video surveillance system using skeleton video analysis technique
CN108428316A (en) Security monitoring method and device, security equipment and household appliance
CN109284730B (en) Method and device applied to screening data and monitoring system
CN111696290A (en) Security decision method and device, computing equipment and computer storage medium
CN113255435A (en) Article monitoring method and device, computer equipment and storage medium
CN105374150A (en) Alarm control method, device and server
US10692217B2 (en) Image processing method and image processing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant