CN107808502B - A kind of image detection alarm method and device - Google Patents

A kind of image detection alarm method and device Download PDF

Info

Publication number
CN107808502B
CN107808502B CN201711051206.7A CN201711051206A CN107808502B CN 107808502 B CN107808502 B CN 107808502B CN 201711051206 A CN201711051206 A CN 201711051206A CN 107808502 B CN107808502 B CN 107808502B
Authority
CN
China
Prior art keywords
target
target person
work order
target area
image information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711051206.7A
Other languages
Chinese (zh)
Other versions
CN107808502A (en
Inventor
陈硕
胡敏
姜利辉
徐雷
任建国
陈华
彭驭风
崔德永
梁杰
安兴
胡效雷
欧又成
彭峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Jijian Technology Co ltd
China Resources Power Haifeng Co Ltd
China Resources Power Hubei Co Ltd
China Resource Power Technology Research Institute
Original Assignee
Huarun Power Technology Research Institute Co Ltd
Shenzhen Polar View Technology Co Ltd
China Resources Power Haifeng Co Ltd
China Resources Power Hubei Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huarun Power Technology Research Institute Co Ltd, Shenzhen Polar View Technology Co Ltd, China Resources Power Haifeng Co Ltd, China Resources Power Hubei Co Ltd filed Critical Huarun Power Technology Research Institute Co Ltd
Priority to CN201711051206.7A priority Critical patent/CN107808502B/en
Publication of CN107808502A publication Critical patent/CN107808502A/en
Application granted granted Critical
Publication of CN107808502B publication Critical patent/CN107808502B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/22Status alarms responsive to presence or absence of persons
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The embodiment of the present application discloses a kind of image detection alarm method and device, for timely and effectively finding the abnormal behaviour of internal staff, and is warned, is eliminated safe hidden trouble.The embodiment of the present application method includes: to obtain the image information of target person in target area, and described image information includes at least the human face image information of the target person;Determine that the personal information of the target person, the personal information include at least character types and ID number according to the human face image information;Judge whether the character types of the target person are associated with work order;If association, judges whether the target person can enter the target area according to the ID number;If cannot, judge that the target person whether there is the target work order to match;If it does not exist, then warning note is carried out.

Description

A kind of image detection alarm method and device
Technical field
This application involves safety-security area more particularly to a kind of image detection alarm methods and device.
Background technique
With the fast development of face recognition technology, more and more fields are managed using face recognition technology, For example, working is registered, work handover etc..
Currently, Ren Yuanduo, management difficulty is big, and the same area enters and exits personnel because plant area's range of many enterprises is big Complexity, personal management difficulty are big.It relies primarily on manpower to the supervision of a certain specific region to patrol, to discrepancy, personnel are stepped on Note management, inefficiency.
In existing scheme, many enterprises can be both provided with face identification device in the entrance of key area, to the people of entrance Member is identified.Current recognition of face can only be judged whether according to personal information pre-stored in face identification device For internal staff.But the prior art cannot distinguish internal staff, can not timely and effectively find that internal staff's is different Chang Hangwei, and warned, it eliminates safe hidden trouble.
Summary of the invention
The embodiment of the present application provides a kind of image detection alarm method and device, for timely and effectively finding insider The abnormal behaviour of member, and warned, it eliminates safe hidden trouble.
The application first aspect provides a kind of image detection alarm method, comprising: obtains target person in target area Image information, described image information include at least the target person human face image information;Believed according to the facial image Breath determines that the personal information of the target person, the personal information include at least character types and ID number;Judge the target Whether the character types of personnel are associated with work order;If association, judge whether the target person can be into according to the ID number Enter the target area;If cannot, judge that the target person whether there is the target work order to match;If it does not exist, Then carry out warning note.
In a kind of possible design, in the first implementation of the embodiment of the present application first aspect, the basis It includes: to determine the target according to the ID number that the ID number, which judges whether the target person can enter the target area, The permission region of personnel;Judge the target area whether in the range of the permission region;If the target area is in institute In the range of stating permission region, it is determined that the target person can enter the target area.
In a kind of possible design, in second of implementation of the embodiment of the present application first aspect, the judgement After the target person whether there is the target work order to match, the method also includes: the target work to match if it exists It is single, then judge whether the target work order meets the requirements;If not meeting, warning note is carried out.
In a kind of possible design, in the third implementation of the embodiment of the present application first aspect, the judgement It includes: the workspace for judging the target area and whether recording in the target work order that whether the target work order, which meets the requirements, Within the scope of domain, at the same judge obtain target area in target person image information at the time of whether in the target work order Within the scope of working hour.
In a kind of possible design, in the 4th kind of implementation of the embodiment of the present application first aspect, the acquisition In target area after the image information of target person, it is described judge whether the target work order meets the requirements before, the side Method further include: at the time of record obtains the image information of target person in target area.
The application second aspect provides a kind of image detection warning device, comprising: acquiring unit, for obtaining target area The image information of target person in domain, described image information include at least the human face image information of the target person;It determines single Member, for determining that the personal information of the target person, the personal information include at least angle according to the human face image information Color type and ID number;First judging unit, for judging whether the character types of the target person are associated with work order;Second sentences Disconnected unit, if association, for judging whether the target person can enter the target area according to the ID number;Third Judging unit, if cannot, for judging that the target person whether there is the target work order to match;First alarm is single Member, if it does not exist, then for carrying out warning note.
In a kind of possible design, in the first implementation of the embodiment of the present application second aspect, described second Judging unit includes: the first determining module, for determining the permission region of the target person according to the ID number;Judge mould Block, for judging the target area whether in the range of the permission region;Second determining module, if the target area In the range of the permission region, then for determining that the target person can enter the target area.
In a kind of possible design, in second of implementation of the embodiment of the present application second aspect, the judgement After the target person whether there is the target work order that matches, described device further include: the 4th judging unit, if it exists phase Matched target work order, then for judging whether the target work order meets the requirements;Second alarm unit is used if not meeting In progress warning note.
In a kind of possible design, in the third implementation of the embodiment of the present application second aspect, the judgement It includes: the workspace for judging the target area and whether recording in the target work order that whether the target work order, which meets the requirements, Within the scope of domain, at the same judge obtain target area in target person image information at the time of whether in the target work order Within the scope of working hour.
In a kind of possible design, in the 4th kind of implementation of the embodiment of the present application second aspect, the acquisition In target area after the image information of target person, it is described judge whether the target work order meets the requirements before, the side Method further include: at the time of record obtains the image information of target person in target area.
The third aspect of the application provides a kind of computer readable storage medium, in the computer readable storage medium It is stored with instruction, when run on a computer, so that computer executes method described in above-mentioned various aspects.
The fourth aspect of the application provides a kind of computer program product comprising instruction, when it runs on computers When, so that computer executes method described in above-mentioned various aspects.
As can be seen from the above technical solutions, the embodiment of the present application has the advantage that
In technical solution provided by the embodiments of the present application, the image information of target person in target area, the figure are obtained As information includes at least the human face image information of the target person;The target person is determined according to the human face image information Personal information, the personal information include at least character types and ID number;Judge the target person character types whether It is associated with work order;If association, judges whether the target person can enter the target area according to the ID number;If no It can be then to judge that the target person whether there is the target work order to match;If it does not exist, then warning note is carried out.This Shen Please embodiment, can judge whether the internal staff recognized should appear in monitoring area in time, timely and effectively discovery in The abnormal behaviour of portion staff, and warned, eliminate the security risk being likely to occur.
Detailed description of the invention
Fig. 1 is one embodiment schematic diagram of image detection alarm method in the embodiment of the present application;
Fig. 2 is another embodiment schematic diagram of image detection alarm method in the embodiment of the present application;
Fig. 3 is one embodiment schematic diagram of image detection warning device in the embodiment of the present application;
Fig. 4 is another embodiment schematic diagram of image detection warning device in the embodiment of the present application.
Specific embodiment
The embodiment of the present application provides a kind of image detection alarm method and device, for timely and effectively finding insider The abnormal behaviour of member, and warned, it eliminates safe hidden trouble.
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application The embodiment of the present application is described in attached drawing.
The description and claims of this application and term " first ", " second ", " third ", " in above-mentioned attached drawing The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage The data that solution uses in this way are interchangeable under appropriate circumstances, so that the embodiments described herein can be in addition to illustrating herein Or the sequence other than the content of description is implemented.In addition, term " includes " or " having " and its any deformation, it is intended that covering is not Exclusive includes, for example, the process, method, system, product or equipment for containing a series of steps or units be not necessarily limited to it is clear Step or unit those of is listed on ground, but is not clearly listed or for these process, methods, product or is set Standby intrinsic other step or units.
For ease of understanding, the detailed process of the embodiment of the present application is described below, referring to Fig. 1, the application is implemented One embodiment of image detection alarm method includes: in example
101, the image information of target person in target area is obtained.
The image information of target person in target area is obtained, described image information includes at least the face figure of target person As information.
It should be noted that by the identification device that target area inlet is arranged in, to the personnel of disengaging target area Image information is acquired, and is identified.Identification device, which is generally high-resolution camera etc. or other, has acquisition figure As the device of function, specifically herein without limitation.
It is understood that target area can be production area or other important places, it specifically can be according to practical feelings Condition is configured;In addition, identification device can also the dressing image to the target person of appearance be acquired, for example, by pre- The comparison database information set determines whether target person wears the work clothes that meets the requirements, and the dressing image of target person can be confirmation The information of target person provides auxiliary information.
102, the personal information of target person is determined according to image information.
The personal information of target person is determined according to human face image information, which includes at least character types and ID Number, mission bit stream can also include other information, specifically herein without limitation.
It should be noted that character types may include the types such as leader, common management personnel, worker, different roles Type, permission obtained are also different.For example, the permission highest of leader, can enter all areas and be inspected;Common management Personnel can only enter responsible region and work;Worker can enter to need the production area of operation, specifically, to worker's Work post is classified, and different production areas can be associated with according to different work posts.For example, welding worker can only enter welding The production area of project, service worker can enter whole production areas.
It is understood that each staff has unique ID number, which can be associated with other register informations, For example, mug shot, name, work post, character types, permission etc., when the ID number for recognizing target person according to image information, then Other information is indexed according to ID number.
103, judge whether the character types of target person are associated with work order.
According to the character types of target person, judge whether the character types of target person are associated with work order.If for example, Leader is then associated with without work order;If worker either common management personnel, then be associated with work order.If not being associated with, step is executed Rapid 104, carry out other operations;If association, thens follow the steps 105.
It should be noted that whether different character types are associated with work order, can be configured according to the actual situation, example Such as, leader and common management personnel do not have work order, and only worker has work order.When character types not other setting types, then tie Actual conditions are closed to be configured.
104, other operations are carried out.
Carry out other operations.Related personnel is reminded to check etc. specifically, can be, specifically herein without limitation.
105, judge whether target person can enter target area.
If the character types of target person are associated with work order, judge whether target person can enter target according to ID number Region.If can be to then follow the steps 104;If cannot, then follow the steps 106.
In a kind of feasible embodiment, when the character types for determining target person are worker, target person is target Worker, and be associated with work order, target worker's authority information is obtained according to the ID number of target worker, whether judges target worker Target area can be entered.
It is understood that other operations are executed if the character types of target person are not associated with work order, for example, hair Prompt information is sent, there is personnel's entrance;Alternatively, not doing any prompting, only keep a record.
106, judge that target person whether there is the target work order to match.
If it is determined that target person cannot enter target area, then judge that target person whether there is the target work to match It is single.If it does not exist, 107 are thened follow the steps;If it exists, 104 are thened follow the steps.
It should be noted that target person, which is likely to be interim call to target area, carries out operation, and the target person The permission into the target area is had no before member, is not saved the information of the target person in database, is needed the volume of progress at this time Outer judgement, if there are the target work orders that invocation target personnel enter target area.
It is understood that the handling situations of personnel require typing work order information, work order information includes operating personnel, makees Industry region and working time.For example, operating personnel includes secure supervisor, the person of getting angry and other work for needing participation live Personnel;For example, the working time includes the working time applied, delays time etc..Work order information can also include action/ The information such as work post, specifically herein without limitation.Monitoring system needs timing synchronized update data from WorkForm System, guarantees work order The actual effect of data.
It should also be noted that, if it is determined that target person can then execute other operations, specifically herein into target area Without limitation.
107, warning note is carried out.
If it is determined that the target work order to match is not present in target person, then warning note is carried out.
It should be noted that can be configured according to the actual situation there are many modes of warning note.For example, according to Different warning note modes is arranged in the significance level of target area.Specifically, all monitoring areas are classified, according to Significance level, urgency level etc. use mail respectively, and the mode of wechat, the different stages such as short message notifies responsible person or staff, Ensure to carry out warning note at the first time.
In the embodiment of the present application, by judge target person appear in target area behavior it is whether reasonable, it is timely and effective Discovery target person abnormal behaviour, and warned, eliminate the security risk being likely to occur.
Referring to Fig. 2, another embodiment of image detection alarm method includes: in the embodiment of the present application
201, the image information of target person in target area is obtained.
The image information of target person in target area is obtained, described image information includes at least the face figure of target person As information.
It should be noted that by the identification device that target area inlet is arranged in, to the personnel of disengaging target area Image information is acquired, and is identified.Identification device, which is generally high-resolution camera etc. or other, has acquisition figure As the device of function, specifically herein without limitation.
It is understood that target area can be production area or other important places, it specifically can be according to practical feelings Condition is configured;In addition, identification device can also the dressing image to the target person of appearance be acquired, for example, by pre- The comparison database information set determines whether target person wears the work clothes that meets the requirements, and the dressing image of target person can be confirmation The information of target person provides auxiliary information.
202, at the time of record obtains the image information of target person in target area, it is denoted as current time.
At the time of record obtains the image information of target person in target area, when being recorded as current at the time of will acquire It carves.
It is understood that all different at the time of each acquisition image information, the smallest time difference is away from that can be 1 second, also It can be other situations, for example, each frame image is 1/12 second as unit of frame, alternatively, each frame image is 1/25 second, tool Body is herein without limitation.
203, the personal information of target person is determined according to image information.
The personal information of target person is determined according to human face image information, which includes at least character types and ID Number, mission bit stream can also include other information, specifically herein without limitation.
It should be noted that character types may include the types such as leader, common management personnel, worker, different roles Type, permission obtained are also different.For example, the permission highest of leader, can enter all areas and be inspected;Common management Personnel can only enter responsible region and work;Worker can enter to need the production area of operation, specifically, to worker's Work post is classified, and different production areas can be associated with according to different work posts.For example, welding worker can only enter welding The production area of project, service worker can enter whole production areas.
It is understood that each staff has unique ID number, which can be associated with other register informations, For example, mug shot, name, work post, character types, permission etc., when the ID number for recognizing target person according to image information, then Other information is indexed according to ID number.
204, judge whether the character types of target person are associated with work order.
According to the character types of target person, judge whether the character types of target person are associated with work order.If for example, Leader is then associated with without work order;If worker either common management personnel, then be associated with work order.If not being associated with, step is executed Rapid 205, carry out other operations;If association, thens follow the steps 206.
It should be noted that whether different character types are associated with work order, can be configured according to the actual situation, example Such as, leader and common management personnel do not have work order, and only worker has work order.When character types not other setting types, then tie Actual conditions are closed to be configured.
205, other operations are carried out.
Carry out other operations.Related personnel is reminded to check etc. specifically, can be, specifically herein without limitation.
206, judge whether target person can enter target area.
If the character types of target person are associated with work order, judge whether target person can enter target according to ID number Region.If can be to then follow the steps 205;If cannot, then follow the steps 207.
In a kind of feasible embodiment, when the character types for determining target person are worker, target person is target Worker, and be associated with work order, target worker's authority information is obtained according to the ID number of target worker, whether judges target worker Target area can be entered.
It is understood that other operations are executed if the character types of target person are not associated with work order, for example, hair Prompt information is sent, there is personnel's entrance;Alternatively, not doing any prompting, only keep a record.
207, judge that target person whether there is the target work order to match.
If it is determined that target person cannot enter target area, then judge that target person whether there is the target work to match It is single.If it does not exist, 208 are thened follow the steps;If it exists, 209 are thened follow the steps.
It should be noted that target person, which is likely to be interim call to target area, carries out operation, and the target person The permission into the target area is had no before member, is not saved the information of the target person in database, is needed the volume of progress at this time Outer judgement, if there are the target work orders that invocation target personnel enter target area.
It is understood that the handling situations of personnel require typing work order information, work order information includes operating personnel, makees Industry region and working time.For example, operating personnel includes secure supervisor, the person of getting angry and other work for needing participation live Personnel;For example, the working time includes the working time applied, delays time etc..Work order information can also include action/ The information such as work post, specifically herein without limitation.Monitoring system needs timing synchronized update data from WorkForm System, guarantees work order The actual effect of data.
It should also be noted that, if it is determined that target person can then execute other operations, specifically herein into target area Without limitation.
208, warning note is carried out.
If it is determined that the target work order to match is not present in target person, then warning note is carried out.
It should be noted that can be configured according to the actual situation there are many modes of warning note.For example, according to Different warning note modes is arranged in the significance level of target area.Specifically, all monitoring areas are classified, according to Significance level, urgency level etc. use mail respectively, and the mode of wechat, the different stages such as short message notifies responsible person or staff, Ensure to carry out warning note at the first time.
209, judge within the scope of working region that whether target area records in target work order.
If it is determined that target person has the target work order to match, then judge whether target area records in target work order Working region within the scope of.
If thening follow the steps 210 within the scope of the working region that target area records in target work order;If target area is not Within the scope of the working region recorded in target work order, 208 are thened follow the steps.
210, judge current time whether within the working hour in target work order.
Specifically, at the time of judgement obtains the image information of target person in target area, i.e. current time, if in mesh It marks within the scope of the working hour in work order.If not meeting, 208 are thened follow the steps;If meeting, 205 are thened follow the steps.
It should be noted that needing to record target person in acquisition target area before judging current time Image information current time M, then extract the working hour (N, M) recorded in current time K and target work order and compared Compared with.
For example, be 12 points (24 hours systems) in the current time K that target area collects the image information of target person, If the working time (N, M) recorded in target work order existing for target person is (10,13), i.e., 10 points to 13 points, then can be true Recognizing current time K is in the working hour range (N, M) of target work order.The working region recorded in target work order is judged simultaneously With the presence or absence of target area, and if it exists, within the scope of the working region that then determining target area records in target work order.
It is understood that a reporting P can also be arranged, judge whether the value of K meets: N-P≤K≤M+ P, P are set as 30 minutes, and P can also be other numerical value, and P is less than 60 minutes, specifically herein without limitation.
In the embodiment of the present application, by judge target person appear in target area behavior it is whether reasonable, it is timely and effective Discovery target person abnormal behaviour, and warned, eliminate the security risk being likely to occur.
Image detection alarm method in the embodiment of the present application is described above, below in the embodiment of the present application Image detection warning device is described, referring to Fig. 3, in the embodiment of the present application image detection warning device one embodiment Include:
Acquiring unit 301, for obtaining the image information of target person in target area, described image information is included at least The human face image information of the target person;
Determination unit 302, it is described a for determining the personal information of the target person according to the human face image information People's information includes at least character types and ID number;
First judging unit 303, for judging whether the character types of the target person are associated with work order;
Second judgment unit 304, if association, for judging whether the target person can enter according to the ID number The target area;
Third judging unit 305, if cannot, for judging that the target person whether there is the target work to match It is single;
First alarm unit 306, if it does not exist, then for carrying out warning note.
In the embodiment of the present application, by judge target person appear in target area behavior it is whether reasonable, it is timely and effective Discovery target person abnormal behaviour, and warned, eliminate the security risk being likely to occur.
Referring to Fig. 4, the another one embodiment of image detection warning device includes: in the embodiment of the present application
Acquiring unit 401, for obtaining the image information of target person in target area, described image information is included at least The human face image information of the target person;
Determination unit 402, it is described a for determining the personal information of the target person according to the human face image information People's information includes at least character types and ID number;
First judging unit 403, for judging whether the character types of the target person are associated with work order;
Second judgment unit 404, if association, for judging whether the target person can enter according to the ID number The target area;
Third judging unit 405, if cannot, for judging that the target person whether there is the target work to match It is single;
First alarm unit 406, if it does not exist, then for carrying out warning note.
Optionally, second judgment unit 304 can further comprise:
First determining module 4041, for determining the permission region of the target person according to the ID number;
Judgment module, for judging the target area whether in the range of the permission region;
Second determining module 4042, if the target area in the range of permission region, is used for described in determination Target person can enter the target area.
Optionally, image detection warning device can further include:
4th judging unit 407, the target work order to match if it exists, then for judging whether the target work order meets It is required that;
Second alarm unit 408, if not meeting, for carrying out warning note.
Optionally, the 4th judging unit 407 is specifically used for:
Judge within the scope of working region that whether target area records in the target work order, while judging to obtain In target area at the time of the image information of target person whether within the working hour in the target work order.
In the embodiment of the present application, by judge target person appear in target area behavior it is whether reasonable, it is timely and effective Discovery target person abnormal behaviour, and warned, eliminate the security risk being likely to occur.
The computer program product includes one or more computer instructions.Load and execute on computers the meter When calculation machine program instruction, entirely or partly generate according to process or function described in the embodiment of the present application.The computer can To be general purpose computer, special purpose computer, computer network or other programmable devices.The computer instruction can be deposited Storage in a computer-readable storage medium, or from a computer readable storage medium to another computer readable storage medium Transmission, for example, the computer instruction can pass through wired (example from a web-site, computer, server or data center Such as coaxial cable, optical fiber, Digital Subscriber Line (digital subscriber line, DSL)) or wireless (such as infrared, wireless, Microwave etc.) mode transmitted to another web-site, computer, server or data center.It is described computer-readable to deposit Storage media can be any usable medium that computer can store or include the integrated clothes of one or more usable mediums The data storage devices such as business device, data center.The usable medium can be magnetic medium, (for example, floppy disk, hard disk, tape), Optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk (solid state disk, SSD)) etc..
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the application Portion or part steps.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic or disk etc. are various can store program The medium of code.
The above, above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although referring to before Embodiment is stated the application is described in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of image detection alarm method characterized by comprising
The image information of target person in target area is obtained, described image information includes at least the face figure of the target person As information;
Determine that the personal information of the target person, the personal information include at least role class according to the human face image information Type and ID number;
Judge whether the character types of the target person are associated with work order;
If association, judges whether the target person can enter the target area according to the ID number;
If cannot, judge that the target person whether there is the target work order to match, the target work order is calling institute The work order that target person enters the target area is stated, the target person is interim calls to the target area, database In do not save the information of the target person;
If it does not exist, then warning note is carried out.
2. the method according to claim 1, wherein whether described judge the target person according to the ID number The target area, which can be entered, includes:
The permission region of the target person is determined according to the ID number;
Judge the target area whether in the range of the permission region;
If the target area is in the range of the permission region, it is determined that the target person can enter the target area Domain.
3. the method according to claim 1, wherein the judgement target person whether there is and match After target work order, the method also includes:
The target work order to match if it exists, then judge whether the target work order meets the requirements;
If not meeting, warning note is carried out.
4. according to the method described in claim 3, it is characterized in that, described judge whether the target work order meets the requirements packet It includes:
Judge within the scope of working region that whether target area records in the target work order, while judging to obtain target In region at the time of the image information of target person whether within the working hour in the target work order.
5. according to the method described in claim 4, it is characterized in that, the image information for obtaining target person in target area Later, it is described judge whether the target work order meets the requirements before, the method also includes:
At the time of record obtains the image information of target person in target area.
6. a kind of image detection warning device characterized by comprising
Acquiring unit, for obtaining the image information of target person in target area, described image information includes at least the mesh The human face image information of mark personnel;
Determination unit, for determining the personal information of the target person, the personal information according to the human face image information Including at least character types and ID number;
First judging unit, for judging whether the character types of the target person are associated with work order;
Second judgment unit, if association, for judging whether the target person can enter the mesh according to the ID number Mark region;
Third judging unit, if cannot, it is described for judging that the target person whether there is the target work order to match Target work order is the work order for calling the target person to enter the target area, and the target person is interim calls to described Target area does not save the information of the target person in database;
First alarm unit, if it does not exist, then for carrying out warning note.
7. device according to claim 6, which is characterized in that the second judgment unit includes:
First determining module, for determining the permission region of the target person according to the ID number;
Judgment module, for judging the target area whether in the range of the permission region;
Second determining module, if the target area in the range of permission region, is used to determine the target person The target area can be entered.
8. device according to claim 6, which is characterized in that the judgement target person, which whether there is, to match After target work order, described device further include:
4th judging unit, the target work order to match if it exists, then for judging whether the target work order meets the requirements;
Second alarm unit, if not meeting, for carrying out warning note.
9. a kind of computer installation, which is characterized in that the computer installation includes processor, and the processor is deposited for executing It is realized when the computer program stored in reservoir such as the step of any one of claim 1-5 the method.
10. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that: the computer program It is realized when being executed by processor such as the step of any one of claim 1-5 the method.
CN201711051206.7A 2017-10-27 2017-10-27 A kind of image detection alarm method and device Active CN107808502B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711051206.7A CN107808502B (en) 2017-10-27 2017-10-27 A kind of image detection alarm method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711051206.7A CN107808502B (en) 2017-10-27 2017-10-27 A kind of image detection alarm method and device

Publications (2)

Publication Number Publication Date
CN107808502A CN107808502A (en) 2018-03-16
CN107808502B true CN107808502B (en) 2019-01-22

Family

ID=61583213

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711051206.7A Active CN107808502B (en) 2017-10-27 2017-10-27 A kind of image detection alarm method and device

Country Status (1)

Country Link
CN (1) CN107808502B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881858B (en) * 2018-08-03 2020-06-23 四川亚东世纪科技有限公司 Method and device for monitoring external personnel on construction site and electronic equipment
CN111126100B (en) * 2018-10-30 2023-10-17 杭州海康威视数字技术股份有限公司 Alarm method, alarm device, electronic equipment and storage medium
CN110060252B (en) * 2019-04-28 2021-11-05 重庆金山医疗技术研究院有限公司 Method and device for processing target prompt in picture and endoscope system
CN112686085A (en) * 2019-10-18 2021-04-20 晋城三赢精密电子有限公司 Intelligent identification method applied to camera device, camera device and storage medium
CN111310539A (en) * 2019-11-26 2020-06-19 上海秒针网络科技有限公司 Method and device for supervising food processing area
CN111860152A (en) * 2020-06-12 2020-10-30 浙江大华技术股份有限公司 Method, system, equipment and computer equipment for detecting personnel state
CN112883815B (en) * 2021-01-26 2022-11-29 首都师范大学 Automatic supervision method and system for agricultural implement and server
CN113835457B (en) * 2021-08-10 2022-07-12 太原市高远时代科技有限公司 Water conservancy integration intelligence rack based on edge calculation
CN114743345A (en) * 2022-03-22 2022-07-12 广东电力通信科技有限公司 Electronic map-based intelligent core place management and control platform
CN114973486A (en) * 2022-04-20 2022-08-30 上海奂燎智能科技有限公司 Intelligent alarm method and device for machine room and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008140024A (en) * 2006-11-30 2008-06-19 Toshiba Corp Entry management system and entry management method
CN103714648A (en) * 2013-12-06 2014-04-09 乐视致新电子科技(天津)有限公司 Monitoring and early warning method and device
CN104240348A (en) * 2014-09-12 2014-12-24 福建省智慧物联网研究院有限责任公司 Admittance identity authentication method based on image identification
CN104933819A (en) * 2015-06-17 2015-09-23 福建永易信息科技有限公司 Alarm device based on face recognition and sign recognition and alarm method
CN105574477A (en) * 2015-05-26 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Secure anti-theft method, apparatus and system
CN105956731A (en) * 2016-04-18 2016-09-21 佛山市高明区高科中小企业技术服务中心 Enterprise personnel supervision method and enterprise personnel supervision system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008140024A (en) * 2006-11-30 2008-06-19 Toshiba Corp Entry management system and entry management method
CN103714648A (en) * 2013-12-06 2014-04-09 乐视致新电子科技(天津)有限公司 Monitoring and early warning method and device
CN104240348A (en) * 2014-09-12 2014-12-24 福建省智慧物联网研究院有限责任公司 Admittance identity authentication method based on image identification
CN105574477A (en) * 2015-05-26 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Secure anti-theft method, apparatus and system
CN104933819A (en) * 2015-06-17 2015-09-23 福建永易信息科技有限公司 Alarm device based on face recognition and sign recognition and alarm method
CN105956731A (en) * 2016-04-18 2016-09-21 佛山市高明区高科中小企业技术服务中心 Enterprise personnel supervision method and enterprise personnel supervision system

Also Published As

Publication number Publication date
CN107808502A (en) 2018-03-16

Similar Documents

Publication Publication Date Title
CN107808502B (en) A kind of image detection alarm method and device
CN205879007U (en) Intelligence pistol
CN107944838A (en) A kind of intelligent barrier gate Field Monitoring System and method
CN105847769A (en) Construction site behavior analysis system and analysis method
CN107564225A (en) A kind of image detection warning system
CN110070155B (en) Comprehensive behavior recognition method and system for prisoner based on wearable equipment
CN105956731A (en) Enterprise personnel supervision method and enterprise personnel supervision system
CN109286788A (en) A kind of safety defense monitoring system based on cloud computing
CN105637522A (en) World-driven access control using trusted certificates
CN108537422A (en) Security risk early warning system and method
CN113034826A (en) Video-based abnormal event warning method and system, equipment and storage medium thereof
CN111063144A (en) Abnormal behavior monitoring method, device, equipment and computer readable storage medium
CN106327619A (en) In/out management method and system thereof
CN110781735A (en) Alarm method and system for identifying on-duty state of personnel
CN105847236A (en) Firewall security strategy configuration method and device as well as firewall
CN113869767A (en) Method, system, electronic equipment and storage medium for supervising site police officer business assessment
CN114612813A (en) Identity recognition method, model training method, device, equipment and storage medium
CN112381435A (en) Gridding directional pushing management method for dynamic risk in hydropower station operation process
CN109712289A (en) A kind of garden security information processing method and processing device based on intelligent management platform
CN114120510A (en) Infectious disease prevention and control method, device, platform and computer readable storage medium
CN113485277A (en) Intelligent power plant video identification monitoring management system and method
CN111126167A (en) Method and system for quickly identifying series activities of multiple specific persons
CN110443187A (en) The recording method of characteristic information and device
CN114758416A (en) State monitoring method, device, equipment, storage medium and program product
CN109658316A (en) A kind of safe emergency advance warning management method in garden and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 266000 Huangdao District, Qingdao City, Shandong Province (1403, No. 7 Wuyishan Road, former Development Zone)

Patentee after: Shandong jivisual angle Technology Co.,Ltd.

Patentee after: CR POWER TECHNOLOGY INSTITUTE Co.,Ltd.

Patentee after: CHINA RESOURCES POWER (HAIFENG) CO.,LTD.

Patentee after: CHINA RESOURCES POWER HUBEI Co.,Ltd.

Address before: 518000 Room 601, block B, 4th floor, Keyuan Road software industry base, Yuehai street, Nanshan District, Shenzhen, Guangdong

Patentee before: SHENZHEN EXTREME VISION TECHNOLOGY CO.,LTD.

Patentee before: CR POWER TECHNOLOGY INSTITUTE Co.,Ltd.

Patentee before: CHINA RESOURCES POWER (HAIFENG) CO.,LTD.

Patentee before: CHINA RESOURCES POWER HUBEI Co.,Ltd.

CP03 Change of name, title or address
CP01 Change in the name or title of a patent holder

Address after: 266000 Huangdao District, Qingdao City, Shandong Province (1403, No. 7 Wuyishan Road, former Development Zone)

Patentee after: Shandong Jijian Technology Co.,Ltd.

Patentee after: CR POWER TECHNOLOGY INSTITUTE Co.,Ltd.

Patentee after: CHINA RESOURCES POWER (HAIFENG) CO.,LTD.

Patentee after: CHINA RESOURCES POWER HUBEI Co.,Ltd.

Address before: 266000 Huangdao District, Qingdao City, Shandong Province (1403, No. 7 Wuyishan Road, former Development Zone)

Patentee before: Shandong jivisual angle Technology Co.,Ltd.

Patentee before: CR POWER TECHNOLOGY INSTITUTE Co.,Ltd.

Patentee before: CHINA RESOURCES POWER (HAIFENG) CO.,LTD.

Patentee before: CHINA RESOURCES POWER HUBEI Co.,Ltd.

CP01 Change in the name or title of a patent holder