Security monitoring device based on big data and use method thereofTechnical Field
The invention relates to the technical field of security monitoring equipment, in particular to a security monitoring device based on big data and a using method thereof.
Background
The security monitoring system is an independent and complete system which is formed by transmitting video signals in a closed loop by using optical fibers, coaxial cables or microwaves, and shooting, image display and recording. The system can reflect the monitored object in real time, vividly and truly, not only greatly prolongs the observation distance of human eyes, but also enlarges the functions of the human eyes, can replace manpower to carry out long-time monitoring in severe environment, enables people to see all the actual conditions of the monitored site, and records the actual conditions through a video recorder. Meanwhile, the alarm system device alarms illegal intrusion, generated alarm signals are input into the alarm host, and the alarm host triggers the monitoring system to record and record videos.
The existing security monitoring device is used, generally only can watch and store the display terminal connected with a cable to the terminal storage in real time, so that a storage card with larger capacity needs to be added, a user still needs to watch the display terminal appointed after installation, the video recording is relatively troublesome to check, and meanwhile, the existing security monitoring device cannot recognize the human face to a certain degree, so that a good warning effect cannot be achieved.
Disclosure of Invention
1. Technical problem to be solved
The invention aims to provide a security monitoring device based on big data and a using method thereof, aiming at the problems in the prior art, the security monitoring device can realize that a user can use a display terminal connected with a cable to check a video, can simultaneously use a mobile terminal to check a real-time video in a close range and a big data in a long range to check the video, and upload the video to the big data, thereby reducing the capacity requirement of a memory card, meanwhile, the device can compare the video with the data uploaded once when the video is uploaded to the big data, judge whether a strange face hole intrudes or not by a face recognition algorithm written in a camera, once the strange face hole intrudes, a buzzer is started by a controller to prompt, and a good warning effect is achieved.
2. Technical scheme
In order to solve the above problems, the present invention adopts the following technical solutions.
The security monitoring device comprises a camera, wherein the camera is connected with a first cable, the first cable is fixedly connected with a transmission box, a storage unit is fixedly arranged inside the transmission box, the other end of the first cable is connected with the storage unit, a second cable is fixedly connected with the output end of the storage unit, the second cable penetrates through the transmission box and is connected with a display terminal, a wireless transmission end is fixedly arranged inside the transmission box and is connected with the storage unit, the wireless transmission end is connected with a standby battery arranged inside the transmission box, and a receiving end is arranged above the standby battery of the transmission box.
The using method further comprises the following steps:
s1: the user opens the camera, and the camera transmits the image to the storage unit in real time through the first cable, stores in the storage unit and transmits to the display terminal simultaneously and shows.
S2: the user presses the switch button to collect user's fingerprint information through fingerprint identification module, correct when detecting user information, can start wireless transmission end, upload the inside image of memory cell to big data, convenient to use person uses mobile terminal to watch the video.
S3: when big data are uploaded, the big data can be compared with the data uploaded once, whether a strange face breaks in or not is judged through a face recognition algorithm of the camera, and once the strange face breaks in, the buzzer is started through the controller to prompt.
Furthermore, the receiving end is connected with a controller, the side wall is fixedly connected with a buzzer on the transmission box, the buzzer is fixed with the controller, and the buzzer can be started through the controller, so that the warning effect is achieved.
Furthermore, the side wall is installed with the switch button under the transmission box, fingerprint identification module is installed to the side wall under the switch button, can carry out big data transmission through user's discretion.
Further, wireless transmission end right side wall fixedly connected with warning light, and the warning light runs through the transmission box setting, and whether convenient to use person looks over for the data transmission state.
Further, transmission box left side wall fixed mounting has the interface that charges, and the interface that charges is connected with backup battery, can charge backup battery, avoids leading to interim data loss because of the outage.
Furthermore, first cable and second cable run through transmission box department and all install the rubber tube, avoid first cable and second cable wearing and tearing, have strengthened the leakproofness simultaneously, effectively block inside dust and the moisture entering transmission box.
Furthermore, the outer surface of the transmission box is pasted with an identification code, and the transmission box can be bound with a mobile terminal, so that the safety of a user is enhanced.
Furthermore, the transmission box is located the storage unit upside and installs bluetooth module, and the bluetooth is connected with the storage unit, and the video recording is looked over in real time to the accessible bluetooth, and the operation is more convenient.
Furthermore, a face recognition algorithm is installed inside the camera, and the data is transmitted through the face recognition algorithm and then compared with the big data, so that whether the shot person is a strange face or not is judged.
3. Advantageous effects
Compared with the prior art, the invention has the advantages that
(1) This scheme can realize that the user can use cable junction's display terminal to look over the video, can utilize mobile terminal's closely to look over real-time video and long distance to carry out big data simultaneously and look over the video, and upload the video to big data, the capacity requirement of storage card has been reduced, this device can compare with once uploading data when uploading the video to big data simultaneously, whether having strange face hole to break into through the face identification algorithm who writes into the camera, in case break into and start bee calling organ through the controller promptly with the suggestion, play fine warning effect.
(2) The receiving end is connected with the controller, and lateral wall fixedly connected with bee calling organ on the transmission box, and bee calling organ and controller are fixed, can start bee calling organ through the controller to play the effect of warning.
(3) The switch button is installed to the lateral wall under the transmission box, and fingerprint identification module is installed to the lateral wall under the switch button, can carry out big data transmission through user's discretion.
(4) The wireless transmission end right side wall fixedly connected with warning light, and the warning light runs through the transmission box setting, and whether convenient to use person looks over for the data transmission state.
(5) Transmission box left side wall fixed mounting has the interface that charges, and the interface that charges is connected with backup battery, can charge backup battery, avoids leading to interim data loss because of the outage.
(6) First cable and second cable run through transmission box department and all install the rubber tube, avoid first cable and second cable wearing and tearing, have strengthened the leakproofness simultaneously, effectively block inside dust and the moisture entering transmission box.
(7) The outer surface of the transmission box is pasted with the identification code, and the transmission box can be bound with the mobile terminal, so that the safety of a user is enhanced.
(8) The transmission box is located the storage unit upside and installs bluetooth module, and the bluetooth is connected with the storage unit, and the video recording is looked over in real time to the accessible bluetooth, and it is more convenient to operate.
(9) A face recognition algorithm is installed inside the camera, and the data is transmitted through the face recognition algorithm and then compared with the big data, so that whether the shot person is a strange face or not is judged.
Drawings
FIG. 1 is a schematic structural view of the present invention;
FIG. 2 is a schematic diagram of the circuit structure of the present invention;
FIG. 3 is a flow chart of the present invention.
The reference numbers in the figures illustrate:
the device comprises a camera 1, afirst cable 2, atransmission box 3, a storage unit 4, a second cable 5, adisplay terminal 6, a wireless transmission end 7, astandby battery 8, a receivingend 9, a controller 10, a buzzer 11, aswitch button 12, afingerprint identification module 13, a promptinglamp 14, acharging interface 15 and arubber tube 16.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention; it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments, and all other embodiments obtained by those skilled in the art without any inventive work are within the scope of the present invention.
In the description of the present invention, it should be noted that the terms "upper", "lower", "inner", "outer", "top/bottom", and the like indicate orientations or positional relationships based on those shown in the drawings, and are only for convenience of description and simplification of description, but do not indicate or imply that the referred device or element must have a specific orientation, be constructed in a specific orientation, and be operated, and thus should not be construed as limiting the present invention. Furthermore, the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "disposed," "sleeved/connected," "connected," and the like are to be construed broadly, e.g., "connected," which may be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Example 1:
please refer to fig. 1, a security monitoring device based on big data and a using method thereof, including a camera 1, the camera 1 is connected with afirst cable 2, thefirst cable 2 is fixedly connected with atransmission box 3, a storage unit 4 is fixedly installed inside thetransmission box 3, and the other end of thefirst cable 2 is connected with the storage unit 4, an output end of the storage unit 4 is fixedly connected with a second cable 5, the second cable 5 penetrates through thetransmission box 3 and is connected with adisplay terminal 6, a wireless transmission end 7 is fixedly installed inside thetransmission box 3, and the wireless transmission end 7 is connected with the storage unit 4, the wireless transmission end 7 is connected with astandby battery 8 installed inside thetransmission box 3, and a receivingend 9 is installed above thestandby battery 8 of thetransmission box 3.
The using method further comprises the following steps:
s1: the user opens the camera 1, and the camera 1 transmits the image to the storage unit 4 in real time through thefirst cable 2, stores the image in the storage unit 4 and simultaneously transmits the image to thedisplay terminal 6 for display.
S2: the user presses theswitch button 12 to collect user's fingerprint information throughfingerprint identification module 13, correct when detecting user's information, can start wireless transmission end 7, upload the inside image of memory cell 4 to big data, the person of being convenient for uses mobile terminal to watch the video.
S3: when big data are uploaded, the big data can be compared with the data uploaded once, whether a strange face enters the device or not is judged through a face recognition algorithm of the camera 1, and once the strange face enters the device, the buzzer is started through the controller to prompt.
Further, thereceiving end 9 is connected with a controller 10, the side wall of thetransmission box 3 is fixedly connected with a buzzer 11, the buzzer 11 is fixed with the controller 10, and the buzzer 11 can be started through the controller 10, so that the warning effect is achieved.
Further, the side wall is installed withswitch button 12 undertransmission box 3, andfingerprint identification module 13 is installed to the side wall underswitch button 12, can carry out big data transmission through user's discretion.
Further, wireless transmission end 7 right side wall fixedly connected withwarning light 14, andwarning light 14 runs through the setting oftransmission box 3, and whether convenient to use person looks over for the data transmission state.
Further,transmission box 3 left side wall fixed mounting has theinterface 15 that charges, and theinterface 15 that charges is connected with stand-bybattery 8, can charge stand-bybattery 8, avoids leading to interim data loss because of the outage.
Further,first cable 2 runs throughtransmission box 3 with second cable 5 and locates all to installrubber tube 16, avoidsfirst cable 2 and the wearing and tearing of second cable 5, has strengthened the leakproofness simultaneously, effectively blocks inside dust and the moisture enteringtransmission box 3.
Furthermore, the outer surface of thetransmission box 3 is pasted with an identification code, and can be bound with the mobile terminal, so that the safety of the user is enhanced.
Further,transmission box 3 is located 4 upsides of memory cell and installs bluetooth module, and the bluetooth is connected with memory cell 4, and the video recording is looked over in real time to the accessible bluetooth, and the operation is more convenient.
Furthermore, a face recognition algorithm is installed inside the camera 1, and data is transmitted through the face recognition algorithm and then compared with big data, so that whether the shot person is a strange face or not is judged.
The foregoing is only a preferred embodiment of the present invention; the scope of the invention is not limited thereto. Any person skilled in the art should be able to cover the technical scope of the present invention by equivalent or modified solutions and modifications within the technical scope of the present invention.