CN113284274A - Trailing identification method and computer readable storage medium - Google Patents
Trailing identification method and computer readable storage medium Download PDFInfo
- Publication number
- CN113284274A CN113284274A CN202110516457.8A CN202110516457A CN113284274A CN 113284274 A CN113284274 A CN 113284274A CN 202110516457 A CN202110516457 A CN 202110516457A CN 113284274 A CN113284274 A CN 113284274A
- Authority
- CN
- China
- Prior art keywords
- information
- stranger
- intelligent door
- image information
- suspicious
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 94
- 230000006399 behavior Effects 0.000 claims description 71
- 230000014509 gene expression Effects 0.000 claims description 16
- 230000001960 triggered effect Effects 0.000 claims description 16
- 230000003068 static effect Effects 0.000 claims description 12
- 230000008921 facial expression Effects 0.000 claims description 10
- 238000006073 displacement reaction Methods 0.000 claims description 9
- 230000008569 process Effects 0.000 claims description 8
- 230000000007 visual effect Effects 0.000 claims description 6
- 230000009471 action Effects 0.000 description 8
- 238000001514 detection method Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 8
- 238000004891 communication Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 238000012795 verification Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 238000012544 monitoring process Methods 0.000 description 4
- 241000282326 Felis catus Species 0.000 description 3
- 230000004397 blinking Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 230000005856 abnormality Effects 0.000 description 2
- 230000006835 compression Effects 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 210000003811 finger Anatomy 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 210000003813 thumb Anatomy 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/174—Facial expression recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/20—Movements or behaviour, e.g. gesture recognition
- G06V40/28—Recognition of hand or arm movements, e.g. recognition of deaf sign language
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M11/00—Telephonic communication systems specially adapted for combination with other electrical systems
- H04M11/04—Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Psychiatry (AREA)
- Social Psychology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Signal Processing (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a trailing identification method and a computer readable storage medium, which are used for an intelligent door system comprising an intelligent door, and the method comprises the following steps: collecting image information outside the intelligent door; identifying all face information in the image information, and judging whether each face information is stranger information; if at least one piece of face information is stranger information, judging whether behavior of a stranger corresponding to the stranger information is suspicious or not based on the acquired image information; if yes, alarming. The method comprises the steps of collecting image information near the intelligent door, judging whether a stranger exists according to the image information, further detecting whether behavior of the stranger is suspicious if the stranger exists, and giving an alarm when the behavior of the stranger is suspicious, so that the condition of a user can be mastered, and emergency situations can be dealt with in time.
Description
Technical Field
The invention relates to the field of intelligent doors, in particular to a trailing identification method and a computer readable storage medium.
Background
The intelligent door is a door integrating a biological feature recognition technology or an electronic lock or an electronic device such as an automatic door opening and closing machine, and is also called an intelligent safety door or an intelligent anti-theft door. The intelligent door is realized by taking an intelligent system host as a carrier and adopting the internet of things technology on the basis of the traditional anti-theft safety door. Compared with the traditional door, the intelligent door can provide the intelligent life experience of the user, for example, the intelligent door can be automatically unlocked according to the recognized face information or fingerprint information, so that the user can safely open the door without any tool or even without contact, and therefore the intelligent door is used by more and more users and becomes an important component of intelligent home life.
Disclosure of Invention
The invention provides a trailing identification method for an intelligent door, which can give an alarm when a stranger with suspicious behaviors is identified outside the intelligent door so as to deal with emergency situations in time.
Based on this, the embodiment of the invention discloses a trailing identification method for an intelligent door system comprising an intelligent door, the method comprising:
collecting image information outside the intelligent door;
identifying all face information in the image information, and judging whether each face information is stranger information;
if at least one piece of face information is stranger information, judging whether behavior of a stranger corresponding to the stranger information is suspicious or not based on the acquired image information;
if yes, alarming.
According to another specific embodiment of the invention, when the behavior of the stranger corresponding to the stranger information is judged to be suspicious, an interrupt signal is output; the trailing identification method further comprises:
before unlocking the intelligent door is completed, detecting whether an interrupt signal is received;
if the interrupt signal is received, stopping unlocking the intelligent door;
otherwise, unlocking and opening the intelligent door.
According to another embodiment of the present invention, the method further comprises:
after the intelligent door is unlocked, detecting whether an interrupt signal is received in real time in the process of opening the intelligent door;
and if the interrupt signal is received, closing the intelligent door and locking.
According to another specific embodiment of the present invention, the judging whether the behavior of the stranger corresponding to the stranger information is suspicious based on the collected image information includes:
determining target pixel points of stranger information in each frame of image of the image information;
acquiring the matching relation of a target pixel point in each two adjacent frames of images in the image information by using a characteristic point matching method;
calculating a target pose based on a visual odometry method and a matching relation of a target pixel point in each two adjacent frames of images;
acquiring the speed of a stranger according to the target pose by using a difference or filter or regression method;
and comparing the acquired speed of the stranger with a threshold speed, and if the speed is greater than the threshold speed, suspicious behaviors of the stranger.
According to another embodiment of the present invention, after detecting that the interrupt signal is received and the unlocking of the smart door is stopped, the trailing edge identification method further includes:
the method comprises the steps of collecting expression information of a user, matching the expression information with preset safe expression information, and unlocking and opening the intelligent door if matching is successful.
According to another specific embodiment of the invention, the intelligent door system further comprises an alarm module, a cloud server and a mobile terminal which are in communication connection, and the trailing identification method further comprises the following steps:
the alarm module is triggered to output alarm information to the cloud server;
and the cloud server sends the alarm information to the mobile terminal to alarm.
According to another embodiment of the present invention, the alarm module being triggered comprises:
collecting facial expression information or gesture information of a user, matching the facial expression information or the gesture information with preset alarm information, and if matching is successful, triggering an alarm module; and/or
Collecting voice information of a user, and judging whether the collected voice information is preset alarm voice help-seeking information or not; if yes, the alarm module is triggered; and/or
Collecting fingerprint information of a user, and judging whether the collected fingerprint information is preset alarm fingerprint information; if yes, the alarm module is triggered.
According to another specific embodiment of the present invention, the judging whether the behavior of the stranger corresponding to the stranger information is suspicious based on the collected image information includes:
detecting whether a stranger has a static action based on the image information; if yes, calculating the time for the stranger to stay still, comparing the time for the stranger to a first threshold time, and if the time for the stranger to stay still exceeds the first threshold time, judging that the behavior of the stranger is suspicious; and/or the presence of a gas in the gas,
detecting whether the strangers are in the image information within the second threshold time or not based on the image information, if so, judging that the behavior of the strangers is suspicious, and/or,
establishing a coordinate system in the image information, acquiring a moving path of a stranger based on the image information, calculating corresponding displacement of the moving path under the coordinate system, judging whether the displacement direction is opposite according to the displacement, and if so, judging that the behavior of the stranger is suspicious.
According to another specific embodiment of the present invention, the intelligent door system further includes a cloud server and a mobile terminal, and the alarming includes:
when the behavior of the stranger is judged to be suspicious, storing the image information and uploading the image information to a cloud server;
and the cloud server transmits the image information to the mobile terminal to alarm.
According to another embodiment of the present invention, the method for identifying the trailing edge further comprises: and after judging that the behavior of the stranger is suspicious, carrying out sound early warning and/or light early warning.
According to another embodiment of the present invention, the method further comprises:
when all face information in the image information is recognized, if at least one piece of face information is not stranger information, detecting the distance between a person near the intelligent door and the intelligent door, and comparing the distance with a threshold distance;
and if the distance is smaller than or equal to the threshold distance, displaying the acquired image information outside the intelligent door.
According to another embodiment of the present invention, the smart door system further comprises a display screen for displaying image information; the trailing identification method further comprises:
when judging whether the behavior of a stranger corresponding to the stranger information is suspicious, if the stranger does not have suspicious behavior, judging whether the display time of the display screen exceeds a preset time length; and if so, closing the display screen.
According to another embodiment of the present invention, a method for determining whether face information is stranger information includes:
comparing the face information with preset face information;
and if the similarity between the preset face information and the face information is smaller than the similarity threshold, the face information is stranger information.
Correspondingly, the embodiment of the invention also discloses a trailing identification system for the intelligent door, which comprises the following components:
the acquisition module is used for acquiring image information outside the intelligent door;
the identification module is connected with the acquisition module and used for receiving the image information acquired by the acquisition module, identifying all face information in the image information, judging whether each face information is stranger information, and judging whether behaviors of strangers corresponding to the stranger information are suspicious based on the acquired image information if at least one face information is the stranger information;
and the alarm module is connected with the identification module and used for giving an alarm when the identification module judges that the identified stranger behavior is suspicious.
Correspondingly, the invention also provides a trailing identification system for the intelligent door, which comprises a collection device, an identification device and an alarm device. The acquisition includes a processor and a memory, the memory including instructions that when implemented by the processor are capable of performing the following functions: and the acquisition function is used for acquiring the image information outside the intelligent door. The identification device comprises a processor and a memory, wherein the memory comprises instructions which can realize the following functions when being implemented by the processor: and the identification function is used for receiving the image information acquired by the acquisition module, identifying all face information in the image information, judging whether each face information is stranger information, and judging whether behaviors of strangers corresponding to the stranger information are suspicious based on the acquired image information if at least one face information is the stranger information. The alarm device comprises a processor and a memory, wherein the memory comprises instructions which can realize the following functions when being implemented by the processor: and the alarm function is used for giving an alarm when the identification device judges that the identified stranger behavior is suspicious.
Accordingly, the embodiment of the invention also discloses a computer readable storage medium, which stores instructions, and the instructions when executed on a computer cause the computer to execute the trailing identification method.
Compared with the prior art, the invention has the following technical effects:
by collecting image information near the intelligent door and judging whether a stranger exists according to the image information, if the stranger exists, whether behavior of the stranger is suspicious is further detected, and when the behavior of the stranger is suspicious, an alarm is given so as to be convenient for mastering conditions of a user and timely cope with an emergency situation.
Drawings
FIG. 1 is a first flowchart of a method for tail identification according to the present invention;
FIG. 2 is a flow chart of a method for tail identification according to the present invention;
FIG. 3 shows a flow chart III of the trailing identification method provided by the present invention;
FIG. 4 shows a schematic view of an electronic device of an embodiment of the invention;
FIG. 5 illustrates a schematic diagram of a system on a chip of an embodiment of the invention.
Detailed Description
The following description of the embodiments of the present invention is provided for illustrative purposes, and other advantages and effects of the present invention will become apparent to those skilled in the art from the present disclosure. While the invention will be described in conjunction with the preferred embodiments, it is not intended that features of the invention be limited to these embodiments. On the contrary, the invention is described in connection with the embodiments for the purpose of covering alternatives or modifications that may be extended based on the claims of the present invention. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. The invention may be practiced without these particulars. Moreover, some of the specific details have been left out of the description in order to avoid obscuring or obscuring the focus of the present invention. It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
It should be noted that in this specification, like reference numerals and letters refer to like items in the following drawings, and thus, once an item is defined in one drawing, it need not be further defined and explained in subsequent drawings.
In the description of the present embodiment, it should be noted that the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
In the description of the present embodiment, it should be further noted that, unless explicitly stated or limited otherwise, the terms "disposed" and "connected" are to be interpreted broadly, and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present embodiment can be understood in specific cases by those of ordinary skill in the art.
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
The invention provides a trailing identification method which can be applied to an intelligent door system comprising an intelligent door. As shown in fig. 1, the trailing identification method may include:
step S101: and acquiring image information outside the intelligent door.
Specifically, can be located outdoor one side installation at the intelligence door and make a video recording the module, utilize the module of making a video recording to gather the outer near image information of intelligence. Optionally, the camera module can also be arranged on the door frame or the wall side wall on one side outside the intelligent door, as long as the image information of the outer nearby intelligent door can be clearly collected. Furthermore, in order to clearly acquire image information required inside and outside the intelligent door on the basis of cost as low as possible, the camera arranged outside the intelligent door can be a wide-angle lens. Specifically, the wide-angle lens may have a viewing angle of 150 ° or more, whereas the conventional lens is smaller than 90 °, and thus the wide angle may capture wider visual field information.
Step S102: and identifying all face information in the image information, and judging whether each face information is stranger information.
Specifically, since there may be a plurality of face information in the acquired image information, each face to be detected needs to be compared to determine whether each face information is stranger information.
The face recognition technology is a relatively mature technology, and for example, an AVS03A image processor can be used to determine whether a face exists in a dynamic scene and a complex background, and separate the face. In general, the face recognition method may include a reference template method, a face rule method, a sample learning method, a skin color model method, a feature sub-face method, or the like. Taking a reference template method as an example, firstly, one or a plurality of templates of standard human faces are designed, then, collected image information is divided and the like, the matching degree between each divided part of image and the standard template is calculated, and whether the human faces exist is judged by comparing whether the calculated matching degree reaches a threshold value.
Illustratively, the method for judging whether the face information is stranger information comprises the following steps:
comparing the face information with preset face information;
and if the similarity between the preset face information and the face information is smaller than the similarity threshold, the face information is stranger information.
Optionally, the preset face information may be face information of the user and each family member thereof, and when the user performs face registration on the smart door for the first time, the face information is recorded and stored in the smart door. Further, the preset face information can also be used as judgment information for identifying and verifying the door opening through the face. When the face is verified to open the door, the door can be verified to open only when the similarity between the face information of the verified door and the preset face information exceeds or reaches a similarity threshold value. In specific implementation, the number of the preset face information is more than one, so that the face information in the acquired image information needs to be compared with each preset face information, and if the similarity between the face information and one of the preset face information reaches or exceeds a similarity threshold, the face information can be regarded as not stranger information, that is, only when the similarities between the face information and all the preset face information are less than the similarity threshold, the face information can be regarded as stranger information.
Optionally, the similarity threshold may be 90%, that is, when the similarity between the face information and the preset face information reaches or exceeds 90%, it may be determined that the person to be detected and the person corresponding to the preset face information are the same person. For example, when the similarity between the face information and the preset face information is 80%, the face information and the preset face information are considered to be two different persons because 80% is less than 90%, and when the similarity between the face information and the preset face information is 95%, the face information and the preset face information are considered to be the same person because 95% is greater than 90%. Further, for example, if the number of the preset face information stored in the intelligent door is 5, when it is determined whether the face information in the acquired image information is stranger information, the face information needs to be respectively compared with the five preset face information, and if the comparison results are respectively 80%, 70%, 60%, 55% and 35%, the face information in the acquired image information can be regarded as stranger information.
Further, if it is determined in step S102 that at least one piece of face information is stranger information, step S103 is performed.
Step S103: and judging whether the behavior of the stranger corresponding to the stranger information is suspicious or not based on the image information.
That is, when it is recognized that there are a plurality of face information in the image information and there is stranger information in the plurality of face information, it is only necessary to recognize the behavior of the stranger corresponding to the stranger information, and it is not necessary to recognize the behavior of the person corresponding to the other non-stranger information. For example, when 4 pieces of face information (face a, face B, face C, face D) are recognized in the image information, the face a to the face D are respectively determined, and if the determination result shows that the face a and the face B are stranger information and the face C and the face D are not stranger information, the main control module of the smart door performs behavior recognition on the persons corresponding to the face a and the face B based on the image information, but does not recognize whether the behaviors of the persons corresponding to the face C and the face D are suspicious.
Specifically, whether strangers wander, whether users or smart gates are in play, whether running actions exist, whether hiding actions exist, and other abnormal actions can be used as conditions for judging whether behaviors are suspicious.
If it is detected in step S103 that there is a suspicion of a stranger' S behavior, step S104 is executed.
Step S104: and (5) alarming.
Specifically, the suspicious behavior identification in step S103 is performed in the main control module of the intelligent door, and when the main control module identifies that the behavior of a stranger is suspicious, an alarm is given in time.
After judging a stranger according to the image information, detecting whether the behavior of the stranger is suspicious, and giving an alarm in time when the behavior of the stranger is suspicious so as to be convenient for mastering the condition of a user and deal with an emergency in time.
Optionally, in an embodiment of the present invention, the smart door system may further include a cloud server and a mobile terminal, which are communicatively connected; the step S104 of alarming may specifically include:
after the fact that the behavior of the stranger corresponding to the stranger information is suspicious is judged based on the image information, the image information is stored and uploaded to a cloud server, and the cloud server sends the image information to the mobile terminal to give an alarm.
In particular, the mobile terminal may be an APP pre-installed on a handset of an emergency contact (e.g., other members of the user's home). After the host system of intelligence door is based on to image information discernment, if judge that the action of stranger that stranger face information corresponds exists doubtedly, then can preserve the image information at this moment to regard this image information as alarm information and send to cloud ware, cloud ware again with this alarm information propelling movement to the APP on the urgent contact cell-phone, after cell-phone APP received alarm information, let the cell-phone send vibrations and the suggestion of ringing, so that urgent contact can in time see alarm information in order to implement the rescue action.
Further, when the behavior of the stranger corresponding to the stranger information is judged to be suspicious, an interrupt signal is output; as shown in fig. 2, the trailing identification method further includes:
step S201: before unlocking the intelligent door is completed, detecting whether an interrupt signal is received; if the interrupt signal is received, step S202 is executed, otherwise step S203 is executed.
Step S202: stopping unlocking the intelligent door;
step S203: and unlocking and opening the intelligent door.
Optionally, the above steps may be set to be performed before the user enters the door, that is, when the user returns, and when the door is opened through outdoor verification, before the unlocking of the smart door is completed, if an interrupt signal is received, the main control module may stop unlocking the smart door.
Specifically, taking the face recognition verification for opening the door as an example, the process of automatically opening the door after the face verification is successful is as follows: after the face recognition module successfully recognizes, identity authentication success information is sent to the intelligent door main control module; the intelligent door main control module sends an unlocking instruction to the automatic lock control module according to the authentication information; after the automatic lock receives the instruction, a motor of the lock body is electrified to drive the lock tongue to withdraw, and then unlocking is completed; after the bolt sensor detects that the bolt is withdrawn, the automatic lock control module feeds back information of successful unlocking to the intelligent door main control module. After receiving the information of successful unlocking, the intelligent door control module further sends a door opening instruction to the door opener control module, and after receiving the door opening instruction, the door opener control module powers on a motor of the door opening machine to drive the door opening mechanism to automatically open the intelligent door.
The intelligent door is unlocked according to the interruption signal, and the unlocking of the intelligent door is stopped before the bolt is retracted (namely, the unlocking is finished). If the intelligent door is unlocked and the interruption signal is detected, the main control module of the intelligent door controls the intelligent door to close and lock, namely, the trailing identification method may further include:
s204: detecting whether an interrupt signal is received in real time in the process of opening the intelligent door;
if the interrupt signal is received, step S205 is executed. Step S205 is to close and lock the smart door.
Specifically, in the process of opening the intelligent door, if an interrupt signal is received, the main control module of the intelligent door can enable the door opening mechanism control module to control the intelligent door to stop opening and further send a door closing instruction to the door opening machine control module, after the door opening machine control module receives the door closing instruction, the motor of the door opening machine is electrified in an opposite phase mode to drive the door opening mechanism to automatically close the intelligent door, and then when the intelligent door is detected to be closed, the main control module of the intelligent door can send a locking instruction to the automatic lock control module; after the automatic lock receives a locking instruction, the lock body motor is electrified in a reversed phase mode to drive the bolt to extend out, and therefore locking of the intelligent door is achieved.
Illustratively, after detecting that the interrupt signal is received and the intelligent door is stopped to be unlocked, the trailing edge identification method further comprises:
the method comprises the steps of collecting expression information of a user, matching the expression information with preset safe expression information, and unlocking and opening the intelligent door if matching is successful.
Specifically, the step may be performed by separately providing a face authentication module on or near the smart door, or may be performed by using a face authentication module for authenticating opening of the door on the smart door. When the main control module of the intelligent door judges that a suspicious behavior exists in a stranger, after the intelligent door is closed, if a user further confirms that no danger exists, certain specific expression information (such as smiling expressions, blinking expressions and the like) can be made to the face verification module to indicate that no danger exists, and after the expression information is verified successfully, the intelligent door can be unlocked and opened, so that the intelligent door can be opened very conveniently after the user further judges that no danger exists, and the user experience is improved.
Further, in the opening process of the smart machine, after the smart door is closed and locked due to the detection of the interrupt signal, the step of acquiring expression information to match so as to unlock and open the smart door can be executed.
Exemplarily, as shown in fig. 3, the judging whether the behavior of the stranger corresponding to the stranger information is suspicious based on the collected image information includes:
step S301: and determining target pixel points of stranger information in each frame of image of the image information.
Step S302: and obtaining the matching relation of the target pixel point in each two adjacent frames of images in the image information by using a characteristic point matching method. The feature point matching method here may be an optical flow method or other feature point matching methods.
Step S303: and calculating the target pose based on the visual odometry method and the matching relation of the target pixel points in each two adjacent frames of images. Besides calculating the target pose by using a visual odometer method, the target pose can be obtained by using pnp or a least square method taking the target position pose as a variable and the reprojection error as loss.
Step S304: acquiring the speed of a stranger according to the target pose by using a difference or filter or regression method;
step S305: and comparing the acquired speed of the stranger with a threshold speed, and if the speed is greater than the threshold speed, suspicious behaviors of the stranger.
Alternatively, the suspicious behavior determination process may be performed before the user enters the door, that is, before the user enters the door, when the user verifies that the door is opened, whether a stranger has a running behavior is monitored in real time. Specifically, when a user is carrying out face verification to open a door or slightly opens the door, the intelligent door detects whether the moving speed of a strange human body exceeds a threshold speed through images, if so, the intelligent door stops opening the door and actively closes the door to achieve the purpose of defense. In particular, the threshold speed may be set to 5m/s, and stranger behaviour is considered suspicious when the speed of detected strangers is greater than 5 m/s. For example, if a stranger is detected at a speed of 2m/s, the stranger is considered to be absent of suspicious activity because 2m/s is less than 5 m/s; and if the speed of the detected stranger is 6m/s, the behavior of the stranger is considered to be suspicious because 6 is more than 5, and then an alarm is given.
Illustratively, the judging whether the behavior of the stranger corresponding to the stranger information is suspicious based on the collected image information comprises:
detecting whether a stranger has a static action based on the image information; if the unknown person exists, calculating the time for the unknown person to be static, comparing the static time with a first threshold time, and if the static time exceeds the first threshold time, judging that the behavior of the unknown person is allowable; and/or the presence of a gas in the gas,
detecting whether the strangers are in the image information within the second threshold time or not based on the image information, if so, judging that the behavior of the strangers can be met, and/or,
establishing a coordinate system in the image information, acquiring a moving path of a stranger based on the image information, calculating corresponding displacement of the moving path under the coordinate system, judging whether the displacement direction is opposite according to the displacement, and if so, judging that the behavior of the stranger is suspicious.
Optionally, the step of judging whether the stranger behavior is suspicious may be carried out after the user enters the door. Further, suspicious behavior may also be ranked, including: first order (stay); second level (stay + face towards smart door); third level (stay + face toward door left, right, top head rotated);
lingering is specifically stopping and wandering in a monitoring area, wherein the stopping detection may include detecting whether a stranger stays in the monitoring screen for an immobile time exceeding a first threshold time (such as 3 s); loitering detection may include detecting whether the human body movement path is displaced in the opposite direction in the monitor scene coordinates or does not leave the monitor scene for more than a second threshold time (e.g., 6 s).
Head left and right, last rotation detection can detect the realization through head gesture angle, specifically includes: whether a stranger observes the door and the environment in the left direction, the right direction and the upper direction is detected, the intelligent door monitoring system can set detection angle threshold values (for example, 15 degrees) for the 3 directions, if the stranger rotates towards one direction, the stranger is considered to rotate the head towards the direction when the rotation angle of the stranger exceeds the detection angle threshold value, and when the head of the stranger rotates towards two directions, the stranger is judged to observe the door and the surrounding environment.
Exemplarily, the intelligent door system further comprises an alarm module, a cloud server and a mobile terminal which are in communication connection, and the trailing identification method further comprises the following steps:
the alarm module is triggered to output alarm information to the cloud server;
and the cloud server sends the alarm information to the mobile terminal to alarm.
Similarly, in a specific embodiment, the mobile terminal may also be an APP pre-installed on a mobile phone of an emergency contact (e.g., other members in a user's home), the alarm module may be disposed on a smart door, a door frame, or a wall near the smart door, the alarm module may be an active alarm module (e.g., automatically triggering an alarm by collecting information such as an image and a sound of the user), or may be a passive alarm module (e.g., may be an alarm button, and when the alarm button is pressed, an alarm is triggered). After the alarm module is triggered, alarm information can be generated, and the alarm information is pushed to a mobile phone APP of an emergency contact through a cloud server. Moreover, as mentioned above, after the mobile phone APP receives the alarm information, the mobile phone APP can send out vibration and ringing prompts, so that emergency contacts can see the alarm information in time to implement rescue actions.
Illustratively, the alarm module being triggered includes: collecting facial expression information of a user, matching the facial expression information with preset alarm information, and triggering an alarm module if matching is successful; and/or collecting voice information of a user, and judging whether the collected voice information is preset voice help-seeking information; if yes, triggering an alarm module; and/or collecting fingerprint information of a user, and judging whether the collected fingerprint information is preset fingerprint information; if yes, an alarm module is triggered.
That is to say, when the alarm module is actively triggered, the alarm module may be triggered in three ways, and when the alarm module is triggered, the alarm information generated by the alarm module may be acquired image information or may also be character information such as "life saving" or "Help". The three triggering modes are as follows:
the first method is that facial expression information of a user is utilized, specifically, facial expression information or gesture information of the user is collected by a high-definition camera arranged on an intelligent door, the collected facial expression information or gesture information of the user is transmitted to a main control module, the main control module matches the facial expression information with preset alarm information (such as frightening) or matches the gesture information with the preset alarm information (at the moment, the preset alarm information can be a gesture of stretching out a finger stroke number of '1', and the like), and if the matching is successful, the main control module triggers an alarm module. The preset alarm information may be pre-stored in the main control module of the smart door.
The second type utilizes the voice information of a user, specifically, a voice collector is arranged near an intelligent door or a door frame or the intelligent door, the voice collector is in communication connection with a main control module, the voice collector is used for collecting the voice information of the user, the collected voice information is sent to the main control module, the main control module compares the voice information of the user with preset voice help-seeking information (such as do not call me, save life and the like), and if the comparison is successful, the main control module triggers an alarm module. Similarly, the preset voice help-seeking information can be pre-stored in the main control module of the intelligent door.
And thirdly, fingerprint information of the user is utilized, specifically, a fingerprint identifier is arranged near the intelligent door or the door frame or the intelligent door, the fingerprint identifier is in communication connection with the alarm module, the fingerprint information of the user is collected by the fingerprint identifier, the collected fingerprint information is compared with preset fingerprint information (such as the fingerprint information of the thumb of the user), and if the comparison is successful, the fingerprint identifier triggers the alarm module. Wherein the preset fingerprint information may be pre-stored in the fingerprint identifier.
That is, when the user is performing face authentication, if the intelligent door recognizes that a stranger is running close to the intelligent door through the camera module, the automatic unlocking of the door is interrupted, and an outdoor horn warning sound prompt (such as three beeps) is given. After the user confirms safety, the safety can be expressed to the intelligent door through smiling or blinking actions, and the intelligent door is normally unlocked and opened after receiving the safety information; if the user confirms that the door is unsafe, danger can be expressed to the intelligent door through expressions, gestures, voice or fingerprints, and the intelligent door sends alarm information to family members after receiving the information.
Similarly, when the user is authenticated by the face, the intelligent door is slightly opened (within 15 °), and if the intelligent door recognizes that a stranger is running close to the intelligent door through the camera module, the intelligent door is immediately closed and locked, and a warning sound prompt such as a 'tic' is given. After confirming safety, the user expresses safety to the intelligent door through smiling or blinking actions, and the intelligent door normally unlocks and opens the door after receiving the safety information; if the user confirms that the door is unsafe, danger can be expressed to the intelligent door through expressions or gestures, and the intelligent door sends alarm information to family members after receiving the information.
Further, in order to enable the user to timely detect whether illegal actions such as intentional tailing and sudden attack exist in strangers before the user enters the door, the tailing identification method may further include:
when all face information in the image information is recognized, if at least one piece of face information is not stranger information, detecting the distance between a person near the intelligent door and the intelligent door, and comparing the distance with a threshold distance;
and if the distance is smaller than or equal to the threshold distance, displaying the acquired image information outside the intelligent door.
In particular, the distance between a person near the smart door and the smart door may be detected using a distance detection sensor (such as a TOF proximity sensor) or an infrared proximity sensor provided on the smart door. In addition, an outdoor display screen can be arranged outside the intelligent door, an indoor display screen is arranged in the intelligent door, and both the outdoor display screen and the indoor display screen can be used for displaying the acquired image information.
Taking the distance sensor as an example, the distance sensor can detect the distance between the intelligent door and the objects around the intelligent door, and if the distance between the intelligent door and the objects around the intelligent door is smaller than the preset distance, the intelligent door is considered to wake up the outdoor or indoor display screen to display image information. Alternatively, the preset distance may be set to 0.8 m. When it is judged that at least one piece of face information corresponds to a stranger (namely, the face information corresponds to a user or other family members) based on the acquired image information, the distance between people near the intelligent door and the intelligent door is further detected, and if the detected distance is less than or equal to 0.8m, the outdoor display screen is controlled to be opened to display the acquired image information, so that the user can observe the surrounding situation when preparing to open the door and can detect danger.
Through combining TOF proximity sensor and intelligent door outdoor display screen promptly, when the user is close to intelligent door certain distance (like 0.8m) and prepares the authentication and opens the door, the display screen can automatic display cat eye control picture. Therefore, when a stranger is nearby, the user only needs to scan the screen to know the safety of the user without looking around the screen, and the method can be used for anti-tailing detection before opening the door outdoors. In addition, this application can also combine TOF proximity sensor and intelligent door indoor display screen together, and the user is when indoor being close to intelligent door, when the user is close to intelligent door certain distance (if 0.8m), indoor display screen can automatic display cat eye control picture. Like this when the user is allowed to go out and leaves the family or someone presses the doorbell user and prepares to open the door, the user sweeps a screen and can know the outdoor condition, need not to touch any button again and observe outdoor condition in order to start the display screen or be close to the cat eye hole of traditional door for the indoor before opening safety is confirmed.
For example, if a person is 0.6m away from the intelligent door, then the distance between the person and the intelligent door detected by the distance sensor on the intelligent door is 0.6m and is greater than the preset distance of 0.5m, then the outdoor display screen is still in the sleep mode, when the person is 0.4m away from the intelligent door, the distance between the person and the intelligent door detected by the distance sensor is 0.4m and is less than the preset distance of 0.5m, then the distance sensor sends a wake-up signal to the main control module of the intelligent door, the main control module receives the wake-up signal to wake-up, and the outdoor display screen is controlled to be started to display the acquired image information around the intelligent door.
Optionally, after the behavior of the stranger is judged to be suspicious, the stranger with the suspicious behavior can be marked in the image information, for example, the stranger with the suspicious behavior is marked by a yellow or red square frame, and the image information after the marking processing is displayed by an outdoor display screen arranged near the intelligent door, so that the user can more effectively and quickly find the abnormality through the marking frame.
Furthermore, in order to enable the user to timely perceive whether illegal behaviors such as wandering and waiting exist outdoors or not after the user enters the home, an indoor display screen can be further arranged on the indoor intelligent door plate or near the indoor intelligent door and used for displaying image information collected by the outdoor camera, and therefore the user can timely check the situation outside the intelligent door indoors. Further, in order to reduce energy consumption, the anti-tailing identification method provided by the invention may further include: when judging whether the behavior of a stranger corresponding to the stranger information is suspicious, if the stranger does not have suspicious behavior, judging whether the display time of the display screen exceeds a preset time length; and if so, closing the display screen.
Specifically, the preset time period may be set to 2 min. That is, after a user enters the door, the intelligent door starts an indoor display screen arranged indoors to display an outdoor monitoring picture, and the display screen automatically turns off if suspicious behaviors of strangers are not detected within a certain time threshold (such as 2 min); if suspicious behaviors such as trailing behavior, wandering behavior and the like of strangers are detected, the loudspeaker sends out voice prompt, records video record trailing graded information and uploads the recorded video record trailing graded information to the server for the mobile phone end of the user to check. After hearing the prompt tone, the user looks back at the display screen at a glance, and the outdoor situation is clear at a glance. Of course, the user can also view past trailing records locally through the mobile phone client or the smart door.
Further, after the behavior of a stranger is judged to be suspicious, sound and/or light early warning can be carried out. In particular, the audible and visual warning may include a "drip" warning tone and a yellow/red warning mark box.
That is, if the main control module of the intelligent door recognizes that the behavior of a stranger is suspicious, the main control module can control the loudspeaker on the display screen to send out a 'dripping' prompt tone, and marks the person with the suspicious behavior with a yellow or red square frame in the picture on the display screen, so that the user can observe the picture behind the person through the display screen in the door opening process, and can timely find abnormality through the prompt of the intelligent door, thereby timely calling for help or avoiding danger.
Optionally, before acquiring the image information outside the intelligent door, the method may further include: whether personnel exist nearby the intelligent door or not is detected, and if the personnel exist nearby the intelligent door, the collection of image information outside the intelligent door is controlled.
Only when having personnel to exist near the intelligent door, the main control module of intelligent door just can awaken up the camera in order to gather outdoor first image, if do not have personnel to exist near the intelligent door, then the camera will be in dormant state. The information can avoid the energy waste caused by the long-time startup of the camera for collecting the image information.
The trailing identification method provided by the invention can enable a user to timely find suspicious situations such as trailing, wandering and the like, so that the user is early alert and danger is prevented. In addition, after suspicious behaviors of strangers are detected, an alarm is automatically given out, so that other people can know the conditions and deal with the emergency conditions in time.
Accordingly, the embodiment of the present invention also provides a computer-readable storage medium, which stores instructions suitable for being added by a processor and executing the above-mentioned trailing identification method.
Referring to FIG. 4, shown is a block diagram of an electronic device 400 in accordance with one embodiment of the present application. The electronic device 400 may include one or more processors 401 coupled to a controller hub 403. For at least one embodiment, the controller hub 403 communicates with the processor 401 via a multi-drop Bus such as a Front Side Bus (FSB), a point-to-point interface such as a QuickPath Interconnect (QPI), or similar connection port. Processor 401 executes instructions that control general types of data processing operations. In one embodiment, the Controller Hub 403 includes, but is not limited to, a Graphics Memory Controller Hub (GMCH) (not shown) and an Input/Output Hub (IOH) (which may be on separate chips) (not shown), where the GMCH includes a Memory and a Graphics Controller and is coupled to the IOH.
The electronic device 400 may also include a coprocessor 402 and memory 404 coupled to the controller hub 403. Alternatively, one or both of the memory and GMCH may be integrated within the processor (as described herein), with the memory 404 and coprocessor 402 coupled directly to the processor 401 and controller hub 403, with the controller hub 403 and IOH in a single chip.
The Memory 404 may be, for example, a Dynamic Random Access Memory (DRAM), a Phase Change Memory (PCM), or a combination of the two. Memory 404 may include one or more tangible, non-transitory computer-readable media for storing data and/or instructions therein. A computer-readable storage medium has stored therein instructions, and in particular, temporary and permanent copies of the instructions. The instructions may include: instructions that, when executed by at least one of the processors, cause the electronic device 400 to implement the method illustrated in fig. 1-3. The instructions, when executed on a computer, cause the computer to perform the methods disclosed in any one or combination of the embodiments above.
In one embodiment, the coprocessor 402 is a special-purpose processor, such as, for example, a high-throughput MIC (man Integrated Core) processor, a network or communication processor, compression engine, graphics processor, GPGPU (General-purpose computing on graphics processing unit), embedded processor, or the like. The optional nature of coprocessor 402 is represented in FIG. 4 by dashed lines.
In one embodiment, the electronic device 400 may further include a Network Interface Controller (NIC) 406. Network interface 406 may include a transceiver to provide a radio interface for electronic device 400 to communicate with any other suitable device (e.g., front end module, antenna, etc.). In various embodiments, the network interface 406 may be integrated with other components of the electronic device 400. The network interface 406 may implement the functions of the communication unit in the above-described embodiments.
The electronic device 400 may further include an Input/Output (I/O) device 405. I/O405 may include: a user interface designed to enable a user to interact with the electronic device 400; the design of the peripheral component interface enables peripheral components to also interact with the electronic device 400; and/or sensors are designed to determine environmental conditions and/or location information associated with electronic device 400.
It is noted that fig. 4 is merely exemplary. That is, although fig. 4 shows that the electronic device 400 includes a plurality of devices, such as a processor 401, a controller hub 403, a memory 404, etc., in practical applications, the device using the methods of the present application may include only a part of the devices of the electronic device 400, for example, may include only the processor 401 and the network interface 406. The nature of the optional device in fig. 4 is shown in dashed lines.
Referring now to fig. 5, shown is a block diagram of a SoC (System on Chip) 500 in accordance with an embodiment of the present application. In fig. 5, similar components have the same reference numerals. In addition, the dashed box is an optional feature of more advanced socs. In fig. 5, SoC500 includes: an interconnect unit 550 coupled to the processor 510; a system agent unit 580; a bus controller unit 590; an integrated memory controller unit 540; a set or one or more coprocessors 520 which may include integrated graphics logic, an image processor, an audio processor, and a video processor; a Static Random-Access Memory (SRAM) unit 530; a Direct Memory Access (DMA) unit 560. In one embodiment, coprocessor 520 comprises a special-purpose processor, such as, for example, a network or communication processor, compression engine, GPGPU (General-purpose computing on graphics processing units, General-purpose computing on a graphics processing unit), high-throughput MIC processor or embedded processor, or the like.
Static Random Access Memory (SRAM) unit 530 may include one or more tangible, non-transitory computer-readable media for storing data and/or instructions. A computer-readable storage medium has stored therein instructions, and in particular, temporary and permanent copies of the instructions. The instructions may include: instructions that when executed by at least one of the processors cause the SoC to implement the method as shown in fig. 1-3. The instructions, when executed on a computer, cause the computer to perform the methods disclosed in the embodiments described above.
The method embodiments of the present application may be implemented in software, magnetic, firmware, etc.
Program code may be applied to input instructions to perform the functions described herein and generate output information. The output information may be applied to one or more output devices in a known manner. For purposes of this application, a processing system includes any system having a Processor such as, for example, a Digital Signal Processor (DSP), a microcontroller, an Application Specific Integrated Circuit (ASIC), or a microprocessor.
The program code may be implemented in a high level procedural or object oriented programming language to communicate with a processing system. The program code can also be implemented in assembly or machine language, if desired. Indeed, the mechanisms described herein are not limited in scope to any particular programming language. In any case, the language may be a compiled or interpreted language.
One or more aspects of at least one embodiment may be implemented by representative instructions stored on a computer-readable storage medium, which represent various logic in a processor, which when read by a machine causes the machine to fabricate logic to perform the techniques herein. These representations, known as "IP (Intellectual Property) cores," may be stored on a tangible computer-readable storage medium and provided to a number of customers or production facilities to load into the manufacturing machines that actually manufacture the logic or processors.
In some cases, an instruction converter may be used to convert instructions from a source instruction set to a target instruction set. For example, the instruction converter may transform (e.g., using a static binary transform, a dynamic binary transform including dynamic compilation), morph, emulate, or otherwise convert the instruction into one or more other instructions to be processed by the core. The instruction converter may be implemented in software, hardware, firmware, or a combination thereof. The instruction converter may be on the processor, off-processor, or partially on and partially off-processor.
While the invention has been shown and described with reference to certain preferred embodiments thereof, it will be understood by those skilled in the art that the foregoing is a more detailed description of the invention, taken in conjunction with the specific embodiments thereof, and that no limitation of the invention is intended thereby. Various changes in form and detail, including simple deductions or substitutions, may be made by those skilled in the art without departing from the spirit and scope of the invention.
Claims (14)
1. A trailing identification method for an intelligent door system including an intelligent door, comprising:
collecting image information outside the intelligent door;
identifying all face information in the image information, and judging whether the face information is stranger information;
if at least one piece of face information is the stranger information, judging whether behaviors of strangers corresponding to the stranger information are suspicious or not based on the acquired image information;
if yes, alarming.
2. The tailing identification method according to claim 1, characterized in that when it is determined that the behavior of a stranger corresponding to the stranger information is suspicious, an interrupt signal is output; the method for identifying the trailing also comprises the following steps:
detecting whether the interrupt signal is received before unlocking the intelligent door is completed;
if the interrupt signal is received, stopping unlocking the intelligent door;
otherwise, unlocking and opening the intelligent door.
3. The method of tail recognition as set forth in claim 2, further comprising:
after the intelligent door is unlocked, detecting whether the interrupt signal is received in real time in the process of opening the intelligent door;
and if the interrupt signal is received, closing the intelligent door and locking.
4. The tailgating identification method of claim 2, wherein the determining whether behavior of a stranger corresponding to the stranger information is suspicious based on the collected image information comprises:
determining target pixel points of the stranger information in each frame of image of the image information;
acquiring the matching relation of the target pixel point in each two adjacent frames of images in the image information by using a characteristic point matching method;
calculating a target pose based on a visual odometry method and the matching relation of the target pixel points in each two adjacent frames of images;
acquiring the speed of the stranger according to the target pose by using a difference or filter or regression method;
and comparing the acquired speed of the stranger with a threshold speed, and if the speed is greater than the threshold speed, the behavior of the stranger is suspicious.
5. The method of wake recognition according to any one of the claims 2 to 4, wherein after detecting that the unlocking of the smart door is stopped in order to receive the interrupt signal, the method of wake recognition further comprises:
the method comprises the steps of collecting expression information of a user, matching the expression information with preset safe expression information, and unlocking and opening the intelligent door if matching is successful.
6. The tailgating identification method according to any one of claims 1 to 4, wherein the smart door system further comprises an alarm module, a cloud server, and a mobile terminal, which are communicatively connected, and the tailgating identification method further comprises:
the alarm module is triggered to output alarm information to the cloud server;
and the cloud server sends the alarm information to the mobile terminal to alarm.
7. The trail identification method of claim 6, wherein the alarm module being triggered comprises:
acquiring facial expression information or gesture information of a user, matching the facial expression information or the gesture information with preset alarm information, and if the matching is successful, triggering an alarm module; and/or
Collecting voice information of a user, and judging whether the collected voice information is preset alarm voice help-seeking information or not; if yes, the alarm module is triggered; and/or
Collecting fingerprint information of a user, and judging whether the collected fingerprint information is preset alarm fingerprint information; if yes, the alarm module is triggered.
8. The tailgating identification method of claim 1, wherein the determining whether behavior of a stranger corresponding to the stranger information is suspicious based on the collected image information comprises:
detecting whether a static action exists in the stranger based on the image information; if the unknown person exists, calculating the time for the unknown person to be static, comparing the static time with a first threshold time, and if the static time exceeds the first threshold time, judging that the behavior of the unknown person is suspicious; and/or the presence of a gas in the gas,
detecting whether the strangers are in the image information within a second threshold time or not based on the image information, if so, judging that the behavior of the strangers is suspicious, and/or,
establishing a coordinate system in the image information, acquiring a moving path of the stranger based on the image information, calculating corresponding displacement of the moving path under the coordinate system, judging whether the displacement direction is opposite or not according to the displacement, and if so, judging that the behavior of the stranger is suspicious.
9. The tailgating identification method of claim 1, wherein the smart door system further comprises a cloud server and a mobile terminal, and wherein the alerting comprises:
when the behavior of the stranger is judged to be suspicious, the image information is stored and uploaded to the cloud server;
and the cloud server transmits the image information to the mobile terminal to alarm.
10. The method of tail recognition as claimed in claim 1, wherein the method of tail recognition further comprises: and after judging that the behavior of the stranger is suspicious, carrying out sound early warning and/or light early warning.
11. The method of tail recognition as claimed in claim 1, further comprising:
when all face information in the image information is identified, if at least one piece of face information is not stranger information, detecting the distance between people near the intelligent door and the intelligent door, and comparing the distance with a threshold distance;
and if the distance is smaller than or equal to the threshold distance, displaying the acquired image information outside the intelligent door.
12. The tailgating identification method as claimed in any one of claims 1 to 11, wherein the smart door system further comprises a display screen for displaying the image information; the method for identifying the trailing also comprises the following steps:
when judging whether the behavior of a stranger corresponding to the stranger information is suspicious, if the stranger does not have suspicious behavior, judging whether the display time of the display screen exceeds a preset time length; and if so, closing the display screen.
13. The method of trailing recognition according to claim 1, wherein the method of determining whether the face information is the stranger information comprises:
comparing the face information with preset face information;
and if the similarity between the preset face information and the face information is smaller than a similarity threshold value, the face information is the stranger information.
14. A computer-readable storage medium having stored thereon instructions that, when executed on a computer, cause the computer to perform the method of tailgating as claimed in any one of claims 1 to 13.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110516457.8A CN113284274A (en) | 2021-05-12 | 2021-05-12 | Trailing identification method and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110516457.8A CN113284274A (en) | 2021-05-12 | 2021-05-12 | Trailing identification method and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113284274A true CN113284274A (en) | 2021-08-20 |
Family
ID=77278692
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110516457.8A Pending CN113284274A (en) | 2021-05-12 | 2021-05-12 | Trailing identification method and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113284274A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113838230A (en) * | 2021-09-02 | 2021-12-24 | 珠海格力电器股份有限公司 | Door lock control method and device, door lock and storage medium |
CN113891038A (en) * | 2021-09-07 | 2022-01-04 | 深圳Tcl新技术有限公司 | Information prompting method and device, intelligent equipment and computer readable storage medium |
CN113920620A (en) * | 2021-09-29 | 2022-01-11 | 珠海格力电器股份有限公司 | Door lock control method and device, door lock and storage medium |
CN114511957A (en) * | 2022-02-11 | 2022-05-17 | 珠海格力电器股份有限公司 | Door lock-based trailing monitoring method, door lock, storage medium and electronic equipment |
CN114973486A (en) * | 2022-04-20 | 2022-08-30 | 上海奂燎智能科技有限公司 | Intelligent alarm method and device for machine room and electronic equipment |
CN115206009A (en) * | 2022-07-04 | 2022-10-18 | 珠海格力电器股份有限公司 | Child lock control method and device, storage medium and heating electric appliance |
Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103236103A (en) * | 2013-05-14 | 2013-08-07 | 苏州福丰科技有限公司 | Anti-follow access control system based on face recognition |
CN103680028A (en) * | 2013-12-06 | 2014-03-26 | 阮桂芳 | Remote entrance guard monitoring device |
CN104021362A (en) * | 2014-06-30 | 2014-09-03 | 重庆米润科技有限公司 | Access control pre-warning system and pre-warning control method based on image dynamic object identification |
CN104063969A (en) * | 2014-06-30 | 2014-09-24 | 重庆米润科技有限公司 | Access control early warning system and access control early warning control method based on motion detection |
CN106709436A (en) * | 2016-12-08 | 2017-05-24 | 华中师范大学 | Cross-camera suspicious pedestrian target tracking system for rail transit panoramic monitoring |
CN107392112A (en) * | 2017-06-28 | 2017-11-24 | 中山职业技术学院 | A kind of facial expression recognizing method and its intelligent lock system of application |
CN107613254A (en) * | 2017-09-26 | 2018-01-19 | 云丁网络技术(北京)有限公司 | It is a kind of to detect visitor, the method and device of identification visitor's identity outdoors |
CN207392926U (en) * | 2017-09-21 | 2018-05-22 | 云丁网络技术(北京)有限公司 | A kind of smart lock |
CN207638792U (en) * | 2017-12-30 | 2018-07-20 | 深圳市蓝色领域科技有限公司 | The monitoring system of suspicious actions can be warned |
CN207660399U (en) * | 2017-12-18 | 2018-07-27 | 重庆星麓智沃科技有限公司 | A kind of intelligent door lock based on Internet of Things |
CN208421928U (en) * | 2018-05-29 | 2019-01-22 | 浙江大华技术股份有限公司 | A kind of unlocking system |
CN109657608A (en) * | 2018-12-17 | 2019-04-19 | 中通服公众信息产业股份有限公司 | Trailing analysis method based on face recognition technology |
CN110689694A (en) * | 2019-10-17 | 2020-01-14 | 重庆工商职业学院 | Intelligent monitoring system and method based on image processing |
CN110796776A (en) * | 2019-12-13 | 2020-02-14 | 弘视(厦门)智能科技有限公司 | Intelligent access control system and control method thereof |
CN111027349A (en) * | 2018-10-10 | 2020-04-17 | 百度在线网络技术(北京)有限公司 | Anti-tailing prompting method, device, equipment and storage medium |
CN111243143A (en) * | 2020-03-25 | 2020-06-05 | 广东汇泰龙科技股份有限公司 | Method and system for identifying and warning strangers outside door |
CN111476685A (en) * | 2020-03-26 | 2020-07-31 | 深圳力维智联技术有限公司 | Behavior analysis method, device and equipment |
CN211979734U (en) * | 2020-05-27 | 2020-11-20 | 佳都新太科技股份有限公司 | Wisdom safety inspection floodgate machine system |
CN112184965A (en) * | 2020-09-30 | 2021-01-05 | 宁波久婵物联科技有限公司 | Anti-trailing management method and system based on face lock |
CN112257494A (en) * | 2020-09-09 | 2021-01-22 | 贵州赋行智能科技有限公司 | Behavior recognition method based on intelligent video analysis technology and application |
CN212583585U (en) * | 2020-04-21 | 2021-02-23 | 天津市团泊湖投资发展有限公司 | Anti-trailing gate |
-
2021
- 2021-05-12 CN CN202110516457.8A patent/CN113284274A/en active Pending
Patent Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103236103A (en) * | 2013-05-14 | 2013-08-07 | 苏州福丰科技有限公司 | Anti-follow access control system based on face recognition |
CN103680028A (en) * | 2013-12-06 | 2014-03-26 | 阮桂芳 | Remote entrance guard monitoring device |
CN104021362A (en) * | 2014-06-30 | 2014-09-03 | 重庆米润科技有限公司 | Access control pre-warning system and pre-warning control method based on image dynamic object identification |
CN104063969A (en) * | 2014-06-30 | 2014-09-24 | 重庆米润科技有限公司 | Access control early warning system and access control early warning control method based on motion detection |
CN106709436A (en) * | 2016-12-08 | 2017-05-24 | 华中师范大学 | Cross-camera suspicious pedestrian target tracking system for rail transit panoramic monitoring |
CN107392112A (en) * | 2017-06-28 | 2017-11-24 | 中山职业技术学院 | A kind of facial expression recognizing method and its intelligent lock system of application |
CN207392926U (en) * | 2017-09-21 | 2018-05-22 | 云丁网络技术(北京)有限公司 | A kind of smart lock |
CN107613254A (en) * | 2017-09-26 | 2018-01-19 | 云丁网络技术(北京)有限公司 | It is a kind of to detect visitor, the method and device of identification visitor's identity outdoors |
CN207660399U (en) * | 2017-12-18 | 2018-07-27 | 重庆星麓智沃科技有限公司 | A kind of intelligent door lock based on Internet of Things |
CN207638792U (en) * | 2017-12-30 | 2018-07-20 | 深圳市蓝色领域科技有限公司 | The monitoring system of suspicious actions can be warned |
CN208421928U (en) * | 2018-05-29 | 2019-01-22 | 浙江大华技术股份有限公司 | A kind of unlocking system |
CN111027349A (en) * | 2018-10-10 | 2020-04-17 | 百度在线网络技术(北京)有限公司 | Anti-tailing prompting method, device, equipment and storage medium |
CN109657608A (en) * | 2018-12-17 | 2019-04-19 | 中通服公众信息产业股份有限公司 | Trailing analysis method based on face recognition technology |
CN110689694A (en) * | 2019-10-17 | 2020-01-14 | 重庆工商职业学院 | Intelligent monitoring system and method based on image processing |
CN110796776A (en) * | 2019-12-13 | 2020-02-14 | 弘视(厦门)智能科技有限公司 | Intelligent access control system and control method thereof |
CN111243143A (en) * | 2020-03-25 | 2020-06-05 | 广东汇泰龙科技股份有限公司 | Method and system for identifying and warning strangers outside door |
CN111476685A (en) * | 2020-03-26 | 2020-07-31 | 深圳力维智联技术有限公司 | Behavior analysis method, device and equipment |
CN212583585U (en) * | 2020-04-21 | 2021-02-23 | 天津市团泊湖投资发展有限公司 | Anti-trailing gate |
CN211979734U (en) * | 2020-05-27 | 2020-11-20 | 佳都新太科技股份有限公司 | Wisdom safety inspection floodgate machine system |
CN112257494A (en) * | 2020-09-09 | 2021-01-22 | 贵州赋行智能科技有限公司 | Behavior recognition method based on intelligent video analysis technology and application |
CN112184965A (en) * | 2020-09-30 | 2021-01-05 | 宁波久婵物联科技有限公司 | Anti-trailing management method and system based on face lock |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113838230A (en) * | 2021-09-02 | 2021-12-24 | 珠海格力电器股份有限公司 | Door lock control method and device, door lock and storage medium |
CN113891038A (en) * | 2021-09-07 | 2022-01-04 | 深圳Tcl新技术有限公司 | Information prompting method and device, intelligent equipment and computer readable storage medium |
CN113920620A (en) * | 2021-09-29 | 2022-01-11 | 珠海格力电器股份有限公司 | Door lock control method and device, door lock and storage medium |
CN114511957A (en) * | 2022-02-11 | 2022-05-17 | 珠海格力电器股份有限公司 | Door lock-based trailing monitoring method, door lock, storage medium and electronic equipment |
CN114973486A (en) * | 2022-04-20 | 2022-08-30 | 上海奂燎智能科技有限公司 | Intelligent alarm method and device for machine room and electronic equipment |
CN115206009A (en) * | 2022-07-04 | 2022-10-18 | 珠海格力电器股份有限公司 | Child lock control method and device, storage medium and heating electric appliance |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113284274A (en) | Trailing identification method and computer readable storage medium | |
JP7145887B2 (en) | Vehicle, vehicle door unlocking control method, device, and vehicle door unlocking system | |
US11383676B2 (en) | Vehicles, vehicle door unlocking control methods and apparatuses, and vehicle door unlocking systems | |
WO2020125406A1 (en) | Safety guardianship method, apparatus, terminal and computer readable storage medium | |
US11196966B2 (en) | Identifying and locating objects by associating video data of the objects with signals identifying wireless devices belonging to the objects | |
US10846960B1 (en) | Garage security and convenience features | |
CN208014035U (en) | intelligent access control system | |
CN105844128B (en) | Identity recognition method and device | |
CN110297536B (en) | Control method and electronic equipment | |
US10593174B1 (en) | Automatic setup mode after disconnect from a network | |
CN113752983B (en) | Vehicle unlocking control system and method based on face recognition/eye recognition | |
WO2016019590A1 (en) | Intelligent door lock system, and intelligent door lock and intelligent alarm door | |
CN105279872A (en) | Anti-theft monitoring device and monitoring system for entrance door | |
CN112991585B (en) | Access personnel management method and computer readable storage medium | |
CN104504793A (en) | Intelligent door safety control system and method based on video service | |
CN106384479A (en) | Monitoring method and device | |
CN205080681U (en) | Register one's residence door electronic monitoring device | |
CN113053002B (en) | Door lock control method and device and storage medium | |
WO2019153378A1 (en) | Security protection method and device of floor cleaning robot | |
CN112699802A (en) | Driver micro-expression detection device and method | |
TWI611355B (en) | Barrier Door Controlling System and Barrier Door Controlling Method | |
TWI486910B (en) | Parking lot management system combined with two-factor identification and method therefore | |
US20210248221A1 (en) | Security control method and system | |
CN212229720U (en) | Intelligent access control system based on block chain | |
CN111583493A (en) | Intelligent access control system based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210820 |
|
RJ01 | Rejection of invention patent application after publication |