Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Invasion monitoring method based on WIFI wireless signal and system

A technology of intrusion monitoring and wireless signals, applied in the field of intrusion monitoring based on WIFI wireless signals, can solve the problems of being in the laboratory stage, the influence of infrared monitoring equipment, and high false alarm rate, and achieve the effect of making up for the limited monitoring range

Active Publication Date: 2017-07-21
南京苗米科技有限公司
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of modern science and technology, the field of artificial intelligence is becoming more and more mature. Among them, the intelligent recognition and intelligent monitoring technology of human body movements is also developing rapidly as the basic technology of artificial intelligence. The existing intelligent monitoring technology can monitor the target object in real time. Provide detailed and effective analysis data for computers and artificial intelligence systems, but there is still a huge room for expansion of application requirements for real environments
[0003] Existing intrusion monitoring methods include video monitoring, infrared monitoring, etc. These monitoring methods have defects in coverage area and monitoring environment. Serious impact, high false alarm rate, etc.;
[0006] At present, the environment-aware analysis technology of CSI sub-carrier signals is still in the initial stage of development. Although the analysis based on wireless signals has high precision, the relevant research is still in the laboratory stage, and the practical application is very limited, and the problem solving of practical applications is mostly in the Exploration stage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Invasion monitoring method based on WIFI wireless signal and system
  • Invasion monitoring method based on WIFI wireless signal and system
  • Invasion monitoring method based on WIFI wireless signal and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in further detail below in conjunction with preferred embodiment, set forth more details in the following description so as to fully understand the present invention, but, the present invention can obviously be implemented in a variety of other modes different from this description, Those skilled in the art can make similar promotions and deductions based on actual application situations without violating the connotation of the present invention, so the content of this specific embodiment should not limit the protection scope of the present invention.

[0036] figure 1 , 2 It is a schematic diagram of an embodiment of the present invention. It should be noted that this drawing is only an example, not drawn according to the same scale, and should not be used as a limit to the actual scope of protection of the present invention.

[0037] Working principle: When there is no intrusion event in the monitoring environment, the WIFI sig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an invasion monitoring method based on a WIFI wireless signal. The method comprises following steps that each monitoring node acquires a CSI sub carrier wave emitted by a WIFI signal source, feature vector extraction is performed after initial filtering and de-noising filtering processing are carries out and the biggest component is selected to be a main feature variable of the signal; each monitoring node sends third signals to a front end server; and when the absolute value of the main feature variable of one of the third signals and the main feature variable of a static state signal is larger than a monitoring threshold value, the front end sever triggers an alarming signal. According to the invention, by sue of the existing wireless infrastructures, through signal processing, the CSI sub carrier waves are grabbed and analyzed to obtain a feature signal with the main feature variable; the feature signal is sent to the front end server and compared with a feature information database in the server, so whether foreign bodies invade the system can be judged; and by combing the provided system and the existing monitoring system, all-directional monitoring of a target region is achieved.

Description

technical field [0001] The invention relates to the technical field of information and communication engineering, to the application of wireless equipment in the field of target recognition and security, and in particular to an intrusion monitoring method and device based on WIFI wireless signals. Background technique [0002] With the rapid development of modern science and technology, the field of artificial intelligence is becoming more and more mature. Among them, the intelligent recognition and intelligent monitoring technology of human body movements is also developing rapidly as the basic technology of artificial intelligence. The existing intelligent monitoring technology can monitor the target object in real time. Provide detailed and effective analysis data for computers and artificial intelligence systems, but there is still a huge room for expansion of application requirements for real environments. [0003] Existing intrusion monitoring methods include video mon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G08B13/00
CPCG08B13/00
Inventor 苏瀚
Owner 南京苗米科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products