CN109872482A - Wisdom security protection monitoring and managing method, system and storage medium - Google Patents

Wisdom security protection monitoring and managing method, system and storage medium Download PDF

Info

Publication number
CN109872482A
CN109872482A CN201910052332.7A CN201910052332A CN109872482A CN 109872482 A CN109872482 A CN 109872482A CN 201910052332 A CN201910052332 A CN 201910052332A CN 109872482 A CN109872482 A CN 109872482A
Authority
CN
China
Prior art keywords
information
personnel
image information
location information
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910052332.7A
Other languages
Chinese (zh)
Inventor
梁峰
司少东
吴如田
祝志苗
陈佳佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Xin Lion Security Services Ltd
Original Assignee
Guangdong Xin Lion Security Services Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Xin Lion Security Services Ltd filed Critical Guangdong Xin Lion Security Services Ltd
Priority to CN201910052332.7A priority Critical patent/CN109872482A/en
Publication of CN109872482A publication Critical patent/CN109872482A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a kind of wisdom security protection monitoring and managing method, system and storage mediums;It solves the problems, such as to pass in and out and can not learn there are a suspect, its key points of the technical solution are that, obtain current monitor data information;From pre-set database, preset data information is searched;Monitoring data information includes personnel's image information;Preset data information includes preset personnel's image information;Analysis matching is carried out according between current persons' image information and preset personnel's image information, if current persons' image information matched with preset personnel's image information it is unsuccessful, which is stored into database and define personnel corresponding to current persons' image information be suspicion personnel;If within the default time cycle, the number that personnel's image information of suspicion personnel is got by the monitoring device of same position is more than default number, then feed back information warning, the present invention intellectual analysis a suspect and can be fed back, and further increase degree of safety.

Description

Wisdom security protection monitoring and managing method, system and storage medium
Technical field
The present invention relates to safeguard management methods, in particular to wisdom security protection monitoring and managing method, system and storage medium.
Background technique
Safety and protection system (SPS) security & protection system is to safeguard social public security as mesh , intrusion alarm system, video security monitoring system, the entrance that application safety prevention product and other Related products are constituted The liquid crystal-spliced wall system of control system, BSV, gate inhibition's fire-fighting system, anti-explosion safety inspection system etc.;Or by these systems be subsystem System combination or integrated electronic system or network.
Safety and protection system specifically includes that closed monitor system, intrusion alarm system, gateway control system, night watching system System, garage parking (field) management system etc..
Closed monitor system utilizes video technique detection, monitoring security area and real-time display, the electricity for recording live image Subsystem or network.The headend equipment of this system is various types of video cameras (or video alarm) monitor and its attached sets Standby, coaxial cable transmission or optical fiber transmission can be used in transmission mode;The terminal device of system be display, record, control, communication set Standby (including multimedia technology equipment) generally uses independent video hub console or monitoring-alarm center console.
Intrusion alarm system (IAS) intruder alarm system is visited using sensor technology and electronic information technology Survey and indicate illegally to enter or attempt the behavior for illegally entering security area, the electronics for handling warning message, alert System or network.The composition of intrusion alarm system is generally by (outer) region/shield structure in perimeter protection, building and mesh in kind The parts such as mark protection are constituted alone or in combination.The headend equipment of system is various types of intrusion detectors (sensor).Transmission Mode can use wire transmission or wireless transmission, and the modes such as special line transmission, telephone line transmission can be used in wire transmission again;System Terminal show, control, alarm controller can be used in device talk, may also set up alarm center console.When system designs, enter The configuration for invading detector should make its investigative range have enough covering surfaces, be considered as the detection using various different detection principles Device.
Gateway control system is identified using self-defining character or/and mode identification technology identifies simultaneously entrance target Control the electronic system or network of the opening and closing of entrance executing agency.Gateway control system is generally by entrance to as (people, object) Identification device, entrance information processing, control, communication device and access control executing agency three parts composition.Entrance control System processed, which should have, prevents one to stick into more people or one block the precautionary measures of more people out, should prevent same category of device bootlegging from effectively demonstrate,proving The cryptographic system of part card, cryptographic system should be able to authorize a change.
Patrol system is the electronic system that inspection route, mode and the process of security personnel patrolman are managed and are controlled Or network.
Garage parking (field) management system carries out the electricity of automated log on, monitoring and management to the vehicle into and out of garage parking (field) Subsystem or network.
Although present cell has various security systems, so that the overall security of cell increases, it can not The various nonnative personnel that still suffer from avoided enter in cell, especially to the end of the year when thievery happen occasionally again, So the Security Personnel to cell brings biggish supervision difficulty, so having certain improvement with existing security system Space.
Summary of the invention
The first object of the present invention is to provide a kind of wisdom security protection monitoring and managing method, and identification can be carried out to a suspect and is gone forward side by side Row warning.
Above-mentioned technical purpose of the invention has the technical scheme that
A kind of wisdom security protection monitoring and managing method, comprising:
Obtain the current monitor data information for being set to the monitoring device of institute's predeterminated position;
From pre-set database, search and preset data information corresponding to current monitor device;The monitoring data Information includes personnel's image information;The preset data information includes preset personnel's image information;
Analysis matching is carried out according between current persons' image information and preset personnel's image information, if current persons' image information It is matched with preset personnel's image information unsuccessful, then current persons' image information is stored into database and defined and work as forefathers Personnel corresponding to member's image information are suspicion personnel;
If personnel's image information of suspicion personnel is got by the monitoring device of same position within the default time cycle Number be more than default number, then feed back information warning.
Using the above scheme, according to personnel's image information accessed by monitoring device come with the preset personnel in database Image information is compared, and if there is the nonnative personnel in no longer database, then the personnel are to be defined as suspicion personnel, still Suspicion personnel may be take-away person or pass by personnel etc., thus according to suspicion personnel by the monitoring device of same position The number got judges, if it exceeds preset number, illustrate that suspicion personnel pay close attention to, is passing through warning letter Breath carries out warning Security Personnel or warns security center.
Preferably, according to the information warning and nearby principle arrangement Security Personnel fed back to associated monitoring devices Position checked.
Using the above scheme, since suspicion personnel repeatedly stay the same place, illustrate in the presence of pilferage or other attempts, Therefore need to arrange Security Personnel and check, in order to improve efficiency, therefore personnel are arranged using nearby principle.
Preferably, arranging the method for Security Personnel as follows:
Obtain associated monitoring devices device location information and Security Personnel locating for personnel location information;
From pre-set database, the path data information of current region is searched and obtained;
According to position corresponding to device location information and personnel location information and along corresponding to path data information Path forms range information to calculate the distance between device location information and personnel location information;
Range information corresponding to different Security Personnel is compared to each other to arrange the smallest Security Personnel of range information.
Using the above scheme, according to acquired device location information and the point of personnel location information, and in number of path It is believed that calculating the path distance between two points on breath, the shortest path as in Baidu map is calculated, and to each security people The range information of member is compared, and the smallest Security Personnel of range information is selected to check in the past, realizes the function of arranging nearby.
Preferably, the method for obtaining the location information of associated monitoring devices is as follows:
Obtain the number data information of monitoring device;
From pre-set database, search and device location information corresponding to number data information;Feedback query is obtained The device location information taken.
Using the above scheme, installation position corresponding to the preparatory typing number of each monitoring device in the database It sets, so that only needing to obtain the corresponding number data information of monitoring device can be appreciated that position corresponding to the monitoring device.
Preferably, including:
Obtain the current triggering information of current Security Personnel;
From the corresponding relationship between pre-set, triggering information and command information, search and the current triggering information pair The present instruction information answered;The triggering information includes surrounding and seize triggering information, and described instruction information includes and surrounds and seize triggering information It is mutual corresponding to surround and seize execution information;
It is enclosed according to position corresponding to execution information and feedback information warning is surrounded and seize with nearby principle arrangement Security Personnel It catches.
Using the above scheme, it if suspicion personnel determination is thief, is surrounded and seize, avoids small evade It runs, so surrounding and seize triggering information according to corresponding Security Personnel personnel triggering.
Preferably, arranging the method for Security Personnel as follows:
Obtain associated monitoring devices device location information and Security Personnel locating for personnel location information;
From pre-set database, the path data information of current region is searched and obtained;
According to position corresponding to device location information and personnel location information and along corresponding to path data information Path forms range information to calculate the distance between device location information and personnel location information;
Range information corresponding to different Security Personnel is compared to each other to form distance sequencing information, according to distance Sequencing information arranges a number of Security Personnel.
Using the above scheme, according to acquired device location information and the point of personnel location information, and in number of path It is believed that calculating the path distance between two points on breath, the shortest path as in Baidu map is calculated, and to each security people The range information of member is compared, and nearest several Security Personnel is selected to check in the past, realizes the function of arranging nearby.
Preferably, the determination method of the quantity of Security Personnel needed for arranging is as follows:
Obtain the number data information of monitoring device;
From pre-set database, search and device location information corresponding to number data information;The device location Information includes building location information and floor location information locating for equipment, and the building location information includes several outlet Information;
The quantity according to corresponding to outlet information is to arrange the Security Personnel of corresponding number.
Using the above scheme, because of the outlet that building had, corresponding security is arranged according to the quantity of outlet Personnel, enable to each Security Personnel to be responsible for one outlet, and the personnel that effectively save oneself from suspicion are staggered and flee from Security Personnel Situation improves the feasibility surrounded and seize.
Preferably, the position according to corresponding to different outlet informations and personnel location information and along number of path It is believed that path corresponding to breath to calculate different the distance between outlet information and personnel location information, forms distance letter Breath;
Different Security Personnel are compared to each other from range information corresponding to different outlets, arrange relevant outlet corresponding away from From the smallest Security Personnel of information.
Using the above scheme, the nearest Security Personnel of mouth is separated out according to nearby principle arrangement, improving Security Personnel can use up Near big corresponding outlet, the case where multiple Security Personnel have gone to same outlet also can be avoided.
The second object of the present invention is to provide a kind of storage medium, can store corresponding instruction set, can be to suspicious people Member is identified and is warned.
Above-mentioned technical purpose of the invention has the technical scheme that
A kind of storage medium, is stored with instruction set, and described instruction collection is suitable for a processor and loads and execute following processing, wraps It includes:
Obtain the current monitor data information for being set to the monitoring device of institute's predeterminated position;
From pre-set database, search and preset data information corresponding to current monitor device;The monitoring data Information includes personnel's image information;The preset data information includes preset personnel's image information;
Analysis matching is carried out according between current persons' image information and preset personnel's image information, if current persons' image information It is matched with preset personnel's image information unsuccessful, then current persons' image information is stored into database and defined and work as forefathers Personnel corresponding to member's image information are suspicion personnel;
If personnel's image information of suspicion personnel is got by the monitoring device of same position within the default time cycle Number be more than default number, then feed back information warning.
Using the above scheme, according to personnel's image information accessed by monitoring device come with the preset personnel in database Image information is compared, and if there is the nonnative personnel in no longer database, then the personnel are to be defined as suspicion personnel, still Suspicion personnel may be take-away person or pass by personnel etc., thus according to suspicion personnel by the monitoring device of same position The number got judges, if it exceeds preset number, illustrate that suspicion personnel pay close attention to, is passing through warning letter Breath carries out warning Security Personnel or warns security center.
The third object of the present invention is to provide a kind of wisdom security protection supervisory systems, and identification can be carried out to a suspect and is gone forward side by side Row warning.
Above-mentioned technical purpose of the invention has the technical scheme that
A kind of wisdom security protection supervisory systems, comprising:
Processor, for loading and executing instruction collection;And
Such as above-mentioned storage medium.
Using the above scheme, according to personnel's image information accessed by monitoring device come with the preset personnel in database Image information is compared, and if there is the nonnative personnel in no longer database, then the personnel are to be defined as suspicion personnel, still Suspicion personnel may be take-away person or pass by personnel etc., thus according to suspicion personnel by the monitoring device of same position The number got judges, if it exceeds preset number, illustrate that suspicion personnel pay close attention to, is passing through warning letter Breath carries out warning Security Personnel or warns security center.
In conclusion the invention has the following advantages: intellectual analysis a suspect and can feed back, further Improve degree of safety.
Detailed description of the invention
Fig. 1 is the flow diagram of wisdom security protection monitoring and managing method;
Fig. 2 is the flow diagram for arranging the method for Security Personnel;
Fig. 3 is the flow diagram for obtaining the method for location information of associated monitoring devices;
Fig. 4 is the flow diagram for arranging the method surrounded and seize;
Fig. 5 is the flow diagram for the method for arranging Security Personnel to be surrounded and seize;
Fig. 6 is the flow diagram of the quantity of Security Personnel needed for arranging and the method for position.
Specific embodiment
Below in conjunction with attached drawing, invention is further described in detail.
This specific embodiment is only explanation of the invention, is not limitation of the present invention, those skilled in the art Member can according to need the modification that not creative contribution is made to the present embodiment after reading this specification, but as long as at this All by the protection of Patent Law in the scope of the claims of invention.
The embodiment of the present invention provides a kind of wisdom security protection monitoring and managing method, comprising: obtains the monitoring for being set to institute's predeterminated position The current monitor data information of device;From pre-set database, search and preset number corresponding to current monitor device It is believed that breath;Monitoring data information includes personnel's image information;Preset data information includes preset personnel's image information;According to current Analysis matching is carried out between personnel's image information and preset personnel's image information, if current persons' image information and preset personnel scheme Picture information matches are unsuccessful, then store into database current persons' image information and define current persons' image information institute Corresponding personnel are suspicion personnel;If personnel's image information of suspicion personnel is by same position within the default time cycle The number that the monitoring device set is got is more than default number, then feeds back information warning.
In the embodiment of the present invention, according to personnel's image information accessed by monitoring device come with the preset people in database Member image information be compared, if there is the nonnative personnel in no longer database, then the personnel be defined as suspicion personnel, but It is that suspicion personnel may be take-away person or pass by personnel etc., therefore be filled according to suspicion personnel by the monitoring of same position The number that gets is set to judge, if it exceeds preset number, illustrates that suspicion personnel pay close attention to, is passing through warning Information carries out warning Security Personnel or warns security center.
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
In addition, the terms "and/or", only a kind of incidence relation for describing affiliated partner, indicates may exist Three kinds of relationships, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.Separately Outside, character "/" herein typicallys represent the relationship that forward-backward correlation object is a kind of "or" unless otherwise specified.
The embodiment of the present invention is described in further detail with reference to the accompanying drawings of the specification.
Referring to Figure 1, the embodiment of the present invention provides a kind of wisdom security protection monitoring and managing method, and the main flow description of method is such as Under.
As shown in Figure 1:
Step 1100: obtaining the current monitor data information for being set to the monitoring device of institute's predeterminated position, monitoring data packet Include personnel's image information.
Wherein, monitoring device is monitoring camera, is respectively provided with monitoring device by each doorway in the cell, so that peace Guarantor person can supervise the case where entire cell, it is ensured that the personal safety of resident in cell.Have personnel occur when The image information for capturing the face of the personnel is waited to facilitate subsequent comparison to analyze.
Step 1200: from pre-set database, lookup and preset data information corresponding to current monitor device, Preset data information includes preset personnel's image information.
Wherein, the corresponding resident in each doorway, and every resident has corresponding personnel's subdata base, corresponding Preset personnel's image information of typing before being stored in personnel's subdata base, to facilitate subsequent comparison.
Step 1300: analysis matching is carried out according between current persons' image information and preset personnel's image information, if working as Preceding personnel's image information matches unsuccessful with preset personnel's image information, then stores current persons' image information to database In and define personnel corresponding to current persons' image information be suspicion personnel.
Wherein, current persons' image information according to accessed by monitoring device and preset personnel's image information carry out face Identification compares, and by discriminance analysis to judge whether to match, if it fails to match, illustrates that current personnel do not exist In personnel's subdata base.
Step 1400: if personnel's image information of suspicion personnel is by same position within the default time cycle The number that monitoring device is got is more than default number, then feeds back information warning.
Wherein, the default time cycle can be 1 hour, 2 hours, 3 hours, 4 hours, half a day, one day Etc., it is preferably half a day in the present embodiment;Default number can be 1 time, 2 times, 3 times, 4 times etc., excellent in the present embodiment It is selected as 3 times;Information warning can be sound information warning, light warning information, short message prompting message, pop-up prompting message etc. Deng, several combinations being also possible in above-mentioned information warning, light warning information and pop-up are preferably used in the present embodiment The combination of prompting message sends pop-up prompting message by way of light flash and in corresponding software APP to remind phase Close Security Personnel or security center.
In order to reduce the danger of cell as far as possible, so Security Personnel is needed to check in the past, therefore according to the warning fed back Information and nearby principle arrange Security Personnel to check with the position to associated monitoring devices.As shown in Fig. 2, specific arrangement The method of Security Personnel is as follows:
Step 2100: obtain associated monitoring devices device location information and Security Personnel locating for personnel location information.
Wherein, the relevant instrument with GPS system is had with each Security Personnel, is obtained by GPS positioning To personnel location information locating for the Security Personnel;In addition, as shown in figure 3, about the location information for obtaining associated monitoring devices Method it is as follows:
Step 2110: obtaining the number data information of monitoring device;
Step 2120: from pre-set database, searching and device location information corresponding to number data information;Feedback The acquired device location information of inquiry.
Wherein, number data information is the coding artificially carried out to monitoring device;It presets in the database corresponding Monitoring device subdata base, in the monitoring device subdata base corresponding to the preparatory typing number of each monitoring device Installation site so that only needing to obtain the corresponding number data information of monitoring device can be appreciated that corresponding to the monitoring device Position.
Step 2200: from pre-set database, searching and obtain the path data information of current region.
Wherein, the routing database of cell is preset in the database, i.e., is stored in the routing database relevant Path map data, so that the later period transfers use.
Step 2300: according to position corresponding to device location information and personnel location information and along path data Path corresponding to information forms range information to calculate the distance between device location information and personnel location information.
Step 2400: range information corresponding to different Security Personnel being compared to each other to arrange the smallest peace of range information Guarantor person.
Wherein, according to acquired device location information and the point of personnel location information, and in path data information The path distance between two points is calculated, the shortest path as in Baidu map calculates, and to the distance of each Security Personnel Information is compared, and the smallest Security Personnel of range information is selected to check in the past, realizes the function of arranging nearby.
If suspicion personnel determination is thief, is surrounded and seize, thief is avoided to escape, so according to correspondence Triggering information is surrounded and seize in Security Personnel personnel triggering;As shown in figure 4, specifically arranging the method surrounded and seize as follows:
Step 3100: obtaining the current triggering information of current Security Personnel, triggering information includes surrounding and seize triggering information.
Wherein, this is surrounded and seize triggering information and can be obtained by mechanical key triggering, can also be touched by virtual key Acquisition is sent, i.e., is triggered manually by current Security Personnel to realize and obtain the current triggering information.
Step 3200: from the corresponding relationship between pre-set, triggering information and command information, searching and current touching The corresponding present instruction information of photos and sending messages;Command information includes that information is mutual corresponding surrounds and seize execution information with triggering is surrounded and seize.
Step 3300: being pacified according to position corresponding to execution information and feedback information warning is surrounded and seize with nearby principle arrangement Guarantor person is surrounded and seize.
As shown in figure 5, the method that specific arrangement Security Personnel is surrounded and seize is as follows:
Step 3310: obtain associated monitoring devices device location information and Security Personnel locating for personnel location information.
Wherein, device location information and the acquisition modes of personnel location information and step 2100 and step 2110 are to step Identical in rapid 2120, therefore, not repeat them here.
Step 3320: from pre-set database, searching and obtain the path data information of current region.
Wherein, the set-up mode of path data information and acquisition modes are identical as in step 2200, therefore do not go to live in the household of one's in-laws on getting married herein It states.
Step 3330: according to position corresponding to device location information and personnel location information and along path data Path corresponding to information forms range information to calculate the distance between device location information and personnel location information.
Step 3340: range information corresponding to different Security Personnel being compared to each other to form distance sequence letter Breath, a number of Security Personnel is arranged according to distance sequencing information.
Wherein, as shown in fig. 6, the quantity of Security Personnel needed for arranging and the method for position are as follows:
Step 3341: obtaining the number data information of monitoring device.
Step 3342: from pre-set database, searching and device location information corresponding to number data information; Device location information includes building location information and floor location information locating for equipment, and building location information includes several Outlet information.
Step 3343: the quantity according to corresponding to outlet information is to arrange the Security Personnel of corresponding number.
Step 3344: according to position corresponding to different outlet informations and personnel location information and along number of path It is believed that path corresponding to breath to calculate different the distance between outlet information and personnel location information, forms distance letter Breath.
Step 3345: different Security Personnel being compared to each other from range information corresponding to different outlets, are arranged related Outlet corresponding to the smallest Security Personnel of range information.
The embodiment of the present invention provides a kind of storage medium, and storage medium is stored with instruction set, which is suitable for a processing Device is loaded and is executed including Fig. 1-Fig. 6.Each step in process.
Computer storage medium for example, USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), Random access memory (Random Access Memory, RAM), magnetic or disk etc. be various to can store program code Medium.
Based on the same inventive concept, the embodiment of the present invention provides a kind of wisdom security protection supervisory systems, processor, for loading And execute instruction collection;And such as above-mentioned storage medium.
It is apparent to those skilled in the art that for convenience and simplicity of description, only with above-mentioned each function The division progress of module can according to need and for example, in practical application by above-mentioned function distribution by different function moulds Block is completed, i.e., the internal structure of device is divided into different functional modules, to complete all or part of function described above Energy.The specific work process of the system, apparatus, and unit of foregoing description, can be with reference to corresponding in preceding method embodiment Journey, details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, module or unit Division, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or group Part can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown Or the mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, device or unit it is indirect Coupling or communication connection can be electrical property, mechanical or other forms.
Unit may or may not be physically separated as illustrated by the separation member, shown as a unit Component may or may not be physical unit, it can and it is in one place, or may be distributed over multiple networks On unit.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
It, can if integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product To be stored in a computer readable storage medium.Based on this understanding, the technical solution of the application substantially or Say that all or part of the part that contributes to existing technology or the technical solution can embody in the form of software products Out, which is stored in a storage medium, including some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) or processor (processor) execute each implementation of the application The all or part of the steps of example method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory, arbitrary access The various media that can store program code such as memory, magnetic or disk.
More than, above embodiments are only described in detail to the technical solution to the application, but above embodiments Illustrate to be merely used to help understand method and its core concept of the invention, should not be construed as limiting the invention.This technology In the technical scope disclosed by the present invention, any changes or substitutions that can be easily thought of by the technical staff in field, should all cover in this hair Within bright protection scope.

Claims (10)

1. a kind of wisdom security protection monitoring and managing method, characterized in that include:
Obtain the current monitor data information for being set to the monitoring device of institute's predeterminated position;
From pre-set database, search and preset data information corresponding to current monitor device;The monitoring data Information includes personnel's image information;The preset data information includes preset personnel's image information;
Analysis matching is carried out according between current persons' image information and preset personnel's image information, if current persons' image information It is matched with preset personnel's image information unsuccessful, then current persons' image information is stored into database and defined and work as forefathers Personnel corresponding to member's image information are suspicion personnel;
If personnel's image information of suspicion personnel is got by the monitoring device of same position within the default time cycle Number be more than default number, then feed back information warning.
2. wisdom security protection monitoring and managing method according to claim 1, characterized in that according to the information warning fed back and just Approximately principle arranges Security Personnel to check with the position to associated monitoring devices.
3. wisdom security protection monitoring and managing method according to claim 2, characterized in that
The method for arranging Security Personnel is as follows:
Obtain associated monitoring devices device location information and Security Personnel locating for personnel location information;
From pre-set database, the path data information of current region is searched and obtained;
According to position corresponding to device location information and personnel location information and along corresponding to path data information Path forms range information to calculate the distance between device location information and personnel location information;
Range information corresponding to different Security Personnel is compared to each other to arrange the smallest Security Personnel of range information.
4. wisdom security protection monitoring and managing method according to claim 3, characterized in that
The method for obtaining the location information of associated monitoring devices is as follows:
Obtain the number data information of monitoring device;
From pre-set database, search and device location information corresponding to number data information;Feedback query is obtained The device location information taken.
5. wisdom security protection monitoring and managing method according to claim 1, characterized in that include:
Obtain the current triggering information of current Security Personnel;
From the corresponding relationship between pre-set, triggering information and command information, search and the current triggering information pair The present instruction information answered;The triggering information includes surrounding and seize triggering information, and described instruction information includes and surrounds and seize triggering information It is mutual corresponding to surround and seize execution information;
It is enclosed according to position corresponding to execution information and feedback information warning is surrounded and seize with nearby principle arrangement Security Personnel It catches.
6. wisdom security protection monitoring and managing method according to claim 5, characterized in that
The method for arranging Security Personnel is as follows:
Obtain associated monitoring devices device location information and Security Personnel locating for personnel location information;
From pre-set database, the path data information of current region is searched and obtained;
According to position corresponding to device location information and personnel location information and along corresponding to path data information Path forms range information to calculate the distance between device location information and personnel location information;
Range information corresponding to different Security Personnel is compared to each other to form distance sequencing information, according to distance Sequencing information arranges a number of Security Personnel.
7. wisdom security protection monitoring and managing method according to claim 6, characterized in that
The determination method of the quantity of Security Personnel needed for arranging is as follows:
Obtain the number data information of monitoring device;
From pre-set database, search and device location information corresponding to number data information;The device location Information includes building location information and floor location information locating for equipment, and the building location information includes several outlet Information;
The quantity according to corresponding to outlet information is to arrange the Security Personnel of corresponding number.
8. wisdom security protection monitoring and managing method according to claim 7, it is characterized in that:
According to position corresponding to different outlet informations and personnel location information and along corresponding to path data information Path to calculate different the distance between outlet information and personnel location information, form range information;
Different Security Personnel are compared to each other from range information corresponding to different outlets, arrange relevant outlet corresponding away from From the smallest Security Personnel of information.
9. a kind of storage medium, characterized in that it is stored with instruction set, and described instruction collection is suitable for a processor and loads and execute such as Lower processing, comprising:
Obtain the current monitor data information for being set to the monitoring device of institute's predeterminated position;
From pre-set database, search and preset data information corresponding to current monitor device;The monitoring data Information includes personnel's image information;The preset data information includes preset personnel's image information;
Analysis matching is carried out according between current persons' image information and preset personnel's image information, if current persons' image information It is matched with preset personnel's image information unsuccessful, then current persons' image information is stored into database and defined and work as forefathers Personnel corresponding to member's image information are suspicion personnel;
If personnel's image information of suspicion personnel is got by the monitoring device of same position within the default time cycle Number be more than default number, then feed back information warning.
10. a kind of wisdom security protection supervisory systems, it is characterized in that: including:
Processor, for loading and executing instruction collection;And
Storage medium as claimed in claim 9.
CN201910052332.7A 2019-01-21 2019-01-21 Wisdom security protection monitoring and managing method, system and storage medium Pending CN109872482A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910052332.7A CN109872482A (en) 2019-01-21 2019-01-21 Wisdom security protection monitoring and managing method, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910052332.7A CN109872482A (en) 2019-01-21 2019-01-21 Wisdom security protection monitoring and managing method, system and storage medium

Publications (1)

Publication Number Publication Date
CN109872482A true CN109872482A (en) 2019-06-11

Family

ID=66917893

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910052332.7A Pending CN109872482A (en) 2019-01-21 2019-01-21 Wisdom security protection monitoring and managing method, system and storage medium

Country Status (1)

Country Link
CN (1) CN109872482A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110458489A (en) * 2019-07-05 2019-11-15 宁波海上鲜信息技术有限公司 Chief storekeeper's method, system, storage medium and its intelligent terminal
CN110533858A (en) * 2019-09-07 2019-12-03 贵州中信宏业科技股份有限公司 A kind of method for safety monitoring based on local area network
CN110728815A (en) * 2019-10-25 2020-01-24 深圳市商汤科技有限公司 Early warning method and device based on video analysis, electronic equipment and storage medium
CN110807393A (en) * 2019-10-25 2020-02-18 深圳市商汤科技有限公司 Early warning method and device based on video analysis, electronic equipment and storage medium
CN111951507A (en) * 2020-07-23 2020-11-17 昆山安盾网络科技有限公司 Intelligent security comprehensive control system based on building automation
CN112767196A (en) * 2021-01-15 2021-05-07 森罗云科技(广州)有限公司 Intelligent property management information sharing platform for smart community
CN112818854A (en) * 2021-02-01 2021-05-18 南通大学 All-weather video person searching method applied to campus security
CN112866647A (en) * 2021-01-15 2021-05-28 森罗云科技(广州)有限公司 Intelligent property management system based on smart community
CN113222548A (en) * 2021-05-18 2021-08-06 绿漫科技有限公司 Community property eagle eye monitoring system and use method
CN113393628A (en) * 2021-05-10 2021-09-14 天津泰来勘测设计有限公司 Intelligent monitoring alarm method, system, intelligent terminal and storage medium
CN113807636A (en) * 2021-04-12 2021-12-17 河北广电传智信息技术有限公司 Region supervision method and device, electronic equipment and computer storage medium
CN115272948A (en) * 2022-05-20 2022-11-01 贵州丰立空间科技有限公司 Intelligent security information system based on Internet of things

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102646197A (en) * 2012-02-20 2012-08-22 华焦宝 Pre-warning information issuing method and system
CN102768736A (en) * 2011-05-04 2012-11-07 永泰软件有限公司 Police resource scheduling method based on optimal route
CN103246869A (en) * 2013-04-19 2013-08-14 福建亿榕信息技术有限公司 Crime monitoring method based on face recognition technology and behavior and sound recognition
CN103456147A (en) * 2012-07-24 2013-12-18 陕西省公安厅 Intelligent warning instance automatic identification mass texting system
CN104376679A (en) * 2014-11-24 2015-02-25 苏州立瓷电子技术有限公司 Intelligent household pre-warning method
CN105678247A (en) * 2015-12-30 2016-06-15 武汉大学 Abnormal behavior early warning method and system for hovering event space-time big data analysis
CN105788282A (en) * 2016-04-20 2016-07-20 青岛华高软件科技有限公司 Smart traffic monitoring and arresting linked management method
CN106128053A (en) * 2016-07-18 2016-11-16 四川君逸数码科技股份有限公司 A kind of wisdom gold eyeball identification personnel stay hover alarm method and device
JP2017027568A (en) * 2015-07-27 2017-02-02 守男 望月 Shoplifting prevention warning system
CN107563363A (en) * 2017-10-18 2018-01-09 哈尔滨学院 Capturing system based on day net engineering and facial recognition technology
CN108039007A (en) * 2017-12-26 2018-05-15 北斗七星(重庆)物联网技术有限公司 A kind of safety protection method and device
CN108053122A (en) * 2017-12-18 2018-05-18 中国刑事警察学院 A kind of police strength dispatching method and device
CN108200405A (en) * 2018-02-05 2018-06-22 成都伦索科技有限公司 A kind of video monitoring system based on recognition of face
CN108471518A (en) * 2018-03-21 2018-08-31 东莞仲天电子科技有限公司 A kind of command system applied to police service fusion
CN108701393A (en) * 2016-03-04 2018-10-23 伊瑞斯缇公司(公共) System and method for event handling
CN108922114A (en) * 2018-06-22 2018-11-30 张小勇 Security monitor method and system

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102768736A (en) * 2011-05-04 2012-11-07 永泰软件有限公司 Police resource scheduling method based on optimal route
CN102646197A (en) * 2012-02-20 2012-08-22 华焦宝 Pre-warning information issuing method and system
CN103456147A (en) * 2012-07-24 2013-12-18 陕西省公安厅 Intelligent warning instance automatic identification mass texting system
CN103246869A (en) * 2013-04-19 2013-08-14 福建亿榕信息技术有限公司 Crime monitoring method based on face recognition technology and behavior and sound recognition
CN104376679A (en) * 2014-11-24 2015-02-25 苏州立瓷电子技术有限公司 Intelligent household pre-warning method
JP2017027568A (en) * 2015-07-27 2017-02-02 守男 望月 Shoplifting prevention warning system
CN105678247A (en) * 2015-12-30 2016-06-15 武汉大学 Abnormal behavior early warning method and system for hovering event space-time big data analysis
CN108701393A (en) * 2016-03-04 2018-10-23 伊瑞斯缇公司(公共) System and method for event handling
CN105788282A (en) * 2016-04-20 2016-07-20 青岛华高软件科技有限公司 Smart traffic monitoring and arresting linked management method
CN106128053A (en) * 2016-07-18 2016-11-16 四川君逸数码科技股份有限公司 A kind of wisdom gold eyeball identification personnel stay hover alarm method and device
CN107563363A (en) * 2017-10-18 2018-01-09 哈尔滨学院 Capturing system based on day net engineering and facial recognition technology
CN108053122A (en) * 2017-12-18 2018-05-18 中国刑事警察学院 A kind of police strength dispatching method and device
CN108039007A (en) * 2017-12-26 2018-05-15 北斗七星(重庆)物联网技术有限公司 A kind of safety protection method and device
CN108200405A (en) * 2018-02-05 2018-06-22 成都伦索科技有限公司 A kind of video monitoring system based on recognition of face
CN108471518A (en) * 2018-03-21 2018-08-31 东莞仲天电子科技有限公司 A kind of command system applied to police service fusion
CN108922114A (en) * 2018-06-22 2018-11-30 张小勇 Security monitor method and system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
杨冬琼: "《物业安保消防看图看板管理与问答》", 31 July 2014 *
梅蓉: "《数字侦查技术教程》", 30 June 2016 *
许锋等: "《视频现场勘查及应用》", 28 February 2018 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110458489A (en) * 2019-07-05 2019-11-15 宁波海上鲜信息技术有限公司 Chief storekeeper's method, system, storage medium and its intelligent terminal
CN110533858A (en) * 2019-09-07 2019-12-03 贵州中信宏业科技股份有限公司 A kind of method for safety monitoring based on local area network
CN110728815A (en) * 2019-10-25 2020-01-24 深圳市商汤科技有限公司 Early warning method and device based on video analysis, electronic equipment and storage medium
CN110807393A (en) * 2019-10-25 2020-02-18 深圳市商汤科技有限公司 Early warning method and device based on video analysis, electronic equipment and storage medium
CN111951507A (en) * 2020-07-23 2020-11-17 昆山安盾网络科技有限公司 Intelligent security comprehensive control system based on building automation
CN112866647A (en) * 2021-01-15 2021-05-28 森罗云科技(广州)有限公司 Intelligent property management system based on smart community
CN112767196A (en) * 2021-01-15 2021-05-07 森罗云科技(广州)有限公司 Intelligent property management information sharing platform for smart community
CN112818854A (en) * 2021-02-01 2021-05-18 南通大学 All-weather video person searching method applied to campus security
CN112818854B (en) * 2021-02-01 2023-12-05 南通大学 All-weather video person searching method applied to campus security
CN113807636A (en) * 2021-04-12 2021-12-17 河北广电传智信息技术有限公司 Region supervision method and device, electronic equipment and computer storage medium
CN113807636B (en) * 2021-04-12 2024-04-09 河北广电传智信息技术有限公司 Regional supervision method and device, electronic equipment and computer storage medium
CN113393628A (en) * 2021-05-10 2021-09-14 天津泰来勘测设计有限公司 Intelligent monitoring alarm method, system, intelligent terminal and storage medium
CN113222548A (en) * 2021-05-18 2021-08-06 绿漫科技有限公司 Community property eagle eye monitoring system and use method
CN115272948A (en) * 2022-05-20 2022-11-01 贵州丰立空间科技有限公司 Intelligent security information system based on Internet of things
CN115272948B (en) * 2022-05-20 2023-02-17 贵州丰立空间科技有限公司 Intelligent security information system based on Internet of things

Similar Documents

Publication Publication Date Title
CN109872482A (en) Wisdom security protection monitoring and managing method, system and storage medium
US11645904B2 (en) Drone-augmented emergency response services
US11527149B2 (en) Emergency alert system
US10726709B2 (en) System and method for reporting the existence of sensors belonging to multiple organizations
CN109064698B (en) Resident security early warning method and resident security early warning system
US10257469B2 (en) Neighborhood camera linking system
US9607501B2 (en) Systems and methods for providing emergency resources
US11011036B2 (en) Object tracking using disparate monitoring systems
DK201500228A1 (en) Smart alarm system with user confirmed video stream notification of psap in combination with data safety and public emergency involvement using smartphone agents
KR101841882B1 (en) Unmanned Crime Prevention System and Method
CN202904839U (en) Intelligent security system based on internet of things
US20180167585A1 (en) Networked Camera
CN102184602B (en) Bank automatic teller machine (ATM) and field facility narrow-band monitoring and warning system
US11600166B1 (en) Occurrence-record driven monitoring system and method of use thereof
KR102084687B1 (en) Security operation service method and system for detecting illegal photography
KR101664556B1 (en) Social security network method and system
US20200265694A1 (en) System for implementing an aerial security network
WO2014199173A1 (en) Car park monitoring system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190611