CN108446819A - One kind being used for garden personal management trust evaluation system - Google Patents
One kind being used for garden personal management trust evaluation system Download PDFInfo
- Publication number
- CN108446819A CN108446819A CN201810107364.8A CN201810107364A CN108446819A CN 108446819 A CN108446819 A CN 108446819A CN 201810107364 A CN201810107364 A CN 201810107364A CN 108446819 A CN108446819 A CN 108446819A
- Authority
- CN
- China
- Prior art keywords
- trust
- garden
- trust evaluation
- dynamic
- evaluation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000011156 evaluation Methods 0.000 title claims abstract description 59
- 238000012544 monitoring process Methods 0.000 claims abstract description 28
- 230000003993 interaction Effects 0.000 claims description 15
- 238000004364 calculation method Methods 0.000 claims description 2
- 230000008859 change Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 238000010276 construction Methods 0.000 description 3
- 238000013473 artificial intelligence Methods 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000000034 method Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 206010021703 Indifference Diseases 0.000 description 1
- 241000207961 Sesamum Species 0.000 description 1
- 235000003434 Sesamum indicum Nutrition 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000000205 computational method Methods 0.000 description 1
- 230000001186 cumulative effect Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000004880 explosion Methods 0.000 description 1
- 230000005764 inhibitory process Effects 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Economics (AREA)
- Tourism & Hospitality (AREA)
- General Physics & Mathematics (AREA)
- Marketing (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Theoretical Computer Science (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Game Theory and Decision Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses for garden personal management trust evaluation system, it is characterized in that, the personnel that each garden that comes in and goes out is directed to by trust evaluation generate each to interact and form corresponding dynamic trust evaluation of estimate, and carry out real-time dynamic monitoring based on the dynamic trust evaluation of estimate.Scheme provided by the invention gives the certain trust integral of personnel of each garden that comes in and goes out by alternate evaluation, which, to realize the functions such as alarm, access and exit control in the equipment such as video monitoring, is finally reached the purpose of intelligent security guard based on trust value.
Description
Technical field
The present invention relates to safe practices, and in particular to is used for garden personal management trust evaluation technology.
Background technology
With the development of economy, no matter Chinese industry, science and technology and Campus recent two decades are from quantity and scale
On all have and be obviously improved, but the cases such as fire, explosion, theft all come therewith occur repeatedly, or even give garden manager
And owner brings great casualties and property loss.Therefore, security protection construction is increasingly paid attention in modernization wisdom garden, from
And it realizes and prevents trouble before it happens.
By security protection and the construction of intelligent video monitoring system, manager can reinforce the monitoring to passing in and out personnel, in addition
Interconnecting under big data enables Security Personnel to find circumference invader in time, prevents and reduce larceny case.But
It is that existing security protection and intelligent video monitoring system mostly or by the observation of Security Personnel are monitored, inefficiency;Again
Person, intelligent video monitoring system its accuracy of identification in part is poor, the problems such as often wrong report by mistake.
Invention content
It is directed to the problems of existing security protection and intelligent video monitoring system as a result, needs a kind of new intelligent security guard
Scheme.
For this purpose, problem to be solved by this invention be to provide it is a kind of being used for garden personal management trust evaluation system, with gram
Take the problems of prior art.
To solve the above-mentioned problems, it provided by the present invention for garden personal management trust evaluation system, is commented by trusting
Valence generates each interaction being directed to the personnel of each garden that comes in and goes out and forms corresponding dynamic trust evaluation of estimate, and dynamically based on this
Trust evaluation value carries out real-time dynamic monitoring.
Further, the trust evaluation system includes:
Monitoring unit, the monitoring unit are distributed on several monitoring nodes of garden;
Trust data library stores several trust value computing information in the trust data library;
Trust evaluation unit, the trust evaluation unit and monitoring unit and trust data library data connection, it is single from monitoring
Member obtains each interaction that the personnel of each garden that comes in and goes out generate, and extracts trust value computing information from trust data library, right
The interaction carries out dynamic trust evaluation and calculates the corresponding dynamic trust evaluation of estimate of stroke, and based on the dynamic trust evaluation of estimate come into
Row real-time dynamic monitoring.
Further, the trust evaluation unit is based on following formula and carries out dynamic trust evaluation calculating:
Wherein, n indicates the number that service occurs;P has bound Pmax, Pmin, and a variety of alarm threshold values can be set;T is
In specific time period, the subjective assessment quantized value of main object validity.
Further, the trust value computing includes with information:History trusts value information, black and white lists information, trust etc.
Grade information.
Scheme provided by the invention given by alternate evaluation it is each come in and go out garden personnel it is certain trust integral, should
Mechanism, to realize the functions such as alarm, access and exit control in the equipment such as video monitoring, is finally reached intelligent security guard based on trust value
Purpose.
Description of the drawings
It is further illustrated the present invention below in conjunction with the drawings and specific embodiments.
Fig. 1 is the Definition Principle figure between user in present example, role, service three;
Fig. 2 is the logic schematic diagram that personal management trust evaluation system in garden is used in present example;
Fig. 3 is the alarming logic figure that personal management trust evaluation system in garden is used in present example.
Specific implementation mode
In order to make the technical means, the creative features, the aims and the efficiencies achieved by the present invention be easy to understand, tie below
Conjunction is specifically illustrating, and the present invention is further explained.
It is to quantify the interbehavior of user in the form of evaluation points that basic thought is fed back in behavior, and overall merit behavior is
It is no that there is risk.Reflect to user behavior objective the certain intentions of user.By being monitored to user behavior, behavior is determined
Legitimacy.
This example is first to the related personnel of garden according to grade classification:User-role-service (referring to Fig. 1).
User (USER) can be understood as all personnel into system, and no matter occupation, age, gender are unified indifference and remembered
Record is USER.
Role (ROLE) is the role that user undertakes in the system, and a USER generally corresponds to a kind of role ROLE, but
Multiple ROLE can theoretically be corresponded to.
The actual content that service (Ser) generates for role's work activities.
Meanwhile user is called interaction by this example to the intermediate process of service.Primary interaction can generate trust evaluation value
T。
T is in specific time period, and the subjective assessment quantized value of main object validity is known as degree of belief.
The introducing of degree of belief so that role interacts foundation on faith mechanism with service.Role is adjusted by degree of belief
Mandate relationship between service.
In user and underlying services interactive process, trust value can dynamically change with the variation of the particular content of service
Become, the intersection of degree of belief T is indicated by P synthesis trust evaluations:
N indicates the number that service occurs;
P should have bound Pmax, Pmin, and a variety of alarm threshold values can be set.
Hereby it is achieved that support a variety of interactive modes, including authentication ids, sesame credit accreditation, garden employee's typing, it is special
Other, it is also primary interaction to be captured every time to user when artificial intelligence camera.Equally, these interactions also have corresponding trust
Value.
According to trust value, dynamic in real time is carried out to the personnel of each discrepancy garden and is given a mark, it is when some event of triggering, i.e., special
Interaction, trust value generates fluctuation, reaches setting value then output alarm signal.
Principle accordingly, this example provide the implementation for garden personal management trust evaluation system.
Referring to Fig. 2, this includes mainly monitoring unit 110, trust data for garden personal management trust evaluation system 100
130 three parts of library 120 and trust evaluation unit.
Wherein, monitoring unit 110 is distributed on several monitoring nodes of garden, goes out the people of each garden that comes in and goes out for identification
Member, and identification obtain each interaction that the personnel of each garden that comes in and goes out generate.
Trust data library 120 is for storing several trust value computing information, trust value computing packet here
It includes history and trusts value information, black and white lists information, reliability rating information etc..
Trust evaluation unit 130 and 120 data connection of monitoring unit 110 and trust data library, can obtain from monitoring unit
Each interaction that the personnel of each garden that comes in and goes out generate, and trust value computing information is extracted from trust data library, to the interaction
It carries out dynamic trust evaluation and calculates the corresponding dynamic trust evaluation of estimate of stroke, and is real-time to carry out based on the dynamic trust evaluation of estimate
Dynamic monitors.
In specific implementation, which is based on following formula and carries out dynamic trust evaluation calculating:
Wherein, n indicates the number that service occurs;P has bound Pmax, Pmin, and a variety of alarm threshold values can be set;T is
In specific time period, the subjective assessment quantized value of main object validity.
What is constituted accordingly is used for garden personal management trust evaluation system 100 when being run, first according to each garden
The characteristics of area manages, in the monitoring corresponding monitoring unit of inserting knot accordingly;
Then, in the needs according to actual monitored, multiple nodes to be selected are selected;And extract trust value meter from trust data library
Calculation information is loaded into history trust information;It is loaded into black and white lists, the information such as prediction level of trust.
Furthermore each interaction that each personnel generate is obtained in real time from the monitoring node of selection, and based on the letter extracted
Appoint value calculating to carry out dynamic trust evaluation with information to calculate, obtains corresponding dynamic trust evaluation of estimate.
Finally, according to trust evaluation as a result, corresponding node is selected to interact, and the corresponding letter in database is corrected accordingly
Appoint data.
Carry out illustratively this programme below by way of a concrete application example.
This application example with a Logistics Park, in garden all personnel may include-administrative staff, engineering construction personnel,
For property sanitation worker, property security personnel etc..
Referring to Fig. 2, occupation is not being distinguished in system, enumerated successively as user.It is examined by inlet recognition of face hardware
It surveys, to detect that personnel are numbered (USER).
The service of different role covering is defined, as an example, relevant service can be reduced to ' enter so-and-so region ' thing
Part.Specific in practice, for ' by artificial camera detection when entering the region '.
The trust evaluation that this time interaction generates is according to formula
Trust scoring example to set according to different scenes, example can see the table below:
When user remembers from initially being detected by camera, its score Ttotal and detected times N are recorded, is added up single
Camera adds up occurrence number Tn, region cumulative number Tq。
It utilizesIt calculates user and appears in the single camera frequency.
Computational methods based on P as a result, associated user is more in the node survey number just to score, i.e., denominator is bigger, the use
The family score just average normal level 1, you can think that the user credit is good.
As the dynamic evaluation value of Fig. 3, user determine its alert level being in.When user's score is too low, then enter black
In list;All underlying devices detect this with alarming per family in garden.
When user's score value is in subaverage, but not in the row of blacklist;At this point, the negative scoring such as danger zone is related
Underlying device detects that the user realizes alarm.
When user's score value is in average level or more, especially outstanding person, such as garden enterprises registration labourer or garden property
Manager, such user enter white list.When into danger zone, underlying device detects that the user does not alarm, but at this time should
User's score value has declined, and the underlying device for hereafter repeatedly being born score value region detects, users to trust scoring drops to general
Logical rank, alarm mechanism accordingly change.
By upper example it is found that this programme has the following advantages that:
1) by this programme, the personnel of each garden that comes in and goes out generate trust value due to being interacted with garden generation, and trust value is real
When dynamic change, to realize to the real time dynamic tracing of each user.
2) by this programme, user is by indiscriminate carry out trust evaluation, according to the setting of the trust evaluation value in reality
To select the functions such as alarm, control to user behavior.
3) by this programme, artificial intelligence camera captures face, checks card at gate inhibition and garden employee registration etc. is all
The behavior interacted with underlying device be all included into the trust evaluation mechanism, to which the interconnection for realizing internet of things equipment is mutual
It is logical.
4) by this programme, the data that trust evaluation generates can be used for big data analysis, same in the management of more gardens
It is applicable in.
The basic principles, main features and advantages of the present invention have been shown and described above.The technology of the industry
Personnel are it should be appreciated that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this
The principle of invention, without departing from the spirit and scope of the present invention, various changes and improvements may be made to the invention, these changes
Change and improvement all fall within the protetion scope of the claimed invention.The claimed scope of the invention by appended claims and its
Equivalent thereof.
Claims (4)
1. being used for garden personal management trust evaluation system, which is characterized in that be directed to each discrepancy garden by trust evaluation
Personnel generate each interaction and form corresponding dynamic trust evaluation of estimate, and it is real-time to carry out based on the dynamic trust evaluation of estimate
Dynamic monitors.
2. according to claim 1 be used for garden personal management trust evaluation system, which is characterized in that the trust evaluation
System includes:
Monitoring unit, the monitoring unit are distributed on several monitoring nodes of garden;
Trust data library stores several trust value computing information in the trust data library;
Trust evaluation unit, the trust evaluation unit and monitoring unit and trust data library data connection, are obtained from monitoring unit
The each interaction for taking the personnel of each garden that comes in and goes out to generate, and trust value computing information is extracted from trust data library, to the friendship
It mutually carries out dynamic trust evaluation and calculates the corresponding dynamic trust evaluation of estimate of stroke, and reality is carried out based on the dynamic trust evaluation of estimate
When dynamic monitor.
3. according to claim 2 be used for garden personal management trust evaluation system, which is characterized in that the trust evaluation
Unit is based on following formula and carries out dynamic trust evaluation calculating:
Wherein, n indicates the number that service occurs;P has bound Pmax, Pmin, and a variety of alarm threshold values can be set;T is in spy
Timing section, the subjective assessment quantized value of main object validity.
4. according to claim 2 be used for garden personal management trust evaluation system, which is characterized in that the trust value meter
Calculation includes with information:History trusts value information, black and white lists information, reliability rating information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810107364.8A CN108446819A (en) | 2018-02-02 | 2018-02-02 | One kind being used for garden personal management trust evaluation system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810107364.8A CN108446819A (en) | 2018-02-02 | 2018-02-02 | One kind being used for garden personal management trust evaluation system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108446819A true CN108446819A (en) | 2018-08-24 |
Family
ID=63191496
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810107364.8A Withdrawn CN108446819A (en) | 2018-02-02 | 2018-02-02 | One kind being used for garden personal management trust evaluation system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108446819A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109409064A (en) * | 2018-10-12 | 2019-03-01 | 传化智联股份有限公司 | A kind of the blacklist notification method and device of Logistics Park |
CN109615256A (en) * | 2018-12-17 | 2019-04-12 | 武汉烽火信息集成技术有限公司 | Wisdom garden security protection risk control method, storage medium, electronic equipment and system |
CN112528300A (en) * | 2020-12-09 | 2021-03-19 | 深圳市天彦通信股份有限公司 | Visitor credit scoring method, electronic equipment and related products |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101261717A (en) * | 2008-04-09 | 2008-09-10 | 北京航空航天大学 | Subjective trust evaluation method based on cloud model |
CN101902459A (en) * | 2010-03-18 | 2010-12-01 | 中国科学院计算技术研究所 | Trust selection method and system for nodes in P2P network by applying P4P |
CN101923615A (en) * | 2010-06-11 | 2010-12-22 | 北京工业大学 | Grey fuzzy comprehensive evaluation-based trust quantization method |
CN102945258A (en) * | 2012-10-18 | 2013-02-27 | 北京淘友天下科技发展有限公司 | Method and system for obtaining reliability of users in social networking services |
CN104732338A (en) * | 2015-03-06 | 2015-06-24 | 安徽师范大学 | Method for evaluating services based on fuzzy theory in cloud environment |
US20160300239A1 (en) * | 2015-04-07 | 2016-10-13 | Manuel Guerra-Mondragon | System and method for managing and handling permits |
CN106846577A (en) * | 2017-01-19 | 2017-06-13 | 泰康保险集团股份有限公司 | Personnel's discrepancy authority control method and device based on recognition of face |
CN107241400A (en) * | 2017-05-26 | 2017-10-10 | 河南职业技术学院 | A kind of industrial zone information interaction system based on Internet of Things |
-
2018
- 2018-02-02 CN CN201810107364.8A patent/CN108446819A/en not_active Withdrawn
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101261717A (en) * | 2008-04-09 | 2008-09-10 | 北京航空航天大学 | Subjective trust evaluation method based on cloud model |
CN101902459A (en) * | 2010-03-18 | 2010-12-01 | 中国科学院计算技术研究所 | Trust selection method and system for nodes in P2P network by applying P4P |
CN101923615A (en) * | 2010-06-11 | 2010-12-22 | 北京工业大学 | Grey fuzzy comprehensive evaluation-based trust quantization method |
CN102945258A (en) * | 2012-10-18 | 2013-02-27 | 北京淘友天下科技发展有限公司 | Method and system for obtaining reliability of users in social networking services |
CN104732338A (en) * | 2015-03-06 | 2015-06-24 | 安徽师范大学 | Method for evaluating services based on fuzzy theory in cloud environment |
US20160300239A1 (en) * | 2015-04-07 | 2016-10-13 | Manuel Guerra-Mondragon | System and method for managing and handling permits |
CN106846577A (en) * | 2017-01-19 | 2017-06-13 | 泰康保险集团股份有限公司 | Personnel's discrepancy authority control method and device based on recognition of face |
CN107241400A (en) * | 2017-05-26 | 2017-10-10 | 河南职业技术学院 | A kind of industrial zone information interaction system based on Internet of Things |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109409064A (en) * | 2018-10-12 | 2019-03-01 | 传化智联股份有限公司 | A kind of the blacklist notification method and device of Logistics Park |
CN109615256A (en) * | 2018-12-17 | 2019-04-12 | 武汉烽火信息集成技术有限公司 | Wisdom garden security protection risk control method, storage medium, electronic equipment and system |
CN112528300A (en) * | 2020-12-09 | 2021-03-19 | 深圳市天彦通信股份有限公司 | Visitor credit scoring method, electronic equipment and related products |
CN112528300B (en) * | 2020-12-09 | 2024-05-17 | 深圳市天彦通信股份有限公司 | Visitor credit scoring method, electronic equipment and related products |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Laufs et al. | Security and the smart city: A systematic review | |
Deng et al. | A total uncertainty measure for D numbers based on belief intervals | |
JP6905850B2 (en) | Image processing system, imaging device, learning model creation method, information processing device | |
CN105376255B (en) | A kind of Android platform intrusion detection method based on K-means cluster | |
Wei et al. | Effective detection of sophisticated online banking fraud on extremely imbalanced data | |
CN102004923B (en) | Method and apparatus for detecting behavior in a monitoring system | |
CN106339679B (en) | A kind of face identification system | |
Bologa et al. | Big data and specific analysis methods for insurance fraud detection. | |
CN101459537A (en) | Network security situation sensing system and method based on multi-layer multi-angle analysis | |
JP2013131153A (en) | Autonomous crime prevention warning system and autonomous crime prevention warning method | |
CN105681298A (en) | Data security abnormity monitoring method and system in public information platform | |
CN108446819A (en) | One kind being used for garden personal management trust evaluation system | |
CN107317718A (en) | A kind of O&M service management and management platform | |
WO2022165685A1 (en) | Method for determining dangerousness of person, apparatus, system and storage medium | |
CN109615256A (en) | Wisdom garden security protection risk control method, storage medium, electronic equipment and system | |
CN111915468B (en) | Network anti-fraud active inspection and early warning system | |
TWM565361U (en) | Fraud detection system for financial transaction | |
JP2019096179A (en) | Behavior monitoring system | |
Ma et al. | A Dempster‐Shafer theory and uninorm‐based framework of reasoning and multiattribute decision‐making for surveillance system | |
CN202230509U (en) | Face identification data management system | |
CN106686338A (en) | Custody room internal-external interaction terminal | |
CN115346170B (en) | Intelligent monitoring method and device for gas facility area | |
CN112949442B (en) | Abnormal event pre-recognition method and device, electronic equipment and monitoring system | |
Villegas-Ch et al. | Authentication, access, and monitoring system for critical areas with the use of artificial intelligence integrated into perimeter security in a data center | |
Santos et al. | On deception detection in multiagent systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180824 |