CN111507574A - Security personnel deployment method and device, computer equipment and storage medium - Google Patents

Security personnel deployment method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN111507574A
CN111507574A CN202010194765.9A CN202010194765A CN111507574A CN 111507574 A CN111507574 A CN 111507574A CN 202010194765 A CN202010194765 A CN 202010194765A CN 111507574 A CN111507574 A CN 111507574A
Authority
CN
China
Prior art keywords
security
personnel
exhibition
monitoring
area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010194765.9A
Other languages
Chinese (zh)
Other versions
CN111507574B (en
Inventor
马量
丁雪玲
傅东生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Miracle Intelligent Network Co ltd
Original Assignee
Miracle Intelligent Network Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Miracle Intelligent Network Co ltd filed Critical Miracle Intelligent Network Co ltd
Priority to CN202010194765.9A priority Critical patent/CN111507574B/en
Publication of CN111507574A publication Critical patent/CN111507574A/en
Application granted granted Critical
Publication of CN111507574B publication Critical patent/CN111507574B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Tourism & Hospitality (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Alarm Systems (AREA)

Abstract

The application relates to a method and a device for deploying security personnel, computer equipment and a storage medium. The method comprises the following steps: acquiring monitoring data collected for a current exhibition site; the exhibition site comprises a plurality of exhibition areas; acquiring a security dispatching instruction generated by drawing operation on a dispatching page based on the monitoring data; the security dispatching instruction comprises an area identifier of a exhibition area where security personnel need to be dispatched and a personnel identifier of the security personnel to be dispatched; determining a communication identifier corresponding to a security personnel to be dispatched according to the security dispatching instruction; and issuing the security dispatching instruction to a corresponding terminal based on the communication identifier so that security personnel corresponding to the personnel identifier can reach the exhibition area corresponding to the area identifier. By adopting the method, the deployment efficiency of security personnel can be improved.

Description

Security personnel deployment method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for deploying security personnel, a computer device, and a storage medium.
Background
With the development of social productivity, the exhibition industry is gradually rising. An exhibition is an activity where multiple people gather communications around a particular subject at a particular time location, including various types of expos, fairs, large conferences or exhibitions, and the like. Because the number of participants is large and the exhibition site is complex, the safety of the participants needs to be paid special attention.
At present, security management personnel plan security strategies for meetings and exhibitions in advance according to the post requirements and scheduling requirements of the security personnel, and then perform security deployment based on the pre-planned security strategies. However, it is difficult to flexibly change a pre-planned security policy according to a complicated scene.
Disclosure of Invention
In view of the above, it is necessary to provide a method, an apparatus, a computer device, and a storage medium for deploying security personnel, which can flexibly change according to a real scene.
A method of security personnel deployment, the method comprising:
acquiring monitoring data collected for a current exhibition site; the exhibition site comprises a plurality of exhibition areas;
acquiring a security dispatching instruction generated by drawing operation on a dispatching page based on the monitoring data; the security dispatching instruction comprises an area identifier of a exhibition area where security personnel need to be dispatched and a personnel identifier of the security personnel to be dispatched;
determining a communication identifier corresponding to a security worker to be dispatched according to the security dispatching instruction;
and issuing the security dispatching instruction to a corresponding terminal based on the communication identifier so that security personnel corresponding to the personnel identifier can reach a exhibitions area corresponding to the area identifier.
In one embodiment, the acquiring the monitoring data collected for the current exhibition site includes:
determining the type of a monitoring target, and screening out at least one monitoring dimension matched with the type and at least one monitoring index corresponding to each monitoring dimension from more than one piece of locally stored first associated information; the first associated information is obtained by associating types corresponding to the monitoring targets with corresponding monitoring dimensions and monitoring indexes in advance;
and respectively collecting monitoring data corresponding to the monitoring indexes when monitoring the monitoring target.
In one embodiment, the obtaining, based on the monitoring data, a security dispatch instruction generated by a drawing operation on a dispatch page includes:
determining risk assessment parameters corresponding to each exhibition area according to the monitoring data;
predicting a risk value of a corresponding exhibition area based on the risk assessment parameters;
generating a security strategy of the exhibition area according to the risk value;
displaying the security policy;
and acquiring a security dispatching instruction generated on a dispatching page based on the security policy.
In one embodiment, the obtaining, based on the monitoring data, a security dispatch instruction generated by a drawing operation on a dispatch page includes:
determining the acquisition time for acquiring the monitoring data;
generating a corresponding security strategy based on the acquisition time and the monitoring data;
displaying the security policy;
and acquiring a security dispatching instruction generated on a dispatching page based on the security policy.
In one embodiment, the generating a corresponding security policy based on the acquisition time and the monitoring data includes:
judging whether the acquisition time is in a exhibitions stage;
if yes, extracting first face images shot for each exhibition area from the monitoring data;
determining the staff flow of each exhibition area according to the first face image;
and generating a corresponding security strategy based on the personnel flow of each exhibition area.
In one embodiment, the determining the flow of people in each exhibition area according to the first face image includes:
acquiring a face library corresponding to the first face image based on the shooting area;
carrying out similarity matching on the first face image and a second face image in a face library;
determining a second face image with the similarity meeting the condition as a target face image;
identifying a target person in the target face image, and counting the passing times of the persons according to a person identifier corresponding to the target person;
and determining the personnel flow of the corresponding exhibitions in the acquisition time period according to the personnel passing times corresponding to different personnel identifications.
In one embodiment, the method further comprises:
judging whether the security personnel to be dispatched arrive at the corresponding exhibition area within a preset time period after sending the security strategy;
if not, determining the personnel identification of the security personnel who do not arrive at the corresponding exhibition area;
displaying the personnel identification of the security personnel who do not arrive at the corresponding exhibition area on the dispatch page;
acquiring a communication instruction triggered by a personnel identifier of a security personnel who does not arrive at a corresponding exhibition area; the communication instruction comprises a communication type;
and communicating with the security personnel who do not arrive at the corresponding exhibition area based on the communication type.
A security personnel deployment apparatus, the apparatus comprising:
the monitoring data acquisition module is used for acquiring monitoring data acquired by the current exhibition site;
the security dispatching instruction acquisition module is used for acquiring security dispatching instructions generated by drawing operation on a dispatching page based on the monitoring data; the security dispatching instruction comprises an area identifier of a exhibition area where security personnel need to be dispatched and a personnel identifier of the security personnel to be dispatched;
the instruction issuing module is used for determining a communication identifier corresponding to a security worker to be dispatched according to the security dispatching instruction; and issuing the security dispatching instruction to a corresponding terminal based on the communication identifier so that security personnel corresponding to the personnel identifier can reach a exhibitions area corresponding to the area identifier.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
acquiring monitoring data collected for a current exhibition site; the exhibition site comprises a plurality of exhibition areas;
acquiring a security dispatching instruction generated by drawing operation on a dispatching page based on the monitoring data; the security dispatching instruction comprises an area identifier of a exhibition area where security personnel need to be dispatched and a personnel identifier of the security personnel to be dispatched;
determining a communication identifier corresponding to a security worker to be dispatched according to the security dispatching instruction;
and issuing the security dispatching instruction to a corresponding terminal based on the communication identifier so that security personnel corresponding to the personnel identifier can reach a exhibitions area corresponding to the area identifier.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
acquiring monitoring data collected for a current exhibition site; the exhibition site comprises a plurality of exhibition areas;
acquiring a security dispatching instruction generated by drawing operation on a dispatching page based on the monitoring data; the security dispatching instruction comprises an area identifier of a exhibition area where security personnel need to be dispatched and a personnel identifier of the security personnel to be dispatched;
determining a communication identifier corresponding to a security worker to be dispatched according to the security dispatching instruction;
and issuing the security dispatching instruction to a corresponding terminal based on the communication identifier so that security personnel corresponding to the personnel identifier can reach a exhibitions area corresponding to the area identifier.
According to the method, the device, the computer equipment and the storage medium for deploying the security personnel, the monitoring data of the current exhibition site can be correspondingly displayed by acquiring the monitoring data; by displaying the monitoring data, the exhibition manager can draw the security dispatching route on the dispatching page based on the monitoring data, so that the security dispatching instruction can be quickly generated based on the drawing operation, and the generated security dispatching instruction can be issued to the corresponding terminal, so that the security personnel to be dispatched of the corresponding terminal can reach the appointed exhibition area according to the security dispatching instruction. Because the security dispatch instruction is obtained by analyzing the monitoring data in real time, compared with the traditional pre-made security strategy, the security strategy can be timely adjusted according to the dynamically changed monitoring data, and the deployment efficiency of security personnel is improved.
Drawings
FIG. 1 is a diagram of an application environment of a method for deploying security personnel in one embodiment;
FIG. 2 is a schematic flow chart diagram illustrating a method for deploying security personnel in one embodiment;
FIG. 3 is a schematic diagram of multiple exhibitions in one embodiment;
FIG. 4 is a diagram illustrating a mapping relationship between monitoring metrics and monitoring data according to an embodiment;
FIG. 5 is a diagram of a dispatch page in one embodiment;
FIG. 6 is a diagram illustrating dragging a person icon in one embodiment;
FIG. 7 is a schematic diagram illustrating the steps for acquiring monitoring data according to one embodiment;
FIG. 8 is a block diagram of a security personnel deployment apparatus in one embodiment;
FIG. 9 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The method for deploying security personnel can be applied to the application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 104 may be implemented by an independent server or a server cluster formed by a plurality of servers. The server 104 runs a security personnel deployment system, and the exhibition manager can perform real-time deployment on security personnel based on a dispatch page in the system to obtain a security dispatch instruction, and issue the security dispatch instruction to the terminal 102. The terminal 102 runs an individual soldier dispatch APP (application) for analyzing the security dispatch instruction to obtain a security dispatch strategy, so that dispatched security personnel can arrive at a designated location based on the security dispatch strategy.
In one embodiment, as shown in fig. 2, a method for deploying security personnel is provided, which is described by taking the method as an example applied to the server in fig. 1, and includes the following steps:
and S202, acquiring monitoring data collected by the current exhibition site.
The exhibition site refers to a site where meetings, exhibitions and holiday activities can be performed, and for convenience of management, the exhibition site can be divided into a plurality of exhibition areas as shown in fig. 3. The monitoring data refers to data obtained by monitoring from multiple dimensions such as personnel flow, traffic congestion degree and article safety based on a unified monitoring platform, for example, the monitoring data can be the number of participants, the idle state of parking spaces around the exhibition area, the storage state of warehouse materials, the concentration of combustible gas in the exhibition hall and the like. FIG. 3 is a diagram illustrating a plurality of exhibition areas, in accordance with one embodiment.
Specifically, the developer sets a plurality of monitoring indexes such as infrared intrusion, entrance guard alarm, peripheral traffic indexes and the like shown in fig. 4 for the current exhibition site according to preset monitoring dimensions. In order to better monitor the exhibition site, developers deploy a plurality of monitoring sub-platforms with different functions for the exhibition site in advance, and the all-round monitoring of the exhibition site is realized based on the monitoring sub-platforms with the different functions. For example, based on the vehicle management sub-platform, the vehicle monitoring can be performed on the parking lot area, and based on the face recognition sub-system, the number of people entering the parking lot can be monitored. The developer butt joints the monitoring sub-platforms with the security personnel deployment system, so that the security personnel deployment system can generate monitoring data corresponding to the monitoring indexes based on the sub-platform monitoring data of the monitoring sub-platforms. Fig. 4 is a schematic diagram illustrating a corresponding relationship between a monitoring index and monitoring data in one embodiment.
More specifically, the security personnel deployment system determines at least one monitoring sub-platform corresponding to each sub-platform of each monitoring index, pulls target sub-platform monitoring data from the corresponding monitoring sub-platform according to preset key fields, and then integrates the target sub-platform monitoring data to obtain the monitoring data corresponding to the monitoring indexes. For example, when monitoring data of surrounding traffic needs to be acquired, the security personnel deployment system determines that the monitoring sub-platforms corresponding to the surrounding traffic monitoring indexes are a GIS system, a ground parking system and a vehicle management system. The security personnel deployment system reads target sub-platform monitoring data from data tables corresponding to the GIS system, the ground parking system and the vehicle management system according to preset key fields such as free parking spaces, garage parking quantity and the like, and stores the read target sub-platform monitoring data into data tables corresponding to surrounding traffic monitoring indexes.
In one embodiment, the monitoring sub-platform stores the hot target sub-platform monitoring data into the cache, when the target sub-platform monitoring data is read, the security personnel deployment system preferentially inquires the target sub-platform monitoring data from the cache, and when the target sub-platform monitoring data does not exist in the cache, the target sub-platform monitoring data is inquired from the database, so that the access times of the database can be reduced, and the probability of system breakdown caused by more requests for accessing the database at the same time is avoided.
In one embodiment, the computer device intercepts a target sub-platform monitoring data reading instruction generated by a security personnel deployment system for each monitoring sub-platform within a preset time period. The target sub-platform monitoring data reading instruction is provided with a platform identifier, a data table identifier and a key field identifier of the monitoring sub-platform. And the computer equipment divides the target sub-platform monitoring data reading instruction according to the platform identification, the data table identification and the key field identification to obtain one or more target sub-platform monitoring data reading instructions with the same platform identification, data table identification and key field identification. The computer equipment judges whether the number of target sub-platform monitoring data reading instructions with the same platform identification, data table identification and key field identification is larger than 1, if so, the computer equipment integrates the target sub-platform monitoring data reading instructions with the same platform identification, data table identification and key field identification to obtain batch data reading instructions, and sends the batch task reading instructions to the monitoring sub-platforms corresponding to the platform identification, and the monitoring sub-platforms read data according to the batch task reading instructions. For example, when the platform identifier is a ground parking system, the data table identifier is an idle parking space table, and the key field is the number of idle parking spaces, a parking area a and a parking area B, the computer device correspondingly generates a batch task reading instruction: and reading the free parking spaces in the parking area A and the parking area B from the free parking space table.
The whole process is carried out on the plurality of target sub-platform monitoring data reading instructions in the preset time period, so that the access times of the database can be greatly reduced, and the probability of system breakdown caused by more requests for accessing the database simultaneously is avoided.
S204, based on the monitoring data, obtaining a security dispatch instruction generated by drawing operation on a dispatch page.
The security dispatching instruction comprises an area identifier of a exhibition area where security personnel need to be dispatched and a personnel identifier of the security personnel to be dispatched.
Specifically, when the security personnel log in the individual soldier dispatching APP based on the user name and the password, the individual soldier dispatching APP acquires the current location position information of the security personnel, and sends the position information and the personnel identification of the security personnel to the server. The server may present a dispatch page based on the security personnel deployment system and present a personnel icon corresponding to the personnel identification in an area corresponding to the location information in the dispatch page as shown in fig. 5. FIG. 5 is a diagram of a dispatch page, in one embodiment.
Further, the server monitors clicking operation of the exhibition manager, and when it is determined that the exhibition manager clicks the monitoring data reading button, monitoring data corresponding to each monitoring index are displayed for the exhibition manager on the basis of the monitoring data display page. For example, the display page displays the traffic of the current exhibition site, the traffic conditions around the exhibition site, and the like based on the monitoring data. The exhibition manager formulates a security policy according to the monitoring data displayed on the monitoring data display page, clicks a personnel icon of the security personnel to be dispatched on the dispatch page according to the security policy, and drags the personnel icon to the target exhibition area, so as to draw a dispatching route shown in fig. 6. FIG. 6 is a diagram illustrating dragging a people icon, in one embodiment. And the server generates a security dispatching instruction according to the dispatching route drawn by the exhibition manager and the personnel identification corresponding to the personnel icon.
In one embodiment, the security dispatch system obtains historical monitoring data in historical exhibition, judges whether the monitoring data of the current exhibition is normal or not according to the historical monitoring data, and generates alarm information if the monitoring data is not normal.
In one embodiment, the exhibition manager can pick up a plurality of personnel icons and corresponding exhibition areas on the dispatch page, and the security personnel dispatch system generates corresponding dispatch paths according to the picking operation of the exhibition manager and displays the dispatch paths on the dispatch page, so that the manager can determine the correctness of the security policy according to the displayed dispatch paths.
In one embodiment, the person icon has a status identifier to indicate whether the security personnel is in the dispatched status, so that the exhibition manager can determine the dispatched security personnel in the dispatch page according to the status identifier.
In one embodiment, the security personnel dispatching system acquires the position information of each security personnel in the exhibition site, and counts the number of security personnel in each exhibition area and the average security quantity in the exhibition area according to the position information. The security personnel dispatching system determines a target exhibition area with the number of security personnel exceeding the average security quantity, acquires communication identifiers of the security personnel in the target exhibition area, and sends the dispatching request to the corresponding terminal based on the communication identifiers. The security personnel corresponding to the terminal can respond to the dispatching request, the terminal generates a response request according to the response operation of the security personnel, and the response request is returned to the server. And the server determines whether the corresponding security personnel can be dispatched according to the response request, and if so, the state identifier on the personnel icon is changed into dispatchable.
And S206, determining the communication identifier corresponding to the security personnel to be dispatched according to the security dispatching instruction.
The communication identifier is information uniquely identifying one terminal, and for example, the communication identifier may be a terminal phone number, a user name of an instant messaging application, and the like.
Specifically, after the security personnel log in the individual soldier dispatching APP through the user name and the password, the individual soldier dispatching APP obtains a communication identifier corresponding to the user name, and sends the communication identifier and the user name to the security dispatching system, so that the security dispatching system takes the user name as a personnel identifier of the security personnel, and correspondingly stores the communication identifier and the personnel identifier. For example, the individual dispatch APP determines a terminal telephone number filled in by a corresponding security worker during registration according to a user name, and then sends the user name and the telephone number to the security dispatch system. The security dispatching system extracts the personnel identification of the security personnel to be dispatched from the security dispatching instruction, and determines the corresponding communication identification according to the personnel identification.
And S208, issuing a security dispatching instruction to the corresponding terminal based on the communication identifier so that security personnel corresponding to the personnel identifier can reach the exhibition area corresponding to the area identifier.
Specifically, the security dispatch system issues the security dispatch instruction to the corresponding terminal according to the communication identifier. The individual soldier dispatching APP in the terminal analyzes the security dispatching instruction, determines the area identification of the exhibition area where security personnel need to be dispatched based on the security dispatching instruction, and displays the area identification to the security personnel, so that the security personnel to be dispatched can reach the corresponding exhibition area based on the area identification.
In one embodiment, after the area identifier of the exhibition area where security personnel need to be dispatched is determined, the individual soldier dispatching APP obtains the position information of the to-be-dispatched security personnel corresponding to the personnel identifier, and generates an optimal path according to the position information and the area identifier, so that the to-be-dispatched security personnel can quickly reach the designated area according to the optimal path.
In one embodiment, the manager may set a replacement person in the security dispatch system to notify the replacement person to go to the designated exhibition area when the current to-be-dispatched security person fails to reach the designated exhibition area within a preset time period or when a rejection instruction of accepting the security dispatch instruction from the current to-be-dispatched security person is received.
In the security personnel deployment method, the monitoring data can be correspondingly displayed by acquiring the monitoring data of the current exhibition site; by displaying the monitoring data, the exhibition manager can draw the security dispatching route on the dispatching page based on the monitoring data, so that the security dispatching instruction can be quickly generated based on the drawing operation, and the generated security dispatching instruction can be issued to the corresponding terminal, so that the security personnel to be dispatched of the corresponding terminal can reach the appointed exhibition area according to the security dispatching instruction. Because the security dispatch instruction is obtained by analyzing the monitoring data in real time, compared with the traditional pre-made security strategy, the security strategy can be timely adjusted according to the dynamically changed monitoring data, and the deployment efficiency of security personnel is improved.
In one embodiment, as shown in fig. 7, acquiring the monitoring data collected for the current exhibition site includes:
s702, determining the type of a monitoring target, and screening out at least one monitoring dimension matched with the type and at least one monitoring index corresponding to each monitoring dimension from more than one piece of locally stored first associated information; the first associated information is obtained by associating types corresponding to the monitoring targets with corresponding monitoring dimensions and monitoring indexes in advance.
S704, when monitoring the monitoring target, respectively collecting monitoring data corresponding to the monitoring indexes.
Specifically, the exhibition site may be divided into a plurality of monitoring targets, for example, an exhibition hall, a material warehouse, a closed space, an equipment room, and the like, and different types of the monitoring targets are different, and corresponding monitoring dimensions and monitoring indexes thereof are also different. The security personnel deployment system can automatically determine at least one monitoring dimension matched with the type and at least one monitoring index corresponding to each monitoring dimension according to the determined monitoring target by determining the monitoring target to be monitored. Before monitoring and collecting monitoring data before monitoring the monitoring targets, the security personnel deployment system can locally and previously associate the type corresponding to each monitoring target with the corresponding monitoring dimension and monitoring index to generate more than one piece of first associated information, and store the first associated information in the database.
The monitoring dimension comprises at least one of a personnel dimension, a traffic dimension, an environment dimension, an item dimension, and a fire-fighting dimension; monitoring data corresponding to the monitoring indexes corresponding to the personnel dimensionality comprise at least one of people number data, thermal density data and face recognition data; monitoring data corresponding to the monitoring indexes corresponding to the traffic dimensions comprise at least one of traffic jam data, parking space data and illegal parking data; monitoring data corresponding to the monitoring indexes corresponding to the environment dimensionality comprise at least one of temperature data, humidity data and harmful gas data; monitoring data corresponding to the monitoring indexes corresponding to the article dimensions comprise at least one of equipment fault data, equipment offline data, current and voltage data and article intrusion data; the monitoring data corresponding to the monitoring index corresponding to the fire-fighting dimension comprises at least one of smoke alarm data, fire water supply data and combustible gas data.
And monitoring the monitoring target in real time according to the monitoring dimension corresponding to the monitoring target and the monitoring index corresponding to each monitoring dimension. When monitoring the monitoring target in real time, the safety protection personnel deployment system can collect the monitoring data corresponding to each monitoring index from each monitoring sub-platform corresponding to each monitoring index. For example, when the monitoring target is an equipment room, the security personnel deployment system determines that the acquisition dimension is an article dimension, and the indexes associated with the article dimension are an equipment fault index, an equipment offline index and a current and voltage index, so that the security personnel deployment system can acquire equipment fault data through the data operation and maintenance system, acquire the equipment offline data from the equipment management system, and acquire the current and voltage data from the asset management system.
In the above embodiment, by associating the different types of monitoring targets with the corresponding monitoring dimensions and monitoring indexes, the monitoring dimensions and monitoring indexes can be automatically and properly adjusted according to the different types of the monitoring targets, so that the monitoring is more personalized.
In one embodiment, obtaining the security dispatch instructions generated by the drawing operation on the dispatch page based on the monitored data comprises: determining risk evaluation parameters corresponding to each exhibition area according to the monitoring data; predicting a risk value of the corresponding exhibition area based on the risk assessment parameters; generating a security strategy of the exhibition area according to the risk value; displaying a security strategy; and acquiring a security dispatching instruction generated on a dispatching page based on a security policy.
The risk assessment parameters refer to parameter values used for risk assessment of each exhibition area, and can be personnel flow, exhibit types, enterprise qualifications of exhibitors and the like of the exhibition areas.
Specifically, the security dispatch system extracts monitoring data from a data table corresponding to each monitoring index, analyzes the monitoring data, and obtains risk assessment parameters of each exhibition area in the current exhibition site. More specifically, the monitoring data has exhibition area identifiers, and the security dispatch system divides the monitoring data according to the exhibition area identifiers to obtain area monitoring data of each exhibition area. And the security dispatching system performs statistics and analysis on the region monitoring data according to preset keywords to obtain the personnel flow, the exhibit types and the enterprise qualifications of the exhibitors in each exhibition region. The security dispatch system has the corresponding relations among the personnel flow and the score, the exhibit type and the score and the qualification and the score of the enterprise of the exhibitor region, and the score of the corresponding exhibitor region is determined according to the corresponding relations. For example, when the flow rate of people in the exhibition area is 10 people/square meter or more and less than 20 people/square meter, the corresponding score is 10 points, and when the type of exhibit in the exhibition area is wood, the corresponding score is 20 points. The security dispatch system obtains a weight value corresponding to each risk assessment parameter, and determines a risk value of the exhibition area based on the weight value and the corresponding score, for example, the weight value is multiplied by the corresponding score to obtain a risk value.
Further, the security dispatching system determines the number of security personnel in each exhibition area according to the risk value, for example, more security personnel are dispatched in the exhibition area with higher risk value, a corresponding security policy is generated according to the number of security personnel in each exhibition area, and then the security policy is displayed in a dispatching page. And the exhibition management personnel judge whether the security policy automatically generated by the system is correct according to the actual situation, if not, the exhibition management personnel click the correction control, select the personnel icon of the security personnel needing to be corrected in the dispatch page, and drag the personnel icon to the correct exhibition area, so that the security dispatch system corrects the security policy according to the correction operation of the exhibition management personnel, and generates a corresponding security dispatch instruction based on the corrected security policy.
In this embodiment, the security policy is obtained by risk assessment, so that the generated security policy has more risk prevention awareness. In addition, risk evaluation is carried out on risks in each area, and a security strategy is automatically generated according to a risk evaluation result, so that a manager only needs to monitor the generated security strategy and does not need to make the strategy from the beginning, and the making efficiency of the security strategy is improved.
In one embodiment, obtaining the security dispatch instructions generated by the drawing operation on the dispatch page based on the monitored data comprises: determining the acquisition time for acquiring the monitoring data; generating a corresponding security strategy based on the acquisition time and the monitoring data; displaying a security strategy; and acquiring a security dispatching instruction generated on a dispatching page based on a security policy.
The acquisition time refers to the time for the monitoring sub-platform to acquire the monitoring data of the sub-platform, and the acquisition time can be embedded into the monitoring data of the sub-platform after the acquisition time is determined. The security dispatch system has a corresponding relationship between the exhibition stage and the key area.
Specifically, due to the particularity of the exhibitions, a large exhibitions is generally divided into a pre-exhibition preparation stage, an exhibitions middle stage and an exhibitions removing stage, and security policies required by different stages are different. For example, in the pre-exhibition stage, important monitoring is mainly performed for an area that needs to be redeployed, in the exhibition, the exhibition site needs to be monitored integrally, and in the exhibition withdrawing stage, important monitoring is performed for the exhibition withdrawing outlet. The security dispatch system reads the latest monitoring data from the data table, extracts acquisition time from the latest detection data, judges the stage of the current exhibition site based on the acquisition time, and determines the exhibition area needing important attention based on the corresponding relation between the exhibition stage and the key area. The security dispatching system generates a corresponding security strategy according to the exhibition area needing important attention, for example, more security personnel are dispatched to the exhibition area needing important attention, and the security strategy is displayed in a dispatching page. And the management personnel judge whether the security policy automatically generated by the system is correct according to the actual situation, if not, the management personnel modify the security policy based on the drawing operation, so that the security dispatching system generates a corresponding security dispatching instruction according to the modified security policy.
In the embodiment, different security policies are generated at different time periods, so that the security policies automatically generated by the security dispatching system can better meet actual requirements, and the deployment efficiency of security personnel is improved.
In one embodiment, generating the corresponding security policy based on the acquisition time and the current monitoring data comprises: judging whether the acquisition time is in the exhibitions stage; if yes, extracting first face images shot aiming at each exhibition area from the monitoring data; determining the staff flow of each exhibition area according to the first face image; and generating a corresponding security strategy based on the personnel flow of each exhibition area.
Specifically, each exhibition area is a half of closed area in the exhibition place, and managers can erect a plurality of image acquisition devices at the regional entry of exhibition in advance, based on the first face image that image acquisition device gathered the entering area of exhibition. When the acquisition time corresponding to the latest monitoring data is in the exhibition stage, the image acquisition equipment acquires the real scene in real time according to the preset time frequency in the current acquisition sub-period, and transmits all acquired field images to the server so that the server can perform statistics on the personnel flow of each exhibition area. The time length of the acquisition time interval can be freely set according to the requirement, for example, 1 hour, the acquisition time interval can be divided into a plurality of acquisition sub-time intervals, and the overlong time interval of the acquisition sub-time intervals can enable the target person to possibly enter the current exhibition area for multiple times in the statistical sub-time intervals; the acquisition sub-period is too short, so that the image acquisition equipment can shoot the same passing operation of the same target person in two adjacent acquisition sub-periods, and the passing times of the target person are repeatedly counted finally. Therefore, the length of the time interval of the acquisition sub-period needs to be designed reasonably, so that the same target person only passes through the current exhibition area once as much as possible in a single acquisition sub-period, for example, the acquisition time period can be divided every 5 minutes on the basis of 8:00(am), and a plurality of acquisition sub-periods are obtained. At the end of each acquisition sub-period, the server refreshes the number of people passing based on the live images acquired during the acquisition sub-period.
The server acquires all site images which are transmitted by the image acquisition equipment and acquired for one exhibition area in an acquisition sub-period, extracts personnel characteristic information of target personnel in all the site images, and classifies all the site images according to the personnel characteristic information to obtain different types of site images. The live images of the same category refer to a plurality of image frames shot by the same target person, namely the live images of the same category have the face image of the same target person; the person characteristic information can reflect one or more of the characteristic information of the person, the person clothes color, the person hair style, the person accessories and the like. For example, a is a person wearing a certain special accessory, the server screens out a live image with the same accessory from all the received live images according to the person characteristic information, and the live image screened out based on the accessory information is used as a live image collected for the a; for another example, the server classifies a plurality of face images according to the person hair style characteristics in the live images to obtain different live images of different target persons.
The server sequentially traverses each type of field image and screens out a forward field image with the face direction being the forward direction from the field images of the same type. And the server calculates the area ratio of the face in the forward live image, and takes the forward live image with the largest face area ratio as the first face image of the category. And the security dispatching system in the server determines the personnel flow of each exhibition area according to the first personnel image and generates a corresponding security strategy according to the personnel flow of each exhibition area. For example, a person who visits a convention and exhibition area multiple times within the collection time period may be focused on and determined as a suspected exhibitor.
In this embodiment, through setting up image acquisition device at the regional entrance of exhibition for the security dispatch system can confirm the personnel flow in each exhibition region according to the first face image that image acquisition device gathered, thereby can generate corresponding security policy according to personnel flow, so, makes the security policy who generates more accord with actual conditions.
In one embodiment, a face library corresponding to a first face image is obtained based on a shooting area; carrying out similarity matching on the first face image and a second face image in a face library; determining a second face image with the similarity meeting the condition as a target face image; identifying target personnel in the target face image, and counting the personnel passing times according to the personnel identification corresponding to the target personnel; and determining the personnel flow of the corresponding exhibitions in the statistical time period according to the personnel passing times corresponding to different personnel identifications.
Specifically, the first face image is embedded with a shooting area. The face library stores face feature information of people which are counted in the acquisition time period and appear in the current exhibition area for the first time. After the server obtains a first face image of a target person in a current exhibition area within a current acquisition sub-period, the server inputs the first face image into a preset feature recognition model. The feature recognition model determines facial feature points in the first facial image according to the input image information, recognizes specific coordinates of the facial feature points, and then determines corresponding facial feature information according to the specific coordinates of the facial feature points. For example, the feature recognition model may determine the eye width according to the specific coordinates of the corner of the eye, so as to use the eye width as the facial feature information of the first face. The facial feature information is data reflecting facial features of a person, and the facial feature information can reflect one or more kinds of feature information such as the nose, the mouth and the distance between each facial organ of the person.
After the server determines the facial feature information of the first face, the server respectively carries out similarity matching on the facial feature information of the first face and the facial feature information in the corresponding face library, so that the similarity of the first face image and the face images in the face library is determined, the second face image with the maximum similarity is judged to be in accordance with the similarity matching condition, and if yes, the second face image with the maximum similarity is used as the target face image. After the server determines the target face image, the server determines that the target person corresponding to the target face image does not appear in the current exhibition area for the first time, determines the person identifier of the target person corresponding to the target image, checks whether the person identifier same as the target person identifier exists in a preset statistical table or not, and when the person identifier same as the target person identifier exists in the statistical table, the server obtains the passing times of the target person identifier and adds 1 to the passing times. If not, the server adds the first face image of the target person to the corresponding face library, and adds 1 to the passing times of the target person. And thus, all the first face images in the acquisition time period are traversed. And the server determines the personnel flow of the current exhibition area in the acquisition time period according to the passing times of each target personnel in the current exhibition area and the number of each target personnel in the statistical table.
In one embodiment, after counting the face images within the counting time period, the server deletes the passing times of each target person in the counting table and the second face image in the corresponding face library to save the storage space in the server.
In this embodiment, since the target face image is determined according to the similarity matching result between the first face image and the second face image, when the target person image exists in the face library, statistics on the number of times of person passage corresponding to different person identifiers is realized by directly adding 1 to the number of times of person passage of the person identifier corresponding to the target face image, so that security deployment can be subsequently performed according to the number of times of person passage corresponding to the same person identifier.
In one embodiment, the method for deploying security personnel further includes: judging whether the security personnel to be dispatched arrive at the corresponding exhibition area within a preset time period after sending the security strategy; if not, determining the personnel identification of the security personnel who do not arrive at the corresponding exhibition area; displaying the personnel identification of the security personnel who do not reach the corresponding exhibition area on a dispatch page; acquiring a communication instruction triggered by a personnel identifier of a security personnel who does not arrive at a corresponding exhibition area; the communication instruction includes a communication type; and communicating with security personnel who do not arrive at the corresponding exhibition area based on the communication type.
Specifically, the security dispatching system acquires the position information of one or more security personnel to be dispatched in real time within a preset time period from the sending of the security policy, and judges whether the security personnel to be dispatched reach the exhibition area corresponding to the area identifier or not according to the position information. And if the security personnel to be dispatched do not reach the corresponding exhibition area beyond the preset time period, the security dispatching system determines the personnel identification which does not reach the corresponding exhibition area and displays the personnel identification in a dispatching page. For example, the status flag in the person icon corresponding to the person flag is changed to "not reached". The server monitors the selection operation of the exhibition manager, determines the personnel identification needing to be communicated and the selected communication type based on the selection operation, generates a communication instruction according to the determined personnel identification and the communication type, and then sends the communication instruction to the terminal corresponding to the personnel identification. The communication type refers to a communication means used for communication, and for example, the communication type may be communication with instant messaging software, individual dispatch APP communication, video communication, telephone communication, and the like.
And after the terminal receives the communication instruction, the terminal calls a corresponding application program according to the communication type in the communication instruction and completes real-time communication based on the corresponding application program.
In the embodiment, the position information of the security personnel to be dispatched is obtained in real time, whether the security personnel to be dispatched reach the appointed exhibition area in the preset time period can be judged, so that when the security personnel do not reach the appointed exhibition area, the security personnel who do not reach the appointed exhibition area can be directly communicated in time, specific reasons of the appointed area are known, then the security strategy can be timely adjusted by the exhibition manager according to the specific reasons, and the deployment efficiency of the security personnel is greatly improved.
It should be understood that although the steps in the flowcharts of fig. 2 and 7 are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2 and 7 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of performing the steps or stages is not necessarily sequential, but may be performed alternately or alternately with other steps or at least some of the other steps or stages.
In one embodiment, as shown in fig. 8, there is provided a security personnel deployment device 800 comprising: a monitoring data obtaining module 802, a security dispatch instruction obtaining module 804 and an instruction issuing module 806, wherein:
a monitoring data obtaining module 802, configured to obtain monitoring data collected for a current exhibition site.
A security dispatch instruction obtaining module 804, configured to obtain, based on the monitoring data, a security dispatch instruction generated through a drawing operation on a dispatch page; the security dispatch instructions include the area identification of the exhibitions where security personnel need to be dispatched and the personnel identification of the security personnel to be dispatched.
The instruction issuing module 806 is configured to determine, according to the security dispatching instruction, a communication identifier corresponding to a security worker to be dispatched; and issuing a security dispatching instruction to the corresponding terminal based on the communication identifier so that security personnel corresponding to the personnel identifier can reach the exhibition area corresponding to the area identifier.
In one embodiment, the monitoring data obtaining module 802 is further configured to determine a type of the monitoring target, and screen at least one monitoring dimension matching the type and at least one monitoring index corresponding to each monitoring dimension from more than one locally stored first associated information; the first associated information is obtained by associating types corresponding to all monitoring targets with corresponding monitoring dimensions and monitoring indexes in advance; when monitoring the monitoring target, respectively collecting the monitoring data corresponding to the monitoring indexes.
In one embodiment, the security dispatch instruction obtaining module 804 further includes a risk assessment module 8041, configured to determine risk assessment parameters corresponding to each exhibition area according to the monitoring data; predicting a risk value of the corresponding exhibition area based on the risk assessment parameters; generating a security strategy of the exhibition area according to the risk value; displaying a security strategy; and acquiring a security dispatching instruction generated on a dispatching page based on a security policy.
In one embodiment, the security dispatch instruction fetch module 804 further comprises a collection time determination module 8042 for determining a collection time for collecting the monitoring data; generating a corresponding security strategy based on the acquisition time and the monitoring data; displaying a security strategy; and acquiring a security dispatching instruction generated on a dispatching page based on a security policy.
In one embodiment, the collection time determination module 8042 is further configured to determine whether the collection time is in the exhibitions phase; if yes, extracting first face images shot aiming at each exhibition area from the monitoring data; determining the staff flow of each exhibition area according to the first face image; and generating a corresponding security strategy based on the personnel flow of each exhibition area.
In one embodiment, the acquisition time determining module 8042 is further configured to obtain a face library corresponding to the first face image based on the shooting area; carrying out similarity matching on the first face image and a second face image in a face library; determining a second face image with the similarity meeting the condition as a target face image; identifying target personnel in the target face image, and counting the personnel passing times according to the personnel identification corresponding to the target personnel; and determining the personnel flow of the corresponding exhibitions in the acquisition time period according to the personnel passing times corresponding to different personnel identifications.
In one embodiment, the security personnel deployment apparatus 800 is further configured to determine whether a security personnel to be dispatched arrives at a corresponding exhibition area within a preset time period after sending the security policy; if not, determining the personnel identification of the security personnel who do not arrive at the corresponding exhibition area; displaying the personnel identification of the security personnel who do not reach the corresponding exhibition area on a dispatch page; acquiring a communication instruction triggered by a personnel identifier of a security personnel who does not arrive at a corresponding exhibition area; the communication instruction includes a communication type; and communicating with security personnel who do not arrive at the corresponding exhibition area based on the communication type.
For specific limitations of the security personnel deployment device, reference may be made to the above limitations of the security personnel deployment method, which are not described herein again. The modules in the security personnel deployment apparatus can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 9. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer equipment is used for storing the deployment data of security personnel. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of security personnel deployment.
Those skilled in the art will appreciate that the architecture shown in fig. 9 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
acquiring monitoring data collected for a current exhibition site; the exhibition site comprises a plurality of exhibition areas;
acquiring a security dispatching instruction generated by drawing operation on a dispatching page based on the monitoring data; the security dispatching instruction comprises an area identifier of a exhibition area where security personnel need to be dispatched and a personnel identifier of the security personnel to be dispatched;
determining a communication identifier corresponding to a security personnel to be dispatched according to the security dispatching instruction;
and issuing a security dispatching instruction to the corresponding terminal based on the communication identifier so that security personnel corresponding to the personnel identifier can reach the exhibition area corresponding to the area identifier.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
determining the type of a monitoring target, and screening out at least one monitoring dimension matched with the type and at least one monitoring index corresponding to each monitoring dimension from more than one piece of locally stored first associated information; the first associated information is obtained by associating types corresponding to all monitoring targets with corresponding monitoring dimensions and monitoring indexes in advance;
when monitoring the monitoring target, respectively collecting the monitoring data corresponding to the monitoring indexes.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
determining risk evaluation parameters corresponding to each exhibition area according to the monitoring data;
predicting a risk value of the corresponding exhibition area based on the risk assessment parameters;
generating a security strategy of the exhibition area according to the risk value;
displaying a security strategy;
and acquiring a security dispatching instruction generated on a dispatching page based on a security policy.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
determining the acquisition time for acquiring the monitoring data;
generating a corresponding security strategy based on the acquisition time and the monitoring data;
displaying a security strategy;
and acquiring a security dispatching instruction generated on a dispatching page based on a security policy.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
judging whether the acquisition time is in the exhibitions stage;
if yes, extracting first face images shot aiming at each exhibition area from the monitoring data;
determining the staff flow of each exhibition area according to the first face image;
and generating a corresponding security strategy based on the personnel flow of each exhibition area.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
acquiring a face library corresponding to the first face image based on the shooting area;
carrying out similarity matching on the first face image and a second face image in a face library;
determining a second face image with the similarity meeting the condition as a target face image;
identifying target personnel in the target face image, and counting the personnel passing times according to the personnel identification corresponding to the target personnel;
and determining the personnel flow of the corresponding exhibitions in the acquisition time period according to the personnel passing times corresponding to different personnel identifications.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
judging whether the security personnel to be dispatched arrive at the corresponding exhibition area within a preset time period after sending the security strategy;
if not, determining the personnel identification of the security personnel who do not arrive at the corresponding exhibition area;
displaying the personnel identification of the security personnel who do not reach the corresponding exhibition area on a dispatch page;
acquiring a communication instruction triggered by a personnel identifier of a security personnel who does not arrive at a corresponding exhibition area; the communication instruction includes a communication type;
and communicating with security personnel who do not arrive at the corresponding exhibition area based on the communication type.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
acquiring monitoring data collected for a current exhibition site; the exhibition site comprises a plurality of exhibition areas;
acquiring a security dispatching instruction generated by drawing operation on a dispatching page based on the monitoring data; the security dispatching instruction comprises an area identifier of a exhibition area where security personnel need to be dispatched and a personnel identifier of the security personnel to be dispatched;
determining a communication identifier corresponding to a security personnel to be dispatched according to the security dispatching instruction;
and issuing a security dispatching instruction to the corresponding terminal based on the communication identifier so that security personnel corresponding to the personnel identifier can reach the exhibition area corresponding to the area identifier.
In one embodiment, the computer program when executed by the processor further performs the steps of:
determining the type of a monitoring target, and screening out at least one monitoring dimension matched with the type and at least one monitoring index corresponding to each monitoring dimension from more than one piece of locally stored first associated information; the first associated information is obtained by associating types corresponding to all monitoring targets with corresponding monitoring dimensions and monitoring indexes in advance;
when monitoring the monitoring target, respectively collecting the monitoring data corresponding to the monitoring indexes.
In one embodiment, the computer program when executed by the processor further performs the steps of:
determining risk evaluation parameters corresponding to each exhibition area according to the monitoring data;
predicting a risk value of the corresponding exhibition area based on the risk assessment parameters;
generating a security strategy of the exhibition area according to the risk value;
displaying a security strategy;
and acquiring a security dispatching instruction generated on a dispatching page based on a security policy.
In one embodiment, the computer program when executed by the processor further performs the steps of:
determining the acquisition time for acquiring the monitoring data;
generating a corresponding security strategy based on the acquisition time and the monitoring data;
displaying a security strategy;
and acquiring a security dispatching instruction generated on a dispatching page based on a security policy.
In one embodiment, the computer program when executed by the processor further performs the steps of:
judging whether the acquisition time is in the exhibitions stage;
if yes, extracting first face images shot aiming at each exhibition area from the monitoring data;
determining the staff flow of each exhibition area according to the first face image;
and generating a corresponding security strategy based on the personnel flow of each exhibition area.
In one embodiment, the computer program when executed by the processor further performs the steps of:
acquiring a face library corresponding to the first face image based on the shooting area;
carrying out similarity matching on the first face image and a second face image in a face library;
determining a second face image with the similarity meeting the condition as a target face image;
identifying target personnel in the target face image, and counting the personnel passing times according to the personnel identification corresponding to the target personnel;
and determining the personnel flow of the corresponding exhibitions in the acquisition time period according to the personnel passing times corresponding to different personnel identifications.
In one embodiment, the computer program when executed by the processor further performs the steps of:
judging whether the security personnel to be dispatched arrive at the corresponding exhibition area within a preset time period after sending the security strategy;
if not, determining the personnel identification of the security personnel who do not arrive at the corresponding exhibition area;
displaying the personnel identification of the security personnel who do not reach the corresponding exhibition area on a dispatch page;
acquiring a communication instruction triggered by a personnel identifier of a security personnel who does not arrive at a corresponding exhibition area; the communication instruction includes a communication type;
and communicating with security personnel who do not arrive at the corresponding exhibition area based on the communication type.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for deploying security personnel, the method comprising:
acquiring monitoring data collected for a current exhibition site; the exhibition site comprises a plurality of exhibition areas;
acquiring a security dispatching instruction generated by drawing operation on a dispatching page based on the monitoring data; the security dispatching instruction comprises an area identifier of a exhibition area where security personnel need to be dispatched and a personnel identifier of the security personnel to be dispatched;
determining a communication identifier corresponding to a security worker to be dispatched according to the security dispatching instruction;
and issuing the security dispatching instruction to a corresponding terminal based on the communication identifier so that security personnel corresponding to the personnel identifier can reach a exhibitions area corresponding to the area identifier.
2. The method of claim 1, wherein the obtaining the collected monitoring data for the current exhibition site comprises:
determining the type of a monitoring target, and screening out at least one monitoring dimension matched with the type and at least one monitoring index corresponding to each monitoring dimension from more than one piece of locally stored first associated information; the first associated information is obtained by associating types corresponding to the monitoring targets with corresponding monitoring dimensions and monitoring indexes in advance;
and respectively collecting monitoring data corresponding to the monitoring indexes when monitoring the monitoring target.
3. The method of claim 1, wherein obtaining security dispatch instructions generated by a render operation on a dispatch page based on the monitored data comprises:
determining risk assessment parameters corresponding to each exhibition area according to the monitoring data;
predicting a risk value of a corresponding exhibition area based on the risk assessment parameters;
generating a security strategy of the exhibition area according to the risk value;
displaying the security policy;
and acquiring a security dispatching instruction generated on a dispatching page based on the security policy.
4. The method of claim 1, wherein obtaining security dispatch instructions generated by a render operation on a dispatch page based on the monitored data comprises:
determining the acquisition time for acquiring the monitoring data;
generating a corresponding security strategy based on the acquisition time and the monitoring data;
displaying the security policy;
and acquiring a security dispatching instruction generated on a dispatching page based on the security policy.
5. The method of claim 4, wherein generating the corresponding security policy based on the acquisition time and monitoring data comprises:
judging whether the acquisition time is in a exhibitions stage;
if yes, extracting first face images shot for each exhibition area from the monitoring data;
determining the staff flow of each exhibition area according to the first face image;
and generating a corresponding security strategy based on the personnel flow of each exhibition area.
6. The method of claim 5, wherein the first face image is embedded with a capture area; the determining the staff flow of each exhibition area according to the first face image comprises:
acquiring a face library corresponding to the first face image based on the shooting area;
carrying out similarity matching on the first face image and a second face image in a face library;
determining a second face image with the similarity meeting the condition as a target face image;
identifying a target person in the target face image, and counting the passing times of the persons according to a person identifier corresponding to the target person;
and determining the personnel flow of the corresponding exhibitions in the acquisition time period according to the personnel passing times corresponding to different personnel identifications.
7. The method of claim 1, further comprising:
judging whether the security personnel to be dispatched arrive at the corresponding exhibition area within a preset time period after sending the security strategy;
if not, determining the personnel identification of the security personnel who do not arrive at the corresponding exhibition area;
displaying the personnel identification of the security personnel who do not arrive at the corresponding exhibition area on the dispatch page;
acquiring a communication instruction triggered by a personnel identifier of a security personnel who does not arrive at a corresponding exhibition area; the communication instruction comprises a communication type;
and communicating with the security personnel who do not arrive at the corresponding exhibition area based on the communication type.
8. A security personnel deployment apparatus, the apparatus comprising:
the monitoring data acquisition module is used for acquiring monitoring data acquired by the current exhibition site;
the security dispatching instruction acquisition module is used for acquiring security dispatching instructions generated by drawing operation on a dispatching page based on the monitoring data; the security dispatching instruction comprises an area identifier of a exhibition area where security personnel need to be dispatched and a personnel identifier of the security personnel to be dispatched;
the instruction issuing module is used for determining a communication identifier corresponding to a security worker to be dispatched according to the security dispatching instruction; and issuing the security dispatching instruction to a corresponding terminal based on the communication identifier so that security personnel corresponding to the personnel identifier can reach a exhibitions area corresponding to the area identifier.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202010194765.9A 2020-03-19 2020-03-19 Security personnel deployment method and device, computer equipment and storage medium Active CN111507574B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010194765.9A CN111507574B (en) 2020-03-19 2020-03-19 Security personnel deployment method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010194765.9A CN111507574B (en) 2020-03-19 2020-03-19 Security personnel deployment method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111507574A true CN111507574A (en) 2020-08-07
CN111507574B CN111507574B (en) 2023-08-18

Family

ID=71864708

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010194765.9A Active CN111507574B (en) 2020-03-19 2020-03-19 Security personnel deployment method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111507574B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115169930A (en) * 2022-07-19 2022-10-11 北京拙河科技有限公司 Event security method and system
CN116258346A (en) * 2023-03-21 2023-06-13 广东省智能家电研究院 Household appliance maintenance area personnel allocation method and device, electronic equipment and storage medium
CN117495063A (en) * 2024-01-03 2024-02-02 中关村科学城城市大脑股份有限公司 Police resource scheduling method, apparatus, electronic device and computer readable medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107798393A (en) * 2016-11-14 2018-03-13 平安科技(深圳)有限公司 Self-aided terminal safeguards information processing method and device
CN109636108A (en) * 2018-11-08 2019-04-16 中国平安财产保险股份有限公司 Method, apparatus, computer equipment and the storage medium of dispatcher
CN110244574A (en) * 2019-06-28 2019-09-17 深圳市美兆环境股份有限公司 Intelligent home furnishing control method, device, system and storage medium
CN110826930A (en) * 2019-11-12 2020-02-21 杭州安恒信息技术股份有限公司 Security task scheduling method, device, equipment and readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107798393A (en) * 2016-11-14 2018-03-13 平安科技(深圳)有限公司 Self-aided terminal safeguards information processing method and device
CN109636108A (en) * 2018-11-08 2019-04-16 中国平安财产保险股份有限公司 Method, apparatus, computer equipment and the storage medium of dispatcher
CN110244574A (en) * 2019-06-28 2019-09-17 深圳市美兆环境股份有限公司 Intelligent home furnishing control method, device, system and storage medium
CN110826930A (en) * 2019-11-12 2020-02-21 杭州安恒信息技术股份有限公司 Security task scheduling method, device, equipment and readable storage medium

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115169930A (en) * 2022-07-19 2022-10-11 北京拙河科技有限公司 Event security method and system
CN115169930B (en) * 2022-07-19 2022-12-27 北京拙河科技有限公司 Event security method and system
CN116258346A (en) * 2023-03-21 2023-06-13 广东省智能家电研究院 Household appliance maintenance area personnel allocation method and device, electronic equipment and storage medium
CN116258346B (en) * 2023-03-21 2024-04-05 广东省智能家电研究院 Household appliance maintenance area personnel allocation method and device, electronic equipment and storage medium
CN117495063A (en) * 2024-01-03 2024-02-02 中关村科学城城市大脑股份有限公司 Police resource scheduling method, apparatus, electronic device and computer readable medium
CN117495063B (en) * 2024-01-03 2024-04-12 中关村科学城城市大脑股份有限公司 Police resource scheduling method, apparatus, electronic device and computer readable medium

Also Published As

Publication number Publication date
CN111507574B (en) 2023-08-18

Similar Documents

Publication Publication Date Title
CN111507574B (en) Security personnel deployment method and device, computer equipment and storage medium
AU2011352414B2 (en) Inference engine for video analytics metadata-based event detection and forensic search
CN110428522A (en) A kind of intelligent safety and defence system of wisdom new city
CN105450987A (en) Intelligent recognition platform video monitoring early warning system
CN110263613A (en) Monitor video processing method and processing device
US20080198159A1 (en) Method and apparatus for efficient and flexible surveillance visualization with context sensitive privacy preserving and power lens data mining
US20090006158A1 (en) Visualization system for organizational communication
CN109615256A (en) Wisdom garden security protection risk control method, storage medium, electronic equipment and system
CN110321194A (en) Employee's job information method for visualizing, device, equipment and storage medium
CN115966313B (en) Integrated management platform based on face recognition
CN113011833A (en) Safety management method and device for construction site, computer equipment and storage medium
CN107480553A (en) A kind of data exploration system, method, equipment and storage medium
CN111611439A (en) Fire safety monitoring method and device, computer equipment and storage medium
CN111539862B (en) Emergency processing method and device based on individual dispatch and computer equipment
CN115099724A (en) Monitoring and early warning method, device and equipment for construction scene and storage medium
CN112699328A (en) Network point service data processing method, device, system, equipment and storage medium
CN110096606B (en) Foreign roll personnel management method and device and electronic equipment
CN115457675A (en) Safety inspection method, equipment and storage medium
CN111860187A (en) High-precision worn mask identification method and system
CN111507571A (en) Emergency group scheduling method and device, computer equipment and storage medium
US10891480B2 (en) Image zone processing
US20150066903A1 (en) Security system operator efficiency
CN110505438A (en) A kind of acquisition methods and video camera of data queued
US20230259251A1 (en) Systems and methods for managing security events using a graphical user interface
US20080298693A1 (en) Method, system, and program product for presenting electronic surveillance data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant