CN113643167A - Security monitoring method with track tracking, prediction and dwell time monitoring functions - Google Patents

Security monitoring method with track tracking, prediction and dwell time monitoring functions Download PDF

Info

Publication number
CN113643167A
CN113643167A CN202010392535.3A CN202010392535A CN113643167A CN 113643167 A CN113643167 A CN 113643167A CN 202010392535 A CN202010392535 A CN 202010392535A CN 113643167 A CN113643167 A CN 113643167A
Authority
CN
China
Prior art keywords
time
block
time point
monitoring method
combined
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010392535.3A
Other languages
Chinese (zh)
Inventor
蔡志伟
郑嘉仁
黄盈期
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Delta Electronics Inc
Original Assignee
Delta Electronics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Delta Electronics Inc filed Critical Delta Electronics Inc
Priority to CN202010392535.3A priority Critical patent/CN113643167A/en
Publication of CN113643167A publication Critical patent/CN113643167A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/29Geographical information databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9537Spatial or temporal dependent retrieval, e.g. spatiotemporal queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/04Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Remote Sensing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Educational Administration (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Alarm Systems (AREA)

Abstract

A security monitoring method with trajectory tracking and prediction and dwell time monitoring functions comprises the following steps: dividing an area where an object is located into a plurality of blocks, and arranging at least one sensor; acquiring an identity identification of the object and a block of the position of the object in the area through the at least one sensor, and recording a time point; acquiring a position and time combined authority of the object according to the identity identification of the object; predicting a moving path of the object when the object is moving; according to the combined authority of the position and the time of the object and the moving path, an alarm is sent out at a preset time point before the object approaches to an unauthorized block.

Description

Security monitoring method with track tracking, prediction and dwell time monitoring functions
Technical Field
The invention relates to a security monitoring method, in particular to a security monitoring method with track tracking and prediction and residence time judgment functions.
Background
According to the operation process of the current visitor (or manufacturer) entering a factory area (or a control area), a worker in the factory area needs to fill in a visitor application form in advance, or the visitor fills in the visitor application form in a factory area control point by the visitor in person. And then, the visitor can enter the factory after the visitor pass is exchanged at the factory control point so as to execute the visitor task. When the visitor leaves the field, the visitor leaves the field after the personal certificate is changed back from the factory control point.
The above-described conventional work flow has the following problems. When the visitor holds the visitor to check in the factory area, no check personnel in the factory area execute security check at the entrance and exit of each building, and the dynamics and the route of the visitor vehicle in the factory area cannot be monitored. After the visitor completes the visitor task in the factory, only the visitor certificate is replaced when leaving the factory, no further checking action is available, and if the visitor has illegal things in the factory, the visitor cannot be stopped in real time.
Disclosure of Invention
The monitoring method according to an embodiment of the invention comprises the following steps: dividing an area where an object is located into a plurality of blocks, and arranging at least one sensor; acquiring an identity identification of the object and a block of the position of the object in the area through the at least one sensor, and recording a time point; predicting a moving path of the object when the object is moving; according to the combined authority of the position and the time of the object and the moving path, an alarm is sent out at a preset time point before the object approaches to an unauthorized block.
The monitoring method further comprises the following steps: generating a context sequence associated with the object according to the sequence of the corresponding time points respectively recorded when the object is detected by the at least one sensor in the plurality of blocks; the situation sequence records the identity of the object at the corresponding time points, the block of the position of the object, and the combined authority of the position and the time.
The monitoring method as described above, wherein the predicting the moving speed of the object further includes: calculating the moving speed of the object according to the situation sequence, and comprehensively judging the historical track and the geographic space information of the object in the process of travelling; and judging the next block where the object is located at the next time point.
The monitoring method as described above, wherein the combined permission of the location and the time is a location that the object is authorized to reach during a period.
In the monitoring method, the at least one sensor is disposed in each of the plurality of blocks.
The monitoring method further comprises the following steps: starting at least one camera along the predicted moving path of the object at the predetermined time point before the object approaches the unauthorized block; and controlling the at least one camera to correspondingly steer according to the predicted moving path of the object so as to obtain a real-time image of the object.
The monitoring method further comprises the following steps: obtaining a combined permission of an updated position and time of the object, indicating a position which the object is authorized to reach newly, and replacing the combined permission of the position and time; updating the context sequence associated with the object according to the obtained combination permission of the updated position and time; and sending an alarm at the determined time point before the object approaches the unauthorized block according to the combined authority of the updated position and time of the object and the moving path.
The monitoring method as described above, wherein calculating the moving speed of the object according to the context sequence comprises: obtaining a first block where the object is recorded in the context sequence corresponding to a first time point at the first time point, wherein the object appearing in the first block at the first time point meets the combined permission of the position and time of the object at the first time point; obtaining a second block where the object is recorded in the context sequence corresponding to a second time point at the second time point, wherein the object appearing in the second block at the second time point meets the combined permission of the position and time of the object at the second time point; calculating a time difference between the first time point and the second time point; calculating a distance between the first block and the second block; and calculating the moving speed of the object according to the time difference and the distance.
In the monitoring method, when the moving speed of the object exceeds a speed limit, an alarm is issued.
The monitoring method as described above, wherein the at least one sensor includes: at least one RFID sensor, at least one visible light camera, or at least one infrared thermal imager.
The monitoring method further comprises the following steps: judging whether the object stops or not; when the object stops, obtaining the staying time of the object at the position; if the staying time is larger than a first threshold value, an alarm is sent out.
The monitoring method further comprises the following steps: when the staying time of the object at the position is larger than a second threshold value, starting at least one visible light camera near the position where the object stays; wherein the second threshold is greater than the first threshold; and controlling the at least one visible light camera to correspondingly turn according to the position of the object to obtain a real-time image of the object.
The monitoring method further comprises the following steps: when the staying time of the object at the position is larger than a third threshold value, starting at least one infrared thermal imager near the position where the object stays to confirm whether people exist on the object or whether the vehicle engine of the object is in a starting state; wherein the third threshold is greater than the second threshold; when the person on the object is confirmed, a notification is sent.
In the monitoring method, when it is determined that there is no person on the object, the factory is notified to go to the location where the object stays to lock the wheel.
The monitoring method further comprises the following steps: obtaining a first block where the object is recorded in the situation sequence corresponding to a first time point at the first time point; obtaining a second block where the object is recorded in the situation sequence corresponding to a second time point when the second time point is reached; when the first block is the same as the second block, judging that the object stays at the position; and calculating a time difference between the first time point and the second time point as the staying time.
Drawings
Fig. 1 is a flow chart of a monitoring method according to an embodiment of the present disclosure.
Fig. 2A is a schematic configuration diagram of a monitoring method at a time point T according to an embodiment of the disclosure.
FIG. 2B shows a time T + Δ T according to an embodiment of the disclosure1Schematic configuration diagram of the time monitoring method.
FIG. 2C is a time T + Δ T according to an embodiment of the disclosure2Schematic configuration diagram of the time monitoring method.
FIG. 2D is a time T + Δ T according to an embodiment of the disclosure3Schematic configuration diagram of the time monitoring method.
FIG. 2E is a time T + Δ T according to an embodiment of the disclosure5Schematic configuration diagram of the time monitoring method.
Description of reference numerals:
s100, S102, S104-step
S106, S108 Steps
200-region
202-article
204. 206, 208, 210, 212 RFID sensor
214. 216, 218, 220-visible light camera
Δt1、Δt2、Δt3、Δt4、Δt5、Δt6、Δt7Duration of
Detailed Description
The invention discloses a monitoring method, which can track and predict the moving path of an object in an area when the object moves in the area, and send out an alarm according to the moving path and the combined authority of a position and a time period of the object. The object can be a vehicle driven by a visitor or a manufacturer when the visitor performs a task, the area can be a factory area, a park area or a school area with access control, and the combined permission of the position and the time is the position which can be reached by the object authorized in the factory area, the park area or the school area in which time periods. Fig. 1 is a flow chart of a monitoring method according to an embodiment of the present disclosure. As shown in fig. 1, the monitoring method disclosed in the present invention divides the area into a plurality of blocks, and sets at least one sensor in each block, so that the at least one sensor can detect that the object is present in the corresponding block (step S100). For example, fig. 2A is a schematic configuration diagram of a monitoring method at a time point T according to an embodiment of the disclosure. As shown in fig. 2A, at the time point T, the monitoring method of the present invention divides an area 200 into a block 1, a block 2, a block 3, a block 4, a block 5, a block 6, a block 7, a block 8, and a block 9 according to the geographic features.
The monitoring method of the present invention herein sets an RFID sensor 204 at the block 5, an RFID sensor 206 at the block 4, a visible light camera 214 at the block 3, a visible light camera 216 at the block 9, an RFID sensor 208 at the block 7, a visible light camera 218 at the block 6, a visible light camera 220 at the block 2, an RFID sensor 212 at the block 8, and an RFID sensor 210 at the block 1, such that the RFID sensors 204, 206, 208, 210, 212, or the visible light cameras 214, 216, 218, 220 can detect the presence of an object 202 at their corresponding blocks. For example, the RFID sensor 204 may detect that the item 202 is about to enter the zone 5, the RFID sensor 208 may detect that the item 202 is about to enter the zone 7, or the visible camera 214 may detect the direction of movement of the item 202 while within the zone 3. In some embodiments, the at least one sensor may comprise at least one infrared thermal imager.
Next, the monitoring method of the present invention obtains an identification of the object and a block of the location of the object through the at least one sensor of each block, and records a time point when the identification of the object and the block are obtained (step S102). For example, as shown in FIG. 2A, when the item 202 enters the area 200, the item 202 is issued with a built-in RFID parking pass. When the object 202 is about to enter the block 5, the RFID sensor 204 receives the radio frequency signal transmitted by the RFID parking card on the object 202, so as to know that the object 202 is about to or has entered the block 5, and the monitoring method of the present invention finds the identification related information of the object 202 stored in the database, such as the parking card RFID card number, the license plate number, the vehicle type and the vehicle color, the visitor or manufacturer information, and the combination authority of the location and time corresponding to different time points, etc. from a database. Meanwhile, when the RFID sensor 204 receives the radio frequency signal sent by the RFID parking card on the object 202 to obtain the identification of the object 202, the monitoring method of the present invention also records the time point when the identification of the object 202 is obtained, such as the time point T in fig. 2A.
Then, the monitoring method of the present invention obtains the combined authority of the position and the time of the object according to the identification of the object (step S104). For example, the monitoring method of the present invention obtains the combined authority of the position and the time of the object 202 at the time point T according to the identification of the object 202 obtained from the database. In other words, the monitoring method of the present invention obtains the position or area that the object 202 is authorized to reach in the area 200 at the time point T. The database may be a memory or a cloud memory in a security monitoring system for storing registered or authorized guest data.
The monitoring method of the present invention generates a context sequence associated with the object according to the sequence of the time points recorded by the sensor; the situation sequence at least records the identity of the object at the time point, the block of the position of the object, and the action and the authority executed at the position. In some embodiments, the context sequence has the following exemplary data format, but is not limited thereto:
{“_id”:ObjectID(“57a04a032b8983131c10e000”),
1559205929, Area, east gate one,
“CellSpaceID”:87,“LicensePlate”:“9527-GG”,
“CarType”:“Car”,“RfidID”:
“23080100FB00000000166158”,“Motion”:“in”,
“VisitorApplicationID”:“20190530_9487,
“SuperiorSecurityControl”:“False”}
in FIG. 2A, the "ObjectID" can be an object identification number assigned to the object 202 at the factory floor control point. "Timestamp" may be the point in time that the item 202 is detected by the RFID sensor 204. "Area" is the location where the item 202 is located, such as the west side segment of the central street in the campus. "CellSpaceID" is the block ID, e.g., 5, where the object 202 is located. "license plate" is the car number of the object 202. The "CarType" may be the vehicle type of the item 202. "RfidID" may be the number of the RFID parking pass issued by the item 202 at the factory floor control point. The Motion indicates that the object 202 is in the inbound state, and can be moved within the factory floor (e.g., within the area 200) according to the assigned position and time combination rights of the object 202. The "VisitorApplicationID" is the visitor application number corresponding to the object 202 in the next time of entry. The "superior security control" indicates whether there is special authority control for a specific object group in the whole factory area at the current time point, for example, the visitor vehicle cannot travel in the north factory road area within one hour in the future, even if the object 202 originally has the combined authority of the preset location and time of the area. When "False" is displayed, it indicates that the combined permission of the (preset) location and time of the object 202 can be used without updating, and when "True" is displayed, it indicates that the combined permission of the (preset) location and time of the object 202 needs to be updated, and the object 202 needs to execute the guest task in the area 200 according to an updated combined permission of the location and time.
A portion of the context sequence of the object 202 can be obtained from information that the object 202 has logged in before entering the factory floor. For example, according to the visitor application form filled by the visitor or the factory employee, the database of the monitoring method of the present invention has the combined authority of the location and time of the object 202, i.e., the object 202 is allowed to reach the location in the area 200 within a specific time period (time). The combined permission information of the position and time of the object 202 can be inputted into the database by factory personnel, or the visitor permission given by the project corresponding to the visitor task to be executed when the object 202 enters the factory can be fused with other information related to the object 202. For example, when the object 202 appears at a factory floor control point, the monitoring method of the present invention can obtain the license plate information of the object 202 through the existing license plate recognition system; according to the time point when the object 202 appears at the factory control point, the monitoring method of the invention can inquire the visitor application form applied by the object 202 when entering the factory, the combined authority of the position and the time given by the object 202 when entering the factory and the related basic data of the object 202 from the visitor application form system. Then, the monitoring method of the present invention performs data fusion on the obtained information of the position and time combination authority of the object 202, license plate information, vehicle information, visitor application form information, RFID parking certificate number, etc., binds the object 202 for factory monitoring at this time, and stores the object in the database. When the item 202 is detected by at least one sensor (e.g., the RFID sensor 204) within the factory floor (e.g., within the area 200), the monitoring method of the present invention can retrieve all of the data in the context sequence of the item 202 from a database. In some embodiments, generally, as the item 202 moves within the factory floor, the time ("Timestamp", i.e., the point in time at which the item 202 was detected by at least one sensor), and location information ("Area", "cellspace id") of the item 202 are time-varying, except that the combined rights of the location and time of the item 202, license plate information, vehicle information, visitor application form information, and RFID parking lot number are fixed.
The monitoring method of the present invention calculates the moving speed of the object 202 at the time point (i.e. the time point of obtaining the identification of the object 202 and the block where the object is located) according to the context sequence, and determines the next block where the object 202 is located at the next time point to predict the moving path of the object (step S106). FIG. 2B shows a time T + Δ T according to an embodiment of the disclosure1Schematic configuration diagram of the time monitoring method. Wherein, T + Δ T1Indicates that the period Deltat has elapsed after the time point T1The time point of (a). As shown in fig. 2B, at the time point T + Δ T1When the RFID sensor 206 detects that the object 202 is about to move from the block 5 to the block 4, the monitoring method of the present invention is based on time T and time T + Δ T1The block information of the object 202 is recorded in the temporal context sequence, and the moving track of the object 202 is determined to be from the block 5 to the block 4. FIG. 2C is a time T + Δ T according to an embodiment of the disclosure2Schematic configuration diagram of the time monitoring method. Wherein, T + Δ T2Indicates that the period Deltat has elapsed after the time point T2The time point of (a). In some embodiments, the period Δ t2Greater than the period Deltat1. As shown in fig. 2C, at time point T + Δ T2At this time, the visible light camera 214 has detected that the object 202 has entered block 3 at the intersection, and the monitoring method of the present invention obtains the block 5 where the object 202 is recorded in the context sequence corresponding to the time point T (fig. 2A), and obtains the block corresponding to the time point T + Δ T1(FIG. 2B) the block 4 in which the object 202 is recorded in the context sequence and corresponding to the time point T + Δ T2(FIG. 2B) the block 3 in which the object 202 is recorded in the context sequence. The monitoring method of the present invention then calculates the time T and the time T + Δ T1And the time T + Deltat1And the time T + Deltat2And calculating the distance between the block 5 and the block 4 and the distance between the block 4 and the block 3 to obtain the time T + Δ T of the object 2022The speed of movement (including its speed and direction of movement) is used to predict the path of movement of the object 202. In some embodiments of the present invention, the,when the moving speed of the object 202 exceeds a speed limit, an alarm is issued.
FIG. 2D is a time T + Δ T according to an embodiment of the disclosure3Schematic configuration diagram of the time monitoring method. Wherein, T + Δ T3Indicates that the period Deltat has elapsed after the time point T3The time point of (a). In some embodiments, the period Δ t3Greater than the period Deltat2. At a time T + Δ T according to the object 2022The moving speed (or moving direction) of the time, the monitoring method of the present invention predicts the time point T + Δ T3The object 202 should appear in the block 2 or the block 8 until the time point T + Δ T is reached3The location of the object 202 in time and the combined rights of time. However, as shown in FIG. 2D, at time T + Δ T3The RFID sensor 208 detects that the object 202 is about to exit the block 3 and enter the block 7, and the monitoring method of the present invention predicts the time point T + Δ T4At this time, the object 202 enters an unauthorized area in the north (i.e., above in fig. 2D) of block 7. In some embodiments, the period Δ t4Greater than the period Deltat3Then (c) is performed.
Then, the monitoring method of the present invention is performed at a time point T + Δ T according to the combined authority of the position and the time of the object 202 and the moving path3At this time, an alarm is issued at a predetermined point in time immediately before the object 202 approaches the unauthorized block through detection by the RFID sensor 208 (step S108). In this embodiment, the predetermined time point may be a time point T + Δ T3(a point in time before the item 202 enters the unauthorized zone). In some embodiments, the monitoring method of the present invention starts at least one camera along the predicted moving path of the object 202 at the predetermined time point before the object 202 approaches an unauthorized block (e.g., the north or top block of fig. 2D), and controls the at least one camera to perform corresponding steering according to the predicted moving path of the object 202, so as to obtain a real-time image of the object. Finally, the monitoring method of the present invention notifies the factory guard to stop capturing according to the acquired real-time image of the object 202.
In some embodiments, the monitoring method of the present invention can overwrite (update) the location and time combined authority of the object 202 at the specified time without affecting the combined authority of the routine location and time for the purpose of random strain and flexible control according to the emergency. For example, taking fig. 2A as an example, when the object 202 enters the factory control point before the block 5, the monitoring method of the present invention informs that the original driving path of the object 202 (e.g., the block 5 → the block 4 → the block 3 → the block 2 → the block 8) is temporarily controlled, for example, by CEO temporary observation, reporter visit, customer visit, car accident, road tree collapse, etc., and suggests the object 202 to change the driving path (e.g., change to the block 5 → the block 4 → the block 3 → the block 7, and then go to the target building). At this time, the monitoring method of the present invention obtains a combined authority of an updated location and time of the object 202 at the factory floor control point. The updated location and time combination rights are the location that the object 202 is most recently authorized to reach, replacing the original location and time combination rights. In the present embodiment, the combination of the updated location and time entitles the object 202 to enter the north block of the block 7, which is not originally authorized, via the block 7. The monitoring method of the invention can update the updated position and time combined authority to the situation sequence at the corresponding time point so as to judge the original legal but illegal event and send out an alarm.
For example, as shown in fig. 2C, when the visible light camera detects that the object 202 has entered the block 3, the monitoring method of the present invention obtains the object 202 at a time point T + Δ T2The speed of movement (including its speed and direction of movement) and predict the time point T + Δ T of the object 2023Block 2 is entered. When the visible light camera 220 captures a real-time image that the object 202 is about to enter the block 2, since the object 202 is not authorized to enter the block 2 according to the combined authority of the updated position and the time, the monitoring method of the present invention sends an alarm at the predetermined time point before the object 202 enters the block 2 through the visible light camera 220. Finally, the plant control pointsThe guard may directly call the driver of the object 202 (e.g., leave a contact cell phone number on the visitor's request form), or directly block the object 202 on site to alert the driver (based on the combined authority of the updated location and time) that the object 202 cannot be driven into the block 2.
In some embodiments, the combined location and time permissions granted to the object 202 at the factory floor control point are 9: 00-9: 30AM for unloading at a first dock, 9: 30-9: 40AM for unloading at a second dock, and 9: 40-9: 50AM for unloading at a third dock. In other words, the object 202 is to follow the sequence of first wharf → second wharf → third wharf and be unloaded at a specific time. However, the item 202 actually appears at the jetty at 9:10AM and leaves the jetty at 9:30 and is traveling on the factory floor road to the jetty. The monitoring method of the present invention provides an alarm against the occurrence of an illegal time of the object 202 by monitoring the sequence of situations at the time point when the object 202 is parked at the dock at 9:10 AM. Then, the monitoring method of the present invention knows that the object 202 leaves the loading dock at 9:35AM (detected by the at least one sensor) according to the moving path of the object 202, and predicts that the object 202 is about to travel to the first dock, thereby determining that the object 202 is not delivered in the predetermined sequence of first dock → second dock → loading dock, and issues an alarm at 9:36AM to instruct the manager of the first dock to prohibit the object 202 from occupying the loading dock for an illegal period of time. Finally, the manager can request the object 202 to be delivered to the second dock or wait for the free time between the first dock and the second dock to insert and unload according to the execution status of the on-site scheduling plan, which cannot affect the unloading of other originally scheduled schedules. Furthermore, the manager can notify the guard of the factory control point to issue a violation ticket for the object 202.
According to the context sequence, when the object 202 is located at an authorized position and its corresponding block, and the staying time of the object 202 at the same position and its corresponding block is greater than a first threshold, the monitoring method of the present invention issues an alarm (step S110). For example, go back to the figure2A, at this point in time T the visitor is parking an item 202 (e.g. a vehicle) alongside the block 4. FIG. 2E is a time T + Δ T according to an embodiment of the disclosure5Schematic configuration diagram of the time monitoring method. Wherein, T + Δ T5Indicates that the period Deltat has elapsed after the time point T5The time point of (a). In some embodiments, the period Δ t5Much longer than the period deltat3. For example, as shown in FIG. 2B, at the time point T + Δ T5When the object 202 is found to be located in the block 4 (e.g., 5 minutes after the time point T of fig. 2A), the monitoring method of the present invention detects the object 202 is located in the block 4 through the RFID sensor 206 in the block 4. Furthermore, the monitoring method of the present invention then compares the position information of the object 202 in the context sequence at the time point T with the time point T + Δ T5Comparing the position information of the object in the context sequence to find that the object 202 is at the time point T and the time point T + Δ T5Is in block 4, thus determining that the object 202 remains in the same location.
Then, the monitoring method of the present invention calculates the time point T + Δ T5A time difference from the time point T. For example, the time difference is 5 minutes. In other words, the dwell time of the object 202 in the zone 4 is 5 minutes. When the time difference (i.e., the staying time of the object 202 in the block 4) is greater than a first threshold (e.g., the first threshold is 4 minutes), the monitoring method of the present invention issues an alarm. In other words, in the embodiment, when the staying time of the object 202 at the same location exceeds 4 minutes, the monitoring method of the present invention will issue an alarm due to the staying time of the object 202 at the authorized location or the corresponding block (e.g., the block 4) being too long.
In some embodiments, the monitoring method of the present invention may increase the monitoring level due to the long stay time of the object 202 at the same position. For example, at time T + Δ T6(e.g., 10 minutes after the time point T of FIG. 2A), the monitoring method of the present invention finds the item 202 still in the zone 4 again by the RFID sensor 206 in the zone 4. Wherein, T + Δ T6After the time point TAfter the lapse of time Deltat6The time point of (a). In some embodiments, the period Δ t6Greater than the period Deltat5. When the staying time of the object 202 in the zone 4 is greater than a second threshold (e.g., the second threshold is 8 minutes), the monitoring method of the present invention activates at least one visible light camera (e.g., the visible light camera 214, 216 or 218) near the location (e.g., the zone 4) where the object 202 stays. In the present embodiment, the second threshold value (8 minutes after the time point T) is larger than the first threshold value (4 minutes after the time point T).
Then, the monitoring method of the present invention controls the at least one visible light camera (e.g., the visible light camera 214, 216 or 218) to perform corresponding steering according to the position (e.g., the block 4) where the object 202 stays, i.e., all points to the position where the object 202 stays, so as to obtain a real-time image of the object 202. The security guard or the staff in the control point of the factory can monitor the state of the visitor or the object 202 in real time according to the real-time image of the object 202 obtained by the monitoring method of the invention.
In some embodiments, the monitoring method of the present invention may again increase the monitoring level because the object 202 stays at the same location for too long. For example, at time T + Δ T7(e.g., 15 minutes after the time point T of FIG. 2A), the monitoring method of the present invention finds the item 202 still in the zone 4 again by the RFID sensor 206 in the zone 4. Wherein, T + Δ T7Indicates that the period Deltat has elapsed after the time point T7The time point of (a). In some embodiments, the period Δ t7Greater than the period Deltat6. When the staying time of the object 202 at the same position and the corresponding block (e.g., the block 4) is greater than a third threshold (e.g., the third threshold is 12 minutes), at least one infrared thermal imager (not shown) near the position where the object 202 stays is activated to determine whether the visitor is within the object 202. In the present embodiment, the third threshold value (12 minutes after the time point T) is larger than the second threshold value (8 minutes after the time point T).
When the monitoring method of the present invention confirms that a person (e.g., the visitor) is on the object 202, the monitoring method notifies the guard to go to the location where the object 202 is located to band, or issues a ticket to the visitor with the same factory service for the illegal parking of the object 202. When the monitoring method of the present invention confirms that there is no person on the object 202, the factory is notified to go to the location where the object 202 stays and lock the wheels. In some embodiments, when the monitoring method of the present invention determines that there is no person on the object 202, but the object vehicle engine is in the on state, the object 202 may be at risk of a car bomb, so the monitoring method of the present invention notifies the police, or even the blasting team, to the location of the object 202 for processing. The monitoring method of the present invention can gradually increase the monitoring level of the object 202 as the staying time of the object 202 at the same position increases, so as to continuously alarm the violation event of the object 202 as the time goes by.
While embodiments of the present invention have been described above, it should be understood that they have been presented by way of example only, and not limitation. Many modifications of the above-described exemplary embodiments in accordance with this embodiment may be made without departing from the spirit and scope of the invention. Thus, the breadth and scope of the present invention should not be limited by any of the above-described exemplary embodiments. Rather, the scope of the invention should be defined by the claims and their equivalents.

Claims (12)

1. A method of monitoring, comprising:
dividing an area where an object is located into a plurality of blocks, and arranging at least one sensor;
acquiring an identity identification of the object and a block of the position of the object in the area through the at least one sensor, and recording a time point;
acquiring a position and time combined authority of the object according to the identity identification of the object;
predicting a moving path of the object when the object is moving;
according to the combined authority of the position and the time of the object and the moving path, an alarm is sent out at a preset time point before the object approaches to an unauthorized block.
2. The monitoring method of claim 1, further comprising:
generating a situation sequence related to the object according to the sequence of the corresponding time points respectively recorded when the object is detected by the at least one sensor in the plurality of blocks; the situation sequence records the identity of the object at the corresponding time points, the block of the position of the object, and the combined authority of the position and the time.
3. A monitoring method as recited in claim 2 wherein said predicting the path of movement of the object further comprises:
calculating the moving speed of the object according to the situation sequence, and comprehensively judging the historical track and the geographic space information of the object in the process of travelling; and
and judging the next block where the object is located at the next time point.
4. The monitoring method of claim 1, further comprising:
starting at least one camera along the predicted moving path of the object at the predetermined time point immediately before the object approaches the unauthorized block;
and controlling the at least one camera to correspondingly steer according to the predicted moving path of the object so as to obtain a real-time image of the object.
5. The monitoring method of claim 2, further comprising:
obtaining a combined permission of an updated position and time of the object, indicating a position which the object is authorized to reach newly, and replacing the combined permission of the position and time;
updating the context sequence associated with the object according to the obtained combination permission of the updated position and time;
and sending an alarm at the determined time point before the object approaches the unauthorized block according to the combined authority of the updated position and time of the object and the moving path.
6. A monitoring method as recited in claim 3, wherein calculating the moving speed of the object according to the context sequence comprises:
obtaining a first block where the object is recorded in the context sequence corresponding to a first time point at the first time point, wherein the object appearing in the first block at the first time point meets the combined permission of the position and time of the object at the first time point;
obtaining a second block where the object is recorded in the context sequence corresponding to a second time point at the second time point, wherein the object appearing in the second block at the second time point meets the combined permission of the position and time of the object at the second time point;
calculating a time difference between the first time point and the second time point;
calculating a distance between the first block and the second block;
and calculating the moving speed of the object according to the time difference and the distance.
7. A monitoring method according to claim 6, wherein an alarm is issued when the speed of movement of the object exceeds a speed limit.
8. A method of monitoring as recited in claim 1 wherein the at least one sensor comprises: at least one RFID sensor, at least one visible light camera, or at least one infrared thermal imager.
9. The monitoring method of claim 2, further comprising:
judging whether the object stops or not;
when the object stops, obtaining the staying time of the object at the position;
if the staying time is larger than a first threshold value, an alarm is sent out.
10. The monitoring method of claim 9, further comprising:
when the staying time of the object at the position is larger than a second threshold value, starting at least one visible light camera near the position where the object stays; wherein the second threshold is greater than the first threshold;
and controlling the at least one visible light camera to correspondingly turn according to the position of the object so as to obtain a real-time image of the object.
11. The monitoring method of claim 10, further comprising:
when the staying time of the object at the position is larger than a third threshold value, starting at least one infrared thermal imager near the position where the object stays to confirm whether people exist on the object or whether the vehicle engine of the object is in a starting state; wherein the third threshold is greater than the second threshold;
when the person on the object is confirmed, a notification is sent.
12. The monitoring method of claim 9, further comprising:
obtaining a first block where the object is recorded in the situation sequence corresponding to a first time point at the first time point;
obtaining a second block where the object is recorded in the situation sequence corresponding to a second time point when the second time point is reached;
when the first block is the same as the second block, judging that the object stays at the position;
and calculating a time difference between the first time point and the second time point as the staying time.
CN202010392535.3A 2020-05-11 2020-05-11 Security monitoring method with track tracking, prediction and dwell time monitoring functions Pending CN113643167A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010392535.3A CN113643167A (en) 2020-05-11 2020-05-11 Security monitoring method with track tracking, prediction and dwell time monitoring functions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010392535.3A CN113643167A (en) 2020-05-11 2020-05-11 Security monitoring method with track tracking, prediction and dwell time monitoring functions

Publications (1)

Publication Number Publication Date
CN113643167A true CN113643167A (en) 2021-11-12

Family

ID=78415388

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010392535.3A Pending CN113643167A (en) 2020-05-11 2020-05-11 Security monitoring method with track tracking, prediction and dwell time monitoring functions

Country Status (1)

Country Link
CN (1) CN113643167A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115062243A (en) * 2022-07-27 2022-09-16 南通友鸿信息技术有限公司 Data processing system and method based on interaction between mobile terminal and computer

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090024357A1 (en) * 2006-02-28 2009-01-22 Toyota Jidosha Kabushiki Kaisha Object Path Prediction Method, Apparatus, and Program, and Automatic Operation System
TW201123038A (en) * 2009-12-25 2011-07-01 Taiwan Sogo Shinkong Security Co Ltd A personnel location tracking and management system and the method thereof
CN104700202A (en) * 2014-12-31 2015-06-10 大亚湾核电运营管理有限责任公司 Method and device for controlling people permission in nuclear power plant area
CN105581411A (en) * 2016-01-26 2016-05-18 大唐国际发电股份有限公司重庆分公司 Intelligent safety helmet and personnel location management system and method
CN108960352A (en) * 2017-05-18 2018-12-07 中兴通讯股份有限公司 A kind of method, apparatus of safety custody, system and storage medium
CN109344948A (en) * 2018-10-30 2019-02-15 深圳市大数据研究院 A kind of intelligence password card and the garden safety management method using the card
CN110399951A (en) * 2019-07-26 2019-11-01 马鞍山市科泰电气科技有限公司 A kind of monitoring management system and method for plant area staff motion track

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090024357A1 (en) * 2006-02-28 2009-01-22 Toyota Jidosha Kabushiki Kaisha Object Path Prediction Method, Apparatus, and Program, and Automatic Operation System
TW201123038A (en) * 2009-12-25 2011-07-01 Taiwan Sogo Shinkong Security Co Ltd A personnel location tracking and management system and the method thereof
CN104700202A (en) * 2014-12-31 2015-06-10 大亚湾核电运营管理有限责任公司 Method and device for controlling people permission in nuclear power plant area
CN105581411A (en) * 2016-01-26 2016-05-18 大唐国际发电股份有限公司重庆分公司 Intelligent safety helmet and personnel location management system and method
CN108960352A (en) * 2017-05-18 2018-12-07 中兴通讯股份有限公司 A kind of method, apparatus of safety custody, system and storage medium
CN109344948A (en) * 2018-10-30 2019-02-15 深圳市大数据研究院 A kind of intelligence password card and the garden safety management method using the card
CN110399951A (en) * 2019-07-26 2019-11-01 马鞍山市科泰电气科技有限公司 A kind of monitoring management system and method for plant area staff motion track

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘修文: "《全国高等职业教育"十三五"规划教材 物联网技术应用 智能家居 第2版》", 北京:机械工业出版社 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115062243A (en) * 2022-07-27 2022-09-16 南通友鸿信息技术有限公司 Data processing system and method based on interaction between mobile terminal and computer

Similar Documents

Publication Publication Date Title
CN109753058B (en) Autonomous vehicle
US10974693B1 (en) Methods of theft prevention or mitigation
EP2038860B1 (en) Automated site security, monitoring and access control system
KR100785137B1 (en) Computerized parking facility management system and method
CN105894810B (en) Method and device for monitoring a vehicle travelling in a parking area
CN114466305A (en) Rescue system, rescue method and server used by rescue system
CN107004359B (en) Method for monitoring a parking lot
CN108025702B (en) Motor vehicle safeguard
EP3432283A1 (en) Safe-exit system for safety protection of a passenger exiting an automated vehicle
CN109615866A (en) Traffic monitoring system Internet-based
RU2712404C2 (en) System for monitoring and monitoring of routed vehicles
CN112466031A (en) Vehicle area control method and system based on vehicle-mounted personnel information and electronic equipment
US20170080897A1 (en) Securing a motor vehicle
CN110047174A (en) A kind of orbit traffic full network multifunctional platform management system
CN113643167A (en) Security monitoring method with track tracking, prediction and dwell time monitoring functions
WO2010056139A2 (en) A system and method for monitoring and management of public transport vehicles
KR100867336B1 (en) System and method of supervising the parking violation
TWI753427B (en) A surveillance method with predictive track and trace and parking duration monitoring
EP2700546A1 (en) Method and system for surveilling a vehicle
US7477163B2 (en) Apparatus and method for determining asset location via local triangulation
KR101084597B1 (en) Realtime video control method of surveillance camera
US11955005B2 (en) Virtual gate system of connected traffic signals, dynamic message signs and indicator lights for managing traffic
JP2001283376A (en) Detection device for illegally parked vehicle
KR102039404B1 (en) Image surveillance system and method thereof
US20100053328A1 (en) Surveillance system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination