CN111447563A - Target object tracking method and security system - Google Patents

Target object tracking method and security system Download PDF

Info

Publication number
CN111447563A
CN111447563A CN202010146539.3A CN202010146539A CN111447563A CN 111447563 A CN111447563 A CN 111447563A CN 202010146539 A CN202010146539 A CN 202010146539A CN 111447563 A CN111447563 A CN 111447563A
Authority
CN
China
Prior art keywords
target object
terminal
server
information
tracking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010146539.3A
Other languages
Chinese (zh)
Other versions
CN111447563B (en
Inventor
孟万祥
高金铎
高峰
王彦顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xizhuo Technology Co ltd
Original Assignee
Shenzhen Xizhuo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xizhuo Technology Co ltd filed Critical Shenzhen Xizhuo Technology Co ltd
Priority to CN202010146539.3A priority Critical patent/CN111447563B/en
Publication of CN111447563A publication Critical patent/CN111447563A/en
Application granted granted Critical
Publication of CN111447563B publication Critical patent/CN111447563B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal

Abstract

A target object tracking method is applied to a security system, the security system comprises a server and at least one terminal, the server sends a tracking instruction for a target object to the at least one terminal, each terminal responds to the tracking instruction, judges whether the target object is tracked according to identity information acquired in real time and identity characteristic information of the target object, sends tracking success information to the server after the target terminal tracks the target object, and the server generates a motion track of the target object according to position information of the target terminal after receiving the tracking success information sent by the target terminal. The purpose that a plurality of terminals in the security system track the target object in real time is achieved, and the tracking efficiency of the target object is improved.

Description

Target object tracking method and security system
Technical Field
The application belongs to the technical field of computers, and particularly relates to a target object tracking method and a security system.
Background
With the development of information technology, in the tracking process of target objects such as suspects and lost articles, the tracking method is more and more dependent on a security system. At present, common security systems are identity verification, video security monitoring, anti-theft alarm, attendance access control and other systems formed by security products aiming at maintaining social public security. Because the systems are independent precaution systems which are not associated with each other, the systems are difficult to realize the sharing of monitoring data, and the tracking efficiency of the target object is low.
Disclosure of Invention
The application aims to provide a target object tracking method and a security system, and aims to solve the problem that data sharing cannot be realized because traditional security subsystems are independent from one another, and improve the tracking efficiency of a target object.
A first aspect of an embodiment of the present application provides a target object tracking method, which is applied to a security system, where the security system includes a server and at least one terminal; the method comprises the following steps:
the server sends a tracking instruction for a target object to the at least one terminal, wherein the tracking instruction carries identity characteristic information of the target object;
each terminal responds to the tracking instruction and judges whether the target object is tracked or not according to the identity information acquired in real time and the identity characteristic information of the target object;
if the terminal tracks the target object, sending tracking success information to the server;
and the server generates a motion track of the target object according to the position information of the target terminal, wherein the target terminal is a terminal which sends tracking success information to the server from the at least one terminal.
In an optional implementation manner, before the server sends the tracking instruction for the target object to the at least one terminal, the method further includes:
each terminal registers on the server and uploads the information type of the corresponding identification information to the server;
accordingly, the server sends a tracking instruction for the target object to the at least one terminal, including:
and the server sends a tracking instruction aiming at the target object to each terminal according to the information type.
In an optional implementation manner, each of the terminals registers on the server and uploads an information type of the corresponding identification information to the server, further including:
and each terminal uploads the corresponding position information to the server.
In an optional implementation manner, if the terminal tracks the target object, sending tracking success information to the server, further includes:
and if the terminal tracks the target object, sending the position information of the terminal to the server.
In an alternative implementation, the tracking success information includes timestamp information;
the server generates the motion trail of the target object according to the position information of the target terminal, and the motion trail comprises the following steps:
and the server generates a motion trail of the target object according to the position information of the target terminal and the timestamp information.
In an optional implementation manner, the sending, by the server, a tracking instruction for the target object to each terminal according to the information type includes:
and the server generates detection data in a first preset format according to the identity characteristic information of the target object and a preset first field, and sends the detection data to a downlink stack of a preset information exchange stack of each terminal.
In an optional implementation manner, if the terminal tracks the target object, sending tracking success information to the server, further includes:
if the terminal tracks the target object, generating detection identification information in a second preset format according to the corresponding position information and a preset second field, and storing the detection identification information to an uplink stack of the information exchange stack, wherein a mapping relation exists between the detection identification information and the detection data;
correspondingly, the server generates the motion trail of the target object according to the position information of the target terminal, and the motion trail comprises the following steps:
and the server acquires the detection identification information from the uplink stack of the information exchange stack according to the tracking success information, and generates the motion track of the target object according to the detection identification information.
In an alternative implementation, the server is a public security system server.
In an optional implementation, the method further includes:
and if the terminal receives a tracking stopping instruction which is sent by the server and aims at the target object, the terminal deletes the response process of the tracking instruction.
A second aspect of an embodiment of the present application provides a security system, where the security system includes a server and at least one terminal;
the server is used for sending a tracking instruction for a target object to the at least one terminal and generating a motion track of the target object according to position information of the target terminal, wherein the tracking instruction carries identity characteristic information of the target object, and the target terminal is a terminal which sends tracking success information to the server from the at least one terminal;
each terminal is used for responding to the tracking instruction, judging whether the target object is tracked according to the identity information acquired in real time and the identity characteristic information of the target object, and sending tracking success information to the server when the target object is tracked.
Compared with the prior art, the target object tracking method provided by the embodiment of the invention is applied to a security system, the security system comprises a server and at least one terminal, the server sends a tracking instruction for a target object to the at least one terminal, each terminal responds to the tracking instruction, judges whether the target object is tracked according to identity information acquired in real time and identity characteristic information of the target object, sends tracking success information to the server after the target terminal tracks the target object, and the server generates a motion track of the target object according to position information of the target terminal after receiving the tracking success information sent by the target terminal. The server controls each terminal in at least one terminal to track the target object in real time, and further generates the motion track of the target object according to the position information of each target terminal tracking the target object, so that the purpose that a plurality of terminals in a security system track the target object in real time is achieved, and the tracking efficiency of the target object is improved.
Drawings
Fig. 1 is a schematic structural diagram of a security system provided in a first embodiment of the present application;
fig. 2 is a schematic diagram of an interaction process between the server and the terminal shown in fig. 1 according to a second embodiment of the present application;
FIG. 3 is a diagram illustrating a structure of detection data in a first predetermined format;
FIG. 4 is a diagram illustrating a second predetermined format of detection identification information;
fig. 5 is a schematic diagram of an interaction process between the server and the terminal shown in fig. 1 according to a third embodiment of the present application;
fig. 6 is a schematic diagram of an interaction process between the server and the terminal shown in fig. 1 according to a fourth embodiment of the present application.
Detailed Description
In order to make the technical problems, technical solutions and advantageous effects to be solved by the present application clearer, the present application is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
It should be noted that the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
It should be noted that, with the development of network technology, in the field of public security, various security systems are used to ensure people's daily life and prevent illegal criminal activities. However, at present, each security system is an independent security system fixed at a specific position, and each independent security system can only monitor a fixed area and cannot share monitoring data. The technical scheme provided by the embodiment of the application can realize the sharing of the monitoring data of each independent security system and improve the target tracking efficiency.
Specifically, as shown in fig. 1, the structure diagram of the security system provided in the first embodiment of the present application is shown. As can be seen from fig. 1, the security system 1 provided in the embodiment of the present application includes a server 10 and at least one terminal 11, and it can be understood that the number of the terminals 11 may be 1 or any integer greater than 1. The server 10 is in communication connection with each terminal 11, the server 10 is configured to send a tracking instruction for a target object to each terminal 11, and generate a motion trajectory of the target object according to position information of the target terminal, where the tracking instruction carries identity characteristic information of the target object, and the target terminal is the terminal 11 that sends tracking success information to the server 10 from all terminals 11. Each terminal 11 is configured to respond to the tracking instruction, determine whether the target object is tracked according to the identity information acquired in real time and the identity characteristic information of the target object, and send a tracking success message to the server 10 when the target object is tracked.
It is understood that, in practical applications, the server 10 and each terminal 11 need to be connected to the internet, so that a communication connection can be established between the server 10 and each terminal 11. After the communication connection is established between the server 10 and each terminal 11, the server 10 controls each terminal 11 to perform tracking of the target object by transmitting a tracking instruction for the target object to each terminal 11.
By way of example and not limitation, the server 10 is a server of a public safety organization, such as a server of a public safety system, and the terminal 11 is a control terminal of a security subsystem of the public safety organization, such as a control terminal of an entrance guard subsystem, a control terminal of a parking lot management subsystem, a control terminal of a hotel management subsystem, a control terminal of a video monitoring management subsystem, and the like. It can be understood that, in order to further improve the control efficiency of the server 10 on the terminals 11, and implement that the identity characteristic information carrying the corresponding category is selectively sent according to the information categories of the identification information of different terminals 11, in an alternative implementation manner, before the server 10 sends the tracking instruction for the target object to each terminal 11, each terminal 11 registers on the server 10 and uploads the information type of the corresponding identification information to the server 10, and the server 10 may send the tracking instruction for the target object to each terminal 11 according to the registered information of each terminal 11 and the information type of the corresponding identification information of each terminal. It can be understood that, when each terminal 11 registers on the server 10, it needs to upload corresponding registration information, where the registration information may be at least one of basic data information such as an address, a name, and a security type corresponding to each terminal 11.
For example, each security subsystem of the public security organization sends a registration application to a server of the public security organization, and after the application is received, each security subsystem realizes logical connection with the public security organization, and the identity recognition devices of each security subsystem, such as a fingerprint reading device, a human face capturing device, an iris reading device, a number plate photographing recognition device, a voiceprint reading device, a second-generation identity card reading device, and the like, become each terminal 11 of the public security system 1. Thus, the server sends the identity feature information of the target object, such as the suspect a, to each terminal 11, which is equivalent to that the search comparison of a is performed on all terminals registered on the server 10 in a city or even a country, and the effect of searching the suspect a by each terminal is obviously wider, more accurate and more efficient than the search range of criminal investigation/technical investigation personnel in a database at the bottom of a case.
As an example and not by way of limitation, when the subsystems register, the information types of the identification information corresponding to the subsystems can be uploaded to the server through the control terminals, after the server receives the information types of the identification information of the security subsystem uploaded by the control terminals, the received information types can be stored, and when a tracking instruction for a target user needs to be sent, the tracking instruction carrying the corresponding desired information types is sent to the terminals by referring to the information types. Understandably, the terminal 11
In this embodiment, the server may store the information type in a pre-established detection information pool, where the information detection pool is used to store the identity characteristic information of the target object (person or object) searched by the public safety organization. For example, if the searched target object is a case suspect, the identity characteristic information includes at least one of information such as a fingerprint, a face photo, a conversation record, an identity card number, a photo and the like of the case suspect; if the searched target object is a traffic accident vehicle, the identity characteristic information comprises a vehicle photo, license plate information and the like of the accident vehicle, the server classifies the identity characteristic information of the target object, and sends different types of identity characteristic information to corresponding terminals according to the information types of the received identification information of each terminal, for example, if the terminal is a monitoring device of a certain cell, the information type of the corresponding identification information can be image information comprising a human face or fingerprint information, and the server can send a target object tracking instruction carrying the human face image information and/or the fingerprint image information to the terminal; if the terminal is a management device of the parking lot, the information type of the corresponding identification information is a license plate number, and the server can send image information carrying the license plate number to the terminal. It should be noted that the server 10 may perform operations such as updating, adding, deleting, and the like on the detection data in the detection information pool at regular time, so that the detection information pool can provide more accurate detection data.
It can be understood that, since the installation location of each terminal 11 is fixed and there is a time record in the tracking process, each terminal 11 uploads the respective location information and timestamp information to the server 10 while sending the tracking success information, and the server 10 can determine the motion trajectory of the target object according to the location information of the target terminal tracked to the target object and the tracked timestamp information, thereby providing a good clue and means for tracking the target object.
It should be noted that, in an alternative implementation manner, the tracking success information may include the timestamp information, and when each terminal 11 registers on the server 10 and uploads the information type of the corresponding identification information to the server 10, it may also upload the corresponding location information to the server 10.
It can be understood that, when the server 10 receives the tracking success information and determines the motion trajectory of the target object according to the position information and the timestamp information of the target terminal, and then the tracking task of the target object is completed, the server 10 may send a tracking stop instruction for the target object to each terminal 11, and each terminal 11 deletes the response process of the tracking instruction after receiving the tracking stop instruction.
According to the target object tracking method, a server of a security system sends a tracking instruction for a target object to at least one terminal of the security system, each terminal responds to the tracking instruction and judges whether the target object is tracked according to identity information acquired in real time and identity characteristic information of the target object, and after the target terminal tracks the target object, tracking success information is sent to the server, and after the server receives the tracking success information sent by the target terminal, the server generates a motion track of the target object according to position information of the target terminal. The server controls each terminal in at least one terminal to track the target object in real time, and further generates the motion track of the target object according to the position information of each target terminal tracking the target object, so that the purpose that a plurality of terminals in a security system track the target object in real time is achieved, and the tracking efficiency of the target object is improved.
Fig. 2 is a schematic diagram of an interaction process of implementing target object tracking by the security system shown in fig. 1 according to the second embodiment of the present application. As can be seen from fig. 2, the interaction steps between the server 10 and each terminal 11 when the security system of the present application tracks a target object are as follows:
s201, the server 10 sends a tracking instruction for the target object to at least one terminal 11, where the tracking instruction carries identity characteristic information of the target object.
It should be noted that, since the communication process between the server 10 and each terminal 11 is the same, in the embodiment shown in fig. 2, only one terminal 11 is shown for convenience of display, and in practical applications, the number of terminals 11 may be 1 or any integer greater than 1. Specifically, after receiving a target object tracking instruction triggered by a user, the server 10 needs to acquire identity feature information of the target object, where the identity feature information may be uploaded by the user or acquired from a pre-established detection information pool. It is understood that, in order to improve the working efficiency of each terminal 11, the server 10 may select to send the identity feature information including the information type of the corresponding identification information to different terminals 11 according to the information type of the corresponding identification information uploaded by each terminal 11 in advance.
Further, the server 10 may transmit a tracking command for the target object to each of the terminals 11 according to the information type of the identification information corresponding to each of the terminals 11. It can be understood that the target object tracking instruction carries identity feature information of a type matching the information type of the identification information of the corresponding terminal.
In an optional implementation manner, in order to ensure communication security between the server 10 and each terminal 11, before the server 10 sends a tracking instruction for the target object to each terminal 11 according to an information type of the identification information corresponding to each terminal 11, detection data in a first preset format is generated according to the identity characteristic information of the target object and a preset first field, and the detection data is sent to a downlink stack of a preset information exchange stack of each terminal 11. The downlink stack is used for storing the detection data sent by the server 10.
As shown in fig. 3, which is a schematic structural diagram of the detection data in the first predetermined format, as can be seen from fig. 3, the detection data in the first predetermined format includes: category, sequence number, command, data and check code; the category represents a data type, the sequence number is generated by the server 10 according to the sequence of the target object tracking task in the task to be executed, the command is the execution task sent by the server 10 to each terminal 11, and is generally composed of binary digits with preset meanings, for example, "00" represents the start of search, and "11" represents the end of search, and the like, the data is the identity characteristic information of the target object, and the check code is generated by the server according to the identity characteristic information, so that the function of preventing errors in the transmission process or data field information from being forged can be achieved.
S202, each terminal 11 responds to the tracking instruction, and judges whether the target object is tracked or not according to the identity information acquired in real time and the identity characteristic information of the target object.
It should be noted that each terminal 11 is pre-established with a user identity template, the user identity template is established by the terminal 11 according to the user identity characteristic information collected historically, when the terminal 11 responds to the tracking instruction, the identity template of the target object may be generated according to the identity characteristic information of the target object, and the identity templates of all users detected within a preset time period are dynamically compared to search the target object.
It can be understood that, for the security of data communication, in an optional implementation manner, each of the terminals 11 obtains the detection data from the downlink stack of the information exchange stack, executes a corresponding instruction according to the detection data, if the detection data includes a start search instruction, executes a tracking instruction for the target object, and determines whether to track the target object according to the identity information acquired in real time and the identity feature information of the target object included in the detection data. And if the detection data comprises a search stopping instruction, deleting all responses for executing the tracking task by the terminal, and finishing searching.
S203, if the terminal 11 tracks the target object, sending a tracking success message to the server 10.
And S204, the server 10 generates a motion track of the target object according to the position information of the target terminal, wherein the target terminal is a terminal which sends tracking success information to the server 10 from the at least one terminal 11.
In an optional implementation manner, in order to ensure communication security, if the terminal 11 tracks the target object, detecting identification information in a second preset format is generated according to respective corresponding location information and a preset second field, and the detecting identification information is stored in an uplink stack of the information exchange stack, where a mapping relationship exists between the detecting identification information and the detecting data. It should be noted that, when the terminal 11 stores the detection identification information in the uplink stack of the information exchange stack. Correspondingly, after receiving the tracking success information, the server 10 obtains the detection identification information from the uplink stack of the information exchange stack, and determines the motion trajectory of the target object according to the detection identification information.
Further, the server 10 transmits a stop tracking instruction for the target object to each terminal 11, and each terminal 11 deletes a response progress of the tracking instruction after receiving the stop tracking instruction. Further, after receiving the instruction to stop tracking, each terminal 11 ends the dynamic search process for the target object by deleting the identity template of the target object.
Fig. 4 is a schematic diagram of the detection identification information in the second predetermined format. As shown in fig. 4, the detecting identification information in the second predetermined format includes: category, serial number, callback, time, template number. The type and the sequence number are correspondingly consistent with those in the detection data, the reply instruction is a reply instruction generated according to a command in the detection data, the reply instruction is also composed of a binary number with a preset meaning, for example, "01" indicates that a search template is established, the search is started, "10" indicates that the matched data is found, that is, the tracking is successful, the reply is made to the instruction sent by the server 10, the time filling is the time stamp information for searching the target object, and the template number is mapped with the check code in the detection data. Thus, after receiving the detection identifier word sent by the terminal 11, the server 10 can obtain the time and the place of the target object according to the detection identifier word, and further can generate the motion trajectory of the target object according to the time and the place.
As can be seen from the above analysis, in this embodiment, a server of a security system sends a tracking instruction for a target object to at least one terminal of the security system, each terminal responds to the tracking instruction, determines whether the target object is tracked according to identity information acquired in real time and identity characteristic information of the target object, and sends tracking success information to the server after the target terminal tracks the target object, and the server generates a motion trajectory of the target object according to position information of the target terminal after receiving the tracking success information sent by the target terminal. The server controls each terminal in at least one terminal to track the target object in real time, and further generates the motion track of the target object according to the position information of each target terminal tracking the target object, so that the purpose that a plurality of terminals in a security system track the target object in real time is achieved, and the tracking efficiency of the target object is improved.
Fig. 5 is a schematic diagram of an interaction process between the server and the terminal shown in fig. 1 according to a third embodiment of the present application. As shown in fig. 5, in this embodiment, compared with the embodiment shown in fig. 2, the implementation processes of S502 to S505 are the same as the implementation processes of S201 to S204, except that the following interaction process is further included before S502:
s501, each terminal 11 registers on the server 10, and uploads the information type of the corresponding identification information to the server 10.
Specifically, the process of registering each terminal 11 on the server 10 is described in detail in the embodiment of fig. 1, and is not described herein again.
Fig. 6 is a schematic diagram illustrating an interaction process between the server and the terminal shown in fig. 1 according to a fourth embodiment of the present application. As shown in fig. 6, compared with the embodiment shown in fig. 5, the present embodiment has the same implementation process from S601 to S605, except that after S604, the following interaction process is further included:
s605, if the terminal 11 receives the instruction for stopping tracking of the target object sent by the server 10, the terminal 11 deletes the response process of the tracking instruction.
That is, after the server 10 generates the motion trajectory of the target object, it determines that the tracking task for the target object is completed, at this time, the server 10 sends a stop tracking instruction to each terminal 11, and when the terminal 11 receives the stop tracking instruction for the target object sent by the server, the terminal deletes the response process of the tracking instruction.
For example, suppose a person a who lives in S city is reported by family for a plurality of days to lose contact, the contact ways such as telephone, social networking and the like are interrupted, and the family can only provide a photo of a. The public security department in the S city submits the photo and the ID card number of the person A to a public security system in the S city, and a server of the public security system pushes the photo and the ID card information of the person A to be searched to a downlink stack of an information exchange stack of a corresponding terminal in a data word detecting mode according to the information type of the identification information corresponding to each registered security subsystem. And respectively searching the A corresponding to the terminals for identity authentication by using the face recognition technology and the identity card, and sending tracking success information to the server after the identity information of the A is searched, wherein the server can generate the motion track of the target object according to the position information of the terminals for identity authentication by using the face recognition technology and the identity card and the timestamp information in the tracking success information. Specifically, each terminal which performs identity authentication by using a face recognition technology and an identity card correspondingly can create an identity template of a according to a photo and the identity card of the terminal a, dynamically compare the identity template of the terminal a with the identity template corresponding to the user detected in a preset time period, create an uplink stack in which a detection marker word is written in an information exchange stack, and inform a server that the terminal has started to search if the content of a response field of the detection marker word is '01'. And in the subsequent identification process of the user, the A is identified. After the information of the A is identified, the terminal creates a new detection identifier word, the command return field is set to be 10, the person A is found, and the detection identifier word is written into an uplink stack of the information exchange stack; the server establishes the motion track of the searched person A according to the detection identifier words retrieved from different terminals. For example, the server learns that an attendance/entrance guard rule of an enterprise has appeared by face recognition of a person A according to the detection identification word information of a plurality of terminals, and the person A is paid by face brushing through an online shopping platform and is checked to enter a station by using an identity card at a railway station, and the public security department can find the person A who is lost in contact through the movement track of the person A. Further, after the search work of the lost contact person is finished, the server pushes the detection data carrying the "search end" command to the downlink stack of the information exchange stack of the relevant terminal, and the content of the command field is "11", which indicates that the search work of the person is finished. And after receiving the search ending instruction, each related terminal deletes the process for executing the search A, and the scheme is ended.
As can be seen from the above analysis, in the embodiment of the present application, on the basis of the embodiment shown in fig. 2, the server 10 further sends an instruction to stop tracking the target object to each terminal 11 after the tracking is successful, and each terminal 11 deletes the response process of the tracking instruction after receiving the instruction to stop tracking the target object, so that each terminal 11 can be protected from being affected while ensuring information security.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer-readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. . Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (10)

1. A target object tracking method is characterized by being applied to a security system, wherein the security system comprises a server and at least one terminal; the method comprises the following steps:
the server sends a tracking instruction for a target object to the at least one terminal, wherein the tracking instruction carries identity characteristic information of the target object;
each terminal responds to the tracking instruction and judges whether the target object is tracked or not according to the identity information acquired in real time and the identity characteristic information of the target object;
if the terminal tracks the target object, sending tracking success information to the server;
and the server generates a motion track of the target object according to the position information of the target terminal, wherein the target terminal is a terminal which sends tracking success information to the server from the at least one terminal.
2. The target object tracking method of claim 1, before the server sends the tracking instruction for the target object to the at least one terminal, further comprising:
each terminal registers on the server and uploads the information type of the corresponding identification information to the server;
accordingly, the server sends a tracking instruction for the target object to the at least one terminal, including:
and the server sends a tracking instruction aiming at the target object to each terminal according to the information type.
3. The method for tracking a target object according to claim 2, wherein each of the terminals registers with the server and uploads information types of the respective corresponding identification information to the server, further comprising:
and each terminal uploads the corresponding position information to the server.
4. The target object tracking method according to any one of claims 1 to 3, wherein if the terminal tracks the target object, sending tracking success information to the server, further comprising:
and if the terminal tracks the target object, sending the position information of the terminal to the server.
5. The target object tracking method according to claim 4, wherein the tracking success information includes time stamp information;
the server generates the motion trail of the target object according to the position information of the target terminal, and the motion trail comprises the following steps:
and the server generates a motion trail of the target object according to the position information of the target terminal and the timestamp information.
6. The target object tracking method according to claim 5, wherein the server sends a tracking instruction for the target object to each of the terminals according to the information type, including:
and the server generates detection data in a first preset format according to the identity characteristic information of the target object and a preset first field, and sends the detection data to a downlink stack of a preset information exchange stack of each terminal.
7. The method for tracking a target object according to claim 6, wherein if the terminal tracks the target object, sending a tracking success message to the server, further comprising:
if the terminal tracks the target object, generating detection identification information in a second preset format according to the corresponding position information and a preset second field, and storing the detection identification information to an uplink stack of the information exchange stack, wherein a mapping relation exists between the detection identification information and the detection data;
correspondingly, the server generates the motion trail of the target object according to the position information of the target terminal, and the motion trail comprises the following steps:
and the server acquires the detection identification information from the uplink stack of the information exchange stack according to the tracking success information, and generates the motion track of the target object according to the detection identification information.
8. The target object tracking method of claim 7, wherein the server is a police system server.
9. The target object tracking method of claim 8, further comprising:
and if the terminal receives a tracking stopping instruction which is sent by the server and aims at the target object, the terminal deletes the response process of the tracking instruction.
10. A security system is characterized by comprising a server and at least one terminal;
the server is used for sending a tracking instruction for a target object to the at least one terminal and generating a motion track of the target object according to position information of the target terminal, wherein the tracking instruction carries identity characteristic information of the target object, and the target terminal is a terminal which sends tracking success information to the server from the at least one terminal;
each terminal is used for responding to the tracking instruction, judging whether the target object is tracked according to the identity information acquired in real time and the identity characteristic information of the target object, and sending tracking success information to the server when the target object is tracked.
CN202010146539.3A 2020-03-05 2020-03-05 Target object tracking method and security system Active CN111447563B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010146539.3A CN111447563B (en) 2020-03-05 2020-03-05 Target object tracking method and security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010146539.3A CN111447563B (en) 2020-03-05 2020-03-05 Target object tracking method and security system

Publications (2)

Publication Number Publication Date
CN111447563A true CN111447563A (en) 2020-07-24
CN111447563B CN111447563B (en) 2021-09-07

Family

ID=71648725

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010146539.3A Active CN111447563B (en) 2020-03-05 2020-03-05 Target object tracking method and security system

Country Status (1)

Country Link
CN (1) CN111447563B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115884076A (en) * 2022-11-01 2023-03-31 深圳心派科技有限公司 Object tracking method and system

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102056235A (en) * 2009-11-09 2011-05-11 华为技术有限公司 Data transmission method, equipment and system
CN103442152A (en) * 2013-09-02 2013-12-11 马东 Positioning and tracking system and positioning and tracking method
CN105243851A (en) * 2015-09-24 2016-01-13 上海车音网络科技有限公司 Vehicle monitoring method and system
CN106612494A (en) * 2017-01-20 2017-05-03 泉州奇鹭物联网科技有限公司 Intelligent location tracking method and intelligent location tracking system
CN107529221A (en) * 2017-08-22 2017-12-29 上海兴容信息技术有限公司 A kind of follow-up analysis system and method for combination video monitoring and Wi Fi positioning
CN108010008A (en) * 2017-12-01 2018-05-08 北京迈格威科技有限公司 Method for tracing, device and the electronic equipment of target
CN108881342A (en) * 2017-05-11 2018-11-23 京东方科技集团股份有限公司 A kind of target tracking method and target tracking system
CN109862522A (en) * 2019-03-25 2019-06-07 大陆汽车电子(长春)有限公司 Positioning system, mark equipment and server
CN110580053A (en) * 2019-08-13 2019-12-17 深圳市道通智能航空技术有限公司 Target tracking method, aircraft and flight system
WO2020023337A1 (en) * 2018-07-23 2020-01-30 The Wireless Registry, Inc. Systems and methods for generating and updating proximal groupings of electronic devices
US10575138B1 (en) * 2019-08-02 2020-02-25 Tile, Inc. Tracking device location detection using access point collections

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102056235A (en) * 2009-11-09 2011-05-11 华为技术有限公司 Data transmission method, equipment and system
CN103442152A (en) * 2013-09-02 2013-12-11 马东 Positioning and tracking system and positioning and tracking method
CN105243851A (en) * 2015-09-24 2016-01-13 上海车音网络科技有限公司 Vehicle monitoring method and system
CN106612494A (en) * 2017-01-20 2017-05-03 泉州奇鹭物联网科技有限公司 Intelligent location tracking method and intelligent location tracking system
CN108881342A (en) * 2017-05-11 2018-11-23 京东方科技集团股份有限公司 A kind of target tracking method and target tracking system
CN107529221A (en) * 2017-08-22 2017-12-29 上海兴容信息技术有限公司 A kind of follow-up analysis system and method for combination video monitoring and Wi Fi positioning
CN108010008A (en) * 2017-12-01 2018-05-08 北京迈格威科技有限公司 Method for tracing, device and the electronic equipment of target
WO2020023337A1 (en) * 2018-07-23 2020-01-30 The Wireless Registry, Inc. Systems and methods for generating and updating proximal groupings of electronic devices
CN109862522A (en) * 2019-03-25 2019-06-07 大陆汽车电子(长春)有限公司 Positioning system, mark equipment and server
US10575138B1 (en) * 2019-08-02 2020-02-25 Tile, Inc. Tracking device location detection using access point collections
CN110580053A (en) * 2019-08-13 2019-12-17 深圳市道通智能航空技术有限公司 Target tracking method, aircraft and flight system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SANG HWA LEE: "An Intelligent Video Security System Using Object Tracking and Shape Recognition", 《ACIVS:INTERNATIONAL CONFERENCE ON ADVANCED CONCEPTS FOR INTELLIGENT VISION SYSTEM》 *
杜丽娟: "视频监控中多视角目标智能定位追踪方法研究", 《科学技术与工程》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115884076A (en) * 2022-11-01 2023-03-31 深圳心派科技有限公司 Object tracking method and system
CN115884076B (en) * 2022-11-01 2023-09-01 深圳心派科技有限公司 Object Tracking Method and System

Also Published As

Publication number Publication date
CN111447563B (en) 2021-09-07

Similar Documents

Publication Publication Date Title
CN109389723B (en) Visitor management method and device using face recognition and computer equipment
AU2018323233A1 (en) Resource transfer method, fund payment method and apparatus, and electronic device
US20090140045A1 (en) PIV card model # 6800
AU2018201140B2 (en) System and method for candidate profile screening
CN107025397B (en) Identity information acquisition method and device
CN201508555U (en) Internet bar management system based on face recognition
CN108564674A (en) A kind of intelligent attendance system based on comprehensive identification
CN105160455A (en) Visitor management system
CN104240014A (en) Door access control method and door access control platform
WO2019200737A1 (en) Real estate data uploading method and apparatus, computer device, and storage medium
CN114187673A (en) Mobile attendance system based on block chain and method thereof
CN109377611A (en) Caller management method, system, computer equipment and storage medium based on bio-identification
US11790638B2 (en) Monitoring devices at enterprise locations using machine-learning models to protect enterprise-managed information and resources
CN111447563B (en) Target object tracking method and security system
US20090133111A1 (en) System for centralizing personal identification verification and access control
US10210684B2 (en) System and method for identity verification in a detention environment
CN113158771A (en) Community personnel information acquisition method and system and application
US20230094544A1 (en) Systems and methods for tracking chain of custody of body worn cameras
CN109409295A (en) Multiple terminals stereo intelligent testimony of a witness verifying system
CN113822651A (en) Wisdom community entrance guard management system based on safety management
AU2017245284A1 (en) A Method and System for Generating a Report
KR100744560B1 (en) Data Storage Medium for multimodal biometric recognition and method for registrating and authenticating using the same
CN111753872A (en) Method, device, equipment and storage medium for analyzing association of serial and parallel cases
US11017652B2 (en) System for publication and assignment of assistance requests
CN112990855B (en) Personnel and vehicle management system and method applied to intelligent community

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant