CN109872482A - Wisdom security protection monitoring and managing method, system and storage medium - Google Patents
Wisdom security protection monitoring and managing method, system and storage medium Download PDFInfo
- Publication number
- CN109872482A CN109872482A CN201910052332.7A CN201910052332A CN109872482A CN 109872482 A CN109872482 A CN 109872482A CN 201910052332 A CN201910052332 A CN 201910052332A CN 109872482 A CN109872482 A CN 109872482A
- Authority
- CN
- China
- Prior art keywords
- information
- personnel
- image information
- location information
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a kind of wisdom security protection monitoring and managing method, system and storage mediums;It solves the problems, such as to pass in and out and can not learn there are a suspect, its key points of the technical solution are that, obtain current monitor data information;From pre-set database, preset data information is searched;Monitoring data information includes personnel's image information;Preset data information includes preset personnel's image information;Analysis matching is carried out according between current persons' image information and preset personnel's image information, if current persons' image information matched with preset personnel's image information it is unsuccessful, which is stored into database and define personnel corresponding to current persons' image information be suspicion personnel;If within the default time cycle, the number that personnel's image information of suspicion personnel is got by the monitoring device of same position is more than default number, then feed back information warning, the present invention intellectual analysis a suspect and can be fed back, and further increase degree of safety.
Description
Technical field
The present invention relates to safeguard management methods, in particular to wisdom security protection monitoring and managing method, system and storage medium.
Background technique
Safety and protection system (SPS) security & protection system is to safeguard social public security as mesh
, intrusion alarm system, video security monitoring system, the entrance that application safety prevention product and other Related products are constituted
The liquid crystal-spliced wall system of control system, BSV, gate inhibition's fire-fighting system, anti-explosion safety inspection system etc.;Or by these systems be subsystem
System combination or integrated electronic system or network.
Safety and protection system specifically includes that closed monitor system, intrusion alarm system, gateway control system, night watching system
System, garage parking (field) management system etc..
Closed monitor system utilizes video technique detection, monitoring security area and real-time display, the electricity for recording live image
Subsystem or network.The headend equipment of this system is various types of video cameras (or video alarm) monitor and its attached sets
Standby, coaxial cable transmission or optical fiber transmission can be used in transmission mode;The terminal device of system be display, record, control, communication set
Standby (including multimedia technology equipment) generally uses independent video hub console or monitoring-alarm center console.
Intrusion alarm system (IAS) intruder alarm system is visited using sensor technology and electronic information technology
Survey and indicate illegally to enter or attempt the behavior for illegally entering security area, the electronics for handling warning message, alert
System or network.The composition of intrusion alarm system is generally by (outer) region/shield structure in perimeter protection, building and mesh in kind
The parts such as mark protection are constituted alone or in combination.The headend equipment of system is various types of intrusion detectors (sensor).Transmission
Mode can use wire transmission or wireless transmission, and the modes such as special line transmission, telephone line transmission can be used in wire transmission again;System
Terminal show, control, alarm controller can be used in device talk, may also set up alarm center console.When system designs, enter
The configuration for invading detector should make its investigative range have enough covering surfaces, be considered as the detection using various different detection principles
Device.
Gateway control system is identified using self-defining character or/and mode identification technology identifies simultaneously entrance target
Control the electronic system or network of the opening and closing of entrance executing agency.Gateway control system is generally by entrance to as (people, object)
Identification device, entrance information processing, control, communication device and access control executing agency three parts composition.Entrance control
System processed, which should have, prevents one to stick into more people or one block the precautionary measures of more people out, should prevent same category of device bootlegging from effectively demonstrate,proving
The cryptographic system of part card, cryptographic system should be able to authorize a change.
Patrol system is the electronic system that inspection route, mode and the process of security personnel patrolman are managed and are controlled
Or network.
Garage parking (field) management system carries out the electricity of automated log on, monitoring and management to the vehicle into and out of garage parking (field)
Subsystem or network.
Although present cell has various security systems, so that the overall security of cell increases, it can not
The various nonnative personnel that still suffer from avoided enter in cell, especially to the end of the year when thievery happen occasionally again,
So the Security Personnel to cell brings biggish supervision difficulty, so having certain improvement with existing security system
Space.
Summary of the invention
The first object of the present invention is to provide a kind of wisdom security protection monitoring and managing method, and identification can be carried out to a suspect and is gone forward side by side
Row warning.
Above-mentioned technical purpose of the invention has the technical scheme that
A kind of wisdom security protection monitoring and managing method, comprising:
Obtain the current monitor data information for being set to the monitoring device of institute's predeterminated position;
From pre-set database, search and preset data information corresponding to current monitor device;The monitoring data
Information includes personnel's image information;The preset data information includes preset personnel's image information;
Analysis matching is carried out according between current persons' image information and preset personnel's image information, if current persons' image information
It is matched with preset personnel's image information unsuccessful, then current persons' image information is stored into database and defined and work as forefathers
Personnel corresponding to member's image information are suspicion personnel;
If personnel's image information of suspicion personnel is got by the monitoring device of same position within the default time cycle
Number be more than default number, then feed back information warning.
Using the above scheme, according to personnel's image information accessed by monitoring device come with the preset personnel in database
Image information is compared, and if there is the nonnative personnel in no longer database, then the personnel are to be defined as suspicion personnel, still
Suspicion personnel may be take-away person or pass by personnel etc., thus according to suspicion personnel by the monitoring device of same position
The number got judges, if it exceeds preset number, illustrate that suspicion personnel pay close attention to, is passing through warning letter
Breath carries out warning Security Personnel or warns security center.
Preferably, according to the information warning and nearby principle arrangement Security Personnel fed back to associated monitoring devices
Position checked.
Using the above scheme, since suspicion personnel repeatedly stay the same place, illustrate in the presence of pilferage or other attempts,
Therefore need to arrange Security Personnel and check, in order to improve efficiency, therefore personnel are arranged using nearby principle.
Preferably, arranging the method for Security Personnel as follows:
Obtain associated monitoring devices device location information and Security Personnel locating for personnel location information;
From pre-set database, the path data information of current region is searched and obtained;
According to position corresponding to device location information and personnel location information and along corresponding to path data information
Path forms range information to calculate the distance between device location information and personnel location information;
Range information corresponding to different Security Personnel is compared to each other to arrange the smallest Security Personnel of range information.
Using the above scheme, according to acquired device location information and the point of personnel location information, and in number of path
It is believed that calculating the path distance between two points on breath, the shortest path as in Baidu map is calculated, and to each security people
The range information of member is compared, and the smallest Security Personnel of range information is selected to check in the past, realizes the function of arranging nearby.
Preferably, the method for obtaining the location information of associated monitoring devices is as follows:
Obtain the number data information of monitoring device;
From pre-set database, search and device location information corresponding to number data information;Feedback query is obtained
The device location information taken.
Using the above scheme, installation position corresponding to the preparatory typing number of each monitoring device in the database
It sets, so that only needing to obtain the corresponding number data information of monitoring device can be appreciated that position corresponding to the monitoring device.
Preferably, including:
Obtain the current triggering information of current Security Personnel;
From the corresponding relationship between pre-set, triggering information and command information, search and the current triggering information pair
The present instruction information answered;The triggering information includes surrounding and seize triggering information, and described instruction information includes and surrounds and seize triggering information
It is mutual corresponding to surround and seize execution information;
It is enclosed according to position corresponding to execution information and feedback information warning is surrounded and seize with nearby principle arrangement Security Personnel
It catches.
Using the above scheme, it if suspicion personnel determination is thief, is surrounded and seize, avoids small evade
It runs, so surrounding and seize triggering information according to corresponding Security Personnel personnel triggering.
Preferably, arranging the method for Security Personnel as follows:
Obtain associated monitoring devices device location information and Security Personnel locating for personnel location information;
From pre-set database, the path data information of current region is searched and obtained;
According to position corresponding to device location information and personnel location information and along corresponding to path data information
Path forms range information to calculate the distance between device location information and personnel location information;
Range information corresponding to different Security Personnel is compared to each other to form distance sequencing information, according to distance
Sequencing information arranges a number of Security Personnel.
Using the above scheme, according to acquired device location information and the point of personnel location information, and in number of path
It is believed that calculating the path distance between two points on breath, the shortest path as in Baidu map is calculated, and to each security people
The range information of member is compared, and nearest several Security Personnel is selected to check in the past, realizes the function of arranging nearby.
Preferably, the determination method of the quantity of Security Personnel needed for arranging is as follows:
Obtain the number data information of monitoring device;
From pre-set database, search and device location information corresponding to number data information;The device location
Information includes building location information and floor location information locating for equipment, and the building location information includes several outlet
Information;
The quantity according to corresponding to outlet information is to arrange the Security Personnel of corresponding number.
Using the above scheme, because of the outlet that building had, corresponding security is arranged according to the quantity of outlet
Personnel, enable to each Security Personnel to be responsible for one outlet, and the personnel that effectively save oneself from suspicion are staggered and flee from Security Personnel
Situation improves the feasibility surrounded and seize.
Preferably, the position according to corresponding to different outlet informations and personnel location information and along number of path
It is believed that path corresponding to breath to calculate different the distance between outlet information and personnel location information, forms distance letter
Breath;
Different Security Personnel are compared to each other from range information corresponding to different outlets, arrange relevant outlet corresponding away from
From the smallest Security Personnel of information.
Using the above scheme, the nearest Security Personnel of mouth is separated out according to nearby principle arrangement, improving Security Personnel can use up
Near big corresponding outlet, the case where multiple Security Personnel have gone to same outlet also can be avoided.
The second object of the present invention is to provide a kind of storage medium, can store corresponding instruction set, can be to suspicious people
Member is identified and is warned.
Above-mentioned technical purpose of the invention has the technical scheme that
A kind of storage medium, is stored with instruction set, and described instruction collection is suitable for a processor and loads and execute following processing, wraps
It includes:
Obtain the current monitor data information for being set to the monitoring device of institute's predeterminated position;
From pre-set database, search and preset data information corresponding to current monitor device;The monitoring data
Information includes personnel's image information;The preset data information includes preset personnel's image information;
Analysis matching is carried out according between current persons' image information and preset personnel's image information, if current persons' image information
It is matched with preset personnel's image information unsuccessful, then current persons' image information is stored into database and defined and work as forefathers
Personnel corresponding to member's image information are suspicion personnel;
If personnel's image information of suspicion personnel is got by the monitoring device of same position within the default time cycle
Number be more than default number, then feed back information warning.
Using the above scheme, according to personnel's image information accessed by monitoring device come with the preset personnel in database
Image information is compared, and if there is the nonnative personnel in no longer database, then the personnel are to be defined as suspicion personnel, still
Suspicion personnel may be take-away person or pass by personnel etc., thus according to suspicion personnel by the monitoring device of same position
The number got judges, if it exceeds preset number, illustrate that suspicion personnel pay close attention to, is passing through warning letter
Breath carries out warning Security Personnel or warns security center.
The third object of the present invention is to provide a kind of wisdom security protection supervisory systems, and identification can be carried out to a suspect and is gone forward side by side
Row warning.
Above-mentioned technical purpose of the invention has the technical scheme that
A kind of wisdom security protection supervisory systems, comprising:
Processor, for loading and executing instruction collection;And
Such as above-mentioned storage medium.
Using the above scheme, according to personnel's image information accessed by monitoring device come with the preset personnel in database
Image information is compared, and if there is the nonnative personnel in no longer database, then the personnel are to be defined as suspicion personnel, still
Suspicion personnel may be take-away person or pass by personnel etc., thus according to suspicion personnel by the monitoring device of same position
The number got judges, if it exceeds preset number, illustrate that suspicion personnel pay close attention to, is passing through warning letter
Breath carries out warning Security Personnel or warns security center.
In conclusion the invention has the following advantages: intellectual analysis a suspect and can feed back, further
Improve degree of safety.
Detailed description of the invention
Fig. 1 is the flow diagram of wisdom security protection monitoring and managing method;
Fig. 2 is the flow diagram for arranging the method for Security Personnel;
Fig. 3 is the flow diagram for obtaining the method for location information of associated monitoring devices;
Fig. 4 is the flow diagram for arranging the method surrounded and seize;
Fig. 5 is the flow diagram for the method for arranging Security Personnel to be surrounded and seize;
Fig. 6 is the flow diagram of the quantity of Security Personnel needed for arranging and the method for position.
Specific embodiment
Below in conjunction with attached drawing, invention is further described in detail.
This specific embodiment is only explanation of the invention, is not limitation of the present invention, those skilled in the art
Member can according to need the modification that not creative contribution is made to the present embodiment after reading this specification, but as long as at this
All by the protection of Patent Law in the scope of the claims of invention.
The embodiment of the present invention provides a kind of wisdom security protection monitoring and managing method, comprising: obtains the monitoring for being set to institute's predeterminated position
The current monitor data information of device;From pre-set database, search and preset number corresponding to current monitor device
It is believed that breath;Monitoring data information includes personnel's image information;Preset data information includes preset personnel's image information;According to current
Analysis matching is carried out between personnel's image information and preset personnel's image information, if current persons' image information and preset personnel scheme
Picture information matches are unsuccessful, then store into database current persons' image information and define current persons' image information institute
Corresponding personnel are suspicion personnel;If personnel's image information of suspicion personnel is by same position within the default time cycle
The number that the monitoring device set is got is more than default number, then feeds back information warning.
In the embodiment of the present invention, according to personnel's image information accessed by monitoring device come with the preset people in database
Member image information be compared, if there is the nonnative personnel in no longer database, then the personnel be defined as suspicion personnel, but
It is that suspicion personnel may be take-away person or pass by personnel etc., therefore be filled according to suspicion personnel by the monitoring of same position
The number that gets is set to judge, if it exceeds preset number, illustrates that suspicion personnel pay close attention to, is passing through warning
Information carries out warning Security Personnel or warns security center.
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
In addition, the terms "and/or", only a kind of incidence relation for describing affiliated partner, indicates may exist
Three kinds of relationships, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.Separately
Outside, character "/" herein typicallys represent the relationship that forward-backward correlation object is a kind of "or" unless otherwise specified.
The embodiment of the present invention is described in further detail with reference to the accompanying drawings of the specification.
Referring to Figure 1, the embodiment of the present invention provides a kind of wisdom security protection monitoring and managing method, and the main flow description of method is such as
Under.
As shown in Figure 1:
Step 1100: obtaining the current monitor data information for being set to the monitoring device of institute's predeterminated position, monitoring data packet
Include personnel's image information.
Wherein, monitoring device is monitoring camera, is respectively provided with monitoring device by each doorway in the cell, so that peace
Guarantor person can supervise the case where entire cell, it is ensured that the personal safety of resident in cell.Have personnel occur when
The image information for capturing the face of the personnel is waited to facilitate subsequent comparison to analyze.
Step 1200: from pre-set database, lookup and preset data information corresponding to current monitor device,
Preset data information includes preset personnel's image information.
Wherein, the corresponding resident in each doorway, and every resident has corresponding personnel's subdata base, corresponding
Preset personnel's image information of typing before being stored in personnel's subdata base, to facilitate subsequent comparison.
Step 1300: analysis matching is carried out according between current persons' image information and preset personnel's image information, if working as
Preceding personnel's image information matches unsuccessful with preset personnel's image information, then stores current persons' image information to database
In and define personnel corresponding to current persons' image information be suspicion personnel.
Wherein, current persons' image information according to accessed by monitoring device and preset personnel's image information carry out face
Identification compares, and by discriminance analysis to judge whether to match, if it fails to match, illustrates that current personnel do not exist
In personnel's subdata base.
Step 1400: if personnel's image information of suspicion personnel is by same position within the default time cycle
The number that monitoring device is got is more than default number, then feeds back information warning.
Wherein, the default time cycle can be 1 hour, 2 hours, 3 hours, 4 hours, half a day, one day
Etc., it is preferably half a day in the present embodiment;Default number can be 1 time, 2 times, 3 times, 4 times etc., excellent in the present embodiment
It is selected as 3 times;Information warning can be sound information warning, light warning information, short message prompting message, pop-up prompting message etc.
Deng, several combinations being also possible in above-mentioned information warning, light warning information and pop-up are preferably used in the present embodiment
The combination of prompting message sends pop-up prompting message by way of light flash and in corresponding software APP to remind phase
Close Security Personnel or security center.
In order to reduce the danger of cell as far as possible, so Security Personnel is needed to check in the past, therefore according to the warning fed back
Information and nearby principle arrange Security Personnel to check with the position to associated monitoring devices.As shown in Fig. 2, specific arrangement
The method of Security Personnel is as follows:
Step 2100: obtain associated monitoring devices device location information and Security Personnel locating for personnel location information.
Wherein, the relevant instrument with GPS system is had with each Security Personnel, is obtained by GPS positioning
To personnel location information locating for the Security Personnel;In addition, as shown in figure 3, about the location information for obtaining associated monitoring devices
Method it is as follows:
Step 2110: obtaining the number data information of monitoring device;
Step 2120: from pre-set database, searching and device location information corresponding to number data information;Feedback
The acquired device location information of inquiry.
Wherein, number data information is the coding artificially carried out to monitoring device;It presets in the database corresponding
Monitoring device subdata base, in the monitoring device subdata base corresponding to the preparatory typing number of each monitoring device
Installation site so that only needing to obtain the corresponding number data information of monitoring device can be appreciated that corresponding to the monitoring device
Position.
Step 2200: from pre-set database, searching and obtain the path data information of current region.
Wherein, the routing database of cell is preset in the database, i.e., is stored in the routing database relevant
Path map data, so that the later period transfers use.
Step 2300: according to position corresponding to device location information and personnel location information and along path data
Path corresponding to information forms range information to calculate the distance between device location information and personnel location information.
Step 2400: range information corresponding to different Security Personnel being compared to each other to arrange the smallest peace of range information
Guarantor person.
Wherein, according to acquired device location information and the point of personnel location information, and in path data information
The path distance between two points is calculated, the shortest path as in Baidu map calculates, and to the distance of each Security Personnel
Information is compared, and the smallest Security Personnel of range information is selected to check in the past, realizes the function of arranging nearby.
If suspicion personnel determination is thief, is surrounded and seize, thief is avoided to escape, so according to correspondence
Triggering information is surrounded and seize in Security Personnel personnel triggering;As shown in figure 4, specifically arranging the method surrounded and seize as follows:
Step 3100: obtaining the current triggering information of current Security Personnel, triggering information includes surrounding and seize triggering information.
Wherein, this is surrounded and seize triggering information and can be obtained by mechanical key triggering, can also be touched by virtual key
Acquisition is sent, i.e., is triggered manually by current Security Personnel to realize and obtain the current triggering information.
Step 3200: from the corresponding relationship between pre-set, triggering information and command information, searching and current touching
The corresponding present instruction information of photos and sending messages;Command information includes that information is mutual corresponding surrounds and seize execution information with triggering is surrounded and seize.
Step 3300: being pacified according to position corresponding to execution information and feedback information warning is surrounded and seize with nearby principle arrangement
Guarantor person is surrounded and seize.
As shown in figure 5, the method that specific arrangement Security Personnel is surrounded and seize is as follows:
Step 3310: obtain associated monitoring devices device location information and Security Personnel locating for personnel location information.
Wherein, device location information and the acquisition modes of personnel location information and step 2100 and step 2110 are to step
Identical in rapid 2120, therefore, not repeat them here.
Step 3320: from pre-set database, searching and obtain the path data information of current region.
Wherein, the set-up mode of path data information and acquisition modes are identical as in step 2200, therefore do not go to live in the household of one's in-laws on getting married herein
It states.
Step 3330: according to position corresponding to device location information and personnel location information and along path data
Path corresponding to information forms range information to calculate the distance between device location information and personnel location information.
Step 3340: range information corresponding to different Security Personnel being compared to each other to form distance sequence letter
Breath, a number of Security Personnel is arranged according to distance sequencing information.
Wherein, as shown in fig. 6, the quantity of Security Personnel needed for arranging and the method for position are as follows:
Step 3341: obtaining the number data information of monitoring device.
Step 3342: from pre-set database, searching and device location information corresponding to number data information;
Device location information includes building location information and floor location information locating for equipment, and building location information includes several
Outlet information.
Step 3343: the quantity according to corresponding to outlet information is to arrange the Security Personnel of corresponding number.
Step 3344: according to position corresponding to different outlet informations and personnel location information and along number of path
It is believed that path corresponding to breath to calculate different the distance between outlet information and personnel location information, forms distance letter
Breath.
Step 3345: different Security Personnel being compared to each other from range information corresponding to different outlets, are arranged related
Outlet corresponding to the smallest Security Personnel of range information.
The embodiment of the present invention provides a kind of storage medium, and storage medium is stored with instruction set, which is suitable for a processing
Device is loaded and is executed including Fig. 1-Fig. 6.Each step in process.
Computer storage medium for example, USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM),
Random access memory (Random Access Memory, RAM), magnetic or disk etc. be various to can store program code
Medium.
Based on the same inventive concept, the embodiment of the present invention provides a kind of wisdom security protection supervisory systems, processor, for loading
And execute instruction collection;And such as above-mentioned storage medium.
It is apparent to those skilled in the art that for convenience and simplicity of description, only with above-mentioned each function
The division progress of module can according to need and for example, in practical application by above-mentioned function distribution by different function moulds
Block is completed, i.e., the internal structure of device is divided into different functional modules, to complete all or part of function described above
Energy.The specific work process of the system, apparatus, and unit of foregoing description, can be with reference to corresponding in preceding method embodiment
Journey, details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, module or unit
Division, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or group
Part can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown
Or the mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, device or unit it is indirect
Coupling or communication connection can be electrical property, mechanical or other forms.
Unit may or may not be physically separated as illustrated by the separation member, shown as a unit
Component may or may not be physical unit, it can and it is in one place, or may be distributed over multiple networks
On unit.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
It, can if integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product
To be stored in a computer readable storage medium.Based on this understanding, the technical solution of the application substantially or
Say that all or part of the part that contributes to existing technology or the technical solution can embody in the form of software products
Out, which is stored in a storage medium, including some instructions are used so that a computer equipment
(can be personal computer, server or the network equipment etc.) or processor (processor) execute each implementation of the application
The all or part of the steps of example method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory, arbitrary access
The various media that can store program code such as memory, magnetic or disk.
More than, above embodiments are only described in detail to the technical solution to the application, but above embodiments
Illustrate to be merely used to help understand method and its core concept of the invention, should not be construed as limiting the invention.This technology
In the technical scope disclosed by the present invention, any changes or substitutions that can be easily thought of by the technical staff in field, should all cover in this hair
Within bright protection scope.
Claims (10)
1. a kind of wisdom security protection monitoring and managing method, characterized in that include:
Obtain the current monitor data information for being set to the monitoring device of institute's predeterminated position;
From pre-set database, search and preset data information corresponding to current monitor device;The monitoring data
Information includes personnel's image information;The preset data information includes preset personnel's image information;
Analysis matching is carried out according between current persons' image information and preset personnel's image information, if current persons' image information
It is matched with preset personnel's image information unsuccessful, then current persons' image information is stored into database and defined and work as forefathers
Personnel corresponding to member's image information are suspicion personnel;
If personnel's image information of suspicion personnel is got by the monitoring device of same position within the default time cycle
Number be more than default number, then feed back information warning.
2. wisdom security protection monitoring and managing method according to claim 1, characterized in that according to the information warning fed back and just
Approximately principle arranges Security Personnel to check with the position to associated monitoring devices.
3. wisdom security protection monitoring and managing method according to claim 2, characterized in that
The method for arranging Security Personnel is as follows:
Obtain associated monitoring devices device location information and Security Personnel locating for personnel location information;
From pre-set database, the path data information of current region is searched and obtained;
According to position corresponding to device location information and personnel location information and along corresponding to path data information
Path forms range information to calculate the distance between device location information and personnel location information;
Range information corresponding to different Security Personnel is compared to each other to arrange the smallest Security Personnel of range information.
4. wisdom security protection monitoring and managing method according to claim 3, characterized in that
The method for obtaining the location information of associated monitoring devices is as follows:
Obtain the number data information of monitoring device;
From pre-set database, search and device location information corresponding to number data information;Feedback query is obtained
The device location information taken.
5. wisdom security protection monitoring and managing method according to claim 1, characterized in that include:
Obtain the current triggering information of current Security Personnel;
From the corresponding relationship between pre-set, triggering information and command information, search and the current triggering information pair
The present instruction information answered;The triggering information includes surrounding and seize triggering information, and described instruction information includes and surrounds and seize triggering information
It is mutual corresponding to surround and seize execution information;
It is enclosed according to position corresponding to execution information and feedback information warning is surrounded and seize with nearby principle arrangement Security Personnel
It catches.
6. wisdom security protection monitoring and managing method according to claim 5, characterized in that
The method for arranging Security Personnel is as follows:
Obtain associated monitoring devices device location information and Security Personnel locating for personnel location information;
From pre-set database, the path data information of current region is searched and obtained;
According to position corresponding to device location information and personnel location information and along corresponding to path data information
Path forms range information to calculate the distance between device location information and personnel location information;
Range information corresponding to different Security Personnel is compared to each other to form distance sequencing information, according to distance
Sequencing information arranges a number of Security Personnel.
7. wisdom security protection monitoring and managing method according to claim 6, characterized in that
The determination method of the quantity of Security Personnel needed for arranging is as follows:
Obtain the number data information of monitoring device;
From pre-set database, search and device location information corresponding to number data information;The device location
Information includes building location information and floor location information locating for equipment, and the building location information includes several outlet
Information;
The quantity according to corresponding to outlet information is to arrange the Security Personnel of corresponding number.
8. wisdom security protection monitoring and managing method according to claim 7, it is characterized in that:
According to position corresponding to different outlet informations and personnel location information and along corresponding to path data information
Path to calculate different the distance between outlet information and personnel location information, form range information;
Different Security Personnel are compared to each other from range information corresponding to different outlets, arrange relevant outlet corresponding away from
From the smallest Security Personnel of information.
9. a kind of storage medium, characterized in that it is stored with instruction set, and described instruction collection is suitable for a processor and loads and execute such as
Lower processing, comprising:
Obtain the current monitor data information for being set to the monitoring device of institute's predeterminated position;
From pre-set database, search and preset data information corresponding to current monitor device;The monitoring data
Information includes personnel's image information;The preset data information includes preset personnel's image information;
Analysis matching is carried out according between current persons' image information and preset personnel's image information, if current persons' image information
It is matched with preset personnel's image information unsuccessful, then current persons' image information is stored into database and defined and work as forefathers
Personnel corresponding to member's image information are suspicion personnel;
If personnel's image information of suspicion personnel is got by the monitoring device of same position within the default time cycle
Number be more than default number, then feed back information warning.
10. a kind of wisdom security protection supervisory systems, it is characterized in that: including:
Processor, for loading and executing instruction collection;And
Storage medium as claimed in claim 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910052332.7A CN109872482A (en) | 2019-01-21 | 2019-01-21 | Wisdom security protection monitoring and managing method, system and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910052332.7A CN109872482A (en) | 2019-01-21 | 2019-01-21 | Wisdom security protection monitoring and managing method, system and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109872482A true CN109872482A (en) | 2019-06-11 |
Family
ID=66917893
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910052332.7A Pending CN109872482A (en) | 2019-01-21 | 2019-01-21 | Wisdom security protection monitoring and managing method, system and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109872482A (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110458489A (en) * | 2019-07-05 | 2019-11-15 | 宁波海上鲜信息技术有限公司 | Chief storekeeper's method, system, storage medium and its intelligent terminal |
CN110533858A (en) * | 2019-09-07 | 2019-12-03 | 贵州中信宏业科技股份有限公司 | A kind of method for safety monitoring based on local area network |
CN110728815A (en) * | 2019-10-25 | 2020-01-24 | 深圳市商汤科技有限公司 | Early warning method and device based on video analysis, electronic equipment and storage medium |
CN110807393A (en) * | 2019-10-25 | 2020-02-18 | 深圳市商汤科技有限公司 | Early warning method and device based on video analysis, electronic equipment and storage medium |
CN111951507A (en) * | 2020-07-23 | 2020-11-17 | 昆山安盾网络科技有限公司 | Intelligent security comprehensive control system based on building automation |
CN112767196A (en) * | 2021-01-15 | 2021-05-07 | 森罗云科技(广州)有限公司 | Intelligent property management information sharing platform for smart community |
CN112818854A (en) * | 2021-02-01 | 2021-05-18 | 南通大学 | All-weather video person searching method applied to campus security |
CN112866647A (en) * | 2021-01-15 | 2021-05-28 | 森罗云科技(广州)有限公司 | Intelligent property management system based on smart community |
CN113222548A (en) * | 2021-05-18 | 2021-08-06 | 绿漫科技有限公司 | Community property eagle eye monitoring system and use method |
CN113393628A (en) * | 2021-05-10 | 2021-09-14 | 天津泰来勘测设计有限公司 | Intelligent monitoring alarm method, system, intelligent terminal and storage medium |
CN113807636A (en) * | 2021-04-12 | 2021-12-17 | 河北广电传智信息技术有限公司 | Region supervision method and device, electronic equipment and computer storage medium |
CN115272948A (en) * | 2022-05-20 | 2022-11-01 | 贵州丰立空间科技有限公司 | Intelligent security information system based on Internet of things |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102646197A (en) * | 2012-02-20 | 2012-08-22 | 华焦宝 | Pre-warning information issuing method and system |
CN102768736A (en) * | 2011-05-04 | 2012-11-07 | 永泰软件有限公司 | Police resource scheduling method based on optimal route |
CN103246869A (en) * | 2013-04-19 | 2013-08-14 | 福建亿榕信息技术有限公司 | Crime monitoring method based on face recognition technology and behavior and sound recognition |
CN103456147A (en) * | 2012-07-24 | 2013-12-18 | 陕西省公安厅 | Intelligent warning instance automatic identification mass texting system |
CN104376679A (en) * | 2014-11-24 | 2015-02-25 | 苏州立瓷电子技术有限公司 | Intelligent household pre-warning method |
CN105678247A (en) * | 2015-12-30 | 2016-06-15 | 武汉大学 | Abnormal behavior early warning method and system for hovering event space-time big data analysis |
CN105788282A (en) * | 2016-04-20 | 2016-07-20 | 青岛华高软件科技有限公司 | Smart traffic monitoring and arresting linked management method |
CN106128053A (en) * | 2016-07-18 | 2016-11-16 | 四川君逸数码科技股份有限公司 | A kind of wisdom gold eyeball identification personnel stay hover alarm method and device |
JP2017027568A (en) * | 2015-07-27 | 2017-02-02 | 守男 望月 | Shoplifting prevention warning system |
CN107563363A (en) * | 2017-10-18 | 2018-01-09 | 哈尔滨学院 | Capturing system based on day net engineering and facial recognition technology |
CN108039007A (en) * | 2017-12-26 | 2018-05-15 | 北斗七星(重庆)物联网技术有限公司 | A kind of safety protection method and device |
CN108053122A (en) * | 2017-12-18 | 2018-05-18 | 中国刑事警察学院 | A kind of police strength dispatching method and device |
CN108200405A (en) * | 2018-02-05 | 2018-06-22 | 成都伦索科技有限公司 | A kind of video monitoring system based on recognition of face |
CN108471518A (en) * | 2018-03-21 | 2018-08-31 | 东莞仲天电子科技有限公司 | A kind of command system applied to police service fusion |
CN108701393A (en) * | 2016-03-04 | 2018-10-23 | 伊瑞斯缇公司(公共) | System and method for event handling |
CN108922114A (en) * | 2018-06-22 | 2018-11-30 | 张小勇 | Security monitor method and system |
-
2019
- 2019-01-21 CN CN201910052332.7A patent/CN109872482A/en active Pending
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102768736A (en) * | 2011-05-04 | 2012-11-07 | 永泰软件有限公司 | Police resource scheduling method based on optimal route |
CN102646197A (en) * | 2012-02-20 | 2012-08-22 | 华焦宝 | Pre-warning information issuing method and system |
CN103456147A (en) * | 2012-07-24 | 2013-12-18 | 陕西省公安厅 | Intelligent warning instance automatic identification mass texting system |
CN103246869A (en) * | 2013-04-19 | 2013-08-14 | 福建亿榕信息技术有限公司 | Crime monitoring method based on face recognition technology and behavior and sound recognition |
CN104376679A (en) * | 2014-11-24 | 2015-02-25 | 苏州立瓷电子技术有限公司 | Intelligent household pre-warning method |
JP2017027568A (en) * | 2015-07-27 | 2017-02-02 | 守男 望月 | Shoplifting prevention warning system |
CN105678247A (en) * | 2015-12-30 | 2016-06-15 | 武汉大学 | Abnormal behavior early warning method and system for hovering event space-time big data analysis |
CN108701393A (en) * | 2016-03-04 | 2018-10-23 | 伊瑞斯缇公司(公共) | System and method for event handling |
CN105788282A (en) * | 2016-04-20 | 2016-07-20 | 青岛华高软件科技有限公司 | Smart traffic monitoring and arresting linked management method |
CN106128053A (en) * | 2016-07-18 | 2016-11-16 | 四川君逸数码科技股份有限公司 | A kind of wisdom gold eyeball identification personnel stay hover alarm method and device |
CN107563363A (en) * | 2017-10-18 | 2018-01-09 | 哈尔滨学院 | Capturing system based on day net engineering and facial recognition technology |
CN108053122A (en) * | 2017-12-18 | 2018-05-18 | 中国刑事警察学院 | A kind of police strength dispatching method and device |
CN108039007A (en) * | 2017-12-26 | 2018-05-15 | 北斗七星(重庆)物联网技术有限公司 | A kind of safety protection method and device |
CN108200405A (en) * | 2018-02-05 | 2018-06-22 | 成都伦索科技有限公司 | A kind of video monitoring system based on recognition of face |
CN108471518A (en) * | 2018-03-21 | 2018-08-31 | 东莞仲天电子科技有限公司 | A kind of command system applied to police service fusion |
CN108922114A (en) * | 2018-06-22 | 2018-11-30 | 张小勇 | Security monitor method and system |
Non-Patent Citations (3)
Title |
---|
杨冬琼: "《物业安保消防看图看板管理与问答》", 31 July 2014 * |
梅蓉: "《数字侦查技术教程》", 30 June 2016 * |
许锋等: "《视频现场勘查及应用》", 28 February 2018 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110458489A (en) * | 2019-07-05 | 2019-11-15 | 宁波海上鲜信息技术有限公司 | Chief storekeeper's method, system, storage medium and its intelligent terminal |
CN110533858A (en) * | 2019-09-07 | 2019-12-03 | 贵州中信宏业科技股份有限公司 | A kind of method for safety monitoring based on local area network |
CN110728815A (en) * | 2019-10-25 | 2020-01-24 | 深圳市商汤科技有限公司 | Early warning method and device based on video analysis, electronic equipment and storage medium |
CN110807393A (en) * | 2019-10-25 | 2020-02-18 | 深圳市商汤科技有限公司 | Early warning method and device based on video analysis, electronic equipment and storage medium |
CN111951507A (en) * | 2020-07-23 | 2020-11-17 | 昆山安盾网络科技有限公司 | Intelligent security comprehensive control system based on building automation |
CN112866647A (en) * | 2021-01-15 | 2021-05-28 | 森罗云科技(广州)有限公司 | Intelligent property management system based on smart community |
CN112767196A (en) * | 2021-01-15 | 2021-05-07 | 森罗云科技(广州)有限公司 | Intelligent property management information sharing platform for smart community |
CN112818854A (en) * | 2021-02-01 | 2021-05-18 | 南通大学 | All-weather video person searching method applied to campus security |
CN112818854B (en) * | 2021-02-01 | 2023-12-05 | 南通大学 | All-weather video person searching method applied to campus security |
CN113807636A (en) * | 2021-04-12 | 2021-12-17 | 河北广电传智信息技术有限公司 | Region supervision method and device, electronic equipment and computer storage medium |
CN113807636B (en) * | 2021-04-12 | 2024-04-09 | 河北广电传智信息技术有限公司 | Regional supervision method and device, electronic equipment and computer storage medium |
CN113393628A (en) * | 2021-05-10 | 2021-09-14 | 天津泰来勘测设计有限公司 | Intelligent monitoring alarm method, system, intelligent terminal and storage medium |
CN113222548A (en) * | 2021-05-18 | 2021-08-06 | 绿漫科技有限公司 | Community property eagle eye monitoring system and use method |
CN115272948A (en) * | 2022-05-20 | 2022-11-01 | 贵州丰立空间科技有限公司 | Intelligent security information system based on Internet of things |
CN115272948B (en) * | 2022-05-20 | 2023-02-17 | 贵州丰立空间科技有限公司 | Intelligent security information system based on Internet of things |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109872482A (en) | Wisdom security protection monitoring and managing method, system and storage medium | |
US11645904B2 (en) | Drone-augmented emergency response services | |
US11527149B2 (en) | Emergency alert system | |
US10726709B2 (en) | System and method for reporting the existence of sensors belonging to multiple organizations | |
CN109064698B (en) | Resident security early warning method and resident security early warning system | |
US10257469B2 (en) | Neighborhood camera linking system | |
US9607501B2 (en) | Systems and methods for providing emergency resources | |
US11011036B2 (en) | Object tracking using disparate monitoring systems | |
DK201500228A1 (en) | Smart alarm system with user confirmed video stream notification of psap in combination with data safety and public emergency involvement using smartphone agents | |
KR101841882B1 (en) | Unmanned Crime Prevention System and Method | |
CN202904839U (en) | Intelligent security system based on internet of things | |
US20180167585A1 (en) | Networked Camera | |
CN102184602B (en) | Bank automatic teller machine (ATM) and field facility narrow-band monitoring and warning system | |
US11600166B1 (en) | Occurrence-record driven monitoring system and method of use thereof | |
KR102084687B1 (en) | Security operation service method and system for detecting illegal photography | |
KR101664556B1 (en) | Social security network method and system | |
US20200265694A1 (en) | System for implementing an aerial security network | |
WO2014199173A1 (en) | Car park monitoring system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190611 |