Monitoring method based on intelligent part and intelligent part and security and protection monitoring system

An intelligent accessory and security monitoring technology, applied in the electronic field, can solve the problems such as the inability to remotely and conveniently view real-time security monitoring information and log records, the inability to provide users with personalized and customized services, and the limited information points of the security monitoring system. , to achieve the effect of improving security effect, improving security monitoring, and avoiding security loopholes

Inactive Publication Date: 2013-09-18
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] First, the information points that the security monitoring system can access are very limited, and the monitoring range is limited to a single, fixed location, resulting in a blind area of ​​potential safety hazards; second, the security monitoring system mechanically relies on security personnel, and there is no The monitoring strategy cannot provide users with personalized and customized services; third, users cannot remotely and conveniently view real-time information and log records of security monitoring

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Monitoring method based on intelligent part and intelligent part and security and protection monitoring system
  • Monitoring method based on intelligent part and intelligent part and security and protection monitoring system
  • Monitoring method based on intelligent part and intelligent part and security and protection monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] see figure 1 , this embodiment provides a monitoring method based on smart accessories, which is suitable for private residences or organizations with smart homes. The main steps and principles are as follows:

[0046] Step 101: A. The server monitors at least one monitoring object according to the monitoring policy preset by the user.

[0047] In this embodiment, the server is a security monitoring master station, which can communicate with smart meters and smart accessories through a wide area network. The monitoring objects are smart homes in the user's home, such as smart TVs, smart refrigerators, smart air conditioners, etc., or monitoring equipment such as electronic access control, video surveillance, etc., or sensors such as smoke sensors, pressure sensors, infrared sensors, etc. Each smart home can Communicate with smart accessories via LAN. Users can log in to the server through the WAN, design the architecture of the security monitoring system, customize pe...

Embodiment 2

[0060] see figure 2 , this embodiment provides a smart accessory, which is suitable for security monitoring of private homes or organizations, and mainly includes: a control processing module 201 and a network port 202 .

[0061] The connection structure and working principle of each part are as follows:

[0062] The control processing module 201 is connected with the network port 202, and is used for controlling the network port 202 to receive the security monitoring information uploaded by at least one monitoring object, and for controlling the network port 202 to upload the security monitoring information to the server.

[0063] In this embodiment, the security monitoring information includes: security data of each of the monitoring objects, and power consumption information of each of the monitoring objects.

[0064] The network port 202 communicates with external servers and external monitoring objects respectively. During security monitoring, the control processing mo...

Embodiment 3

[0070] see Figure 4 , this embodiment provides a security monitoring system, which is suitable for security monitoring of private homes or organizations, including: a server 401 , a smart meter 402 , a smart accessory 403 , and at least one monitoring object 404 .

[0071] The main connection structure and working principle of each part are as follows:

[0072] The server 401 is connected to the smart meter 402 and the smart accessory 403 respectively through a wide area network communication, and is used to receive the security monitoring information of each monitoring object uploaded by the smart accessory, and compare the security monitoring information with the setting information in the monitoring strategy, and determine the current status of each monitoring object. Whether the security situation is abnormal, and when it is determined that there is an abnormality, according to the monitoring strategy and each security monitoring situation is an abnormal monitoring object...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the electronic field and discloses a monitoring method based on an intelligent part and the intelligent part and a security and protection monitoring system. The monitoring method mainly comprises that A, a server monitors at least one object to be monitored according to monitoring strategies preset by a user; B, uploaded security and protection monitoring information of the objects to be monitored is received and comprises security and protection monitoring data and power consumption of the objects to be monitored; C, the security and protection monitoring information is compared with set information in the monitoring strategies to determine whether current security and protection monitoring situations of the objects to be monitored are abnormal; D, if determined results in step C are abnormal, whether alarm information is needed to be sent to the user is determined according to the monitoring strategies; and E, the server sends the alarm information to the user if determined results in step D are needing. By means of the technical scheme, personalized security and protection monitoring strategies can be formulated by users, the security and protection monitoring range is expanded, labor costs are reduced, and housing security and protection effects are improved.

Description

technical field [0001] The invention relates to the field of electronics, in particular to a smart accessory and a security monitoring system based on the smart accessory. Background technique [0002] With the development of smart grid technology, especially information and communication technology, smart meters have been widely used. However, the current application of smart meters is only as the terminal closest to the user in the grid, and fails to provide users with better personal services and value-added services, especially in terms of security monitoring. With the development and progress of society and the improvement of national security awareness, people pay more and more attention to private security. Many communities and private units have installed corresponding security monitoring systems and are equipped with dedicated security personnel. [0003] In the process of carrying out the research of the present invention, the inventor finds that the prior art has...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G05B19/418
CPCY02P90/02
Inventor 陈华军段卫国郭晓斌董旭柱关泽武蒙家晓蒋屹新袁小凯
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products