CN110335433A - Applied to the management method of data center, device, medium and equipment - Google Patents
Applied to the management method of data center, device, medium and equipment Download PDFInfo
- Publication number
- CN110335433A CN110335433A CN201910705519.2A CN201910705519A CN110335433A CN 110335433 A CN110335433 A CN 110335433A CN 201910705519 A CN201910705519 A CN 201910705519A CN 110335433 A CN110335433 A CN 110335433A
- Authority
- CN
- China
- Prior art keywords
- personnel
- legal
- data center
- image
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/181—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
Abstract
Present disclose provides a kind of management methods applied to data center, comprising: obtains the image acquired in data center;In the case where including facial image in the picture, personnel identity is determined by recognition of face;Determine whether personnel identity is legal;In the case where determining that personnel identity is legal, the location of personnel are determined;Determine whether position is legal;If it is determined that personnel identity is illegal or position is illegal, then warning message is generated.The disclosure additionally provides a kind of applied to the managing device of data center, a kind of electronic equipment and a kind of computer readable storage medium.
Description
Technical field
The present invention relates to personal management technical field more particularly to it is a kind of applied to the management method of data center, device,
Medium and equipment.
Background technique
The current personal management of data center mainly relies on access control system and scene to accompany for interior employee with nonnative personnel
It is realized with management.
For interior employee, it is arranged by access permission, gives different personnel's difference computer room permissions, to ensure safety, is led to
Normal access permission setting principle is minimization principle.But in actual work, internal staff's permission is usually that its department is whole
Body permission, this extent of competence are usually much larger than staff's jurisdictions mandate needed for each specific works, at the same its
Practical action path in data center can not manage, and when human accident such as occur or need to look back certain specific works,
Expend a large amount of manpower and material resources carry out video resources, gate inhibition swipe the card record lookup, verify.
For nonnative personnel, usually interior employee initiates the application that nonnative personnel enters computer room, by interior after application agreement
Portion personnel accompany nonnative personnel in the whole journey and complete related work.It needs to arrange a large amount of inside inside the period that is busy with one's work, data center
Personnel carry out such simple, uninteresting personnel and accompany work, if retinue has interim arrangements, will bring to stranger employee
The operation of larger impact, even data center brings security risk.
Summary of the invention
The first aspect of the disclosure provides a kind of management method applied to data center, comprising: obtains in the number
According to the image acquired in center;In the case where including facial image in described image, personnel identity is determined by recognition of face;
Determine whether the personnel identity is legal;In the case where determining that the personnel identity is legal, position locating for the personnel is determined
It sets;Determine whether the position is legal;If it is determined that personnel identity is illegal or the position is illegal, then warning message is generated.
Optionally, the image acquired in the data center that obtains includes: to receive to lead to from image collecting device
Cross the image that mobile detection is acquired in the data center.
Optionally, described to determine personnel identity includes: whether to judge personnel identity by recognition of face by recognition of face
Belong to internal staff or registered external staff;If the whether legal determination personnel identity includes: personnel's body
Part belongs to internal staff or registered external staff, it is determined that personnel identity is legal, otherwise determines that personnel identity is illegal.
Optionally, the location of described personnel of the determination comprise determining that the image collecting device of acquisition described image;
Determine the position of described image acquisition device as the location of described personnel.
Optionally, whether the determination position is legal comprises determining that the possessed authority information of personnel, the permission letter
Breath allows access at least one region of the data center;If the position belongs to the area that the authority information is allowed access into
Domain, it is determined that the position is legal, and otherwise the position is illegal.
It optionally, should be applied to the management method of data center further include: raw based on the multiple images comprising same personnel
At the track data of the personnel;Export the track data.
The second aspect of the disclosure provides a kind of managing device applied to data center, comprising: and image obtains module,
For obtaining the image acquired in the data center;Identity determining module, for including facial image in described image
In the case where, personnel identity is determined by recognition of face;Authentication module, for determining whether the personnel identity is legal;
Position determination module, for determining the location of described personnel in the case where determining that the personnel identity is legal;Position is recognized
Module is demonstrate,proved, for determining whether the position is legal;Alarm module, for determine that personnel identity is illegal or the position not
In the case where legal, then warning message is generated.
Optionally, the managing device applied to data center further include: track generation module, for based on comprising same
The multiple images of one personnel generate the track data of the personnel;Track output module, for exporting the track data.
The third aspect of the disclosure provides a kind of electronic equipment, comprising: processor;And memory, it is stored thereon with
Computer-readable instruction makes processor execute above-mentioned method when described instruction is executed by processor.
The fourth aspect of the disclosure provides a kind of computer readable storage medium, is stored thereon with computer-readable finger
It enables, processor is made to execute above-mentioned method when described instruction is executed by processor.
Present disclose provides a kind of applied to the management method of data center, device, medium and equipment, and this method passes through benefit
With existing video monitoring system hardware, it is aided with mobile detection and face recognition technology, realizes to the visual of data center personnel
Change, is unmanned, intelligentized management, improving the quality and efficiency of data center's operation, reducing personal management in data center
Cost.
Detailed description of the invention
Fig. 1 diagrammatically illustrates the flow chart of the management method applied to data center according to the embodiment of the present disclosure;
Fig. 2 diagrammatically illustrates the process of the management method applied to data center according to another embodiment of the disclosure
Figure;
Fig. 3 diagrammatically illustrates the block diagram of the managing device applied to data center according to the embodiment of the present disclosure;And
Fig. 4 diagrammatically illustrates the block diagram of the electronic equipment according to the embodiment of the present disclosure.
Specific embodiment
Hereinafter, will be described with reference to the accompanying drawings embodiment of the disclosure.However, it should be understood that these descriptions are only exemplary
, and it is not intended to limit the scope of the present disclosure.In the following detailed description, to elaborate many specific thin convenient for explaining
Section is to provide the comprehensive understanding to the embodiment of the present disclosure.It may be evident, however, that one or more embodiments are not having these specific thin
It can also be carried out in the case where section.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to avoid
Unnecessarily obscure the concept of the disclosure.
Term as used herein is not intended to limit the disclosure just for the sake of description specific embodiment.It uses herein
The terms "include", "comprise" etc. show the presence of the feature, step, operation and/or component, but it is not excluded that in the presence of
Or add other one or more features, step, operation or component.
There are all terms (including technical and scientific term) as used herein those skilled in the art to be generally understood
Meaning, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification
Meaning, without that should be explained with idealization or excessively mechanical mode.
It, in general should be according to this using statement as " at least one in A, B and C etc. " is similar to
Field technical staff is generally understood the meaning of the statement to make an explanation (for example, " system at least one in A, B and C "
Should include but is not limited to individually with A, individually with B, individually with C, with A and B, with A and C, have B and C, and/or
System etc. with A, B, C).Using statement as " at least one in A, B or C etc. " is similar to, generally come
Saying be generally understood the meaning of the statement according to those skilled in the art to make an explanation (for example, " having in A, B or C at least
One system " should include but is not limited to individually with A, individually with B, individually with C, with A and B, have A and C, have
B and C, and/or the system with A, B, C etc.).
Shown in the drawings of some block diagrams and/or flow chart.It should be understood that some sides in block diagram and/or flow chart
Frame or combinations thereof can be realized by computer program instructions.These computer program instructions can be supplied to general purpose computer,
The processor of special purpose computer or other programmable data processing units, so that these instructions are when executed by this processor can be with
Creation is for realizing function/operation device illustrated in these block diagrams and/or flow chart.The technology of the disclosure can be hard
The form of part and/or software (including firmware, microcode etc.) is realized.In addition, the technology of the disclosure, which can be taken, is stored with finger
The form of computer program product on the computer readable storage medium of order, the computer program product is for instruction execution system
System uses or instruction execution system is combined to use.
Fig. 1 diagrammatically illustrates the flow chart of the management method applied to data center according to the embodiment of the present disclosure.
As shown in Figure 1, this method may include operation S110~S160.
In operation S110, the image acquired in data center is obtained.
In the case where operation S120 includes facial image in the picture, personnel identity is determined by recognition of face.
In operation S130, determine whether above-noted persons' identity is legal.
The location of the personnel are determined in the case where determining that above-noted persons' identity is legal in operation S140.
In operation S150, determine whether the position is legal.
In operation S160, however, it is determined that personnel identity is illegal or position is illegal, then generates warning message.
The method of the embodiment of the present disclosure utilizes existing video monitoring system hardware, is aided with mobile detection and recognition of face skill
Art, realize the quality that data center's operation is improved to the visualization of data center personnel, unmanned, intelligentized management and
Efficiency reduces the cost of personal management in data center.
The above method is illustrated below with reference to embodiment illustrated in Figure 2.
Fig. 2 diagrammatically illustrates the process of the management method applied to data center according to another embodiment of the disclosure
Figure.
In operation S110, the image acquired in data center is obtained.
Referring to Fig. 2, for example, can be operation S210, camera mobile detection.It receives and passes through shifting from image collecting device
The image that dynamic detecting is acquired in data center.Data center is typically provided video monitoring system.Image collecting device can be view
Frequency monitoring system, video monitoring system include multiple cameras being installed on inside data center.Multiple cameras can pass through
Mobile detection acquires the scene inside data center, generates image, and the image of generation is sent to backstage and is handled.Wherein,
Mobile detection technology, which refers to, will be dealt with device according to certain algorithm according to the image that different frame per second collects by camera
It is calculated and compared, when picture changes, if someone passes by or camera lens is moved, the number being calculated can exceed threshold value
And indicate that system can make corresponding processing automatically.
In the case where operation S120 includes facial image in the picture, personnel identity is determined by recognition of face.
Referring to Fig. 2, for example, can be operation S220, compares personal information and carry out recognition of face.If the image of above-mentioned acquisition
Including facial image, judge whether personnel identity belongs to internal staff or registered external staff by recognition of face.Wherein,
Internal staff's information 202 and registered external staff's information 201 can be pre-stored in third party system information resource database or video
Monitoring system database etc..
In operation S130, for example, can be operation S230, judge whether personnel are legal.Referring to Fig. 2, by by face figure
As being compared with the facial image in the internal staff's information 202 and registered external staff's information 201 prestored, thus really
Whether the fixed personnel identity is legal.If the personnel identity belongs to internal staff or registered external staff, it is determined that Ren Yuanshen
Part is legal, otherwise determines that personnel identity is illegal.If personnel identity is illegal, system alarm can star, to prompt safety
Personnel in the data centers such as guard break in.
The location of the personnel are determined in the case where determining that above-noted persons' identity is legal in operation S140.
Referring to Fig. 2, for example, can be proofreaded for operation S240, personnel location information.If by above-mentioned judgement find into
The identity for entering the personnel of data center is legal, then according to prestoring in the movement track of the personnel and workflow system 203
Personnel's legal position carries out a step and judges whether the location of its be legal.It determines the image collecting device of acquisition image, determines
The position of image collecting device is as the location of personnel.For example, video monitoring system can be acquired comprising same personnel's
Multiple images, each image can illustrate the position of personnel's time or certain time, and then generate the movement track of personnel
206, and track data is exported, and carry out the storage of personnel's track data in operation S280.
In operation S150, determine whether the position is legal.
Referring to Fig. 2, for example, can be operation S250, judge whether position is legal.Determine the possessed authority information of personnel,
Authority information allows access at least one region of data center, if position belongs to the region that authority information is allowed access into,
Determine that position is legal, otherwise position is illegal.Wherein, the authority information of the personnel can be stored in workflow system 203
In.Personnel can be set with movable authority information namely legal position according to rank, the department etc. of personnel, and be prestored
In workflow system 203.By track data personnel's mobile message 204 for being included that video monitoring system acquires with prestore
The authority information of the personnel in workflow system 203 namely legitimate activity position are compared, to confirm its rail of taking action
Whether mark is legal.If its movable position belongs to the region that authority information is allowed access into, it is determined that position is legal, otherwise position
It is illegal.
In operation S160, however, it is determined that personnel identity is illegal or position is illegal, then generates warning message.
Referring to fig. 2, for example, can be operation S260, system alarm.If personnel positions are illegal, system can star
Alarm, to prompt the personnel in the data centers such as security guard to break in.
Information above, such as the video data 205 of video monitoring system acquisition, executable operation S270, system demonstration
Video, personnel track.Namely video data 205 and personnel's movement track 206 of operation S280 storage can be in personal managements
Visualization display is carried out on the interface of system etc., which can connect with External memory equipment or it is internal preset
There is storage system, information above can be stored in storage system or External memory equipment, for administrative staff's calling.
Based on the same inventive concept, the embodiment of the present disclosure additionally provides a kind of managing device applied to data center, under
Face combines Fig. 3 that the managing device applied to data center of the embodiment of the present disclosure is introduced.
Fig. 3 diagrammatically illustrates the block diagram of the managing device 300 applied to data center according to the embodiment of the present disclosure.It should
Managing device 300 applied to data center includes: that image obtains module 310, identity determining module 320, authentication module
330, position determination module 340, location-authentication module 350 and alarm module 360.
Image obtains module 310 and for example executes the operation S110 with reference to figure 1 above description, for obtaining in the data
The image of intracardiac acquisition.
Identity determining module 320 for example executes the operation S120 with reference to figure 1 above description, in the picture including face
In the case where image, personnel identity is determined by recognition of face.
Authentication module 330 for example executes the operation S130 with reference to figure 1 above description, for whether determining personnel identity
It is legal.
Position determination module 340 for example executes the operation S140 with reference to figure 1 above description, for determining personnel identity conjunction
In the case where method, the location of personnel are determined.
Location-authentication module 350 for example executes the operation S150 with reference to figure 1 above description, for determining whether position closes
Method.
Alarm module 360 for example executes the operation S160 with reference to figure 1 above description, for determining that personnel identity is illegal
Or in the illegal situation in position, then generate warning message.
This is applied to the managing device of data center further include: track generation module 370 and track output module 380.
Track generation module 370, for generating the track data of personnel based on the multiple images comprising same personnel.
Track output module 380 is used for output trajectory data.
It is module according to an embodiment of the present disclosure, submodule, unit, any number of or in which any more in subelement
A at least partly function can be realized in a module.It is single according to the module of the embodiment of the present disclosure, submodule, unit, son
Any one or more in member can be split into multiple modules to realize.According to the module of the embodiment of the present disclosure, submodule,
Any one or more in unit, subelement can at least be implemented partly as hardware circuit, such as field programmable gate
Array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, the system in encapsulation, dedicated integrated electricity
Road (ASIC), or can be by the hardware or firmware for any other rational method for integrate or encapsulate to circuit come real
Show, or with any one in three kinds of software, hardware and firmware implementations or with wherein any several appropriately combined next reality
It is existing.Alternatively, can be at least by part according to one or more of the module of the embodiment of the present disclosure, submodule, unit, subelement
Ground is embodied as computer program module, when the computer program module is run, can execute corresponding function.
Fig. 4 diagrammatically illustrates the side of the electronic equipment for being adapted for carrying out method as described above according to the embodiment of the present disclosure
Block diagram.Electronic equipment shown in Fig. 4 is only an example, should not function to the embodiment of the present disclosure and use scope bring and appoint
What is limited.
As shown in figure 4, the present invention provides a kind of electronic equipment 400, including processor 410 and memory 420, the electricity
Sub- equipment 400 can execute according to the method for the embodiment of the present invention.
Specifically, processor 410 for example may include general purpose microprocessor, instruction set processor and/or related chip group
And/or special microprocessor (for example, specific integrated circuit (ASIC)), etc..Processor 410 can also include using for caching
The onboard storage device on way.Processor 410 can be for executing the different movements of process according to the method for the embodiment of the present invention
Single treatment unit either multiple processing units.
Memory 420, such as can be the arbitrary medium can include, store, transmitting, propagating or transmitting instruction.For example,
Readable storage medium storing program for executing can include but is not limited to electricity, magnetic, optical, electromagnetic, infrared or semiconductor system, device, device or propagate Jie
Matter.The specific example of readable storage medium storing program for executing includes: magnetic memory apparatus, such as tape or hard disk (HDD);Light storage device, such as CD
(CD-ROM);Memory, such as random access memory (RAM) or flash memory;And/or wire/wireless communication link.
Memory 420 may include computer program 421, which may include that code/computer can be held
Row instruction, by processor 410 execute when make processor 410 execute for example above the embodiment of the present invention method flow and
Its any deformation.
Computer program 421 can be configured to have the computer program code for example including computer program module.Example
Such as, in the exemplary embodiment, the code in computer program 421 may include one or more program modules, for example including
421A, module 421B ....It should be noted that the division mode and number of module are not fixation, those skilled in the art can
To be combined according to the actual situation using suitable program module or program module, when these program modules are combined by processor 410
When execution, processor 410 is executed for example above in conjunction with the method flow of the embodiment of the present invention and its any deformation.
The disclosure additionally provides a kind of computer-readable medium, which, which can be in above-described embodiment, retouches
Included in the equipment/device/system stated;It is also possible to individualism, and without in the supplying equipment/device/system.On
It states computer-readable medium and carries one or more program, when said one or multiple programs are performed, realize root
According to the method for the embodiment of the present application.
According to an embodiment of the present application, computer-readable medium can be computer-readable signal media or computer can
Read storage medium either the two any combination.Computer readable storage medium for example can be --- but it is unlimited
In system, device or the device of --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or any above combination.It calculates
The more specific example of machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, portable of one or more conducting wires
Formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory
(EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device or
The above-mentioned any appropriate combination of person.In this application, computer readable storage medium can be it is any include or storage program
Tangible medium, which can be commanded execution system, device or device use or in connection.And in this Shen
Please in, computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
In carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limited to
Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable
Any computer-readable medium other than storage medium, the computer-readable medium can send, propagate or transmit for by
Instruction execution system, device or device use or program in connection.The journey for including on computer-readable medium
Sequence code can transmit with any suitable medium, including but not limited to: wireless, wired, optical cable, radiofrequency signal etc., or
Above-mentioned any appropriate combination.
Particular embodiments described above has carried out further in detail the purpose of the present invention, technical scheme and beneficial effects
It describes in detail bright, it should be understood that the above is only a specific embodiment of the present invention, is not intended to restrict the invention, it is all
Within the spirit and principles in the present invention, any modification, equivalent substitution, improvement and etc. done should be included in guarantor of the invention
Within the scope of shield.
Claims (10)
1. a kind of management method applied to data center, comprising:
Obtain the image acquired in the data center;
In the case where including facial image in described image, personnel identity is determined by recognition of face;
Determine whether the personnel identity is legal;
In the case where determining that the personnel identity is legal, the location of described personnel are determined;
Determine whether the position is legal;
If it is determined that personnel identity is illegal or the position is illegal, then warning message is generated.
2. according to the method described in claim 1, wherein, the image acquired in the data center that obtains includes:
It receives and passes through the image that mobile detection is acquired in the data center from image collecting device.
3. according to the method described in claim 1, wherein,
It is described to determine that personnel identity includes: to judge whether personnel identity belongs to internal staff by recognition of face by recognition of face
Or registered external staff;
If the whether legal determination personnel identity includes: that the personnel identity belongs to internal staff or registered outside
Personnel, it is determined that personnel identity is legal, otherwise determines that personnel identity is illegal.
4. according to the method described in claim 1, wherein, the location of described described personnel of determination include:
Determine the image collecting device of acquisition described image;
Determine the position of described image acquisition device as the location of described personnel.
5. according to the method described in claim 1, wherein, whether the determination position is legal to include:
Determine that the possessed authority information of personnel, the authority information allow access at least one region of the data center;
If the position belongs to the region that the authority information is allowed access into, it is determined that the position is legal, otherwise institute's rheme
It sets illegal.
6. according to the method described in claim 1, further include:
Based on the multiple images comprising same personnel, the track data of the personnel is generated;
Export the track data.
7. a kind of managing device applied to data center, comprising:
Image obtains module, for obtaining the image acquired in the data center;
Identity determining module determines personnel's body by recognition of face in the case where for including facial image in described image
Part;
Authentication module, for determining whether the personnel identity is legal;
Position determination module, for determining the location of described personnel in the case where determining that the personnel identity is legal;
Location-authentication module, for determining whether the position is legal;
Alarm module, in the case where determining that personnel identity is illegal or the illegal situation in position, then generating warning message.
8. device according to claim 7, further includes:
Track generation module, for generating the track data of the personnel based on the multiple images comprising same personnel;
Track output module, for exporting the track data.
9. a kind of electronic equipment, comprising:
Processor;And
Memory, is stored thereon with computer-readable instruction, and processor perform claim is made when described instruction is executed by processor
It is required that method described in any one of 1~6.
10. a kind of computer readable storage medium is stored thereon with computer-readable instruction, when described instruction is executed by processor
So that method described in any one of processor perform claim requirement 1~6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910705519.2A CN110335433A (en) | 2019-07-31 | 2019-07-31 | Applied to the management method of data center, device, medium and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910705519.2A CN110335433A (en) | 2019-07-31 | 2019-07-31 | Applied to the management method of data center, device, medium and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110335433A true CN110335433A (en) | 2019-10-15 |
Family
ID=68148235
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910705519.2A Pending CN110335433A (en) | 2019-07-31 | 2019-07-31 | Applied to the management method of data center, device, medium and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110335433A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112765574A (en) * | 2019-10-21 | 2021-05-07 | 深圳云天励飞技术有限公司 | Identity verification method, device and system, power equipment and storage medium |
CN113033836A (en) * | 2021-03-04 | 2021-06-25 | 南方电网深圳数字电网研究院有限公司 | Safety management method based on transformer substation, terminal equipment and storage medium |
CN113742666A (en) * | 2021-07-22 | 2021-12-03 | 南方电网深圳数字电网研究院有限公司 | Transformer substation management method and system, electronic equipment and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060204055A1 (en) * | 2003-06-26 | 2006-09-14 | Eran Steinberg | Digital image processing using face detection information |
CN201708856U (en) * | 2009-11-23 | 2011-01-12 | 深圳市宾利达智能科技有限公司 | Intelligent identification monitoring device |
CN202159392U (en) * | 2011-07-08 | 2012-03-07 | 李东风 | Position tracking early warning system based on network of things |
CN203746187U (en) * | 2014-03-25 | 2014-07-30 | 南京信息工程大学 | Security alarm system |
CN206726418U (en) * | 2017-04-28 | 2017-12-08 | 成都志博科技有限公司 | Based on the fatigue detecting system in vehicle traveling process |
CN107886046A (en) * | 2017-09-29 | 2018-04-06 | 深圳高速工程顾问有限公司 | Alarm trigger method, apparatus, computer equipment and storage medium for monitoring |
CN109841022A (en) * | 2018-11-29 | 2019-06-04 | 广州紫川物联网科技有限公司 | A kind of target motion track detecting/warning method, system and storage medium |
CN109948479A (en) * | 2019-03-06 | 2019-06-28 | 百度在线网络技术(北京)有限公司 | Monitoring method, device and the equipment of factory |
-
2019
- 2019-07-31 CN CN201910705519.2A patent/CN110335433A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060204055A1 (en) * | 2003-06-26 | 2006-09-14 | Eran Steinberg | Digital image processing using face detection information |
CN201708856U (en) * | 2009-11-23 | 2011-01-12 | 深圳市宾利达智能科技有限公司 | Intelligent identification monitoring device |
CN202159392U (en) * | 2011-07-08 | 2012-03-07 | 李东风 | Position tracking early warning system based on network of things |
CN203746187U (en) * | 2014-03-25 | 2014-07-30 | 南京信息工程大学 | Security alarm system |
CN206726418U (en) * | 2017-04-28 | 2017-12-08 | 成都志博科技有限公司 | Based on the fatigue detecting system in vehicle traveling process |
CN107886046A (en) * | 2017-09-29 | 2018-04-06 | 深圳高速工程顾问有限公司 | Alarm trigger method, apparatus, computer equipment and storage medium for monitoring |
CN109841022A (en) * | 2018-11-29 | 2019-06-04 | 广州紫川物联网科技有限公司 | A kind of target motion track detecting/warning method, system and storage medium |
CN109948479A (en) * | 2019-03-06 | 2019-06-28 | 百度在线网络技术(北京)有限公司 | Monitoring method, device and the equipment of factory |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112765574A (en) * | 2019-10-21 | 2021-05-07 | 深圳云天励飞技术有限公司 | Identity verification method, device and system, power equipment and storage medium |
CN112765574B (en) * | 2019-10-21 | 2023-05-19 | 深圳云天励飞技术有限公司 | Identity verification method and device, system, power equipment and storage medium |
CN113033836A (en) * | 2021-03-04 | 2021-06-25 | 南方电网深圳数字电网研究院有限公司 | Safety management method based on transformer substation, terminal equipment and storage medium |
CN113742666A (en) * | 2021-07-22 | 2021-12-03 | 南方电网深圳数字电网研究院有限公司 | Transformer substation management method and system, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110335433A (en) | Applied to the management method of data center, device, medium and equipment | |
CN109902659B (en) | Method and apparatus for processing human body image | |
US20200201966A1 (en) | Biometric based self-sovereign information management | |
US20170124421A1 (en) | Verification of images captured using a timestamp decoded from illumination from a modulated light source | |
US20210287469A1 (en) | System and method for provisioning a facial recognition-based system for controlling access to a building | |
US11960583B2 (en) | Biometric based self-sovereign information management based on reverse information search | |
US11196740B2 (en) | Method and system for secure information validation | |
US20190147155A1 (en) | Method of remotely identifying a physical person in asynchronous mode, aimed at the release of an advanced electronic signature, qualified electronic signature or digital identity | |
CN107785073A (en) | Medical examination result-sharing methods, devices and systems based on block chain | |
CN109948320B (en) | Block chain-based identity recognition management method, device, medium and electronic equipment | |
CN110036391A (en) | Bulk of optical feedback for visual identity certification | |
US20160196728A1 (en) | Method and system for detecting a security breach in an organization | |
CN104240013A (en) | Door access control method and door access control platform | |
CN111553266A (en) | Identification verification method and device and electronic equipment | |
CN103458225A (en) | Surveillance including a modified video data stream | |
CN111259682B (en) | Method and device for monitoring safety of construction site | |
KR101400168B1 (en) | Three-dimensional virtual security control system using 360 degree stereoscopic camera, and method thereof | |
CN109325460B (en) | A kind of face identification method, optical center scaling method and terminal | |
CN104240014A (en) | Door access control method and door access control platform | |
CN109871791A (en) | Image processing method and device | |
CN109961472A (en) | Method, system, storage medium and the electronic equipment that 3D thermodynamic chart generates | |
CN108364029A (en) | Method and apparatus for generating model | |
CN109739344A (en) | Unlocking method, device, equipment and storage medium based on eyeball moving track | |
CN111444490A (en) | Identity recognition method and device, computer equipment and storage medium | |
CN106548059A (en) | The method of teacher, head of a family's mobile terminal and head of a family's authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191015 |