CN110335433A - Applied to the management method of data center, device, medium and equipment - Google Patents

Applied to the management method of data center, device, medium and equipment Download PDF

Info

Publication number
CN110335433A
CN110335433A CN201910705519.2A CN201910705519A CN110335433A CN 110335433 A CN110335433 A CN 110335433A CN 201910705519 A CN201910705519 A CN 201910705519A CN 110335433 A CN110335433 A CN 110335433A
Authority
CN
China
Prior art keywords
personnel
legal
data center
image
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910705519.2A
Other languages
Chinese (zh)
Inventor
夏铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN201910705519.2A priority Critical patent/CN110335433A/en
Publication of CN110335433A publication Critical patent/CN110335433A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources

Abstract

Present disclose provides a kind of management methods applied to data center, comprising: obtains the image acquired in data center;In the case where including facial image in the picture, personnel identity is determined by recognition of face;Determine whether personnel identity is legal;In the case where determining that personnel identity is legal, the location of personnel are determined;Determine whether position is legal;If it is determined that personnel identity is illegal or position is illegal, then warning message is generated.The disclosure additionally provides a kind of applied to the managing device of data center, a kind of electronic equipment and a kind of computer readable storage medium.

Description

Applied to the management method of data center, device, medium and equipment
Technical field
The present invention relates to personal management technical field more particularly to it is a kind of applied to the management method of data center, device, Medium and equipment.
Background technique
The current personal management of data center mainly relies on access control system and scene to accompany for interior employee with nonnative personnel It is realized with management.
For interior employee, it is arranged by access permission, gives different personnel's difference computer room permissions, to ensure safety, is led to Normal access permission setting principle is minimization principle.But in actual work, internal staff's permission is usually that its department is whole Body permission, this extent of competence are usually much larger than staff's jurisdictions mandate needed for each specific works, at the same its Practical action path in data center can not manage, and when human accident such as occur or need to look back certain specific works, Expend a large amount of manpower and material resources carry out video resources, gate inhibition swipe the card record lookup, verify.
For nonnative personnel, usually interior employee initiates the application that nonnative personnel enters computer room, by interior after application agreement Portion personnel accompany nonnative personnel in the whole journey and complete related work.It needs to arrange a large amount of inside inside the period that is busy with one's work, data center Personnel carry out such simple, uninteresting personnel and accompany work, if retinue has interim arrangements, will bring to stranger employee The operation of larger impact, even data center brings security risk.
Summary of the invention
The first aspect of the disclosure provides a kind of management method applied to data center, comprising: obtains in the number According to the image acquired in center;In the case where including facial image in described image, personnel identity is determined by recognition of face; Determine whether the personnel identity is legal;In the case where determining that the personnel identity is legal, position locating for the personnel is determined It sets;Determine whether the position is legal;If it is determined that personnel identity is illegal or the position is illegal, then warning message is generated.
Optionally, the image acquired in the data center that obtains includes: to receive to lead to from image collecting device Cross the image that mobile detection is acquired in the data center.
Optionally, described to determine personnel identity includes: whether to judge personnel identity by recognition of face by recognition of face Belong to internal staff or registered external staff;If the whether legal determination personnel identity includes: personnel's body Part belongs to internal staff or registered external staff, it is determined that personnel identity is legal, otherwise determines that personnel identity is illegal.
Optionally, the location of described personnel of the determination comprise determining that the image collecting device of acquisition described image; Determine the position of described image acquisition device as the location of described personnel.
Optionally, whether the determination position is legal comprises determining that the possessed authority information of personnel, the permission letter Breath allows access at least one region of the data center;If the position belongs to the area that the authority information is allowed access into Domain, it is determined that the position is legal, and otherwise the position is illegal.
It optionally, should be applied to the management method of data center further include: raw based on the multiple images comprising same personnel At the track data of the personnel;Export the track data.
The second aspect of the disclosure provides a kind of managing device applied to data center, comprising: and image obtains module, For obtaining the image acquired in the data center;Identity determining module, for including facial image in described image In the case where, personnel identity is determined by recognition of face;Authentication module, for determining whether the personnel identity is legal; Position determination module, for determining the location of described personnel in the case where determining that the personnel identity is legal;Position is recognized Module is demonstrate,proved, for determining whether the position is legal;Alarm module, for determine that personnel identity is illegal or the position not In the case where legal, then warning message is generated.
Optionally, the managing device applied to data center further include: track generation module, for based on comprising same The multiple images of one personnel generate the track data of the personnel;Track output module, for exporting the track data.
The third aspect of the disclosure provides a kind of electronic equipment, comprising: processor;And memory, it is stored thereon with Computer-readable instruction makes processor execute above-mentioned method when described instruction is executed by processor.
The fourth aspect of the disclosure provides a kind of computer readable storage medium, is stored thereon with computer-readable finger It enables, processor is made to execute above-mentioned method when described instruction is executed by processor.
Present disclose provides a kind of applied to the management method of data center, device, medium and equipment, and this method passes through benefit With existing video monitoring system hardware, it is aided with mobile detection and face recognition technology, realizes to the visual of data center personnel Change, is unmanned, intelligentized management, improving the quality and efficiency of data center's operation, reducing personal management in data center Cost.
Detailed description of the invention
Fig. 1 diagrammatically illustrates the flow chart of the management method applied to data center according to the embodiment of the present disclosure;
Fig. 2 diagrammatically illustrates the process of the management method applied to data center according to another embodiment of the disclosure Figure;
Fig. 3 diagrammatically illustrates the block diagram of the managing device applied to data center according to the embodiment of the present disclosure;And
Fig. 4 diagrammatically illustrates the block diagram of the electronic equipment according to the embodiment of the present disclosure.
Specific embodiment
Hereinafter, will be described with reference to the accompanying drawings embodiment of the disclosure.However, it should be understood that these descriptions are only exemplary , and it is not intended to limit the scope of the present disclosure.In the following detailed description, to elaborate many specific thin convenient for explaining Section is to provide the comprehensive understanding to the embodiment of the present disclosure.It may be evident, however, that one or more embodiments are not having these specific thin It can also be carried out in the case where section.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to avoid Unnecessarily obscure the concept of the disclosure.
Term as used herein is not intended to limit the disclosure just for the sake of description specific embodiment.It uses herein The terms "include", "comprise" etc. show the presence of the feature, step, operation and/or component, but it is not excluded that in the presence of Or add other one or more features, step, operation or component.
There are all terms (including technical and scientific term) as used herein those skilled in the art to be generally understood Meaning, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification Meaning, without that should be explained with idealization or excessively mechanical mode.
It, in general should be according to this using statement as " at least one in A, B and C etc. " is similar to Field technical staff is generally understood the meaning of the statement to make an explanation (for example, " system at least one in A, B and C " Should include but is not limited to individually with A, individually with B, individually with C, with A and B, with A and C, have B and C, and/or System etc. with A, B, C).Using statement as " at least one in A, B or C etc. " is similar to, generally come Saying be generally understood the meaning of the statement according to those skilled in the art to make an explanation (for example, " having in A, B or C at least One system " should include but is not limited to individually with A, individually with B, individually with C, with A and B, have A and C, have B and C, and/or the system with A, B, C etc.).
Shown in the drawings of some block diagrams and/or flow chart.It should be understood that some sides in block diagram and/or flow chart Frame or combinations thereof can be realized by computer program instructions.These computer program instructions can be supplied to general purpose computer, The processor of special purpose computer or other programmable data processing units, so that these instructions are when executed by this processor can be with Creation is for realizing function/operation device illustrated in these block diagrams and/or flow chart.The technology of the disclosure can be hard The form of part and/or software (including firmware, microcode etc.) is realized.In addition, the technology of the disclosure, which can be taken, is stored with finger The form of computer program product on the computer readable storage medium of order, the computer program product is for instruction execution system System uses or instruction execution system is combined to use.
Fig. 1 diagrammatically illustrates the flow chart of the management method applied to data center according to the embodiment of the present disclosure.
As shown in Figure 1, this method may include operation S110~S160.
In operation S110, the image acquired in data center is obtained.
In the case where operation S120 includes facial image in the picture, personnel identity is determined by recognition of face.
In operation S130, determine whether above-noted persons' identity is legal.
The location of the personnel are determined in the case where determining that above-noted persons' identity is legal in operation S140.
In operation S150, determine whether the position is legal.
In operation S160, however, it is determined that personnel identity is illegal or position is illegal, then generates warning message.
The method of the embodiment of the present disclosure utilizes existing video monitoring system hardware, is aided with mobile detection and recognition of face skill Art, realize the quality that data center's operation is improved to the visualization of data center personnel, unmanned, intelligentized management and Efficiency reduces the cost of personal management in data center.
The above method is illustrated below with reference to embodiment illustrated in Figure 2.
Fig. 2 diagrammatically illustrates the process of the management method applied to data center according to another embodiment of the disclosure Figure.
In operation S110, the image acquired in data center is obtained.
Referring to Fig. 2, for example, can be operation S210, camera mobile detection.It receives and passes through shifting from image collecting device The image that dynamic detecting is acquired in data center.Data center is typically provided video monitoring system.Image collecting device can be view Frequency monitoring system, video monitoring system include multiple cameras being installed on inside data center.Multiple cameras can pass through Mobile detection acquires the scene inside data center, generates image, and the image of generation is sent to backstage and is handled.Wherein, Mobile detection technology, which refers to, will be dealt with device according to certain algorithm according to the image that different frame per second collects by camera It is calculated and compared, when picture changes, if someone passes by or camera lens is moved, the number being calculated can exceed threshold value And indicate that system can make corresponding processing automatically.
In the case where operation S120 includes facial image in the picture, personnel identity is determined by recognition of face.
Referring to Fig. 2, for example, can be operation S220, compares personal information and carry out recognition of face.If the image of above-mentioned acquisition Including facial image, judge whether personnel identity belongs to internal staff or registered external staff by recognition of face.Wherein, Internal staff's information 202 and registered external staff's information 201 can be pre-stored in third party system information resource database or video Monitoring system database etc..
In operation S130, for example, can be operation S230, judge whether personnel are legal.Referring to Fig. 2, by by face figure As being compared with the facial image in the internal staff's information 202 and registered external staff's information 201 prestored, thus really Whether the fixed personnel identity is legal.If the personnel identity belongs to internal staff or registered external staff, it is determined that Ren Yuanshen Part is legal, otherwise determines that personnel identity is illegal.If personnel identity is illegal, system alarm can star, to prompt safety Personnel in the data centers such as guard break in.
The location of the personnel are determined in the case where determining that above-noted persons' identity is legal in operation S140.
Referring to Fig. 2, for example, can be proofreaded for operation S240, personnel location information.If by above-mentioned judgement find into The identity for entering the personnel of data center is legal, then according to prestoring in the movement track of the personnel and workflow system 203 Personnel's legal position carries out a step and judges whether the location of its be legal.It determines the image collecting device of acquisition image, determines The position of image collecting device is as the location of personnel.For example, video monitoring system can be acquired comprising same personnel's Multiple images, each image can illustrate the position of personnel's time or certain time, and then generate the movement track of personnel 206, and track data is exported, and carry out the storage of personnel's track data in operation S280.
In operation S150, determine whether the position is legal.
Referring to Fig. 2, for example, can be operation S250, judge whether position is legal.Determine the possessed authority information of personnel, Authority information allows access at least one region of data center, if position belongs to the region that authority information is allowed access into, Determine that position is legal, otherwise position is illegal.Wherein, the authority information of the personnel can be stored in workflow system 203 In.Personnel can be set with movable authority information namely legal position according to rank, the department etc. of personnel, and be prestored In workflow system 203.By track data personnel's mobile message 204 for being included that video monitoring system acquires with prestore The authority information of the personnel in workflow system 203 namely legitimate activity position are compared, to confirm its rail of taking action Whether mark is legal.If its movable position belongs to the region that authority information is allowed access into, it is determined that position is legal, otherwise position It is illegal.
In operation S160, however, it is determined that personnel identity is illegal or position is illegal, then generates warning message.
Referring to fig. 2, for example, can be operation S260, system alarm.If personnel positions are illegal, system can star Alarm, to prompt the personnel in the data centers such as security guard to break in.
Information above, such as the video data 205 of video monitoring system acquisition, executable operation S270, system demonstration Video, personnel track.Namely video data 205 and personnel's movement track 206 of operation S280 storage can be in personal managements Visualization display is carried out on the interface of system etc., which can connect with External memory equipment or it is internal preset There is storage system, information above can be stored in storage system or External memory equipment, for administrative staff's calling.
Based on the same inventive concept, the embodiment of the present disclosure additionally provides a kind of managing device applied to data center, under Face combines Fig. 3 that the managing device applied to data center of the embodiment of the present disclosure is introduced.
Fig. 3 diagrammatically illustrates the block diagram of the managing device 300 applied to data center according to the embodiment of the present disclosure.It should Managing device 300 applied to data center includes: that image obtains module 310, identity determining module 320, authentication module 330, position determination module 340, location-authentication module 350 and alarm module 360.
Image obtains module 310 and for example executes the operation S110 with reference to figure 1 above description, for obtaining in the data The image of intracardiac acquisition.
Identity determining module 320 for example executes the operation S120 with reference to figure 1 above description, in the picture including face In the case where image, personnel identity is determined by recognition of face.
Authentication module 330 for example executes the operation S130 with reference to figure 1 above description, for whether determining personnel identity It is legal.
Position determination module 340 for example executes the operation S140 with reference to figure 1 above description, for determining personnel identity conjunction In the case where method, the location of personnel are determined.
Location-authentication module 350 for example executes the operation S150 with reference to figure 1 above description, for determining whether position closes Method.
Alarm module 360 for example executes the operation S160 with reference to figure 1 above description, for determining that personnel identity is illegal Or in the illegal situation in position, then generate warning message.
This is applied to the managing device of data center further include: track generation module 370 and track output module 380.
Track generation module 370, for generating the track data of personnel based on the multiple images comprising same personnel.
Track output module 380 is used for output trajectory data.
It is module according to an embodiment of the present disclosure, submodule, unit, any number of or in which any more in subelement A at least partly function can be realized in a module.It is single according to the module of the embodiment of the present disclosure, submodule, unit, son Any one or more in member can be split into multiple modules to realize.According to the module of the embodiment of the present disclosure, submodule, Any one or more in unit, subelement can at least be implemented partly as hardware circuit, such as field programmable gate Array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, the system in encapsulation, dedicated integrated electricity Road (ASIC), or can be by the hardware or firmware for any other rational method for integrate or encapsulate to circuit come real Show, or with any one in three kinds of software, hardware and firmware implementations or with wherein any several appropriately combined next reality It is existing.Alternatively, can be at least by part according to one or more of the module of the embodiment of the present disclosure, submodule, unit, subelement Ground is embodied as computer program module, when the computer program module is run, can execute corresponding function.
Fig. 4 diagrammatically illustrates the side of the electronic equipment for being adapted for carrying out method as described above according to the embodiment of the present disclosure Block diagram.Electronic equipment shown in Fig. 4 is only an example, should not function to the embodiment of the present disclosure and use scope bring and appoint What is limited.
As shown in figure 4, the present invention provides a kind of electronic equipment 400, including processor 410 and memory 420, the electricity Sub- equipment 400 can execute according to the method for the embodiment of the present invention.
Specifically, processor 410 for example may include general purpose microprocessor, instruction set processor and/or related chip group And/or special microprocessor (for example, specific integrated circuit (ASIC)), etc..Processor 410 can also include using for caching The onboard storage device on way.Processor 410 can be for executing the different movements of process according to the method for the embodiment of the present invention Single treatment unit either multiple processing units.
Memory 420, such as can be the arbitrary medium can include, store, transmitting, propagating or transmitting instruction.For example, Readable storage medium storing program for executing can include but is not limited to electricity, magnetic, optical, electromagnetic, infrared or semiconductor system, device, device or propagate Jie Matter.The specific example of readable storage medium storing program for executing includes: magnetic memory apparatus, such as tape or hard disk (HDD);Light storage device, such as CD (CD-ROM);Memory, such as random access memory (RAM) or flash memory;And/or wire/wireless communication link.
Memory 420 may include computer program 421, which may include that code/computer can be held Row instruction, by processor 410 execute when make processor 410 execute for example above the embodiment of the present invention method flow and Its any deformation.
Computer program 421 can be configured to have the computer program code for example including computer program module.Example Such as, in the exemplary embodiment, the code in computer program 421 may include one or more program modules, for example including 421A, module 421B ....It should be noted that the division mode and number of module are not fixation, those skilled in the art can To be combined according to the actual situation using suitable program module or program module, when these program modules are combined by processor 410 When execution, processor 410 is executed for example above in conjunction with the method flow of the embodiment of the present invention and its any deformation.
The disclosure additionally provides a kind of computer-readable medium, which, which can be in above-described embodiment, retouches Included in the equipment/device/system stated;It is also possible to individualism, and without in the supplying equipment/device/system.On It states computer-readable medium and carries one or more program, when said one or multiple programs are performed, realize root According to the method for the embodiment of the present application.
According to an embodiment of the present application, computer-readable medium can be computer-readable signal media or computer can Read storage medium either the two any combination.Computer readable storage medium for example can be --- but it is unlimited In system, device or the device of --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or any above combination.It calculates The more specific example of machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, portable of one or more conducting wires Formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device or The above-mentioned any appropriate combination of person.In this application, computer readable storage medium can be it is any include or storage program Tangible medium, which can be commanded execution system, device or device use or in connection.And in this Shen Please in, computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, In carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limited to Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable Any computer-readable medium other than storage medium, the computer-readable medium can send, propagate or transmit for by Instruction execution system, device or device use or program in connection.The journey for including on computer-readable medium Sequence code can transmit with any suitable medium, including but not limited to: wireless, wired, optical cable, radiofrequency signal etc., or Above-mentioned any appropriate combination.
Particular embodiments described above has carried out further in detail the purpose of the present invention, technical scheme and beneficial effects It describes in detail bright, it should be understood that the above is only a specific embodiment of the present invention, is not intended to restrict the invention, it is all Within the spirit and principles in the present invention, any modification, equivalent substitution, improvement and etc. done should be included in guarantor of the invention Within the scope of shield.

Claims (10)

1. a kind of management method applied to data center, comprising:
Obtain the image acquired in the data center;
In the case where including facial image in described image, personnel identity is determined by recognition of face;
Determine whether the personnel identity is legal;
In the case where determining that the personnel identity is legal, the location of described personnel are determined;
Determine whether the position is legal;
If it is determined that personnel identity is illegal or the position is illegal, then warning message is generated.
2. according to the method described in claim 1, wherein, the image acquired in the data center that obtains includes:
It receives and passes through the image that mobile detection is acquired in the data center from image collecting device.
3. according to the method described in claim 1, wherein,
It is described to determine that personnel identity includes: to judge whether personnel identity belongs to internal staff by recognition of face by recognition of face Or registered external staff;
If the whether legal determination personnel identity includes: that the personnel identity belongs to internal staff or registered outside Personnel, it is determined that personnel identity is legal, otherwise determines that personnel identity is illegal.
4. according to the method described in claim 1, wherein, the location of described described personnel of determination include:
Determine the image collecting device of acquisition described image;
Determine the position of described image acquisition device as the location of described personnel.
5. according to the method described in claim 1, wherein, whether the determination position is legal to include:
Determine that the possessed authority information of personnel, the authority information allow access at least one region of the data center;
If the position belongs to the region that the authority information is allowed access into, it is determined that the position is legal, otherwise institute's rheme It sets illegal.
6. according to the method described in claim 1, further include:
Based on the multiple images comprising same personnel, the track data of the personnel is generated;
Export the track data.
7. a kind of managing device applied to data center, comprising:
Image obtains module, for obtaining the image acquired in the data center;
Identity determining module determines personnel's body by recognition of face in the case where for including facial image in described image Part;
Authentication module, for determining whether the personnel identity is legal;
Position determination module, for determining the location of described personnel in the case where determining that the personnel identity is legal;
Location-authentication module, for determining whether the position is legal;
Alarm module, in the case where determining that personnel identity is illegal or the illegal situation in position, then generating warning message.
8. device according to claim 7, further includes:
Track generation module, for generating the track data of the personnel based on the multiple images comprising same personnel;
Track output module, for exporting the track data.
9. a kind of electronic equipment, comprising:
Processor;And
Memory, is stored thereon with computer-readable instruction, and processor perform claim is made when described instruction is executed by processor It is required that method described in any one of 1~6.
10. a kind of computer readable storage medium is stored thereon with computer-readable instruction, when described instruction is executed by processor So that method described in any one of processor perform claim requirement 1~6.
CN201910705519.2A 2019-07-31 2019-07-31 Applied to the management method of data center, device, medium and equipment Pending CN110335433A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910705519.2A CN110335433A (en) 2019-07-31 2019-07-31 Applied to the management method of data center, device, medium and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910705519.2A CN110335433A (en) 2019-07-31 2019-07-31 Applied to the management method of data center, device, medium and equipment

Publications (1)

Publication Number Publication Date
CN110335433A true CN110335433A (en) 2019-10-15

Family

ID=68148235

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910705519.2A Pending CN110335433A (en) 2019-07-31 2019-07-31 Applied to the management method of data center, device, medium and equipment

Country Status (1)

Country Link
CN (1) CN110335433A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112765574A (en) * 2019-10-21 2021-05-07 深圳云天励飞技术有限公司 Identity verification method, device and system, power equipment and storage medium
CN113033836A (en) * 2021-03-04 2021-06-25 南方电网深圳数字电网研究院有限公司 Safety management method based on transformer substation, terminal equipment and storage medium
CN113742666A (en) * 2021-07-22 2021-12-03 南方电网深圳数字电网研究院有限公司 Transformer substation management method and system, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060204055A1 (en) * 2003-06-26 2006-09-14 Eran Steinberg Digital image processing using face detection information
CN201708856U (en) * 2009-11-23 2011-01-12 深圳市宾利达智能科技有限公司 Intelligent identification monitoring device
CN202159392U (en) * 2011-07-08 2012-03-07 李东风 Position tracking early warning system based on network of things
CN203746187U (en) * 2014-03-25 2014-07-30 南京信息工程大学 Security alarm system
CN206726418U (en) * 2017-04-28 2017-12-08 成都志博科技有限公司 Based on the fatigue detecting system in vehicle traveling process
CN107886046A (en) * 2017-09-29 2018-04-06 深圳高速工程顾问有限公司 Alarm trigger method, apparatus, computer equipment and storage medium for monitoring
CN109841022A (en) * 2018-11-29 2019-06-04 广州紫川物联网科技有限公司 A kind of target motion track detecting/warning method, system and storage medium
CN109948479A (en) * 2019-03-06 2019-06-28 百度在线网络技术(北京)有限公司 Monitoring method, device and the equipment of factory

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060204055A1 (en) * 2003-06-26 2006-09-14 Eran Steinberg Digital image processing using face detection information
CN201708856U (en) * 2009-11-23 2011-01-12 深圳市宾利达智能科技有限公司 Intelligent identification monitoring device
CN202159392U (en) * 2011-07-08 2012-03-07 李东风 Position tracking early warning system based on network of things
CN203746187U (en) * 2014-03-25 2014-07-30 南京信息工程大学 Security alarm system
CN206726418U (en) * 2017-04-28 2017-12-08 成都志博科技有限公司 Based on the fatigue detecting system in vehicle traveling process
CN107886046A (en) * 2017-09-29 2018-04-06 深圳高速工程顾问有限公司 Alarm trigger method, apparatus, computer equipment and storage medium for monitoring
CN109841022A (en) * 2018-11-29 2019-06-04 广州紫川物联网科技有限公司 A kind of target motion track detecting/warning method, system and storage medium
CN109948479A (en) * 2019-03-06 2019-06-28 百度在线网络技术(北京)有限公司 Monitoring method, device and the equipment of factory

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112765574A (en) * 2019-10-21 2021-05-07 深圳云天励飞技术有限公司 Identity verification method, device and system, power equipment and storage medium
CN112765574B (en) * 2019-10-21 2023-05-19 深圳云天励飞技术有限公司 Identity verification method and device, system, power equipment and storage medium
CN113033836A (en) * 2021-03-04 2021-06-25 南方电网深圳数字电网研究院有限公司 Safety management method based on transformer substation, terminal equipment and storage medium
CN113742666A (en) * 2021-07-22 2021-12-03 南方电网深圳数字电网研究院有限公司 Transformer substation management method and system, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110335433A (en) Applied to the management method of data center, device, medium and equipment
CN109902659B (en) Method and apparatus for processing human body image
US20200201966A1 (en) Biometric based self-sovereign information management
US20170124421A1 (en) Verification of images captured using a timestamp decoded from illumination from a modulated light source
US20210287469A1 (en) System and method for provisioning a facial recognition-based system for controlling access to a building
US11960583B2 (en) Biometric based self-sovereign information management based on reverse information search
US11196740B2 (en) Method and system for secure information validation
US20190147155A1 (en) Method of remotely identifying a physical person in asynchronous mode, aimed at the release of an advanced electronic signature, qualified electronic signature or digital identity
CN107785073A (en) Medical examination result-sharing methods, devices and systems based on block chain
CN109948320B (en) Block chain-based identity recognition management method, device, medium and electronic equipment
CN110036391A (en) Bulk of optical feedback for visual identity certification
US20160196728A1 (en) Method and system for detecting a security breach in an organization
CN104240013A (en) Door access control method and door access control platform
CN111553266A (en) Identification verification method and device and electronic equipment
CN103458225A (en) Surveillance including a modified video data stream
CN111259682B (en) Method and device for monitoring safety of construction site
KR101400168B1 (en) Three-dimensional virtual security control system using 360 degree stereoscopic camera, and method thereof
CN109325460B (en) A kind of face identification method, optical center scaling method and terminal
CN104240014A (en) Door access control method and door access control platform
CN109871791A (en) Image processing method and device
CN109961472A (en) Method, system, storage medium and the electronic equipment that 3D thermodynamic chart generates
CN108364029A (en) Method and apparatus for generating model
CN109739344A (en) Unlocking method, device, equipment and storage medium based on eyeball moving track
CN111444490A (en) Identity recognition method and device, computer equipment and storage medium
CN106548059A (en) The method of teacher, head of a family's mobile terminal and head of a family's authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191015