Current location - Loan Platform Complete Network - Big data management - What are the contents of the intelligent security system program
What are the contents of the intelligent security system program

How to build a set of intelligent security system suitable for the use of the neighborhood?

Smart security in the neighborhood generally need to build three aspects

Cell entrance and exit construction;

Cell internal construction;

Cell intelligent security system.

By building these three aspects, it makes the neighborhood form a security ecological chain, each system interlocked. Once an emergency occurs, you can implement linkage processing, rapid response.

1. Community entrance and exit construction

In the community at the entrance to configure face recognition door machine, intelligent camera, vehicle capture camera , to manage the crowd into the community as well as in and out of the vehicle.

1.1 Management of people entering and exiting

Front-end equipment is responsible for identification and comparison, open access to residents, identification of strangers, on-site alarms, and automatic capture and synchronization of image information on the community's computers at the entrances and exits.

The stranger's entry and exit records are completely automatic, and the subsequent query management is more convenient.

The function can also play the role of anti-tailgating at night. If there are lawbreakers attempting to follow the residents into the neighborhood at night, the device will capture the alarm.

If the system is connected to the intelligent public security platform, there are suspects, fugitives and other key groups, but also directly to the alarm information (time, location, characters, images, etc.), real-time synchronization of the intelligent public security platform, to help solve the case, and to ensure that the residents of the community to live in the security.

If a resident's friend comes to visit, he or she only needs to enter the visitor's password at the door to enter the neighborhood. The device will capture the person and automatically record the time and other information.

At the same time, the information of the visit will be sent to the resident's cell phone in real time to confirm the visitor and play a security role. It also avoids the risk of bad guys aiming at the visitor's password to enter the neighborhood.

Once a non-visitor enters the neighborhood with the password, the resident will see the abnormal visit information, then you need to timely notify the property to deal with, to avoid harm to the residents of the property security and life safety.

The purpose of the entrance and exit management system is to achieve the effect of crowd control, the danger will be intercepted with the community outside the door.

1.2 Management of vehicles

Installed at the entrance and exit of the vehicle capture camera, the owners of the implementation of automatic door opening, the visitors visit to ask the purpose of the visit, management of the community's entry and exit of the vehicle.

1.3 Perimeter Security Management

Build electronic fences or infrared butt alarms on the walls of the neighborhood, and install cameras for monitoring.

Once someone goes over the cell wall, it will trigger the equipment alarm. The software in the security center will present the alarm location in the form of a map.

Security management center personnel can monitor the view over time, over the location, over the face of the video shot when over the image, to do timely scheduling of security personnel to arrest the expulsion.

2. The internal construction of the cell

The main construction of two aspects: the entrance of the unit building and the indoor machine of the residents.

2.1 Construction of the entrance to the building

The entrance to the building is equipped with a live face recognition door machine.

What is Live Face Recognition?

Using mathematical modeling, multiple features of the face are extracted to build a face model. When an occupant uses the machine to swipe a face, the device extracts its brow bone, eyes, frontal bone, and other multiple feature comparisons.

Live detection is done not only by extracting features for comparison, but also by infrared sensing and dynamic detection.

The residents can easily enter and exit the building by swiping their faces.

If the system is docked to an elevator and a linkage protocol is done.

As soon as the occupant finishes brushing his face, the elevator automatically descends and lights up the floor automatically. It's very convenient to go straight to the residence with a face pass and no contact.

2.2 Resident Indoor Unit

One indoor extension in the residence has the basic functions of monitoring, answering, unlocking, alarm key, volume adjustment, and display adjustment.

Monitoring key: The indoor unit can monitor the situation of the entrance of the unit in real time, if it is a villa type, you can directly monitor the entrance, the main thing is that the entrance of the machine in which your indoor unit will be able to monitor which.

Answer key: Answer the call from the downstairs door phone, the display directly shows the image, you can clearly recognize the caller's appearance.

If it's a press from someone of unknown origin, the resident can directly use their cell phone to take a picture of the person to keep a record, and then ask the property management office who the person is and what the purpose of the visit is. It is also a way to protect their own safety.

Unlock button: After confirming your identity, press the unlock button and the downstairs access control will unlock the door and let the visitor in.

Alarm key: If there is an emergency and you need to ask for help, press the alarm key, the management center will receive the alarm signal and you can ask for help from the management center in real time.

The remaining two function keys are because some residents have different sensitivities to sound as well as images, giving them room for their own adjustments.

Small Ao in the research process found that some residents are very sensitive to the volume, especially the elderly, feel that the sound is a bit harsh, want to adjust the volume, but the machine does not have a volume adjustment, not inevitably bring a certain impact on life.

3. Community Intelligent Security System

Community Intelligent Security System contains the following categories:

Live Face Recognition System;

Visitor Management System;

Tailgating Alarm System

High Risk Personnel Management System;

1.

Intelligent security system must be the core of the first element of community security is to identify the identity of the distinction between strangers and community residents.

By extracting a number of facial features recognition, non-living body (such as photos, video) can not be verified.

If someone takes a photo or video to verify the device, the device won't respond and will trigger a camera at the entrance of the neighborhood to capture the alarm. (

Business process of face recognition system:

2. Visitor management system

Visitors visit only need to enter the password at the door, the device automatically capture the record information.

At the same time, it triggers the public terminal to push the visiting information to the residents, who can confirm the identity.

People entering the neighborhood through the visitor system will not trigger the alarm system on site.

Business process of visitor system:

3. Tailgating alarm system

This system is based on the face recognition technology, through the sampling and analysis of the community database comparison. When strangers tailing owners into the neighborhood before, has been the front-end equipment capture recognition comparison.

The equipment will automatically send the alarm signal to the security booth computer (graphic display), management center (graphic display), sound and light alarm (alarm sound).

The visualization of the stranger's face image will be displayed, and the security guard will be able to take the photo to guide the eviction.

The work of the business process:

4. Alarm of high-risk personnel

Community management office can be set up to personnel blacklist information, data synchronization and update to the small area of each device.

In fact, it is to set up the key concern personnel, such as this person often in this place to hang around, idle, seem to have stepped on the behavior, the management center can be set on this person.

Once at the entrance of the district, the alarm information is synchronized to the security guard's cell phone, the background software.

And the system can be docked to the government application platform, once the community appeared fugitive or suspect, the device will send the alarm signal directly to the intelligent public security platform, to help public security arrest and solve the case.

The system allows residents to live in the neighborhood without worrying about absconders and suspects.

The business process:

Like the content you can click a like, forward, share, comment, look at the subject adopted Ha.

Follow me "Aomin Aomin", the follow-up will have more related to the community access control, community security, building intercom and other knowledge, point of view to share out.

Detailed information can be found: web link