CN109816906A - Safety and protection monitoring method and device, electronic equipment, storage medium - Google Patents

Safety and protection monitoring method and device, electronic equipment, storage medium Download PDF

Info

Publication number
CN109816906A
CN109816906A CN201910003255.6A CN201910003255A CN109816906A CN 109816906 A CN109816906 A CN 109816906A CN 201910003255 A CN201910003255 A CN 201910003255A CN 109816906 A CN109816906 A CN 109816906A
Authority
CN
China
Prior art keywords
monitoring
access
access path
objective
monitoring objective
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910003255.6A
Other languages
Chinese (zh)
Other versions
CN109816906B (en
Inventor
夏新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201910003255.6A priority Critical patent/CN109816906B/en
Publication of CN109816906A publication Critical patent/CN109816906A/en
Application granted granted Critical
Publication of CN109816906B publication Critical patent/CN109816906B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

This disclosure relates to safety monitoring technology field more particularly to a kind of safety and protection monitoring method and safety and protection monitoring device, electronic equipment, storage medium.The described method includes: generating corresponding access path according to the location information of the access object of monitoring objective;Monitoring data is obtained, image recognition is carried out to judge whether the monitoring objective appears in the prohibited area other than the access path to the monitoring data;Alarm is triggered if the monitoring objective enters the prohibited area.The scheme of the disclosure can be realized the behavior to monitoring objective and the real time monitoring of track.

Description

Safety and protection monitoring method and device, electronic equipment, storage medium
Technical field
This disclosure relates to safety monitoring technology field more particularly to a kind of safety and protection monitoring method and safety and protection monitoring device, Electronic equipment, storage medium.
Background technique
It is existing when enterprise, organ or interior zone with security classification have nonnative personnel's access in safety-security area Security implementations mostly use the mode manually registered greatly, the personnel amount of monitoring objective, certificate information, visit are recorded by Security Personnel Ask the information such as time and access object.
The above-mentioned prior art haves the defects that certain and deficiency.For example, existing security scheme can not be to prison The certificate information of control target is effectively verified, also can not behavior to monitoring objective and access purpose progress risk comment Estimate.In addition, can not also be carried out to the behavior in interior zone of monitoring objective effective after monitoring objective enters interior zone Monitoring.The detailed access record of history monitoring objective is carried out completely, in detail in addition, the prior art also lacks effective method Record and preservation.There are certain difficulties for later period query history access record.
It should be noted that information is only used for reinforcing the reason to the background of the disclosure disclosed in above-mentioned background technology part Solution, therefore may include the information not constituted to the prior art known to persons of ordinary skill in the art.
Summary of the invention
The disclosure is designed to provide a kind of safety and protection monitoring method, safety and protection monitoring device and a kind of electronic equipment, deposits Storage media, and then one or more is asked caused by overcoming the limitation and defect due to the relevant technologies at least to a certain extent Topic.
Other characteristics and advantages of the disclosure will be apparent from by the following detailed description, or partially by the disclosure Practice and acquistion.
According to the first aspect of the embodiments of the present disclosure, a kind of safety and protection monitoring method is provided, which comprises
Corresponding access path is generated according to the location information of the access object of monitoring objective;
Monitoring data is obtained, image recognition is carried out to judge whether the monitoring objective appears in institute to the monitoring data State the prohibited area other than access path;
Alarm is triggered if the monitoring objective enters the prohibited area.
In a kind of exemplary embodiment of the disclosure, the location information generation pair of the access object according to monitoring objective Before the access path answered, the method also includes verifying the information of monitoring objective, and the security level of the monitoring objective is configured, Include:
Obtain the base identity information of the monitoring objective;
The base identity information and presetting database are verified to obtain check results;
Security level is configured by preset rules to the monitoring objective according to the check results.
In a kind of exemplary embodiment of the disclosure, the location information generation pair of the access object according to monitoring objective The access path answered includes:
Beginning and end is remembered in default map subscript according to the location information of the access object of the monitoring objective;
Access path is planned on the default map by preset rules according to the beginning and end.
It is described to be preset by preset rules described according to the beginning and end in a kind of exemplary embodiment of the disclosure On map after planning access path, which comprises
It is that the monitoring objective distributes Free Region according to the security level of the monitoring objective and the access object;
The Free Region is added to the access path.
In a kind of exemplary embodiment of the disclosure, the acquisition monitor video data, to the monitor video data into Row image recognition includes: to judge the prohibited area that whether appears in other than the access path of access object
The monitoring data of reception monitoring device and corresponding monitoring device identification information;
Corresponding monitoring device mark in the access path is obtained, to generate the corresponding path monitoring of the access path List of devices;
Image recognition is carried out to the monitoring data, to grab the access personnel image;
It obtains and successfully grabs the corresponding current monitor device identification of the access personnel image;
The current monitor device identification and the path monitoring list of devices are compared, to judge the monitoring mesh Whether mark is determined as the monitoring objective not in the access path to appear in the access path in the access path Prohibited area in addition.
In a kind of exemplary embodiment of the disclosure, the method also includes:
Forbid monitoring device list according to the access path and the acquisition of corresponding path monitoring list of devices;
Monitoring device list is forbidden to compare with described the current monitor device identification, to judge the monitoring mesh Whether mark appears in the prohibited area.
In a kind of exemplary embodiment of the disclosure, the method also includes:
The base identity information of the monitoring objective and corresponding monitoring data are saved to preset memory.
According to the second aspect of an embodiment of the present disclosure, a kind of safety and protection monitoring device is provided, comprising:
Access path obtains module, and the location information for the access object according to monitoring objective generates corresponding access road Diameter;
Monitoring analysis module carries out image recognition to the monitoring data for obtaining monitoring data to judge the prison Whether control target appears in the prohibited area other than the access path;
Alarm trigger module, for triggering alarm when the monitoring objective enters the prohibited area.
According to the third aspect of the disclosure, a kind of storage medium is provided, is stored thereon with computer program, described program quilt Processor realizes above-mentioned safety and protection monitoring method when executing.
According to the fourth aspect of the disclosure, a kind of electric terminal, comprising:
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to executing any one of the above safety and protection monitoring method.
The technical scheme provided by this disclosed embodiment can include the following benefits:
In a kind of embodiment of the disclosure, above-mentioned safety and protection monitoring method passes through the access pair previously according to monitoring objective The position of elephant is that monitoring objective plans access path, and monitors mesh by carrying out image recognition to monitoring data with real-time crawl Target image, to judge that monitoring objective whether in the access path of planning, or appears in and forbids other than access path In region.To realize to the behavior of monitoring objective and the real time monitoring of track.And prohibited area can be entered in monitoring objective Shi Jinhang alarm.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.It should be evident that the accompanying drawings in the following description is only the disclosure Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.
Fig. 1 schematically shows a kind of schematic diagram of safety and protection monitoring method in disclosure exemplary embodiment;
Fig. 2 schematically shows a kind of method schematic diagram for verifying monitoring objective information in disclosure exemplary embodiment;
Fig. 3 schematically shows a kind of schematic diagram of safety and protection monitoring method in disclosure exemplary embodiment;
Fig. 4 schematically shows a kind of composition schematic diagram of safety and protection monitoring device in disclosure exemplary embodiment;
Fig. 5 schematically shows a kind of another schematic diagram of safety and protection monitoring device in disclosure exemplary embodiment;
Fig. 6 schematically shows a kind of schematic diagram of the program product of safety and protection monitoring method in disclosure exemplary embodiment.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be with a variety of shapes Formula is implemented, and is not understood as limited to example set forth herein;On the contrary, thesing embodiments are provided so that the disclosure will more Fully and completely, and by the design of example embodiment comprehensively it is communicated to those skilled in the art.Described feature, knot Structure or characteristic can be incorporated in any suitable manner in one or more embodiments.
In addition, attached drawing is only the schematic illustrations of the disclosure, it is not necessarily drawn to scale.Identical attached drawing mark in figure Note indicates same or similar part, thus will omit repetition thereof.Some block diagrams shown in the drawings are function Energy entity, not necessarily must be corresponding with physically or logically independent entity.These function can be realized using software form Energy entity, or these functional entitys are realized in one or more hardware modules or integrated circuit, or at heterogeneous networks and/or place These functional entitys are realized in reason device device and/or microcontroller device.
A kind of safety and protection monitoring method is provided firstly in this example embodiment, it can be using to interior zone or concerning security matters area The behavior of the external access personnel in domain and the real time monitoring of track.With reference to shown in Fig. 1, this method be may comprise steps of:
Step S11 generates corresponding access path according to the location information of the access object of monitoring objective;
Step S12 obtains monitoring data, carries out image recognition to the monitoring data whether to judge the monitoring objective Appear in the prohibited area other than the access path;
Step S13 triggers alarm if the monitoring objective enters the prohibited area.
Above-mentioned safety and protection monitoring method, on the one hand, the position by the access object according to monitoring objective is monitoring objective It plans access path, can be in advance its region that can enter of access personnel planning and scope of activities.On the other hand, pass through To monitoring data carry out image recognition grab the image of monitoring objective in real time, thus judge monitoring objective whether planning visit It asks the way on diameter, or appears in the prohibited area other than access path.To realize to the behavior of monitoring objective and track Real time monitoring
In the following, each step of the reference accompanying drawings and embodiments to the above method in this example embodiment is carried out more detailed Thin explanation.
Step S10, verifies the information of monitoring objective, and configures the security level of the monitoring objective.
In this example embodiment, refering to what is shown in Fig. 2, above-mentioned step S10 may include:
Step S101 obtains the base identity information of the monitoring objective;
Step S102 verifies the base identity information and presetting database to obtain check results;
Step S103 configures security level by preset rules to the monitoring objective according to the check results.
For example, above-mentioned monitoring objective can be intended to access, into the external access personnel of internal restricted area, come Visit personnel can be one either it is multiple.The base identity information of visiting personnel may include: facial image, name, certificate The information such as number.Certificate can be identity card, officer's identity card or other may be used to indicate that the certificate of identity.
Specifically, a terminal device with interactive interface can be provided, identity card can integrate in the terminal device Information reader or the identity card safety control module (SAM) of Ministry of Public Security's authorization.And can by ID card information reader or The identity card safety control module (SAM) of Ministry of Public Security's authorization carries out identification to certificate and information is read, and to the effective of certificate Property is verified.
After the base identity information for obtaining visiting personnel, it can also be compared with preset Ministry of Public Security's blacklist and school It tests, the visiting personnel is judged whether in blacklist, to judge whether visiting personnel is fugitive personnel or bails personnel out, in turn Assessment is made convenient for the security risks to visiting personnel.If finding current visiting personnel default by the comparison with blacklist In blacklist, prompt information or warning information can also be generated, and warning information can be sent to public security system.
According to the base identity information of visiting personnel and the comparing result of presetting database, and open the access of visiting personnel The parameters such as object and history access record can distribute security level for visiting personnel.For example, current visiting personnel exists Multiple history access records, and be sky with the comparing result of presetting database, access object is department head, then can be should The security level of visiting personnel distribution higher level;Corresponding, which can have more region access Permission.Alternatively, the comparing result with presetting database is sky if visiting personnel is to come to visit for the first time, then phase can be distributed for it To lower security level;Corresponding, relatively low security level can be the permission only with the region of access object;Deng Deng.It certainly, can also be visiting personnel distribution peace according to other standards and rule in other exemplary embodiments of the disclosure Congruent grade.The disclosure does not do particular determination to the configuration method and standard of monitoring objective security level.
By obtaining the base identity information of visiting personnel, and information is verified, it can be to visiting personnel identity Authenticity is effectively judged.
Step S11 generates corresponding access path according to the location information of the access object of monitoring objective.
It can be that visiting personnel plans access path according to the location information of access object in this example embodiment.It visits The location information for asking object may include room number, workshop number, floor information and coordinate information in map etc..
Specifically, above-mentioned step S11 may include:
Step S111, according to the location information of the access object of the monitoring objective default map subscript remember a little and eventually Point;
Step S112 plans access path on the default map by preset rules according to the beginning and end.
In this example embodiment, indoor map or plant area's map can be drawn for interior zone in advance.It and can be to be somebody's turn to do The corresponding coordinate of each room, sector disrtibution in map.Further, it is also possible on this map to the coordinate of monitoring device and correspondence ID be marked, and the monitoring range of each monitoring device can be marked.
For example, it presets on map at this, can be terminal by access object tag, and by foreground, gate or safety The entrance etc. in channel is configured to starting point, consequently facilitating planning the access path of visiting personnel in map.For example, distribution away from It is access path from shortest path.
In addition, in other exemplary embodiments of the disclosure, it, can be with root after the access path for obtaining monitoring It is that the monitoring objective distributes Free Region according to the security level of the monitoring objective and the access object;And it can be used by described in Region is added to the access path.
For example, can be the regions such as the available Tea Room of visiting personnel distributor, meeting room, reception room or toilet. Those regions are marked in map, and are added in access path.
It certainly, can also be while planning access path, to monitor mesh in other exemplary embodiments of the disclosure Mark distribution Free Region, and be added in path by Free Region, to obtain the final access path of monitoring objective.By being next Personnel planning access path and distribution Free Region are visited, can be avoided in advance for visiting personnel distributor with movable region Visiting personnel is strayed into other prohibited areas.
Step S12 obtains monitoring data, carries out image recognition to the monitoring data whether to judge the access object Appear in the prohibited area other than the access path.
In this example embodiment, above-mentioned monitoring data can be monitor video and monitoring audio etc..It can be real-time Extraction monitor video, and to monitor video carry out image recognition, judge whether visiting personnel occur in current monitor video.
Specifically, above-mentioned step S12 may include:
Step S120, receive monitoring device monitoring data and corresponding monitoring device identification information;
Step S121 obtains corresponding monitoring device mark in the access path, corresponding to obtain the access path Path monitoring list of devices;
Step S122 carries out image recognition to the monitoring data, to grab the access personnel image;
Step S123 is obtained and is successfully grabbed the corresponding current monitor device identification of the access personnel image;
Step S124 compares the current monitor device identification and the path monitoring list of devices, with judgement Whether the monitoring objective is determined as the monitoring objective not in the access path to appear in institute in the access path State the prohibited area other than access path.
In this example embodiment, after the access path for obtaining visiting personnel, it is right in the access path to extract The information for the multiple monitoring devices answered, such as the ID of monitoring camera.So as to generate path prison according to monitoring device information List of devices is controlled, and establishes the mapping relations between access path and monitoring device.
After visiting personnel enters interior zone, the monitor video data of each monitoring device can be obtained in real time, and Image recognition is carried out to monitor video, grabs the image in monitor video of visiting personnel, and read corresponding monitoring device ID.So as to judge the monitoring device whether in path monitoring list of devices.And then may determine that visiting personnel whether In the access path planned in advance.Realize the real-time tracking to visiting personnel action trail.
Based on above content, in other exemplary embodiments of the disclosure, above-mentioned step S12 can also include:
Step S125 forbids monitoring device to arrange according to the access path and the acquisition of corresponding path monitoring list of devices Table;
The current monitor device identification is forbidden monitoring device list to compare by step S126 with described, with judgement Whether the monitoring objective appears in the prohibited area.
According to the access path of visiting personnel and corresponding path monitoring list of devices;Or the whole according to interior zone Monitoring device information and above-mentioned path monitoring list of devices can also forbid monitoring device list for visiting personnel distribution. This forbids what monitoring device list can be used for marking visiting personnel to forbid access region.
If finding that visiting personnel appears in prohibited area by image recognition, warning information can be generated, carries out wind Danger prompt, and improve security protection grade.In addition, through the above steps, can also judge whether monitoring objective appears in except planning Other regions other than path and prohibited area.
Step S13 triggers alarm if the monitoring objective enters the prohibited area.
It, can when discovery visiting personnel deviates planning path, or enters in prohibited area in this example embodiment Warning information is sent to preset object.For example, sending warning information to security department or public security system.Convenient for user Timely processing to warning information.
In addition, in other exemplary embodiments of the disclosure, refering to what is shown in Fig. 3, above-mentioned method can also include:
Step S14 saves the base identity information of the monitoring objective and corresponding monitoring data to preset memory.
It, can be in order to which the later period be to visiting people by saving the base identity information and monitor video of visiting personnel The inquiry of member's access history.
In conclusion the above method in this illustrative embodiment, by being in advance that visiting personnel distributes access path And mobilizable region, avoid visiting personnel from entering in prohibited area due to ignorant.In addition, by monitor video into Row image recognition obtains visiting personnel current location in real time, and may determine that whether visiting personnel lives what is planned in advance In dynamic region and path.To realize the real-time tracking to personnel track.And then effectively judge the security threat of visiting personnel.
It should be noted that although describing each step of method in the disclosure in the accompanying drawings with particular order, This does not require that or implies must execute these steps in this particular order, or have to carry out step shown in whole Just it is able to achieve desired result.Additional or alternative, it is convenient to omit multiple steps are merged into a step and held by certain steps Row, and/or a step is decomposed into execution of multiple steps etc..In addition, being also easy to understand, these steps be can be Such as it is either synchronously or asynchronously executed in multiple module/process/threads.
Further, in this example embodiment, a kind of safety and protection monitoring device 40 is additionally provided.With reference to shown in Fig. 4, dress Setting 40 may include: that access path obtains module 401, monitoring analysis module 402 and alarm trigger module 403.Wherein:
The access path obtains the location information generation pair for the access object that module 401 can be used for according to monitoring objective The access path answered.
The monitoring analysis module 402 can be used for obtaining monitoring data, to the monitoring data carry out image recognition with Judge whether the monitoring objective appears in the prohibited area other than the access path.
The alarm trigger module 403 can be used for triggering alarm when the monitoring objective enters the prohibited area.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
It should be noted that although being referred to several modules or list for acting the equipment executed in the above detailed description Member, but this division is not enforceable.In fact, according to embodiment of the present disclosure, it is above-described two or more Module or the feature and function of unit can embody in a module or unit.Conversely, an above-described mould The feature and function of block or unit can be to be embodied by multiple modules or unit with further division.As module or list The component of member display may or may not be physical unit, it can and it is in one place, or may be distributed over In multiple network units.It can select some or all of the modules therein according to the actual needs to realize the open scheme of wood Purpose.Those of ordinary skill in the art can understand and implement without creative efforts.
In an exemplary embodiment of the disclosure, a kind of electronics that can be realized above-mentioned safety and protection monitoring method is additionally provided to set It is standby.
Person of ordinary skill in the field it is understood that various aspects of the invention can be implemented as system, method or Program product.Therefore, various aspects of the invention can be embodied in the following forms, it may be assumed that complete hardware embodiment, complete The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here Referred to as circuit, " module " or " system ".
The electronic equipment 600 of this embodiment according to the present invention is described referring to Fig. 5.The electronics that Fig. 5 is shown Equipment 600 is only an example, should not function to the embodiment of the present invention and use scope bring any restrictions.
As shown in figure 5, electronic equipment 600 is showed in the form of universal computing device.The component of electronic equipment 600 can wrap It includes but is not limited to: at least one above-mentioned processing unit 610, at least one above-mentioned storage unit 620, the different system components of connection The bus 630 of (including storage unit 620 and processing unit 610).
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 610 Row, so that various according to the present invention described in the execution of the processing unit 610 above-mentioned " illustrative methods " part of this specification The step of illustrative embodiments.For example, the processing unit 610 can execute step S11 as shown in fig. 1, according to prison The location information for controlling the access object of target generates corresponding access path;Step S12 obtains monitoring data, to the monitoring Data carry out image recognition to judge whether the monitoring objective appears in the prohibited area other than the access path;Step S13 triggers alarm if the monitoring objective enters the prohibited area.
Storage unit 620 may include the readable medium of volatile memory cell form, such as Random Access Storage Unit (RAM) 6201 and/or cache memory unit 6202, it can further include read-only memory unit (ROM) 6203.
Storage unit 620 can also include program/utility with one group of (at least one) program module 6205 6204, such program module 6205 includes but is not limited to: operating system, one or more application program, other program moulds It may include the realization of network environment in block and program data, each of these examples or certain combination.
Bus 630 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures Local bus.
Electronic equipment 600 can also be with one or more external equipments 700 (such as keyboard, sensing equipment, bluetooth equipment Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 600 communicate, and/or with make Any equipment (such as the router, modulation /demodulation that the electronic equipment 600 can be communicated with one or more of the other calculating equipment Device etc.) communication.This communication can be carried out by input/output (I/O) interface 650.Also, electronic equipment 600 can be with By network adapter 660 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, Such as internet) communication.As shown, network adapter 660 is communicated by bus 630 with other modules of electronic equipment 600. It should be understood that although not shown in the drawings, other hardware and/or software module can not used in conjunction with electronic equipment 600, including but not Be limited to: microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and Data backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server, terminal installation or network equipment etc.) is executed according to disclosure embodiment Method.
In an exemplary embodiment of the disclosure, a kind of computer readable storage medium is additionally provided, energy is stored thereon with Enough realize the program product of this specification above method.In some possible embodiments, various aspects of the invention may be used also In the form of being embodied as a kind of program product comprising program code, when described program product is run on the terminal device, institute Program code is stated for executing the terminal device described in above-mentioned " illustrative methods " part of this specification according to this hair The step of bright various illustrative embodiments.
Refering to what is shown in Fig. 6, describing the program product for realizing the above method of embodiment according to the present invention 800, can using portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device, Such as it is run on PC.However, program product of the invention is without being limited thereto, in this document, readable storage medium storing program for executing can be with To be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or It is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, In carry readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetic signal, Optical signal or above-mentioned any appropriate combination.Readable signal medium can also be any readable Jie other than readable storage medium storing program for executing Matter, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or and its The program of combined use.
The program code for including on readable medium can transmit with any suitable medium, including but not limited to wirelessly, have Line, optical cable, RF etc. or above-mentioned any appropriate combination.
The program for executing operation of the present invention can be write with any combination of one or more programming languages Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network (WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP To be connected by internet).
In addition, above-mentioned attached drawing is only the schematic theory of processing included by method according to an exemplary embodiment of the present invention It is bright, rather than limit purpose.It can be readily appreciated that the time that above-mentioned processing shown in the drawings did not indicated or limited these processing is suitable Sequence.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by appended Claim is pointed out.

Claims (10)

1. a kind of safety and protection monitoring method characterized by comprising
Corresponding access path is generated according to the location information of the access object of monitoring objective;
Monitoring data is obtained, image recognition is carried out to judge whether the monitoring objective appears in the visit to the monitoring data The prohibited area asked the way other than diameter;
Alarm is triggered if the monitoring objective enters the prohibited area.
2. the method according to claim 1, wherein the location information of the access object according to monitoring objective Before generating corresponding access path, the method also includes verifying the information of monitoring objective, and the peace of the monitoring objective is configured Congruent grade, comprising:
Obtain the base identity information of the monitoring objective;
The base identity information and presetting database are verified to obtain check results;
Security level is configured by preset rules to the monitoring objective according to the check results.
3. according to the method described in claim 2, it is characterized in that, the location information of the access object according to monitoring objective Generating corresponding access path includes:
Beginning and end is remembered in default map subscript according to the location information of the access object of the monitoring objective;
Access path is planned on the default map by preset rules according to the beginning and end.
4. according to the method described in claim 3, it is characterized in that, described press preset rules in institute according to the beginning and end It states after planning access path on default map, the method also includes:
It is that the monitoring objective distributes Free Region according to the security level of the monitoring objective and the access object;
The Free Region is added to the access path.
5. the method according to claim 1, wherein the acquisition monitoring data, carries out the monitoring data Image recognition includes: to judge the prohibited area that whether appears in other than the access path of access object
The monitoring data of reception monitoring device and corresponding monitoring device identification information;
Corresponding monitoring device mark in the access path is obtained, to generate the corresponding path monitoring equipment of the access path List;
Image recognition is carried out to the monitoring data, to grab the access personnel image;
It obtains and successfully grabs the corresponding current monitor device identification of the access personnel image;
The current monitor device identification and the path monitoring list of devices are compared, to judge that the monitoring objective is It is no in the access path, will not be determined as appearing in other than the access path in the monitoring objective in the access path Prohibited area.
6. according to the method described in claim 5, it is characterized in that, the method also includes:
Forbid monitoring device list according to the access path and the acquisition of corresponding path monitoring list of devices;
Monitoring device list is forbidden to compare with described the current monitor device identification, to judge that the monitoring objective is It is no to appear in the prohibited area.
7. the method according to claim 1, wherein the method also includes:
The base identity information of the monitoring objective and corresponding monitoring data are saved to preset memory.
8. a kind of safety and protection monitoring device characterized by comprising
Access path obtains module, and the location information for the access object according to monitoring objective generates corresponding access path;
Monitoring analysis module carries out image recognition to the monitoring data for obtaining monitoring data to judge the monitoring mesh Whether mark appears in the prohibited area other than the access path;
Alarm trigger module, for triggering alarm when the monitoring objective enters the prohibited area.
9. a kind of storage medium, which is characterized in that the storage medium is stored with computer program, and the computer program can be by Processor, which executes, completes safety and protection monitoring method described in any one of claim 1 to 7.
10. a kind of electric terminal characterized by comprising
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to perform claim requires safety and protection monitoring method described in 1-7 any one.
CN201910003255.6A 2019-01-03 2019-01-03 Security monitoring method and device, electronic equipment and storage medium Active CN109816906B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910003255.6A CN109816906B (en) 2019-01-03 2019-01-03 Security monitoring method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910003255.6A CN109816906B (en) 2019-01-03 2019-01-03 Security monitoring method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109816906A true CN109816906A (en) 2019-05-28
CN109816906B CN109816906B (en) 2022-07-08

Family

ID=66603832

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910003255.6A Active CN109816906B (en) 2019-01-03 2019-01-03 Security monitoring method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109816906B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110689693A (en) * 2019-09-25 2020-01-14 中国建设银行股份有限公司 Path monitoring method, device, equipment and storage medium
CN110796044A (en) * 2019-10-16 2020-02-14 杭州云深科技有限公司 Target area security monitoring method and device
CN112004198A (en) * 2020-08-25 2020-11-27 国家电网有限公司 Visit person monitoring system capable of improving safety level
CN112487367A (en) * 2020-11-16 2021-03-12 深圳市天彦通信股份有限公司 Visitor management method and related device
CN112509197A (en) * 2020-12-10 2021-03-16 深圳市天彦通信股份有限公司 Visitor management method and related device
CN113393871A (en) * 2021-06-28 2021-09-14 平安普惠企业管理有限公司 Data monitoring method, device, equipment and storage medium
CN114449228A (en) * 2022-04-07 2022-05-06 深圳市亚联讯网络科技有限公司 Safety monitoring method, monitoring server and storage medium for community visitors

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105933650A (en) * 2016-04-25 2016-09-07 北京旷视科技有限公司 Video monitoring system and method
EP3163498A2 (en) * 2015-10-28 2017-05-03 Xiaomi Inc. Alarming method and device
CN106973266A (en) * 2017-03-31 2017-07-21 三峡大学 Substation safety operation management and control system and method
CN107004271A (en) * 2016-08-22 2017-08-01 深圳前海达闼云端智能科技有限公司 Display methods, device, electronic equipment, computer program product and non-transient computer readable storage medium storing program for executing
CN107590439A (en) * 2017-08-18 2018-01-16 湖南文理学院 Target person identification method for tracing and device based on monitor video
CN108366226A (en) * 2018-01-30 2018-08-03 深圳市盛路物联通讯技术有限公司 Prison administration control method, device, system and readable storage medium storing program for executing

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3163498A2 (en) * 2015-10-28 2017-05-03 Xiaomi Inc. Alarming method and device
CN105933650A (en) * 2016-04-25 2016-09-07 北京旷视科技有限公司 Video monitoring system and method
CN107004271A (en) * 2016-08-22 2017-08-01 深圳前海达闼云端智能科技有限公司 Display methods, device, electronic equipment, computer program product and non-transient computer readable storage medium storing program for executing
CN106973266A (en) * 2017-03-31 2017-07-21 三峡大学 Substation safety operation management and control system and method
CN107590439A (en) * 2017-08-18 2018-01-16 湖南文理学院 Target person identification method for tracing and device based on monitor video
CN108366226A (en) * 2018-01-30 2018-08-03 深圳市盛路物联通讯技术有限公司 Prison administration control method, device, system and readable storage medium storing program for executing

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110689693A (en) * 2019-09-25 2020-01-14 中国建设银行股份有限公司 Path monitoring method, device, equipment and storage medium
CN110796044A (en) * 2019-10-16 2020-02-14 杭州云深科技有限公司 Target area security monitoring method and device
CN112004198A (en) * 2020-08-25 2020-11-27 国家电网有限公司 Visit person monitoring system capable of improving safety level
CN112004198B (en) * 2020-08-25 2022-08-02 国家电网有限公司 Visit person monitoring system capable of improving safety level
CN112487367A (en) * 2020-11-16 2021-03-12 深圳市天彦通信股份有限公司 Visitor management method and related device
CN112509197A (en) * 2020-12-10 2021-03-16 深圳市天彦通信股份有限公司 Visitor management method and related device
CN113393871A (en) * 2021-06-28 2021-09-14 平安普惠企业管理有限公司 Data monitoring method, device, equipment and storage medium
CN114449228A (en) * 2022-04-07 2022-05-06 深圳市亚联讯网络科技有限公司 Safety monitoring method, monitoring server and storage medium for community visitors

Also Published As

Publication number Publication date
CN109816906B (en) 2022-07-08

Similar Documents

Publication Publication Date Title
CN109816906A (en) Safety and protection monitoring method and device, electronic equipment, storage medium
US11720111B2 (en) Automated route selection by a mobile robot
US9875592B1 (en) Drone used for authentication and authorization for restricted access via an electronic lock
CN105069869B (en) A kind of gate control system based on Quick Response Code
US20190087464A1 (en) Regional population management system and method
CN104240013B (en) A kind of access control method and access control platform
CN104240342B (en) Access control method and device based on identity authentication
CN106204864A (en) Gate control system based on dynamic two-dimension code and door opening method
CN106920071A (en) Substation field operation householder method and system
CN106204866A (en) A kind of gate control system based on Quick Response Code and door opening method
CN110276872B (en) Automatic access control authorization method based on face recognition
CN110473328A (en) Community's access control management method and device, storage medium, electronic equipment
US20210082217A1 (en) Method for provisioning a device with an information element allowing to identify unauthorized users in a restricted area
CN104240014B (en) A kind of online access control method and platform
CN103280041A (en) Monitoring method and monitoring system for automatic deploying virtual electronic fence
US10028147B1 (en) Dynamic defenses to secure a proximity-based communication system of linked wireless-enabled devices
KR102256271B1 (en) object tracking and service execution system by setting event zones and execution rule on the camera screen
CN110365634A (en) Abnormal data monitoring method, device, medium and electronic equipment
CN108765621B (en) Safety inspection system and inspection method for movable operation and maintenance of civil air defense door
CN105376321A (en) Multifunctional Internet of things information platform
CN108123961A (en) Information processing method, apparatus and system
CN109903042A (en) Authorizing information method, apparatus, medium and electronic equipment based on block chain
CN105869255A (en) Intelligent access control method and system based on mobile terminal
KR20210130618A (en) Electronic tag-linked automatic locking device
WO2020033186A1 (en) Security automation in a mobile robot

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
CB02 Change of applicant information

Address after: 201, room 518000, building A, No. 1, front Bay Road, Qianhai Shenzhen Guangdong Shenzhen Hong Kong cooperation zone (Qianhai business secretary)

Applicant after: ONECONNECT FINANCIAL TECHNOLOGY Co.,Ltd. (SHANGHAI)

Address before: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A

Applicant before: ONECONNECT FINANCIAL TECHNOLOGY Co.,Ltd. (SHANGHAI)

CB02 Change of applicant information
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant