Current location - Training Enrollment Network - Mathematics courses - What are the contents of the intelligent security system scheme?
What are the contents of the intelligent security system scheme?
How to build an intelligent security system suitable for residential use?

Community smart security generally needs to build three aspects.

Construction of residential entrances and exits;

Community internal construction;

Intelligent security system for residential quarters.

By creating these three aspects, the community forms a safe ecological chain, and each system is interlocking. In case of emergency, linkage treatment can be implemented to respond quickly.

1. Construction of the entrance and exit of the community. Face recognition entrance guards, smart cameras and vehicle capture cameras are installed at the entrance and exit of the community to manage people entering the community and vehicles entering and leaving.

1. 1 people who manage access.

The front-end equipment is responsible for identifying and comparing, opening residents' access, identifying strangers, giving an alarm on the spot, and automatically capturing photos on the computer at the entrance and exit of the community, and synchronizing image information.

The entry and exit records of strangers are fully automated, and the follow-up inquiry management is more convenient.

This function can also play a role in preventing trailing at night. If criminals try to follow residents into the community at night, the equipment will capture the alarm.

If the system is connected to the intelligent public security platform, alarm information (time, place, people, images, etc. For key people such as criminal suspects and fugitives, it will be directly synchronized with the smart public security platform in real time, which will help solve the case and ensure the residential safety of residents in the community.

If a friend of the resident visits, just enter the visitor password at the door machine to enter the community. The device will capture this person and automatically record the time and other information.

At the same time, the visiting information will be sent to residents' mobile phones in real time to confirm the visitors and play a role in security. It also avoids the risk that the bad guys aim at the visitor password to enter the community.

Once non-visitors use passwords to enter the community, residents will see abnormal visiting information. At this time, it is necessary to inform the property in time to deal with it, so as not to harm the property safety and life safety of residents.

The purpose of the entrance and exit management system is to achieve the effect of mass prevention and treatment, and intercept the danger from outside the community.

1.2 Vehicle access management

Install a vehicle capture camera at the entrance and exit, automatically open the door to the owner, ask the visitors the purpose of their visit, and manage the vehicles entering and leaving the community.

1.3 perimeter security management

Build an electronic fence or infrared alarm on the wall of the community and install a camera for monitoring.

Once someone crosses the fence of the community, it will trigger the equipment alarm. The alarm location will be displayed on the software of the Security Management Center in the form of a map.

The personnel of the security management center can monitor and check the crossing time, crossing place and face videos and images taken during crossing, so as to dispatch security personnel to arrest and expel in time.

2. There are two main aspects in the internal construction of the residential area: the entrance of the unit building and the indoor units of the residents.

2. 1 entrance construction of unit building

Living face recognition door opener is installed at the entrance of the unit building.

What is living face recognition?

Using mathematical modeling, multiple features of human face are extracted and a face model is established. When households use the machine to brush their faces, the equipment will extract features such as brow bone, eyes and frontal bone for comparison.

The method of in vivo detection is not only feature comparison, but also infrared induction and dynamic detection.

Residents can easily get in and out of the unit building by brushing their faces.

If the system is connected to the elevator and a connection agreement is reached.

As long as the residents finish brushing their faces, the elevator will automatically descend and automatically light up the floor. It is very convenient to go directly to the residence in a face-to-face and non-contact way.

2.2 Home Indoor Unit

The indoor extension in the home has the basic functions of monitoring, answering, unlocking, alarm key, volume adjustment and display adjustment.

Monitoring key: the indoor unit can monitor the situation at the entrance of the unit building in real time. If it is a villa type, you can directly monitor the entrance. The most important thing is that your indoor machine can monitor where the door machine is.

Answer key: Answer the call from the downstairs door machine, and the display screen directly displays the image, which can clearly identify the appearance characteristics of the caller.

If it is pressed by someone you don't know, residents can directly take a photo of this person with their mobile phones for the record, and then ask the property management office who this person is and what is the purpose of the visit. It is also a way to protect your own safety.

Unlock key: after confirming your identity, press the unlock key, and the entrance guard downstairs will open the door for visitors to enter.

Alarm key: If you need help in an emergency, press the alarm key, and the management center will receive an alarm signal, and you can ask the management center for help in real time.

The remaining two function keys are because some residents have different sensitivities to sound and images, giving them their own adjustment space.

During the investigation, Xiao Ao found that some residents are very sensitive to the volume, especially the elderly. They think the sound is loud and harsh and want to adjust the volume, but the machine does not adjust the volume, which will inevitably bring some influence to their lives.

3. Community intelligent security system Community intelligent security system includes the following categories:

Living face recognition system;

Visitor management system;

Trailer alarm system

Management system for high-risk personnel;

1. Living face recognition system

The essential core of intelligent security system, the first element of community security is to identify identity and distinguish strangers and residents in the community.

By extracting multiple facial features, non-biological objects (such as photos and videos) cannot be verified.

If someone takes photos or videos to verify the equipment, the equipment will not respond, and the camera at the door of the community will be triggered to capture the alarm. (It is estimated that no one will take photos or videos to do this. )

Business process of face recognition system;

2. Visitor management system

Visitors only need to enter the password at the door machine when visiting, and the equipment automatically captures the recorded information.

At the same time, the WeChat official account terminal is triggered to push the visiting information to the residents, and the residents can confirm their identity.

People who enter the community through the guest system will not trigger the alarm system at the scene.

Business process of customer system:

3. Tracking personnel alarm system

The system is based on face recognition technology, through sampling analysis and comparison of community databases. Before the stranger followed the owner into the community, he was captured and identified by the front-end equipment.

The equipment will automatically send alarm signals to the security booth computer (visual display), management center (visual display) and audible and visual alarm (alarm sound) respectively.

The visual display of strangers' face images allows security guards to use photos to guide the expulsion.

Its work business process:

4. High-risk personnel call the police

The cell management office can establish the blacklist information of personnel and update the data to all devices in the cell synchronously.

In fact, it is to set up key personnel. For example, this person often hangs around this place, as if stepping on it. The management center can set up this person.

Once it appears at the door of the community, the alarm information is synchronized to the security mobile phone and background software.

Moreover, the system can be connected with the government application platform. Once a fugitive or suspect appears in the community, the device will send an alarm signal directly to the smart public security platform to help the public security arrest and solve the case.

Let residents live in the community with peace of mind, without worrying about absconding people and suspects in the community.

Its business process:

If you like the content, you can like it, forward it, share it and comment on it. I hope the subject will adopt it.

Pay attention to my "Aomin Aomin", and there will be more knowledge and opinions about community access control, community security, building intercom and so on.

Details can be found at the following website: network link.