CN113393607B - Intelligent electric power security method and system - Google Patents

Intelligent electric power security method and system Download PDF

Info

Publication number
CN113393607B
CN113393607B CN202110706323.2A CN202110706323A CN113393607B CN 113393607 B CN113393607 B CN 113393607B CN 202110706323 A CN202110706323 A CN 202110706323A CN 113393607 B CN113393607 B CN 113393607B
Authority
CN
China
Prior art keywords
visiting
outbound
vehicle
module
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110706323.2A
Other languages
Chinese (zh)
Other versions
CN113393607A (en
Inventor
张永挺
谢绍敏
谢幸生
林永昌
吴啟民
张勇志
冯灿成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Power Grid Co Ltd
Zhongshan Power Supply Bureau of Guangdong Power Grid Co Ltd
Original Assignee
Guangdong Power Grid Co Ltd
Zhongshan Power Supply Bureau of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Power Grid Co Ltd, Zhongshan Power Supply Bureau of Guangdong Power Grid Co Ltd filed Critical Guangdong Power Grid Co Ltd
Priority to CN202110706323.2A priority Critical patent/CN113393607B/en
Publication of CN113393607A publication Critical patent/CN113393607A/en
Application granted granted Critical
Publication of CN113393607B publication Critical patent/CN113393607B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/20Checking timed patrols, e.g. of watchman
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B19/00Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
    • G08B19/005Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow combined burglary and fire alarm systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

The application discloses an intelligent power security method and system, wherein differentiated management and control are performed according to the type of a visitor, when the visitor is a visitor, the identity information of the visitor and the number of the visitor are automatically identified, and the identification result is preliminarily judged whether to be released or not according to preset conditions; and when the vehicle is a visiting vehicle, the license plate information is automatically identified, and the identification result is preliminarily judged whether to pass or not according to the preset condition. After the visitor and the visiting vehicle are preliminarily judged and are not released, the visitor is confirmed in a manual checking mode, meanwhile, the visiting vehicle can be automatically checked through the security robot, the personnel identity information, the number of visitors and the substances on the visiting vehicle are collected, whether the visiting vehicle is released or not is further judged, if the visitor and the visiting vehicle are not released, the visiting vehicle can be confirmed in the manual checking mode, therefore, the complexity scene can be solved, and the flexibility of security management and control is improved.

Description

Intelligent power security method and system
Technical Field
The application relates to the technical field of security management, in particular to an intelligent electric power security method and system.
Background
The electric power security system is a comprehensive security facility comprising security personnel, video monitoring, electronic fences, a vehicle identification system and security equipment, and is an important measure for protecting the personal safety of non-electric power production personnel and electric power equipment of a transformer substation.
The traditional electric power security system mainly uses security personnel to perform security monitoring management by combining auxiliary electronic equipment such as a video monitoring system, an infrared correlation system, a pulse electronic fence system and the like so as to improve the regional safety.
However, the existing power security system monitoring system can only identify specific people or things, and in the case of a transformer substation in a power production operation place with a complex and variable or no fixed scene, a visual blind area exists, so that people and materials can not be monitored accurately in all directions when entering or leaving the transformer substation, serious potential safety hazards are brought to safety production in the power production place, and development of digital unmanned operation and maintenance of the transformer substation is also hindered.
Disclosure of Invention
The application provides an electric power intelligent security method and system, which are used for solving the technical problem that when an existing security system faces a transformer substation in an electric power production operation place with a complex and changeable or no fixed scene, a visual blind area exists, and therefore all-around accurate monitoring can not be carried out on personnel and vehicles.
In view of this, the first aspect of the present application provides an intelligent power security method, including the following steps:
s1, obtaining a visiting monitoring video of a gate of a transformer substation;
s2, judging whether a visitor or a visiting vehicle exists in the visiting monitoring video, and if the visitor exists, executing the step S3; if the visiting vehicle exists, executing the step S5;
s3, identifying the visiting identity information of the visitor through identification equipment, judging whether the visitor is a legal visitor or not based on a preset accessible personnel library and an identification result, and executing the step S4 if the visitor is judged to be a legal visitor; if the visitor is judged not to be a legal visitor, executing the step S8;
s4, judging whether the number of visitors is lower than a preset number threshold value or not, and executing a step S9 if the number of visitors is judged to be lower than the preset number threshold value; if the number of the visitors is not lower than the preset number threshold, turning to the step S8;
s5, obtaining visiting license plate information of the visiting vehicle through license plate recognition equipment, judging whether the visiting vehicle is a legal visiting vehicle or not based on a preset passable vehicle library and the visiting license plate information, if the visiting vehicle is judged to be the legal visiting vehicle, turning to the step S9, and if the visiting vehicle is judged not to be the legal visiting vehicle, turning to the step S6;
s6, responding to a trigger signal that the visiting vehicle reaches a preset visiting inspection station through a security robot, so as to generate a first motion instruction, wherein the security robot drives to the preset visiting inspection station according to the first motion instruction to inspect the visiting vehicle;
s7, in the process that the security robot patrols the visiting vehicle, acquiring visiting identity information, the number of visiting persons and visiting carriage images of the visiting vehicle, identifying visiting material information in the visiting carriage images, storing the visiting identity information, the number of the visiting persons and the visiting material information of the visiting vehicle, and executing the step S3;
s8, judging whether the visitor or the visiting vehicle can pass or not based on a preset manual checking process, and executing a step S9 if the visitor or the visiting vehicle is judged to pass; if the visitor or the visiting vehicle cannot pass through, the visitor or the visiting vehicle is not released;
s9, allowing the visitor or the visiting vehicle to pass.
Preferably, the step S2 of determining whether there is a visitor or a visiting vehicle in the visiting monitoring video specifically includes:
performing target recognition on the visiting monitoring video based on a pre-trained target feature recognition model so as to judge whether a visiting person or a visiting vehicle exists in the visiting monitoring video; the pre-trained target feature recognition model is obtained through deep learning algorithm training.
Preferably, step S3 is preceded by:
s301, acquiring identity information of legal passers from a work ticket of the transformer substation, and generating a passable personnel library according to the identity information of the legal passers.
Preferably, after step S9, the method comprises:
s10, acquiring an outbound monitoring video of a gate of the transformer substation;
s11, judging whether an outbound person or an outbound vehicle exists in the outbound monitoring video, and if the outbound person exists, executing a step S12; if the vehicle is out of the station, executing step S14;
s12, identifying the outbound identity information of the outbound personnel through the identification equipment, judging whether the outbound personnel is legal or not based on the preset passable personnel library and the identification result, and executing the step S13 if the outbound personnel is judged to be legal; if the outbound person is judged not to be a legal outbound person, executing the step S18;
s13, judging whether the number of the outbound persons is the same as the number of the visiting persons, and if the number of the outbound persons is the same as the number of the visiting persons, executing a step S19; if the above checks are not the same, go to step S18;
s14, acquiring the outbound license plate information of the outbound vehicle through license plate recognition equipment, judging whether the outbound vehicle is a legal outbound vehicle or not based on the preset passable vehicle library and the outbound license plate information, if so, turning to a step S19, and if not, turning to a step S15;
s15, responding to a trigger signal that the outbound vehicle reaches a preset outbound inspection station through the security robot, so as to generate a second motion instruction, wherein the security robot drives to the preset outbound inspection station according to the second motion instruction to inspect the outbound vehicle;
s16, acquiring the outbound identity information, the number of outbound persons and outbound compartment images of the outbound persons on the outbound vehicle in the process of polling the outbound vehicle by the security robot;
s17, identifying outbound material information in the outbound carriage image, performing matching check on the outbound material information and the corresponding visiting material information, judging whether the outbound material information is consistent with the corresponding visiting material information, executing a step S18 if the outbound material information is not consistent with the corresponding visiting material information, and executing a step S12 if the outbound material information is consistent with the corresponding visiting material information;
s18, judging whether the outbound personnel or the outbound vehicle can pass or not based on a preset manual checking process, and executing a step S19 if the outbound personnel or the outbound vehicle can pass; if the outbound personnel or the outbound vehicle cannot pass through, the outbound personnel or the outbound vehicle cannot pass through;
and S19, releasing the outbound personnel or the outbound vehicle.
In a second aspect, the present invention further provides a system for implementing the foregoing intelligent power security method, including:
the video monitoring module is used for acquiring a visiting monitoring video of a gate of the transformer substation;
the first judgment module is used for receiving the visiting monitoring video acquired by the video monitoring module and also used for judging whether a visiting person or a visiting vehicle exists in the visiting monitoring video;
the identity recognition module is used for recognizing the visiting identity information of the visiting person and judging whether the visiting person is a legal visiting person or not based on a preset accessible person library and a recognition result;
the second judgment module is used for judging whether the number of visitors is lower than a preset number threshold value;
the license plate recognition module is used for acquiring the visiting license plate information of the visiting vehicle and judging whether the visiting vehicle is a legal visiting vehicle or not based on a preset passable vehicle library and the visiting license plate information;
the security robot is used for responding to a trigger signal that the visiting vehicle reaches a preset visiting inspection station, generating a first motion instruction, and driving to the preset visiting inspection station according to the first motion instruction to inspect the visiting vehicle; the system is also used for acquiring the visiting identity information, the number of visiting persons and visiting carriage images of the visiting persons on the visiting vehicle; the system is also used for respectively transmitting the visiting identity information and the number of visiting persons to the identity recognition module and the second judgment module;
the material identification module is used for identifying the visiting material information in the visiting carriage image;
the storage module is used for storing the visiting identity information of the visiting person on the visiting vehicle, the number of the visiting person and the visiting material information;
the manual checking module is used for judging whether the visitor or the visiting vehicle can pass or not based on a preset manual checking process and generating a visiting passing signal when the visitor or the visiting vehicle is judged to pass; the system is also used for generating a visiting passing refusing signal when judging that the visiting passing is not possible;
and the access control module is used for performing access releasing operation on the visitor or the visiting vehicle according to the access passing signal and also used for performing access releasing operation on the visitor or the visiting vehicle according to the access passing refusing signal.
Preferably, the method further comprises the following steps:
the legal identity acquisition module is used for acquiring the identity information of legal passers from the work ticket of the transformer substation;
and the database module is used for generating a passable personnel database according to the identity information of the legal passable personnel.
Preferably, the video monitoring module is further configured to obtain an outbound monitoring video of a substation gate;
the first judgment module is also used for judging whether the outbound monitoring video contains outbound personnel or outbound vehicles;
the identity recognition module also recognizes the outbound identity information of the outbound personnel, and judges whether the outbound personnel is legal or not based on the preset passable personnel library and the recognition result;
the second judgment module is also used for judging whether the number of the outbound persons is the same as the number of the visiting persons;
the license plate recognition module is also used for acquiring the outbound license plate information of the outbound vehicle and judging whether the outbound vehicle is a legal outbound vehicle or not based on the preset passable vehicle library and the outbound license plate information;
the security robot is further used for responding to a trigger signal when the outbound vehicle reaches a preset outbound inspection station so as to generate a second motion instruction, and is also used for driving the outbound vehicle to the preset outbound inspection station according to the second motion instruction so as to inspect the outbound vehicle; the system is also used for acquiring the outbound identity information, the number of outbound persons and the outbound carriage image of the outbound persons on the outbound vehicle, and respectively transmitting the outbound identity information and the number of outbound persons to the identity recognition module and the second judgment module;
the material identification module is used for identifying the outbound material information in the outbound carriage image; the system is also used for matching and checking the outbound material information and the corresponding visiting material information, and judging whether the outbound material information is consistent with the corresponding visiting material information or not;
the manual checking module is further configured to judge whether the outbound personnel or the outbound vehicle can pass based on the preset manual checking process, and generate an outbound passing signal when the outbound passing is judged to be possible; the system is also used for generating an outbound passing refusing signal when judging that the outbound passing is not possible;
the entrance guard module is further used for performing the operation of releasing the outbound of the outbound personnel or the outbound vehicle according to the outbound passing signal and also used for performing the operation of releasing the outbound of the outbound personnel or the outbound vehicle according to the signal of releasing the outbound.
Preferably, the identity recognition module comprises a face recognition sub-module, a fingerprint recognition sub-module and a card reading recognition sub-module;
the face recognition sub-module is used for recognizing the face;
the fingerprint identification submodule is used for identifying a fingerprint;
the card reading identification submodule is used for identifying the IC card.
Preferably, the monitoring system further comprises a perimeter alarm module, wherein the perimeter alarm module is connected with the video monitoring module and used for sending alarm information when monitoring that illegal visitors or illegal visitors intrude into the transformer substation.
Preferably, still include a plurality of temperature sensor and fire alarm module, a plurality of temperature sensor is used for gathering the temperature data of transformer substation, fire alarm module with a plurality of temperature sensor electricity is connected for receive the transformer substation that a plurality of temperature sensor gathered temperature data still is used for when temperature data surpasss predetermined safe temperature, then sends alarm information.
According to the technical scheme, the invention has the following advantages:
the method carries out differential management and control according to the type of the visitors, automatically identifies the identity information of the visitors and the number of the visitors when the visitors are the visitors, and preliminarily judges whether the identification result is released or not according to preset conditions; and when the vehicle is a visiting vehicle, the license plate information is automatically identified, and the identification result is preliminarily judged whether to pass or not according to the preset condition. After the visitor and the visiting vehicle are preliminarily judged and are not released, the visitor is confirmed in a manual checking mode, meanwhile, the visiting vehicle can be automatically checked through the security robot, the personnel identity information, the number of visiting persons and substances on the visiting vehicle are collected, whether the visiting vehicle is released is further judged, if the visiting vehicle is not released, the visiting vehicle can be confirmed in the manual checking mode, the complexity scene can be solved, the flexibility of security management and control is improved, the technical problem that when a transformer substation is faced to an electric power production operation place with a complicated and changeable or unfixed scene, a vision blind area exists, and all-round and accurate monitoring on the personnel and the vehicle cannot be achieved is solved.
Drawings
Fig. 1 is a flowchart of an intelligent power security method according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of an intelligent power security system provided in an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Because the existing electric power security system monitoring can only identify specific people or things, visual blind areas exist in the transformer substation facing the electric power production operation places with complicated and variable or no fixed scenes, and all-around accurate monitoring on the entering and exiting of personnel and materials in the transformer substation cannot be carried out.
Therefore, the invention provides an intelligent electric power security method, please refer to fig. 1, which comprises the following steps:
s1, obtaining a visiting monitoring video of a gate of a transformer substation;
s2, judging whether a visitor or a visiting vehicle exists in the visiting monitoring video, and if the visitor exists, executing the step S3; if the vehicle comes, executing step S5;
it should be noted that, after the visiting monitoring video is obtained, the target recognition is performed on the visiting monitoring video based on the pre-trained target feature recognition model, so as to judge whether a visiting person or a visiting vehicle exists in the visiting monitoring video; the pre-trained target feature recognition model is obtained through deep learning algorithm training. Meanwhile, when the target feature recognition model is trained, a large number of people and vehicles can be used as a training set and input into the deep learning algorithm for training.
S3, identifying the visiting identity information of the visiting person through identification equipment, judging whether the visiting person is a legal visiting person or not based on a preset accessible person library and an identification result, and executing the step S4 if the visiting person is judged to be a legal visiting person; if the visitor is judged not to be a legal visitor, executing the step S8;
it can be understood that the preset passable person library has the identity information of the passable person, and whether the visitor is a legal visitor can be judged by comparing the visiting identity information of the visitor with the identity information of the passable person.
In addition, the preset passable personnel library can be manually input, and the identity information comprises names, units, fingerprints, faces, identity cards, work tickets and the like.
S4, judging whether the number of visitors is lower than a preset number threshold value or not, and executing a step S9 if the number of visitors is judged to be lower than the preset number threshold value; if the number of the visitors is not lower than the preset number threshold, turning to the step S8;
it should be noted that the number of visitors can be identified through the visiting monitoring video, and the number of visitors needs to be limited due to the safety limitation of the substation, so that the number threshold needs to be set in advance according to the safety rule, and if the set number threshold is 6 people and the number of visitors is 7 people, it is indicated that the number of visitors is an unsafe number, and whether the visitors can pass or not needs to be further confirmed.
S5, obtaining the visiting license plate information of the visiting vehicle through license plate recognition equipment, judging whether the visiting vehicle is a legal visiting vehicle or not based on a preset passable vehicle library and the visiting license plate information, if the visiting vehicle is judged to be the legal visiting vehicle, turning to the step S9, and if the visiting vehicle is judged not to be the legal visiting vehicle, turning to the step S6;
it can be understood that personnel responsible for operation and maintenance of the transformer substation are arranged in the transformer substation, and license plate information needs to be recorded by the operation and maintenance personnel and is input into the passable vehicle library, so that when the condition that a detected visiting vehicle can be matched with the wheel information recorded in the passable vehicle library, the vehicle can be directly released without further verification.
S6, responding to a trigger signal that a visiting vehicle reaches a preset visiting inspection station through the security robot, so as to generate a first movement instruction, and enabling the security robot to travel to the preset visiting inspection station according to the first movement instruction to inspect the visiting vehicle;
it should be noted that a vehicle identification device may be disposed at the visiting inspection station, and when the visiting vehicle reaches a predetermined visiting inspection station, a trigger signal is generated, so as to send a first motion instruction to the security robot, where a motion trajectory between the security robot and the predetermined visiting inspection station may be preset, and when the security robot receives the first motion instruction, the security robot reaches an assigned position of the predetermined visiting inspection station according to the predetermined motion trajectory to inspect the visiting vehicle.
S7, in the process that the security robot patrols the visiting vehicle, the visiting identity information, the number of visiting persons and the visiting carriage image of the visiting persons on the visiting vehicle are collected, the visiting material information in the visiting carriage image is identified, the visiting identity information, the number of visiting persons and the visiting material information of the visiting persons on the visiting vehicle are stored, and the step S3 is executed;
it can be understood that, when the security robot patrols and examines the in-process to the vehicle of visiting, remind the personnel in the vehicle through multiple mode, if send pronunciation and remind, inform personnel in the vehicle to show visitor's identity information, simultaneously, the security robot has the function of making a video recording, can gather visitor's identity information, visitor number and the carriage image that the personnel in the vehicle showed.
When the image of the visiting carriage is collected, the key point is that for a vehicle with a trunk, the trunk is opened by reminding people in the vehicle, so that a security robot shoots the trunk, the visiting material information in the image of the visiting carriage is identified based on a target feature identification model trained by a deep learning algorithm, such as a tool box, a maintenance tool and the like, and meanwhile, the visiting identity information, the number of visitors and the visiting material information of the visitors on the visiting vehicle can be stored through a server to be filed.
S8, judging whether the visitor or the visiting vehicle can pass or not based on a preset manual checking process, and executing the step S9 if the visitor or the visiting vehicle can pass; if the visitor or the visiting vehicle is judged not to be allowed to pass, the visitor or the visiting vehicle is not allowed to pass;
it can be understood that the manual verification process is performed manually, in a general example, the transformer substation can be provided with a security centralized control center, the security centralized control center can call collected images of the surveillance camera and the security robot, the verification is performed manually, a complex scene can be dealt with, and whether visitors or vehicles are released can be determined according to actual requirements, so that the flexibility of security is improved.
And S9, allowing the visitor or the visiting vehicle to pass.
The embodiment carries out differential management and control according to the visiting type, when the visiting person is the visiting person, the identity information of the person and the number of the visiting person are automatically identified, and whether the identification result is released or not is preliminarily judged according to the preset condition; when the vehicle is a visiting vehicle, the license plate information is automatically identified, and whether the vehicle passes is preliminarily judged according to the identification result under the preset condition. After the visitor and the visiting vehicle are preliminarily judged and not released, the visitor is confirmed in a manual checking mode, meanwhile, the visiting vehicle can be automatically checked through the security robot, the personnel identity information, the number of the visitors and substances on the visiting vehicle are collected, whether the visitor is released or not is further judged, if the visitor is not released, the visiting vehicle can be confirmed in the manual checking mode, therefore, a complex scene can be solved, the flexibility of security control is improved, and the technical problem that when a transformer substation in an electric power production operation place with a complex and variable or non-fixed scene is faced, a vision blind area exists, and therefore all-round and accurate monitoring can not be carried out on the personnel and the vehicle is solved.
Further, before step S3, the method includes:
s301, acquiring the identity information of legal passers from the work ticket of the transformer substation, and generating a passable personnel library according to the identity information of the legal passers.
It can be understood that the work ticket has the identity information of the personnel, such as name, unit and other information, and the identity information of the legal passing personnel can be generated by identifying the identity information of the personnel on the work ticket and is recorded into the passable personnel library to be used as the basis for the identity verification of the personnel.
The above is a detailed description of the security monitoring process when the personnel or the vehicle is out of the station by the intelligent electric power security method provided by the invention.
Specifically, step S9 is followed by:
s10, acquiring an outbound monitoring video of a gate of the transformer substation;
s11, judging whether an outbound person or an outbound vehicle exists in the outbound monitoring video, and if the outbound person exists, executing a step S13; if the vehicle is out of the station, executing the step S15;
it should be noted that the identification process in step S11 is the same as that in step S2, and is not described herein again.
S12, identifying the outbound identity information of the outbound personnel through identification equipment, judging whether the outbound personnel is legal or not based on a preset passable personnel library and an identification result, and executing a step S13 if the outbound personnel is judged to be legal; if the outbound person is judged not to be a legal outbound person, executing the step S18;
it should be noted that the process of step S12 is identical to that of step S3, and is not described herein again.
S13, judging whether the number of the people leaving the station is the same as that of the people visiting the station, and if the number of the people leaving the station is the same as that of the people visiting the station, executing a step S19; if the check is not the same, go to step S18;
it should be noted that, the number of people in the corresponding visit can be determined by the identification information of the number of people who come out, and whether the number of people who come in and go out is consistent can be determined by judging whether the number of people who come out and the number of people who come in are the same, so that the safety is improved.
S14, acquiring the outbound license plate information of the outbound vehicle through license plate recognition equipment, judging whether the outbound vehicle is a legal outbound vehicle or not based on a preset passable vehicle library and the outbound license plate information, if so, turning to a step S19, and if not, turning to a step S15;
it should be noted that the process of step S14 is the same as that of step S5, and is not described herein again.
S15, responding to a trigger signal that the outbound vehicle reaches a preset outbound inspection station through the security robot, so as to generate a second motion instruction, and enabling the security robot to travel to the preset outbound inspection station according to the second motion instruction to inspect the outbound vehicle;
it should be noted that the process of step S15 is identical to that of step S6, and is not described herein again.
S16, in the process that the security robot patrols the outbound vehicle, the outbound identity information, the number of outbound persons and an outbound carriage image of the outbound vehicle are collected;
it should be noted that, this step S16 is consistent with the process of collecting the visiting identity information, the number of visiting persons, and the visiting carriage image of the visiting person in the visiting vehicle in step S7, and will not be described herein again.
S17, identifying outbound material information in the outbound compartment image, performing matching check on the outbound material information and corresponding visiting material information, judging whether the outbound material information is consistent with the corresponding visiting material information, executing a step S18 if the outbound material information is judged to be inconsistent with the corresponding visiting material information, and executing a step S12 if the outbound material information is judged to be consistent with the corresponding visiting material information;
it should be noted that, in step S7, the material information at the time of visiting is identified and archived, and after the outbound material information in the outbound car image is identified in this step, the outbound material information and the corresponding visiting material information can be automatically matched and verified.
Considering that materials may be used or transferred before the vehicle leaves, the information of the materials leaving the station cannot be accurately identified in the image identification process of the vehicle compartment leaving the station, and the matching verification in the step is inaccurate, therefore, when the verification is inconsistent, the manual further verification is needed to cope with the complex and diverse scenes.
S18, judging whether the outbound personnel or the outbound vehicle can pass or not based on a preset manual checking process, and executing the step S19 if the outbound personnel or the outbound vehicle can pass; if the outbound personnel or the outbound vehicle cannot pass through, the outbound personnel or the outbound vehicle cannot pass through;
it should be noted that this step S18 is consistent with the process of step S8, so that the verification is performed manually, a complicated scene can be dealt with, and the determination of whether to release the outbound person or the vehicle can be performed according to actual requirements, thereby improving the flexibility of security.
And S19, allowing the person or vehicle to go out.
The embodiment manages and controls the personnel or vehicles entering and exiting, realizes the security-free management and control of the personnel and materials entering and exiting, and accordingly guarantees the safety of personnel, equipment and a power grid on an operation site.
For the convenience of understanding, please refer to fig. 2, the following is a system for implementing the intelligent power security method provided by the present invention, and the system for implementing the intelligent power security method includes:
the video monitoring module 10 is used for acquiring a visiting monitoring video of a gate of the transformer substation;
the first judging module 20 is configured to receive the visiting monitoring video acquired by the video monitoring module 10, and further configured to judge whether a visiting person or a visiting vehicle exists in the visiting monitoring video;
the identity recognition module 30 is used for recognizing the visiting identity information of the visitor and judging whether the visitor is a legal visitor or not based on a preset accessible personnel library and a recognition result;
the second judgment module 40 is used for judging whether the number of visitors is lower than a preset number threshold;
the license plate recognition module 50 is used for acquiring visiting license plate information of a visiting vehicle and judging whether the visiting vehicle is a legal visiting vehicle or not based on a preset passable vehicle library and the visiting license plate information;
the security robot 60 is used for responding to a trigger signal that a visiting vehicle reaches a preset visiting inspection station, so as to generate a first motion instruction, and is also used for driving to the preset visiting inspection station according to the first motion instruction to inspect the visiting vehicle; the system is also used for acquiring the visiting identity information, the number of visiting persons and visiting carriage images of the visiting persons on the visiting vehicle; the system is also used for respectively transmitting the visiting identity information and the number of visiting persons to the identity recognition module 30 and the second judgment module 40;
the material identification module 70 is used for identifying the visiting material information in the visiting carriage image;
the storage module 80 is used for storing the visiting identity information, the number of visiting persons and the visiting material information of the visiting persons on the visiting vehicle;
the manual checking module 90 is configured to determine whether a visitor or a visiting vehicle can pass through based on a preset manual checking process, and generate a visiting passing signal when determining that the visitor can pass through; the system is also used for generating a visiting passing refusing signal when judging that the visiting passing is not possible;
the access control module 100 is configured to perform an access releasing operation on the visitor or the visiting vehicle according to the access passing signal, and further perform an access releasing rejection operation on the visitor or the visiting vehicle according to the access passing rejection signal.
According to the method, differential management and control are carried out according to the visiting types, when the visiting persons belong to the visiting persons, the identity information of the persons and the number of the visiting persons are automatically identified, and whether the identification results are released or not is preliminarily judged according to preset conditions; when the vehicle is a visiting vehicle, the license plate information is automatically identified, and whether the vehicle passes is preliminarily judged according to the identification result under the preset condition. After the visitor and the visiting vehicle are preliminarily judged and are not released, the visitor is confirmed in a manual checking mode, meanwhile, the visiting vehicle can be automatically checked through the security robot, the personnel identity information, the number of visiting persons and substances on the visiting vehicle are collected, whether the visiting vehicle is released is further judged, if the visiting vehicle is not released, the visiting vehicle can be confirmed in the manual checking mode, the complexity scene can be solved, the flexibility of security management and control is improved, the technical problem that when a transformer substation is faced to an electric power production operation place with a complicated and changeable or unfixed scene, a vision blind area exists, and all-round and accurate monitoring on the personnel and the vehicle cannot be achieved is solved.
Further, the system also includes:
the legal identity acquisition module is used for acquiring the identity information of legal passers from the work ticket of the transformer substation;
and the database module is used for generating a passable personnel database according to the identity information of the legal passable personnel.
Furthermore, the video monitoring module is also used for acquiring an outbound monitoring video of the substation gate;
the first judgment module is also used for judging whether the outbound monitoring video contains outbound personnel or outbound vehicles;
the identity recognition module is used for recognizing the outbound identity information of the outbound personnel and judging whether the outbound personnel is legal or not based on a preset passable personnel library and a recognition result;
the second judgment module is also used for judging whether the number of the outbound persons is the same as the number of the visiting persons;
the license plate recognition module is also used for acquiring the outbound license plate information of the outbound vehicle and judging whether the outbound vehicle is a legal outbound vehicle or not based on a preset passable vehicle library and the outbound license plate information;
the security robot is also used for responding to a trigger signal that the outbound vehicle reaches a preset outbound inspection station so as to generate a second motion instruction, and is also used for driving to the preset outbound inspection station according to the second motion instruction so as to inspect the outbound vehicle; the system is also used for acquiring the outbound identity information, the number of outbound persons and the outbound carriage image of the outbound persons on the outbound vehicle, and respectively transmitting the outbound identity information and the number of outbound persons to the identity recognition module and the second judgment module;
the material identification module is used for identifying the outbound material information in the outbound carriage image; the system is also used for matching and checking the outbound material information and the corresponding visiting material information, and judging whether the outbound material information is consistent with the corresponding visiting material information or not;
the manual checking module is also used for judging whether the outbound personnel or the outbound vehicle can pass or not based on a preset manual checking flow, and is also used for generating an outbound passing signal when judging that the outbound passing can be passed; the system is also used for generating an outbound passing refusing signal when judging that the outbound passing is not possible;
the entrance guard module is also used for carrying out the operation of releasing the outbound of the outbound personnel or the outbound vehicle according to the outbound passing signal and also used for carrying out the operation of releasing the outbound of the outbound personnel or the outbound vehicle according to the signal of releasing the outbound.
Furthermore, the identity recognition module comprises a face recognition sub-module, a fingerprint recognition sub-module and a card reading recognition sub-module;
the face recognition sub-module is used for recognizing the face;
the fingerprint identification sub-module is used for identifying the fingerprint;
the card reading identification submodule is used for identifying the IC card.
Furthermore, the system further comprises a perimeter alarm module, wherein the perimeter alarm module is connected with the video monitoring module and used for sending alarm information when monitoring that the transformer substation has an illegal visitor or an illegal vehicle to break into the transformer substation.
It can be understood that after a series of pass permission confirmations, the entrance guard module performs a pass rejection operation on the visiting person or the visiting vehicle, and then the visiting person or the visiting vehicle can be determined as an illegal visiting person or an illegal visiting vehicle. However, when illegal visitors or illegal visiting vehicles break into the transformer substation, the perimeter alarm module sends alarm information to give an alarm, so that security personnel can find the alarm in time and take emergency measures quickly.
Furthermore, the system further comprises a plurality of temperature sensors and a fire alarm module, wherein the plurality of temperature sensors are used for acquiring temperature data of the transformer substation, the fire alarm module is electrically connected with the plurality of temperature sensors and used for receiving the temperature data of the transformer substation acquired by the plurality of temperature sensors, and when the temperature data exceeds a preset safety temperature, alarm information is sent out.
It can be understood that a plurality of temperature sensors can be installed in each instruction position of the transformer substation according to requirements, so that temperature data of the designated position can be collected, the fire alarm module processes the temperature data, whether abnormal fire occurs or not is judged, when abnormal fire occurs, an alarm message is sent out, and the message form comprises an audible and visual alarm mode and the like.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for executing all or part of the steps of the method described in the embodiments of the present application through a computer device (which may be a personal computer, a server, or a network device). And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present application.

Claims (10)

1. An intelligent electric power security method is characterized by comprising the following steps:
s1, obtaining a visiting monitoring video of a gate of a transformer substation;
s2, judging whether a visitor or a visiting vehicle exists in the visiting monitoring video, and if the visitor exists, executing the step S3; if the visiting vehicle exists, executing the step S5;
s3, identifying the visiting identity information of the visiting person through an identification device, judging whether the visiting person is a legal visiting person or not based on a preset accessible person library and an identification result, and executing the step S4 if the visiting person is judged to be the legal visiting person; if the visitor is judged not to be a legal visitor, executing the step S8;
s4, judging whether the number of visitors is lower than a preset number threshold value or not, and executing a step S9 if the number of visitors is judged to be lower than the preset number threshold value; if the number of the visitors is not lower than the preset number threshold, turning to the step S8;
s5, obtaining visiting license plate information of the visiting vehicle through license plate recognition equipment, judging whether the visiting vehicle is a legal visiting vehicle or not based on a preset passable vehicle library and the visiting license plate information, if the visiting vehicle is judged to be the legal visiting vehicle, turning to the step S9, and if the visiting vehicle is judged not to be the legal visiting vehicle, turning to the step S6;
s6, responding to a trigger signal that the visiting vehicle reaches a preset visiting inspection station through a security robot, so as to generate a first movement instruction, wherein the security robot drives to the preset visiting inspection station according to the first movement instruction to inspect the visiting vehicle;
s7, in the process that the security robot patrols the visiting vehicle, acquiring visiting identity information, the number of visiting persons and visiting carriage images of the visiting vehicle, identifying visiting material information in the visiting carriage images, storing the visiting identity information, the number of the visiting persons and the visiting material information of the visiting vehicle, and executing the step S3;
s8, judging whether the visitor or the visiting vehicle can pass or not based on a preset manual checking process, and executing the step S9 if the visitor or the visiting vehicle is judged to pass; if the visitor or the visiting vehicle cannot pass through, the visitor or the visiting vehicle is not released;
s9, the visitor or the visiting vehicle is released.
2. The intelligent power security method according to claim 1, wherein the step S2 of determining whether a visitor or a visiting vehicle is present in the visiting surveillance video specifically comprises:
performing target recognition on the visiting monitoring video based on a pre-trained target feature recognition model so as to judge whether a visiting person or a visiting vehicle exists in the visiting monitoring video; the pre-trained target feature recognition model is obtained through deep learning algorithm training.
3. The power intelligent security method according to claim 1, wherein before step S3, the method comprises:
s301, obtaining identity information of legal passers from work tickets of the transformer substation, and generating a passable personnel library according to the identity information of the legal passers.
4. The power intelligent security method according to claim 1, comprising, after step S9:
s10, obtaining an outbound monitoring video of a substation gate;
s11, judging whether an outbound person or an outbound vehicle exists in the outbound monitoring video, and if the outbound person exists, executing a step S12; if the vehicle is out of the station, executing step S14;
s12, identifying the outbound identity information of the outbound personnel through the identification equipment, judging whether the outbound personnel is legal or not based on the preset passable personnel library and the identification result, and executing the step S13 if the outbound personnel is judged to be legal; if the outbound person is judged not to be a legal outbound person, executing step S18;
s13, judging whether the number of the outbound persons is the same as the number of the visiting persons, and if the number of the outbound persons is the same as the number of the visiting persons, executing a step S19; if the above checks are not the same, go to step S18;
s14, acquiring the outbound license plate information of the outbound vehicle through license plate recognition equipment, judging whether the outbound vehicle is a legal outbound vehicle or not based on the preset passable vehicle library and the outbound license plate information, if so, turning to a step S19, and if not, turning to a step S15;
s15, responding to a trigger signal that the outbound vehicle reaches a preset outbound inspection station through the security robot so as to generate a second motion instruction, wherein the security robot drives to the preset outbound inspection station according to the second motion instruction to inspect the outbound vehicle;
s16, acquiring the outbound identity information, the number of outbound persons and outbound compartment images of the outbound persons on the outbound vehicle in the process of polling the outbound vehicle by the security robot;
s17, identifying outbound material information in the outbound carriage image, performing matching check on the outbound material information and the corresponding visiting material information, judging whether the outbound material information is consistent with the corresponding visiting material information, executing a step S18 if the outbound material information is not consistent with the corresponding visiting material information, and executing a step S12 if the outbound material information is consistent with the corresponding visiting material information;
s18, judging whether the outbound personnel or the outbound vehicle can pass or not based on a preset manual checking process, and if so, executing a step S19; if the outbound personnel or the outbound vehicle cannot pass through, the outbound personnel or the outbound vehicle cannot pass through;
and S19, releasing the outbound personnel or the outbound vehicle.
5. A system for realizing the intelligent power security method of claim 1, which is characterized by comprising the following steps:
the video monitoring module is used for acquiring a visiting monitoring video of a gate of the transformer substation;
the first judgment module is used for receiving the visiting monitoring video acquired by the video monitoring module and also used for judging whether a visiting person or a visiting vehicle exists in the visiting monitoring video;
the identity recognition module is used for recognizing the visiting identity information of the visitor and judging whether the visitor is a legal visitor or not based on a preset accessible personnel library and a recognition result;
the second judgment module is used for judging whether the number of visitors is lower than a preset number threshold value;
the license plate recognition module is used for acquiring visiting license plate information of the visiting vehicle and judging whether the visiting vehicle is a legal visiting vehicle or not based on a preset passable vehicle library and the visiting license plate information;
the security robot is used for responding to a trigger signal that the visiting vehicle reaches a preset visiting inspection station, generating a first motion instruction, and driving to the preset visiting inspection station according to the first motion instruction to inspect the visiting vehicle; the system is also used for acquiring the visiting identity information, the number of visiting persons and visiting carriage images of the visiting persons on the visiting vehicle; the identity recognition module is used for respectively transmitting the visiting identity information and the number of the visitors to the second judgment module;
the material identification module is used for identifying the visiting material information in the visiting carriage image;
the storage module is used for storing the visiting identity information of the visiting person on the visiting vehicle, the number of the visiting person and the visiting material information;
the manual checking module is used for judging whether the visitor or the visiting vehicle can pass or not based on a preset manual checking process and generating a visiting passing signal when the visitor or the visiting vehicle is judged to pass; the system is also used for generating a visiting passing refusing signal when judging that the visiting passing is not possible;
and the access control module is used for performing access control operation on the visitor or the visiting vehicle according to the access passing signal and also used for performing access control rejection operation on the visitor or the visiting vehicle according to the access passing rejection signal.
6. The system of claim 5, further comprising:
the legal identity acquisition module is used for acquiring the identity information of legal passers from the work ticket of the transformer substation;
and the database module is used for generating a passable personnel database according to the identity information of the legal passable personnel.
7. The system of claim 5, wherein the video monitoring module is further configured to obtain an outbound monitoring video of a substation gate;
the first judging module is also used for judging whether the outbound monitoring video contains outbound personnel or outbound vehicles;
the identity recognition module is also used for recognizing the outbound identity information of the outbound personnel and judging whether the outbound personnel are legal outbound personnel or not based on the preset passable personnel library and a recognition result;
the second judgment module is also used for judging whether the number of the outbound persons is the same as the number of the visiting persons;
the license plate recognition module is also used for acquiring the outbound license plate information of the outbound vehicle and judging whether the outbound vehicle is a legal outbound vehicle or not based on the preset passable vehicle library and the outbound license plate information;
the security robot is further used for responding to a trigger signal when the outbound vehicle reaches a preset outbound inspection station so as to generate a second motion instruction, and is also used for driving the outbound vehicle to the preset outbound inspection station according to the second motion instruction so as to inspect the outbound vehicle; the system is also used for acquiring the outbound identity information, the number of outbound persons and the outbound carriage image of the outbound personnel on the outbound vehicle, and respectively transmitting the outbound identity information and the number of outbound persons to the identity recognition module and the second judgment module;
the material identification module is used for identifying the outbound material information in the outbound carriage image; the system is also used for matching and checking the outbound material information and the corresponding visiting material information, and judging whether the outbound material information is consistent with the corresponding visiting material information or not;
the manual checking module is further configured to judge whether the outbound personnel or the outbound vehicle can pass based on the preset manual checking process, and generate an outbound passing signal when the outbound passing is judged to be possible; the system is also used for generating an outbound passing refusing signal when judging that the outbound passing is not possible;
the entrance guard module is further used for performing the operation of releasing the outbound of the outbound personnel or the outbound vehicle according to the outbound passing signal and also used for performing the operation of releasing the outbound of the outbound personnel or the outbound vehicle according to the signal of releasing the outbound.
8. The system of claim 5, wherein the identity recognition module comprises a face recognition sub-module, a fingerprint recognition sub-module, and a card reading recognition sub-module;
the face recognition sub-module is used for recognizing the face;
the fingerprint identification sub-module is used for identifying a fingerprint;
the card reading identification submodule is used for identifying the IC card.
9. The system of claim 5, further comprising a perimeter alarm module, wherein the perimeter alarm module is connected with the video monitoring module and used for sending alarm information when monitoring that an illegal visitor or an illegal visiting vehicle intrudes into the transformer substation.
10. The system of claim 5, further comprising a plurality of temperature sensors and a fire alarm module, wherein the plurality of temperature sensors are used for collecting temperature data of a transformer substation, and the fire alarm module is electrically connected with the plurality of temperature sensors, is used for receiving the temperature data of the transformer substation collected by the plurality of temperature sensors, and is further used for sending alarm information when the temperature data exceeds a preset safe temperature.
CN202110706323.2A 2021-06-24 2021-06-24 Intelligent electric power security method and system Active CN113393607B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110706323.2A CN113393607B (en) 2021-06-24 2021-06-24 Intelligent electric power security method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110706323.2A CN113393607B (en) 2021-06-24 2021-06-24 Intelligent electric power security method and system

Publications (2)

Publication Number Publication Date
CN113393607A CN113393607A (en) 2021-09-14
CN113393607B true CN113393607B (en) 2023-01-10

Family

ID=77623838

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110706323.2A Active CN113393607B (en) 2021-06-24 2021-06-24 Intelligent electric power security method and system

Country Status (1)

Country Link
CN (1) CN113393607B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113903112A (en) * 2021-09-17 2022-01-07 苏州城之瞳安防智能科技有限公司 Intelligent monitoring system, method and medium for community management
CN114821879A (en) * 2022-06-29 2022-07-29 河北远东通信系统工程有限公司 Park visitor management system

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6476732B1 (en) * 2000-05-10 2002-11-05 Ford Global Technologies, Inc. Passive automatic door opener
CN105139490B (en) * 2015-08-04 2018-03-09 国网上海市电力公司 A kind of gate management method for unattended operation transformer station
CN108269336A (en) * 2018-01-18 2018-07-10 西安艾润物联网技术服务有限责任公司 A kind of vehicle and authorization management method of occupant, device and storage medium
CN108615279A (en) * 2018-03-06 2018-10-02 安徽电科恒钛智能科技有限公司 Intelligent door access control system for transformer substations based on Internet of Things
CN108269407B (en) * 2018-04-09 2024-03-12 中山火炬高新企业孵化器有限公司 Security robot capable of automatically managing people stream and logistics
CN109118617B (en) * 2018-07-13 2021-02-09 河南腾龙信息工程有限公司 Access control system applied to transformer substation and identification method thereof
CN109688373A (en) * 2018-12-11 2019-04-26 国网河北省电力有限公司保定供电分公司 A kind of video fusion management system of substation project scene
CN110136315A (en) * 2019-06-27 2019-08-16 广东电网有限责任公司 A kind of substation safety region prevention and control system based on Internet of Things and recognition of face
CN111833502A (en) * 2020-06-28 2020-10-27 云南电网有限责任公司昆明供电局 Intelligent monitoring and management method for personnel entering and leaving station of unattended transformer substation

Also Published As

Publication number Publication date
CN113393607A (en) 2021-09-14

Similar Documents

Publication Publication Date Title
CN109598885B (en) Monitoring system and alarm method thereof
CN113393607B (en) Intelligent electric power security method and system
CN112489272A (en) Intelligent security control system special for garden
US20110001812A1 (en) Context-Aware Alarm System
CN113408683A (en) Construction site safety supervision method and system
CN107833328B (en) Access control verification method and device based on face recognition and computing equipment
CN212208379U (en) Automatic attendance temperature measuring system
EP2779133A2 (en) System and method of anomaly detection
CN110544312A (en) Video display method and device in virtual scene, electronic equipment and storage device
CN112132048A (en) Community patrol analysis method and system based on computer vision
CN115809949A (en) Smart park management system based on big data processing technology
CN115271612A (en) Logistics park safety monitoring method, device, equipment and storage medium
CN111599119A (en) Self-service police article borrowing and returning system
CN110517397B (en) Unmanned system and method for oil depot
CN206256874U (en) A kind of urgent clearance gate equipment based on multi-functional identification technology
EP3109837A1 (en) System and method of smart incident analysis in control system using floor maps
CN111696239A (en) Artificial intelligence identification system based on computer
CN210262831U (en) Gate machine
CN106127903A (en) Electronic equipment detection gate inhibition's control device and method thereof
KR101381524B1 (en) Visitor management system using image
CN113792665B (en) Forbidden area intrusion detection method aiming at different role authorities
CN116168457A (en) Subway security check and ticket selling security check integrated checking system and method
CN111754665A (en) Open security system based on cloud computing architecture
CN115565284A (en) Identity verification method and device based on security scene
CN210222869U (en) A unmanned on duty system for oil depot

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant