Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Comprehensive security monitoring method and comprehensive security monitoring system based on sentry

A security monitoring and sentinel technology, applied in the field of comprehensive security monitoring methods and systems based on sentry, can solve the problems of worrying security situation, comatose security personnel, and inability to report sentinel information in time.

Inactive Publication Date: 2012-08-22
NAT UNIV OF DEFENSE TECH
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, some emergencies may directly lead to coma or death of security personnel, so that the sentry information cannot be reported in time, causing heavy losses to the security area
In recent years, there have been many incidents of attacks on security personnel, resulting in serious losses in related security areas and adverse social impacts
In addition, security personnel generally adopt the method of standing guard for guarding. When encountering a sudden vicious attack, they are often powerless and cannot report to the police in time, leaving opportunities for criminals to take advantage of, and the security situation is worrying.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Comprehensive security monitoring method and comprehensive security monitoring system based on sentry
  • Comprehensive security monitoring method and comprehensive security monitoring system based on sentry
  • Comprehensive security monitoring method and comprehensive security monitoring system based on sentry

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] like figure 1 As shown, the implementation steps of the sentinel-based comprehensive security monitoring method in this embodiment are as follows:

[0059] 1) Set the critical value of the sleep pulse, the weak pulse of life and the threshold of human motion signs;

[0060] 2) Real-time collection of the pulse and human movement signs of the security personnel at the sentry position. When it is detected that the pulse of the security personnel is lower than the sleep pulse threshold, the on-site video of the sentry position will be collected through the camera, and the drowsiness warning will be output to the security personnel and sent to the monitoring center. Collected by the camera On-site video; when it is detected that the pulse of the security personnel is lower than the critical value of the weak pulse of life or the physical signs of the security personnel are lower than the critical value of human physical signs, the on-site video of the sentinel will be colle...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a comprehensive security monitoring method and a comprehensive security monitoring system based on a sentry. The comprehensive security monitoring method includes the following implementation steps: 1) setting a sleep pulse critical value, a life weak pulse critical value and a human movement sign critical value; and 2) collecting pulse and human movement signs of sentry security personnel in real time. Security monitoring alarm is achieved according to three factors of the pulse, the human movement signs and manually triggered alarm, a sentry site video is collected through a camera during the triggered alarm, and alarm and the site video collected by the camera are sent to a monitoring center. The comprehensive security monitoring system comprise the monitoring center and at least one sentry unit, the sentry unit comprises a video monitoring unit, a sentry base station and at least one security personnel terminal, the video monitoring unit comprises the camera with a rotary platform, and the security personnel terminal comprises a pulse sensor, an attitude sensor, an alarm button, a terminal controller and a terminal wireless module. The comprehensive security monitoring method and the comprehensive security monitoring system based on the sentry have the advantages of being good in security, high in reliability, accurate in video monitoring and simpleand convenient to use.

Description

technical field [0001] The present invention relates to the security field, in particular to a whistle-based comprehensive security monitoring method and system for ensuring the security of security areas. Background technique [0002] Security personnel on duty is a basic system of security and an important line of defense to ensure the security of the security area. In normal times, this system can effectively curb infringements, prevent accidents, maintain safety and stability, and promote the harmonious development of security areas; in emergencies, this system can effectively stop infringements and ensure the personal and property safety of people in security areas. Security personnel on duty mainly have three functions: 1) deterrence; 2) verification and control of people entering; 3) special situation disposal. Deterrence: Security personnel are required to be on duty at all times and remain vigilant at all times, so as not to give criminals an opportunity; check and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G08B21/02G08B21/06
Inventor 冯莹赵立双王俊朱靖乔林波胡正良
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products