CN112700579A - Internet of things-based networking service management platform and method for key community personnel - Google Patents

Internet of things-based networking service management platform and method for key community personnel Download PDF

Info

Publication number
CN112700579A
CN112700579A CN202011520947.7A CN202011520947A CN112700579A CN 112700579 A CN112700579 A CN 112700579A CN 202011520947 A CN202011520947 A CN 202011520947A CN 112700579 A CN112700579 A CN 112700579A
Authority
CN
China
Prior art keywords
information
personnel
visitor
key
dangerous
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011520947.7A
Other languages
Chinese (zh)
Inventor
郁强
徐晨晖
顾孙挺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCI China Co Ltd
Original Assignee
CCI China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CCI China Co Ltd filed Critical CCI China Co Ltd
Priority to CN202011520947.7A priority Critical patent/CN112700579A/en
Publication of CN112700579A publication Critical patent/CN112700579A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/886Radar or analogous systems specially adapted for specific applications for alarm systems
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/89Radar or analogous systems specially adapted for specific applications for mapping or imaging
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S17/00Systems using the reflection or reradiation of electromagnetic waves other than radio waves, e.g. lidar systems
    • G01S17/88Lidar systems specially adapted for specific applications
    • G01S17/89Lidar systems specially adapted for specific applications for mapping or imaging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L25/00Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
    • G10L25/48Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use
    • G10L25/51Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use for comparison or discrimination
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/10Detection; Monitoring
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems

Abstract

The invention provides a management platform and a method for grid service of key personnel in communities based on the Internet of things.

Description

Internet of things-based networking service management platform and method for key community personnel
Technical Field
The invention relates to the field of community management, in particular to a community key personnel grid service management platform and method based on the Internet of things.
Background
Aiming at residences and office communities, a entrance guard and a foreground register and manage visitors, and the entrance guard and the foreground are important links of security and guard work. So far, most community visitor management mostly still stays in the manual management stage of 'seeing, asking, writing by mouth', namely, property management personnel carry out oral inquiry and information entry to visitors who do not carry effective community certificates, and the safety and reliability of the mode are extremely low. The concrete embodiment is as follows: firstly, if illegal persons steal effective certificates of the community, the illegal persons can freely enter and exit the community without property management and control, so that the illegal events cannot be prevented from occurring, and even cannot be traced after the illegal events occur; secondly, the current visitor information registration cannot be checked in real time, illegal personnel can freely use a false identity card or a reason for editing and manufacturing to manage and control property management personnel, and if illegal events occur, actual perpetrators cannot be traced, so that the visitor information registration is similar to a nominal visitor information registration.
Certainly, there are also communities that manage and control visitors by using a face recognition technology, for example, CN11899404A provides a way to implement intelligent access control in cooperation with the face recognition technology, but this way can only distinguish people registered in an information base from people not registered in the information base, and cannot distinguish illegal persons or visitors with illegal motivations in time according to actual situations, and there are still many security risks.
With the continuous improvement of social security requirements, people urgently need a management and control platform which can improve the management and control efficiency of key community personnel and improve the safety factor of community environment.
Disclosure of Invention
The invention aims to provide a management platform and a method for grid service of key personnel in communities based on the Internet of things.
In order to achieve the above purpose, the technical scheme provides a face recognition step: acquiring visitor facial information of a visitor, and distinguishing an owner, a common visitor and a key person based on the visitor facial information, wherein if the visitor is the owner, the owner management step is executed, if the visitor is the common visitor, the common visitor management step is executed, and if the visitor is the key person, the key person management step is executed; owner management: collecting article information of articles carried by the owner, distinguishing safety articles and dangerous articles based on the article information, and opening an access control if the articles are the safety articles; if the dangerous goods are dangerous goods, informing the property personnel to investigate the owner, registering the source and the purpose of the dangerous goods, and if the property personnel judge that the danger cannot be generated, opening the access control; and a common visitor management step: collecting article information of articles carried by the common visitor, distinguishing safety articles and dangerous articles based on the article information, and if the articles are the safety articles, registering the visitor information of the common visitor and opening an access control; if the dangerous goods are dangerous goods, informing the property personnel to temporarily buckle the dangerous goods, and if the property personnel judge that no danger is generated, opening the access control; key personnel management steps: calling file information of the key personnel, distinguishing key personnel of the civil case and key personnel of the criminal case based on the file information, acquiring article information of articles carried by the key personnel if the key personnel of the civil case are the key personnel of the civil case, distinguishing safety articles and dangerous articles based on the article information, opening an access control after acquiring a safety guarantee book registered by an owner pre-visited by the key personnel if the key personnel of the civil case are the safety articles, and informing the property personnel if the key personnel of the civil case are the dangerous articles; if the person is the key person of criminal case, the door is not opened.
This technical scheme provides a key personnel meshing service management platform in community based on thing networking, includes: the system comprises a property management server, a face recognition unit, a dangerous article recognition unit, an information registration unit, a special information registration unit, an access control unit and a monitoring terminal, wherein the face recognition unit, the dangerous article recognition unit, the information registration unit, the special information registration unit, the access control unit and the monitoring terminal are in communication connection with the property management server; the property management server is internally provided with an information base and a file base; the face recognition unit is used for acquiring the facial information of the visitors and distinguishing owners, common visitors and key personnel based on the facial information of the visitors; the dangerous goods identification unit is used for acquiring the goods information of the goods carried by the visitor and distinguishing safety goods and dangerous goods based on the goods information; the information registration unit is used for registering visitor information of the visitor and using information of the dangerous goods; a special information registration unit for filling in a security certificate of the owner; the access control unit is used for controlling the opening and closing of the access; and the monitoring terminal is used for notifying the property personnel.
Compared with the prior art, the technical scheme has the following characteristics and beneficial effects:
1. the face recognition technology is combined with the built-in information base to identify and distinguish the owner and the non-owner, if the owner is the non-owner, the non-owner is continuously combined with the archive base to identify the common visitor or the key personnel, and the two-time segmentation identification mode is adopted to ensure the identification efficiency and improve the capacity of the identification base. That is, only one time of identifying the information base is needed to identify the owner, so that the time consumption for identifying the owner can be relatively reduced, and meanwhile, if key personnel need to be identified, the archive is borrowed to ensure the completeness of the database.
2. The article imaging technology is used for identifying whether an article carried by a person is a safe article or a dangerous article, the safety of the article is further identified on the basis of personnel judgment, the possibility of illegal events is radically reduced in the mode, and the person with illegal motivation is effectively controlled.
3. Further distinguish the illegal personnel of civil case or the illegal personnel of criminal case to key personnel, subdivide the management and control again to the illegal personnel of civil case, it is more humanized and reasonable in key personnel's management and control.
4. The method comprises the steps of carrying out voice recognition on personnel entering a community, if the recognized personnel voice contains excessive dangerous keywords, prejudging whether the personnel possibly has a violent tendency or an illegal tendency, and timely managing and controlling the personnel, so that the possibility of illegal events is reduced.
Drawings
Fig. 1 is a schematic block diagram of a method for managing an internet of things-based grid service of key people in a community according to an embodiment of the present invention.
FIG. 2 is a schematic diagram of a framework of a management platform for Internet of things-based networking services for key people in the community according to an embodiment of the invention.
FIG. 3 is a flowchart of a method for managing Internet of things-based grid-based service of key people in a community according to an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present invention.
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly and may, for example, be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
The scheme provides a community key personnel gridding service management platform and method based on the Internet of things. The community of this scheme include residential community, office community etc. this scheme key personnel including the illegal personnel who has produced the end of the case, the personnel that have the illegal motivation of conspiracy etc. this scheme is through discerning the common management and control key personnel of a plurality of dimensions such as authentication identity, discernment dangerous goods and discernment dangerous pronunciation.
Specifically, this key personnel grid service management platform of community based on thing networking is including the information base of storage owner information and the archive storehouse of storage key personnel information, wherein the information base stores the owner identity information and the facial characteristic information of owner at least, the archive storehouse stores key personnel's key personnel identity information, key personnel facial characteristic information and the case type that corresponds at least, and the case type includes but not limited to civil case and criminal case. In addition, for convenience of explanation, the "service management platform" will be referred to as an "internet of things-based community key personnel grid service management platform" hereinafter.
According to a first aspect of the invention, a method for managing networking service of key community personnel based on the internet of things is provided, and the method is operated based on the service management platform and comprises the following steps:
(face recognition step) S1 of obtaining the visitor' S facial information, distinguishing a proprietor, a general visitor, and a key person based on the visitor facial information, performing step S2 if the proprietor is the visitor, performing step S3 if the general visitor is the visitor, and performing step S4 if the key person is the key person;
(owner management step) S2: collecting article information of articles carried by the owner, distinguishing safety articles and dangerous articles based on the article information, if the articles are the safety articles, opening an access control, and if the articles are the dangerous articles, informing property personnel;
(general visitor management step) S3: collecting article information of articles carried by the common visitor, distinguishing safety articles and dangerous articles based on the article information, if the articles are the safety articles, registering the visitor information of the common visitor and opening an access control, and if the articles are the dangerous articles, informing property personnel;
(key personnel management step) S4, retrieving the file information of the key personnel, distinguishing key personnel in the civil case and key personnel in the criminal case based on the file information, and executing step S5 if the key personnel in the civil case are the key personnel in the civil case;
and S5, collecting the article information of the visitor' S article, distinguishing a security article and a dangerous article based on the article information, signing a security certificate and opening an access control if the security article is the security article, and informing a property worker if the security article is the dangerous article.
Wherein in step S1, the owner, the general visitor, and the key person are face-recognized to perform different community management and control systems for different persons.
Specifically, "acquiring the visitor's facial information" includes: and collecting the facial information of the visitor by utilizing camera equipment arranged at the position of the access control, and stopping the steps of the method if the facial information of the visitor is not collected. In the scheme, the visitor is photographed to obtain the visitor facial information, and the visitor facial information at least comprises characteristics capable of identifying the identity of the visitor.
"differentiating business owners, general visitors, and key persons based on the facial information of the visitors" includes: comparing the facial information of the visitor with the facial feature information of the owner stored in the information base, if the similarity is greater than a first similarity threshold value, the visitor is the owner, and if not, the visitor is the non-owner; if the visitor is a non-owner, comparing the facial information of the visitor with the facial feature information of key personnel stored in the archives, if the similarity is greater than a second similarity threshold value, the visitor is the key personnel, and if not, the visitor is a common visitor. "
Since the corresponding control degree is the lowest in the case of the owner identification, the set threshold value of the similarity for the owner face identification determination may be larger, and in the present embodiment, the set threshold value of the similarity for the owner face identification determination is 90%. And because the corresponding control strength is the highest if the face of the key person is identified, the set threshold of the similarity for face identification and judgment of the key person can be smaller, and in the scheme, the set threshold of the similarity for face identification and judgment of the key person is 80%. Correspondingly, the first similarity threshold is greater than the second similarity threshold.
And, in this step, the visitor face information and the owner face information are compared one by one, and the owner face information with the highest similarity and the visitor face information are compared again for further determination.
And in the scheme, if the visitor is identified as the key person, the property personnel or the public security organization is notified in time. The manner of notification is not limited to: the control alarm sends out a 'danger' signal to the public security department, and at the moment, property personnel need to stabilize key personnel in time.
It is worth mentioning that in the face recognition step of the scheme, the capacity of the recognition library is improved while the recognition efficiency is ensured by adopting a twice segmentation recognition mode. That is, only one time of identifying the information base is needed to identify the owner, so that the time consumption for identifying the owner can be relatively reduced, and meanwhile, if key personnel need to be identified, the archive is borrowed to ensure the integrity of the database.
In step S2, the security of the articles carried by the owner is comprehensively evaluated to predict the occurrence of the illegal action, and since the probability of the illegal action made by the owner to the community environment is low, the owner takes a specific measure for the articles carried by the owner.
Specifically, "collect the article information of the article that owner carried, distinguish security article and hazardous articles based on the article information," include: and acquiring an article image of the article by utilizing a radar imaging technology, comparing the article image with a dangerous article image in a dangerous article library, and distinguishing the safe article from the dangerous article. The radar imaging technology is realized by the following steps: and scanning the article information of the article by using a radar laser, and sending the article information to a radar imaging unit for imaging so as to obtain the article image. Comparing the article image with the dangerous article image can be realized by means of an image detection technology, a deep learning model can be adopted, and only characteristic points of the images can be compared.
The dangerous goods include but are not limited to cutting tools, drugs and other goods which endanger social public safety.
"if it is dangerous article, notify the property personnel" includes: and informing the property personnel to investigate the owner, registering the source and the purpose of the dangerous goods, recording the obtained information of the dangerous goods, and opening the entrance guard if the property personnel judges that no danger is generated. In this scheme, if for the hazardous articles then control first alarm and send out the police dispatch newspaper, inform the property personnel are right the owner surveys, requires the owner registers the hazardous articles source and intention, subsequently, the property personnel close first alarm, entrance guard quilt simultaneously service management platform triggers and opens.
In step S3, the security of the article carried by the general visitor is comprehensively evaluated to predict the occurrence of the unlawful act, and since the general visitor has the possibility of unlawful act on the community environment, the general visitor takes a specific measure for the article carried by the general visitor.
Specifically, the steps of "collecting the article information of the article carried by the visitor and distinguishing the security article and the dangerous article based on the article information" are the same as the above steps.
The difference lies in that if the safety article is used, the step of registering the visitor information of the common visitor and opening the entrance guard comprises the following steps: if the visitor registration unit is a security article, the visitor information of the visitor is registered through the visitor registration unit, wherein the visitor information comprises the identity information of the visitor and the purpose of visiting, so that the follow-up management of the common visitor can be facilitated.
"if it is dangerous article, notify the property personnel" includes: and informing the property personnel to temporarily buckle the dangerous goods, and if the property personnel judge that no danger is generated, opening the access control. In the scheme, if the dangerous goods are, the first alarm is controlled to give an alarm to inform property personnel to temporarily buckle the dangerous goods, then the property personnel close the first alarm, and meanwhile, the access control is triggered and opened by the service management platform.
In step S4, the key personnel are also divided into key personnel with high safety factor and key personnel with low safety factor, and here, the key personnel further distinguish the illegal personnel of the civil case from the illegal personnel of the criminal case, and the key personnel subdivide and manage the illegal personnel of the civil case again, so that the key personnel are more humanized and reasonable in management and control.
Specifically, the "retrieving the profile information of the key personnel" includes: and calling the archive information from the archive library, wherein the archive information at least comprises case types, if the archive information is the civil case archives, the key personnel are the civil case key personnel, and if the archive information is the criminal case archives, the key personnel are the criminal case key personnel.
In the embodiment of the present disclosure, the property personnel is notified to retrieve the file information, or alternatively, the platform retrieves the file information by itself. And when the key personnel are the key personnel of the criminal case, the entrance guard is not opened and the public security organ is informed.
In step S5, the steps of "collecting the item information of the item carried by the general visitor and distinguishing the security item and the dangerous item based on the item information" are the same as the above-mentioned steps, and are not described redundantly.
The difference lies in that if the security product is used, the security certificate is signed and the entrance guard is opened, the method comprises the following steps: and acquiring the security certificate registered by the owner pre-visited by the key personnel, and opening the access control. In an embodiment of the solution, the owner may register the security certificate with a special registration unit. The benefits of this are: and ensuring that the owners are responsible, and if illegal things happen to the community because of the visitors, the owners undertake the same legal responsibility.
"if it is dangerous article, notify the property personnel" includes: and informing the property personnel to temporarily buckle the dangerous goods, and if the property personnel judge that no danger is generated, opening the access control. In the scheme, if the dangerous goods are, the first alarm is controlled to give an alarm to inform property personnel to temporarily buckle the dangerous goods, then the property personnel close the first alarm, and meanwhile, the access control is triggered and opened by the service management platform.
According to a second aspect of the invention, a method for managing the grid-based service of key people in the community based on the internet of things is provided, on the basis of the method for managing the network-based service, the voice of people entering the community is further recognized, so that the possibility of illegal events is reduced as much as possible, and on the other hand, the development of civilized society can be promoted.
Specifically, other steps are the same as those described above, except that:
(voice management step) S6, acquiring the voice content and tone information of community personnel entering the community, analyzing whether dangerous speech exists or not based on the voice content, and acquiring the personnel information of the community personnel based on the tone information if the voice content is the dangerous speech.
The purpose of this step is to analyze from the speech content whether the guest is prone to illicit activity. Specifically, "acquiring the voice content and the tone information of the community personnel, and analyzing whether there is a dangerous utterance based on the voice content" includes: and acquiring the voice content of community personnel by using a voice analysis generator, converting the voice content into text information, analyzing whether dangerous keywords are carried in the text information or not, and judging that the voice content is the dangerous speech if any.
Further, if the number of times of carrying dangerous keywords in the text information is greater than a set number of times, the voice content is the dangerous utterance. The set number of times may be 3 times.
In the embodiment of the scheme, the voice content of the personnel in the community is constantly acquired by using the voice analysis generator, the voice content is sent to the voice-character conversion unit to be converted so as to obtain the text information, the text recognition unit recognizes the text intention of the text information and raises the keywords, and the keywords are compared with the dangerous keywords.
Wherein the risk keywords include, but are not limited to: beating, smashing, robbing, grazing, stealing, killing and the like.
If the voice content is the dangerous speech, obtaining the visitor information of the visitor based on the tone information comprises: if the voice content is the dangerous speech, property personnel is notified, the tone information is recognized, the tone information is compared with a stored tone library to match personnel corresponding to the tone information, and personnel information of community personnel is obtained.
In the scheme, the tone information stored in the tone library is bound with the corresponding personnel information. In the community applicable to the scheme, all the owner's tone color information is stored in the tone color library, and the tone color information and the service information are bound one by one; the tone of the common visitors and key personnel entering the community is recorded, the tone information and the personnel information are bound one by one, if the tone of the common visitors and key personnel entering the community is stored, the common visitors and key personnel entering the community are not stored, and if the tone of the common visitors and key personnel entering the community is not stored, the tone is stored newly.
That is to say, the tone color library stores the tone colors of all community personnel entering the community, at this time, the community personnel can be owners, common visitors and key personnel, and the personnel information can be owner identity information or visitor information of the visitors correspondingly. If the personnel is the owner, the personnel can give an alarm and temporarily withhold the identity document to be used as a safety guarantee; if the person is not owner, the person is immediately evicted.
In the scheme, the safety of the community is maintained from multiple dimensions of the visitor carrying articles, the visitor identity, the visitor voice content and the like.
According to a third aspect of the present invention, there is provided an internet of things-based grid service management platform for key community people, including:
the system comprises a property management server 1, a face recognition unit 2, a dangerous article recognition unit 3, an information registration unit 5, a special information registration unit 6, an access control unit 7 and a monitoring terminal 8, wherein the face recognition unit 2, the dangerous article recognition unit 3, the information registration unit 5, the special information registration unit 6, the access control unit 7 and the monitoring terminal 8 are in communication connection with the property management server 1;
the property management server 1 is internally provided with an information base 11 and an archive base 12, wherein the information base 11 at least stores owner identity information and owner facial feature information of an owner, and the archive base 12 at least stores key personnel identity information and key personnel facial feature information of key personnel and corresponding case types;
the face recognition unit 2 is used for acquiring the facial information of the visitors and distinguishing owners, common visitors and key personnel based on the facial information of the visitors;
the dangerous goods identification unit 3 is used for acquiring the goods information of the goods carried by the visitor and distinguishing safety goods and dangerous goods based on the goods information;
the information registration unit 5 is used for registering visitor information of the visitor and using information of the dangerous goods, wherein the visitor information at least comprises a contact way, an identity card number and a visiting purpose of the visitor, and the using information of the dangerous goods at least comprises a source and a purpose of the dangerous goods corresponding to the owner;
a special information registration unit 6 for filling in a security certificate of the owner;
the access control unit 7 is used for controlling the opening and closing of an access;
and the monitoring terminal 8 is used for notifying the property personnel.
The Internet of things-based community key personnel grid service management platform is controlled according to the management method provided by the first embodiment of the scheme, and the specific information transfer process can refer to the management method of the first embodiment.
Specifically, the face recognition unit 2 is connected to the property management server 1 to obtain information of the information base 11 and the information of the archive base 12, the face recognition unit 2 includes an image acquisition module 21 and a face recognition module 22, wherein the image acquisition module 21 acquires facial information of a visitor of the visitor and transmits the facial information to the face recognition module 22, the face recognition module 22 acquires facial feature information of an owner in the information base 11, compares the facial information of the visitor with the facial feature information of the owner, and determines whether the visitor is the owner if the similarity is greater than a first similarity threshold; if the visitor is a non-owner, the face recognition module 22 obtains the facial feature information of the key personnel in the archive 12, compares the facial feature information of the visitor with the facial feature information of the key personnel, and determines whether the visitor is the key personnel if the similarity is greater than a second similarity threshold, wherein the first similarity threshold is greater than the second similarity threshold.
The hazardous article identification unit 3 comprises a radar transceiver module 31, a radar imaging module 32 and a hazardous article comparison module 33, wherein the radar transceiver module 31 acquires article information of an article of a visitor and transmits the article information to the radar imaging module 32 to obtain article image information, and a hazardous article comparison module 33 is internally provided with a hazardous article image and compares the hazardous article image with the article image information to judge whether the article is a hazardous article.
When the visitor is a general visitor and the hand-held article is a security article, visitor information is registered in the information registering unit 5, wherein the visitor information at least includes identity information of the visitor and a visiting purpose. Specifically, the visitor can fill in the visitor information at the terminal or upload the corresponding visitor information by a designated person.
When the visitor is a home owner and the hand-held article is a dangerous article, the information registering unit 5 registers the use information of the dangerous article, which includes the source and the destination of the dangerous article.
When the visitor is a key personnel of the civil case and the handheld article is a security article, a security certificate registered by an owner and pre-visited by the key personnel of the civil case is acquired and registered in a special information registration unit.
In addition, the service management platform comprises a key personnel management unit for distinguishing key personnel as key personnel in a civil case or key personnel in a criminal case. In the embodiment of the scheme, the case types in the archive are acquired to distinguish the key personnel.
When the visitor is a key person of the civil case and the handheld article is a security article, the security certificate registered by the owner pre-visited by the key person is acquired and recorded in the special information registration unit.
The monitoring terminal 8 includes a first alarm 81 and a second alarm 82, wherein the first alarm 81 and the second alarm 82 emit different alarm information to notify property personnel. Specifically, the first alarm 81 is used for prompting the property personnel to hold dangerous goods, and the second alarm 82 is used for prompting the property personnel that the visitor is a key person.
According to a fourth aspect of the invention, a grid service management platform for key community people based on the internet of things is provided, and a voice analysis unit 9 is added on the third aspect and is used for analyzing whether community people have dangerous speeches.
In the embodiment of the present disclosure, the speech analysis unit 9 includes a speech analysis receiver 91, a speech recognition module 92, an ASR module 93, and an NLP module 94, where the speech analysis receiver 91 is disposed at multiple places in the community activity range and is used to receive the speech content of people in the community range; the ASR module 93 is configured to recognize the speech content as a text, and send the text information to the NLP module; the NLP module 94 is configured to identify text intents and extract keywords therein to compare with dangerous words preset in the NLP module 94; the voice recognition module 92 is used for recording the tone color information of common visitors, key personnel and owners and binding the tone color information with owner information or visitor registration information.
In the community applicable to the scheme, all the owner's tone color information is stored in the tone color library, and the tone color information and the service information are bound one by one; the tone of the common visitors and key personnel entering the community is recorded, the tone information and the personnel information are bound one by one, if the tone of the common visitors and key personnel entering the community is stored, the common visitors and key personnel entering the community are not stored, and if the tone of the common visitors and key personnel entering the community is not stored, the tone is stored newly.
In addition, the service management platform provided by the scheme can be networked with a police station service platform through a wireless communication unit.
The computer system of the server for implementing the internet of things-based community key people grid-based service management method according to the embodiment of the present invention includes a central processing unit CPU), which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) or a program loaded from a storage section into a Random Access Memory (RAM). In the RAM, various programs and data necessary for system operation are also stored. The CPU, ROM, and RAM are connected to each other via a bus. An input/output (I/O) interface is also connected to the bus.
In particular, the process of internet of things based community key people meshing service management described above with reference to the flow diagrams may be implemented as a computer software program, according to an embodiment of the present disclosure. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program containing program code for executing the method for internet of things based grid-based service management of community key people as illustrated in the flowchart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication section, and/or installed from a removable medium. The computer program performs the above-described functions defined in the system of the present invention when executed by a Central Processing Unit (CPU).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. Each block of the block diagrams or flowchart illustrations, and combinations of blocks in the block diagrams or flowchart illustrations, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. The modules described in the embodiments of the present invention may be implemented by software, or may be implemented by hardware, and the described modules may also be disposed in a processor.
The above-described embodiments should not be construed as limiting the scope of the invention. Those skilled in the art will appreciate that various modifications, combinations, sub-combinations, and substitutions can occur, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A grid service management method for key community personnel based on the Internet of things is characterized by comprising the following steps:
a face recognition step: acquiring visitor facial information of a visitor, and distinguishing an owner, a common visitor and a key person based on the visitor facial information, wherein if the visitor is the owner, the owner management step is executed, if the visitor is the common visitor, the common visitor management step is executed, and if the visitor is the key person, the key person management step is executed;
owner management: collecting article information of articles carried by the owner, distinguishing safety articles and dangerous articles based on the article information, and opening an access control if the articles are the safety articles; if the dangerous goods are dangerous goods, informing the property personnel to investigate the owner, registering the source and the purpose of the dangerous goods, and if the property personnel judge that the danger cannot be generated, opening the access control;
and a common visitor management step: collecting article information of articles carried by the common visitor, distinguishing safety articles and dangerous articles based on the article information, and if the articles are the safety articles, registering the visitor information of the common visitor and opening an access control; if the dangerous goods are dangerous goods, informing the property personnel to temporarily buckle the dangerous goods, and if the property personnel judge that no danger is generated, opening the access control;
key personnel management steps: calling file information of the key personnel, distinguishing key personnel of the civil case and key personnel of the criminal case based on the file information, acquiring article information of articles carried by the key personnel if the key personnel of the civil case are the key personnel of the civil case, distinguishing safety articles and dangerous articles based on the article information, opening an access control after acquiring a safety guarantee book registered by an owner pre-visited by the key personnel if the key personnel of the civil case are the safety articles, and informing the property personnel if the key personnel of the civil case are the dangerous articles; if the person is the key person of criminal case, the door is not opened.
2. The Internet of things-based grid service management method for key community personnel, according to claim 1, is characterized by comprising the following voice recognition steps: the method comprises the steps of obtaining voice content and tone information of community personnel entering a community, analyzing whether dangerous speeches exist or not based on the voice content, and obtaining the personnel information of the community personnel based on the tone information if the voice content is the dangerous speeches.
3. The Internet of things-based grid service management method for key community people, according to claim 2, characterized in that a voice analysis generator is used for obtaining the voice content of the community people, converting the voice content into text information, analyzing whether dangerous keywords are carried in the text information or not, and judging the dangerous speech.
4. The Internet of things-based grid service management method for key community personnel, according to claim 3, wherein if the voice content is the dangerous speech, the property is informed to compare the timbre information with a stored timbre library to match personnel corresponding to the timbre information, personnel information of community personnel is obtained, and the timbre library stores the timbres of all personnel entering the community.
5. The Internet of things-based community key personnel grid service management method according to claim 1, wherein distinguishing owner, common visitor and key personnel based on the visitor facial information comprises: comparing owner facial feature information stored in the visitor facial information and the information base, judging whether the visitor is an owner or a non-owner based on the comparison of the similarity and a first similarity threshold value, if the visitor is a non-owner, judging whether the visitor is a common visitor or a key person based on the comparison of the similarity and a second similarity threshold value by using key person facial feature information stored in the visitor facial information and the archival degree, wherein the first similarity threshold value is larger than the second similarity threshold value.
6. The Internet of things-based grid-based service management method for key community personnel, according to claim 1, wherein the step of collecting item information of an item carried by the visitor and distinguishing a security item and a dangerous item based on the item information comprises the following steps: and acquiring an article image of the article by utilizing a radar imaging technology, comparing the article image with a dangerous article image in a dangerous article library, and distinguishing the safe article from the dangerous article.
7. The utility model provides a key personnel grid service management platform in community based on thing networking which characterized in that includes:
the system comprises a property management server, a face recognition unit, a dangerous article recognition unit, an information registration unit, a special information registration unit, an access control unit and a monitoring terminal, wherein the face recognition unit, the dangerous article recognition unit, the information registration unit, the special information registration unit, the access control unit and the monitoring terminal are in communication connection with the property management server;
the property management server is internally provided with an information base and an archive base, wherein the information base at least stores owner identity information and owner facial feature information of an owner, and the archive base at least stores key personnel identity information, key personnel facial feature information and corresponding case types of key personnel;
the face recognition unit is used for acquiring the facial information of the visitors and comparing the facial information of the visitors with the information base or the archive base so as to distinguish owners, common visitors and key personnel;
the dangerous goods identification unit is used for acquiring the goods information of the goods carried by the visitor and distinguishing safety goods and dangerous goods based on the goods information;
the information registration unit is used for registering visitor information of the visitor and using information of the dangerous goods;
a special information registration unit for filling in a security certificate of the owner;
the access control unit is used for controlling the opening and closing of the access;
the monitoring terminal is used for notifying property personnel;
when the visitor is a common visitor and the handheld article is a security article, the visitor information is registered in the information registration unit; when the visitor is a home owner and the hand-held article is a dangerous article, the dangerous article use information is registered in the information registration unit; when the visitor is a key personnel of the civil case and the handheld article is a security article, a security certificate registered by an owner and pre-visited by the key personnel of the civil case is acquired and registered in a special information registration unit.
8. The Internet of things-based grid service management platform for key community people, according to claim 7, comprising: the voice analysis unit is used for acquiring voice content and tone information of community personnel entering a community, analyzing whether dangerous speech exists or not based on the voice content, and acquiring personnel information of the community personnel based on the tone information if the voice content is the dangerous speech.
9. The Internet of things-based networking service management platform for key community people, according to claim 8, wherein a voice analysis generator of a voice analysis unit obtains the voice content of the community people, converts the voice content into text information, analyzes whether dangerous keywords are carried in the text information or not, judges whether the voice content is dangerous speech or not if the dangerous speech is carried, informs a property to compare the tone information and a stored tone library to match people corresponding to the tone information if the dangerous speech is carried, obtains the personnel information of the community people, and stores the tones of all people entering the community.
10. The Internet of things-based grid service management platform for key community people, according to claim 7, wherein the face recognition unit compares the facial information of the visitor with the information base, judges whether the visitor is an owner or a non-owner based on the comparison of the similarity and the first similarity threshold, and judges whether the visitor is an owner or a non-owner; if the visitor is a non-owner, the facial information of the visitor and the facial feature information of key personnel stored in the archives are judged whether the visitor is a common visitor or key personnel based on the comparison of the similarity and a second similarity threshold, and the first similarity threshold is larger than the second similarity threshold.
CN202011520947.7A 2020-12-21 2020-12-21 Internet of things-based networking service management platform and method for key community personnel Pending CN112700579A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011520947.7A CN112700579A (en) 2020-12-21 2020-12-21 Internet of things-based networking service management platform and method for key community personnel

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011520947.7A CN112700579A (en) 2020-12-21 2020-12-21 Internet of things-based networking service management platform and method for key community personnel

Publications (1)

Publication Number Publication Date
CN112700579A true CN112700579A (en) 2021-04-23

Family

ID=75509729

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011520947.7A Pending CN112700579A (en) 2020-12-21 2020-12-21 Internet of things-based networking service management platform and method for key community personnel

Country Status (1)

Country Link
CN (1) CN112700579A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009032188A (en) * 2007-07-30 2009-02-12 Celeste Inter Cooperation Reception system
CN204029015U (en) * 2014-08-02 2014-12-17 四川五博科技有限公司 Visitor management system
CN204965566U (en) * 2015-09-28 2016-01-13 尚淑玲 District access control system based on thing networking
CN108520749A (en) * 2018-03-06 2018-09-11 杭州孚立计算机软件有限公司 A kind of voice-based grid-based management control method and control device
CN108573554A (en) * 2018-04-12 2018-09-25 广东汇泰龙科技有限公司 A kind of automatic identification alarm method and system based on face lock
CN108961520A (en) * 2018-09-21 2018-12-07 深圳市九洲电器有限公司 A kind of face identification method and device
CN109410521A (en) * 2018-12-28 2019-03-01 苏州思必驰信息科技有限公司 Voice monitoring alarm method and system
CN109741498A (en) * 2018-12-28 2019-05-10 金威建设集团有限公司 A method of intelligence registration community visitor
CN109949009A (en) * 2019-03-20 2019-06-28 任磊 A kind of Campus Office System based on student health development
CN110097882A (en) * 2019-05-16 2019-08-06 安徽天帆智能科技有限责任公司 A kind of intelligent safety and defence system based on speech recognition technology

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009032188A (en) * 2007-07-30 2009-02-12 Celeste Inter Cooperation Reception system
CN204029015U (en) * 2014-08-02 2014-12-17 四川五博科技有限公司 Visitor management system
CN204965566U (en) * 2015-09-28 2016-01-13 尚淑玲 District access control system based on thing networking
CN108520749A (en) * 2018-03-06 2018-09-11 杭州孚立计算机软件有限公司 A kind of voice-based grid-based management control method and control device
CN108573554A (en) * 2018-04-12 2018-09-25 广东汇泰龙科技有限公司 A kind of automatic identification alarm method and system based on face lock
CN108961520A (en) * 2018-09-21 2018-12-07 深圳市九洲电器有限公司 A kind of face identification method and device
CN109410521A (en) * 2018-12-28 2019-03-01 苏州思必驰信息科技有限公司 Voice monitoring alarm method and system
CN109741498A (en) * 2018-12-28 2019-05-10 金威建设集团有限公司 A method of intelligence registration community visitor
CN109949009A (en) * 2019-03-20 2019-06-28 任磊 A kind of Campus Office System based on student health development
CN110097882A (en) * 2019-05-16 2019-08-06 安徽天帆智能科技有限责任公司 A kind of intelligent safety and defence system based on speech recognition technology

Similar Documents

Publication Publication Date Title
CN108052925B (en) Intelligent management method for community personnel files
CN108492404B (en) Face lock unlocking method and device with additional expression recognition function
CN106408832B (en) A kind of monitoring method and system of noiseless visitor
US11049375B2 (en) Parcel delivery prediction-based theft detection
CN111599065A (en) Method and system for managing public rental personnel
CN108364374A (en) Face access control device based on deep learning and method
CN106897959A (en) A kind of intelligent Community safety-protection system based on Internet of Things
CN108010289A (en) A kind of internet alarm method and system based on Application on Voiceprint Recognition
CN106504374A (en) A kind of can automatic identification entrance guard security system
CN103714631A (en) ATM intelligent monitoring system based on human face recognition
CN108009488A (en) The street security joint defense system of Behavior-based control analysis
CN113330491B (en) Electronic gate opening method and device and server
JP2019535067A (en) Parcel theft deterrence for wireless audio / video recording and communication devices
CN101668291A (en) Multifunctional multi-collection portable ID identifying device and method based on 3G network
CN112002094A (en) Cell personnel management method based on triangular positioning
CN110415410A (en) A kind of access control system of residential community based on safety technological guard engineering
CN110211270A (en) A kind of efficient secret laboratory access control system
EP3828837A1 (en) Frictionless security processing
CN210295241U (en) Intelligent entrance guard
CN112700579A (en) Internet of things-based networking service management platform and method for key community personnel
CN105139502A (en) Intelligent material evidence access control system
CN111126167A (en) Method and system for quickly identifying series activities of multiple specific persons
CN116308960A (en) Intelligent park property prevention and control management system based on data analysis and implementation method thereof
CN110197341A (en) Social contradications dispute information management system and method
CN210377604U (en) Multifunctional community access control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210423