CN112906839A - Fixed asset monitoring method, device, equipment and storage medium - Google Patents

Fixed asset monitoring method, device, equipment and storage medium Download PDF

Info

Publication number
CN112906839A
CN112906839A CN202110196757.2A CN202110196757A CN112906839A CN 112906839 A CN112906839 A CN 112906839A CN 202110196757 A CN202110196757 A CN 202110196757A CN 112906839 A CN112906839 A CN 112906839A
Authority
CN
China
Prior art keywords
fixed asset
information
taken away
away
fixed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110196757.2A
Other languages
Chinese (zh)
Inventor
阮华敏
黄翔靖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Entropy Technology Co Ltd
ZKTeco Co Ltd
Original Assignee
Xiamen Entropy Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Entropy Technology Co Ltd filed Critical Xiamen Entropy Technology Co Ltd
Priority to CN202110196757.2A priority Critical patent/CN112906839A/en
Publication of CN112906839A publication Critical patent/CN112906839A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/41Higher-level, semantic clustering, classification or understanding of video scenes, e.g. detection, labelling or Markovian modelling of sport events or news items
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Computational Linguistics (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a fixed asset monitoring method, a device, equipment and a storage medium, which are applied to a locally deployed fixed asset monitoring system, and the method comprises the following steps: when any fixed asset is taken away, acquiring label information corresponding to the fixed asset; judging whether the fixed assets support being taken away or not according to the label information and a preset white list; if the fixed assets do not support being taken away, identifying identity information of the person who is taken away according to the obtained real-time video information; and executing monitoring processing operation according to the blacklist comparison result aiming at the identity information. Therefore, the fixed asset checking workload is reduced, the asset taking-away condition is judged more effectively in a data mode, the asset taken away is effectively tracked in position, and the monitoring function is separated from the cloud end to operate.

Description

Fixed asset monitoring method, device, equipment and storage medium
Technical Field
The present invention relates to the field of asset monitoring technologies, and in particular, to a fixed asset monitoring method, apparatus, device, and storage medium.
Background
In some scenarios with fixed assets, such as a campus and a system equipment library of an enterprise, due to working requirements, many valuable devices in the system equipment library may need to be occasionally changed or transferred, and equipment change may introduce a hidden danger that the assets cannot be monitored, which may easily result in asset loss.
The existing asset monitoring method generally adopts a mobile reader-writer to carry out routing inspection so as to read an electronic tag on a fixed asset, judge whether the asset is illegally transferred and effectively finish safety audit.
However, the above scheme is based on regular inventory of fixed assets by enterprises, and when the number of devices is large, the following defects exist:
1) the inventory workload is large, and the fixed assets in the warehouse and the use condition cannot be acquired in time.
2) Whether the fixed assets in the current library support to be taken out of the asset library or not can not be judged in a data mode, and the judgment of personnel is relied on, so that the method is time-consuming, large in workload of personnel, low in efficiency and high in misjudgment rate.
3) The location tracking of the assets being taken away is not possible.
4) The monitoring function is deployed at the cloud end to operate, and the problems of low data security, increased deployment cost, high dependence on cloud service maintenance and the like exist.
Disclosure of Invention
The invention provides a fixed asset monitoring method, a fixed asset monitoring device, fixed asset monitoring equipment and a storage medium, and solves the technical problems that the existing inherent asset monitoring method has large inventory checking workload due to the fact that the number of inventory checking devices is large, the taking-off condition of assets cannot be judged in a data mode, the position of the taken-off assets is difficult to track, and the monitoring function depends on a cloud side.
The invention provides a fixed asset monitoring method, which is characterized in that the method is applied to a locally deployed fixed asset monitoring system, and comprises the following steps:
when any fixed asset is taken away, acquiring label information corresponding to the fixed asset;
judging whether the fixed asset supports being taken away or not according to the label information and a preset white list;
if the fixed asset does not support being taken away, identifying identity information of the person who is taken away according to the obtained real-time video information;
and executing monitoring processing operation according to the blacklist comparison result aiming at the identity information.
Optionally, the step of determining whether the fixed asset supports being taken away according to the tag information and a preset white list includes:
traversing a preset white list; wherein the preset white list comprises a plurality of information of the labels which can be taken away and a plurality of information of the labels which cannot be taken away
If the tag information is the same as any one of the detachable tag information, determining that the fixed asset support is detached;
and if the tag information is the same as any one of the non-detachable tag information, judging that the fixed asset does not support being detached.
Optionally, the step of executing a monitoring processing operation according to the blacklist comparison result for the identity information includes:
if the identity information is in a blacklist, eliminating the passing permission of the taken-away personnel;
and outputting first alarm information and displaying the real-time video information on a real-time monitoring page.
Optionally, the method further comprises:
and if the identity information is not in a blacklist, the real-time video information is stored.
Optionally, the preset white list further includes an effective band-off time period corresponding to each of the band-off tag information, and the method further includes:
and if the fixed asset support is taken away and is not in the effective taking away time period, eliminating the passing authority of the taken away personnel and outputting second alarm information.
Optionally, the method further comprises:
and if the fixed asset support is taken away and is within the effective taking away time period, the real-time video information is saved.
Optionally, the method further comprises:
and if the tag information does not exist in the preset white list, judging that the fixed asset is not registered, recording the identity information in the black list and outputting third alarm information.
The invention also provides a fixed asset monitoring device, which is applied to a locally deployed fixed asset monitoring system and comprises a tag information acquisition module, a fixed asset management module, an AI camera module and a monitoring processing module;
the tag information acquisition module is used for acquiring tag information corresponding to any fixed asset when the fixed asset is taken away;
the fixed asset management module is used for judging whether the fixed asset supports being taken away or not according to the label information and a preset white list;
the AI camera module is used for identifying the identity information of the person to be carried away according to the acquired real-time video information if the fixed asset does not support being carried away;
and the monitoring processing module is used for executing monitoring processing operation according to the blacklist comparison result aiming at the identity information.
The invention also provides an electronic device comprising a memory and a processor, wherein the memory stores a computer program, and the computer program, when executed by the processor, causes the processor to perform the steps of the fixed asset monitoring method according to any one of the above.
The invention also provides a computer readable storage medium having stored thereon a computer program which, when executed by the processor, implements a fixed asset monitoring method as defined in any one of the preceding claims.
According to the technical scheme, the invention has the following advantages:
according to the method, through acquiring the tag information corresponding to the fixed assets, when any one fixed asset is taken away, whether the taken away fixed asset supports the taken away is judged according to the tag information and the preset white list, if the taken away fixed asset does not support the taken away fixed asset, the real-time video information is acquired, the identity information of the person taking away the fixed asset is identified according to the acquired real-time video information, and corresponding monitoring processing operation is executed based on the comparison result of the identity information and the preset black list, so that the technical problems that the inventory workload is large due to the fact that the inventory equipment is large in quantity, the asset taking away condition cannot be judged in a data mode, the taken away asset is difficult to track the position of the taken away asset, and the monitoring function depends on the cloud end in the conventional inherent asset monitoring method are solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
FIG. 1 is a flowchart illustrating steps of a method for monitoring fixed assets according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating steps of a fixed asset monitoring method according to a second embodiment of the present invention;
fig. 3 is a block diagram of a fixed asset monitoring device according to a third embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a fixed asset monitoring method, a fixed asset monitoring device, fixed asset monitoring equipment and a storage medium, which are used for solving the technical problems that the existing inherent asset monitoring method has large inventory checking workload due to the fact that the number of inventory checking devices is large, the asset taking-off condition cannot be judged in a datamation mode, the taken-off asset is difficult to track in position, and the monitoring function depends on a cloud end.
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the embodiments described below are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart illustrating steps of a fixed asset monitoring method according to an embodiment of the present invention.
The invention provides a fixed asset monitoring method, which is characterized in that the method is applied to a locally deployed fixed asset monitoring system and comprises the following steps:
step 101, when any fixed asset is taken away, acquiring label information corresponding to the fixed asset;
the tag information refers to an Electronic Product Code (EPC), and is provided on each fixed asset in the form of an RFID (Radio Frequency Identification) tag, so that the fixed asset can be tagged, the RFID tag of each fixed asset is registered in the fixed asset monitoring system, the fixed asset corresponding to the RFID tag is identified by a communication method such as TCP/IP, and the in-library range of the fixed asset is specified by the output power of the RFID tag; the label information may further include information such as a code, purchase price, purchase time, custodian, and custody location.
In a specific implementation, the tag information of the fixed assets can be set when the fixed assets are put in storage, the fixed assets are registered in the fixed asset monitoring system, the tag information corresponding to each fixed asset is obtained in real time, and when any fixed asset is taken away, the tag information corresponding to the fixed asset is obtained, so that whether the fixed asset supports being taken away or not can be determined.
Step 102, judging whether the fixed asset supports being taken away or not according to the label information and a preset white list;
the fixed assets may not all be stored in the warehouse and each have their own location during use, where some fixed assets may need to be moved more frequently and some fixed assets do not need to be moved. When any one of the fixed assets is taken away, the tag information of the taken-away fixed asset can be compared with a preset white list, and whether the fixed asset supports being taken away is judged according to the comparison result.
103, if the fixed asset does not support being taken away, identifying identity information of the person who is taken away according to the obtained real-time video information;
in the embodiment of the invention, if the fixed asset is judged not to be carried away, the fixed asset is in the abnormal carried away condition at the moment, and the position of the fixed asset can be positioned according to the tag information carried by the fixed asset at the moment so as to obtain the real-time video information of the fixed asset; and finally, identifying the person who takes away the fixed asset by adopting the real-time video information to obtain the identity information of the person who takes away so as to determine whether the operation of taking away the person from the fixed asset is needed to carry out subsequent alarm processing.
The identity information may include face information of a person to be taken away, and registration information of the person to be taken away, such as name, job number, department, etc., of the person to be taken away, or a person marked as stranger.
And 104, executing monitoring processing operation according to the blacklist comparison result aiming at the identity information.
And after the identity information of the people who leave the system is acquired, monitoring processing operation is executed according to a blacklist comparison result obtained by comparing the identity information with the blacklist, so that the operations of real-time monitoring of the people who leave the system, real-time alarming, recording of the process of leaving the fixed asset and the like are realized.
In the embodiment of the invention, by acquiring the tag information corresponding to the fixed assets, when any one fixed asset is taken away, whether the taken away fixed asset supports the taken away is judged according to the tag information and the preset white list, if the taken away fixed asset does not support the taken away fixed asset, the real-time video information is acquired, the identity information of the person taking away from the fixed asset is identified according to the acquired real-time video information, and the corresponding monitoring processing operation is executed based on the comparison result of the identity information and the preset black list, so that the technical problems that the existing inherent asset monitoring method is large in inventory workload due to the fact that the quantity of inventory equipment is large, the taking away condition of the asset cannot be judged in a datamation manner, the position tracking of the taken away asset is difficult, and the monitoring function depends on the cloud are solved.
Referring to fig. 2, fig. 2 is a flowchart illustrating steps of a fixed asset monitoring method according to a second embodiment of the present invention.
The invention provides a fixed asset monitoring method, which is characterized in that the method is applied to a locally deployed fixed asset monitoring system and comprises the following steps:
step 201, when any fixed asset is taken away, acquiring label information corresponding to the fixed asset;
in the embodiment of the present invention, the specific implementation process of step 201 is similar to that of step 101, and is not described herein again.
It is worth mentioning that, the method for judging whether the fixed asset is taken away can regulate the in-warehouse range of the fixed asset through the output power of the RFID tag, when the RFID tag carried by the fixed asset is taken out of the in-warehouse range, it is judged that the fixed asset is taken away, and the tag information corresponding to the fixed asset is obtained to perform subsequent monitoring processing.
Alternatively, the tag of the fixed asset can be identified by a multi-tag identification algorithm, and when the tag is not in the predetermined position, the fixed asset is taken away.
Step 202, judging whether the fixed asset is supported to be taken away or not according to the label information and a preset white list;
optionally, step 202 may include the following sub-steps:
when any fixed asset is taken away, traversing a preset white list; the preset white list comprises a plurality of information of labels which can be taken away and a plurality of information of labels which cannot be taken away;
if the tag information is the same as any one of the label information capable of being taken away, judging that the fixed asset support is taken away;
and if the tag information is the same as any one of the non-detachable tag information, judging that the fixed asset is not supported to be detached.
In a specific implementation, since fixed assets are all tagged, a white list can be preset in the system, and corresponding information of the taken-off tag and information of the taken-off tag are set in the white list.
When any fixed asset is taken away, the preset white list can be traversed to determine whether information identical to the label information exists, and if the label information is identical to any label information capable of being taken away, the fixed asset is judged to support being taken away; and if the tag information is the same as any one of the non-detachable tag information, judging that the fixed asset is not supported to be detached.
Step 203, if the fixed asset does not support being taken away, identifying the identity information of the person who is taken away according to the obtained real-time video information;
in the real-time embodiment of the invention, if the fixed asset does not support being taken away but is taken away by the person, the real-time video information of the fixed asset at the current moment can be acquired through the camera device such as an AI camera, and the identity information of the person who is taken away is identified according to the real-time video information.
For example, real-time video information can be acquired through an AI camera, the face information of the person to be carried away can be obtained by performing operations such as video recording and snapshot on the field situation, and then the acquired face information is matched from a database to determine the identity information of the person to be carried away.
Optionally, the preset white list further includes an effective band-off time period corresponding to each piece of band-off tag information, and the method further includes:
and if the fixed asset support is taken away and is not in the effective taking away time period, eliminating the passing authority of the taken away personnel and outputting second alarm information.
In the embodiment of the present invention, when the fixed asset is in the preset white list, it is determined that the fixed asset is supported to be taken away, and in order to prevent the fixed asset from being taken away for too long, an effective taking away time period corresponding to each information of the label capable of being taken away may be further set in the preset white list. When the fixed asset is judged to support being taken away and is not in the effective taking away time period, the current taking away operation is determined to be not legal, at the moment, the passing permission of the person who is taken away can be directly eliminated, and meanwhile, alarm information can be output.
Wherein the fixed asset not being brought away during the active bring-away period further comprises the fixed asset being brought away during the active bring-away period, but not being returned during the active bring-away period.
Further, the method further comprises:
and if the fixed asset support is brought away and is in the effective brought away time period, the real-time video information is saved.
In specific implementation, if the fixed asset supports being taken away and is within an effective taking away time period, it is indicated that the taking away operation at this time belongs to a legal operation, but in order to further prevent the fixed asset from being lost, the acquired real-time video information can be stored to provide a history tracing function, so that an enterprise manager can query a history record through conditions such as time, specific equipment, personnel and the like, and acquire evidences such as a taking away record and video monitoring.
Step 204, if the identity information is in the blacklist, eliminating the passing authority of the person to be carried away;
step 205, outputting first alarm information and displaying real-time video information on a real-time monitoring page;
in specific implementation, the blacklist can be set by a manager, or the blacklist of the alarm system is directly synchronized, and the manager can add the identity information to the blacklist after recognizing the identity information of the person to be taken away.
In the embodiment of the invention, if the identity information is in the blacklist, the operation of taking away the person is not legal, at this time, the passing permission of the person, such as entrance guard permission, passage permission and the like, can be directly eliminated, the person to be taken away is limited at the current position, the person to be taken away cannot enter the door and the passage maintained by the system, and the fixed asset is effectively prevented from being taken away too far.
Meanwhile, alarm information can be output, and real-time video information is displayed on a real-time monitoring page, so that management personnel can be informed to process the illegal operation in time.
Alternatively, the alert information may include fixed asset information, identity information, image information, location information, and the like.
Furthermore, after the administrator checks the alarm information, the alarm is found to be false alarm, and the alarm can be cancelled according to the alarm information; or under the condition that the range of a park or an enterprise is large, an alarm notice can be issued, and units are called to catch the people away.
And step 206, if the identity information is not in the blacklist, storing the real-time video information.
In another example of the present invention, if the identity information is not in the blacklist, the real-time video information is saved to provide a history tracing function, so that an enterprise administrator can query the history record through conditions such as time, specific equipment, personnel, and the like, and obtain evidence such as a leave record, video monitoring, and the like.
In another example of the present invention, the method further comprises:
and if the tag information does not exist in the preset white list, judging that the fixed asset is not registered, recording identity information in a black list and outputting third alarm information.
In the embodiment of the invention, if the tag information does not exist in the preset white list, the fixed asset is not registered, and in order to prevent the fixed asset from being lost, the identity information of the person away from the fixed asset can be recorded in the black list and alarm information is output so as to inform a manager to process the fixed asset.
In specific implementation, the manager can set the alarm condition according to the taking-away action.
In the embodiment of the invention, by acquiring the tag information corresponding to the fixed assets, when any one fixed asset is taken away, whether the taken away fixed asset supports the taken away is judged according to the tag information and the preset white list, if the taken away fixed asset does not support the taken away fixed asset, the real-time video information is acquired, the identity information of the person taking away from the fixed asset is identified according to the acquired real-time video information, and the corresponding monitoring processing operation is executed based on the comparison result of the identity information and the preset black list, so that the technical problems that the existing inherent asset monitoring method is large in inventory workload due to the fact that the quantity of inventory equipment is large, the taking away condition of the asset cannot be judged in a datamation manner, the position tracking of the taken away asset is difficult, and the monitoring function depends on the cloud are solved.
Referring to fig. 3, fig. 3 is a block diagram of a fixed asset monitoring device according to a third embodiment of the present invention.
The invention provides a fixed asset monitoring device, which is applied to a locally deployed fixed asset monitoring system and comprises a tag information acquisition module, a fixed asset management module, an AI camera module and a monitoring processing module;
a tag information obtaining module 301, configured to obtain tag information corresponding to a fixed asset when any fixed asset is taken away;
the fixed asset management module 302 is configured to determine whether the fixed asset is supported to be taken away according to the tag information and a preset white list;
the AI camera module 303 is configured to identify identity information of a person who is away from the fixed asset according to the acquired real-time video information if the fixed asset does not support being away from the fixed asset;
and the monitoring processing module 304 is configured to execute a monitoring processing operation according to the blacklist comparison result for the identity information.
Optionally, the fixed asset management module 302 comprises:
the traversal submodule is used for traversing a preset white list; the preset white list comprises a plurality of information of the labels which can be taken away and a plurality of information of the labels which cannot be taken away
The first taking-away judgment sub-module is used for judging that the fixed asset support is taken away if the tag information is the same as any one of the label information capable of being taken away;
and the first taking-off judgment sub-module is used for judging that the fixed asset is not supported to be taken off if the tag information is the same as any one of the non-taken-off tag information.
Optionally, the monitoring processing module 304 includes:
the permission eliminating submodule is used for eliminating the passing permission of the person if the identity information is in the blacklist;
and the alarm submodule is used for outputting first alarm information and displaying real-time video information on a real-time monitoring page.
Optionally, the method further comprises:
and the first video storage module is used for storing the real-time video information if the identity information is not in the blacklist.
Optionally, the preset white list further includes an effective band-off time period corresponding to each piece of band-off tag information, and the system further includes:
and the permission and alarm module is used for eliminating the passing permission of the person to be carried away and outputting second alarm information if the fixed asset support is carried away and is not in the effective carrying away time period.
Optionally, the system further comprises:
and the second video storage module is used for storing the real-time video information if the fixed asset support is taken away and is in an effective taking away time period.
Optionally, the system further comprises:
and the recording and alarming module is used for judging that the fixed asset is not registered if the tag information does not exist in the preset white list, recording the identity information in the black list and outputting third alarming information.
The invention also provides an electronic device comprising a memory and a processor, wherein the memory stores a computer program, and the computer program, when executed by the processor, causes the processor to perform the steps of the fixed asset monitoring method according to any one of the embodiments.
The invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a fixed asset monitoring method as in any of the embodiments described above.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A fixed asset monitoring method applied to a locally deployed fixed asset monitoring system, the method comprising:
when any fixed asset is taken away, acquiring label information corresponding to the fixed asset;
judging whether the fixed asset supports being taken away or not according to the label information and a preset white list;
if the fixed asset does not support being taken away, identifying identity information of the person who is taken away according to the obtained real-time video information;
and executing monitoring processing operation according to the blacklist comparison result aiming at the identity information.
2. The fixed asset monitoring method according to claim 1, wherein said step of determining whether the fixed asset supports being taken away according to the tag information and a preset white list comprises:
traversing a preset white list; wherein the preset white list comprises a plurality of information of the labels which can be taken away and a plurality of information of the labels which cannot be taken away
If the tag information is the same as any one of the detachable tag information, determining that the fixed asset support is detached;
and if the tag information is the same as any one of the non-detachable tag information, judging that the fixed asset does not support being detached.
3. The fixed asset monitoring method according to claim 1, wherein the step of performing a monitoring processing operation according to the blacklist comparison result for the identity information includes:
if the identity information is in a blacklist, eliminating the passing permission of the taken-away personnel;
and outputting first alarm information and displaying the real-time video information on a real-time monitoring page.
4. The fixed asset monitoring method of claim 3, further comprising:
and if the identity information is not in a blacklist, the real-time video information is stored.
5. The fixed asset monitoring method according to claim 2, wherein said predefined white list further comprises a valid bring-away time period corresponding to each of said leave-able tag information, said method further comprising:
and if the fixed asset support is taken away and is not in the effective taking away time period, eliminating the passing authority of the taken away personnel and outputting second alarm information.
6. The fixed asset monitoring method of claim 5, further comprising:
and if the fixed asset support is taken away and is within the effective taking away time period, the real-time video information is saved.
7. The fixed asset monitoring method according to any of claims 1-6, wherein the method further comprises:
and if the tag information does not exist in the preset white list, judging that the fixed asset is not registered, recording the identity information in the black list and outputting third alarm information.
8. A fixed asset monitoring device is characterized in that a fixed asset monitoring system applied to local deployment comprises a tag information acquisition module, a fixed asset management module, an AI camera module and a monitoring processing module;
the tag information acquisition module is used for acquiring tag information corresponding to any fixed asset when the fixed asset is taken away;
the fixed asset management module is used for judging whether the fixed asset supports being taken away or not according to the label information and a preset white list;
the AI camera module is used for identifying the identity information of the person to be carried away according to the acquired real-time video information if the fixed asset does not support being carried away;
and the monitoring processing module is used for executing monitoring processing operation according to the blacklist comparison result aiming at the identity information.
9. An electronic device comprising a memory and a processor, the memory having stored therein a computer program that, when executed by the processor, causes the processor to perform the steps of the fixed asset monitoring method of any of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a fixed asset monitoring method according to any one of claims 1-7.
CN202110196757.2A 2021-02-22 2021-02-22 Fixed asset monitoring method, device, equipment and storage medium Pending CN112906839A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110196757.2A CN112906839A (en) 2021-02-22 2021-02-22 Fixed asset monitoring method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110196757.2A CN112906839A (en) 2021-02-22 2021-02-22 Fixed asset monitoring method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112906839A true CN112906839A (en) 2021-06-04

Family

ID=76124460

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110196757.2A Pending CN112906839A (en) 2021-02-22 2021-02-22 Fixed asset monitoring method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112906839A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114189799A (en) * 2021-11-12 2022-03-15 珠海大横琴科技发展有限公司 Fixed asset monitoring method and device
CN114418281A (en) * 2021-12-08 2022-04-29 浙江创泰科技有限公司 Fixed asset full life cycle management method and system

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090160646A1 (en) * 2007-12-20 2009-06-25 General Electric Company System and method for monitoring and tracking inventories
CN201984523U (en) * 2011-01-20 2011-09-21 北京金宇盛通科技有限公司 Information security management system (ISMS) for personnel and carrier
CN103021044A (en) * 2011-09-23 2013-04-03 北京天一众合科技股份有限公司 Method, device and system for area monitoring
CN103778449A (en) * 2014-01-20 2014-05-07 中国科学院数据与通信保护研究教育中心 Tracking and monitoring system and method for intra-area mobile storage device
CN103955781A (en) * 2014-03-14 2014-07-30 李志敏 Intelligent identification confidential article management system based on Internet of Things
CN105809868A (en) * 2016-04-07 2016-07-27 河海大学常州校区 RFID-technology-based campus anti-theft system and method
CN106447143A (en) * 2015-08-06 2017-02-22 宁波福玛特金属制品实业有限公司 Intelligent material evidence management system
CN109615158A (en) * 2018-10-15 2019-04-12 平安科技(深圳)有限公司 Asset management monitoring method, device, computer equipment and storage medium
CN210270972U (en) * 2019-07-18 2020-04-07 国电宁波风电开发有限公司 Warehouse supervisory system
CN111724288A (en) * 2020-06-18 2020-09-29 深圳市海恒智能科技有限公司 Book borrowing method and system based on mobile terminal
CN111971703A (en) * 2019-12-12 2020-11-20 深圳市微蓝智能科技有限公司 Article management method, background system, data processing device and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090160646A1 (en) * 2007-12-20 2009-06-25 General Electric Company System and method for monitoring and tracking inventories
CN201984523U (en) * 2011-01-20 2011-09-21 北京金宇盛通科技有限公司 Information security management system (ISMS) for personnel and carrier
CN103021044A (en) * 2011-09-23 2013-04-03 北京天一众合科技股份有限公司 Method, device and system for area monitoring
CN103778449A (en) * 2014-01-20 2014-05-07 中国科学院数据与通信保护研究教育中心 Tracking and monitoring system and method for intra-area mobile storage device
CN103955781A (en) * 2014-03-14 2014-07-30 李志敏 Intelligent identification confidential article management system based on Internet of Things
CN106447143A (en) * 2015-08-06 2017-02-22 宁波福玛特金属制品实业有限公司 Intelligent material evidence management system
CN105809868A (en) * 2016-04-07 2016-07-27 河海大学常州校区 RFID-technology-based campus anti-theft system and method
CN109615158A (en) * 2018-10-15 2019-04-12 平安科技(深圳)有限公司 Asset management monitoring method, device, computer equipment and storage medium
CN210270972U (en) * 2019-07-18 2020-04-07 国电宁波风电开发有限公司 Warehouse supervisory system
CN111971703A (en) * 2019-12-12 2020-11-20 深圳市微蓝智能科技有限公司 Article management method, background system, data processing device and storage medium
CN111724288A (en) * 2020-06-18 2020-09-29 深圳市海恒智能科技有限公司 Book borrowing method and system based on mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114189799A (en) * 2021-11-12 2022-03-15 珠海大横琴科技发展有限公司 Fixed asset monitoring method and device
CN114418281A (en) * 2021-12-08 2022-04-29 浙江创泰科技有限公司 Fixed asset full life cycle management method and system

Similar Documents

Publication Publication Date Title
US7245221B2 (en) Inventory control
RU2740619C2 (en) Tracking and anticipation system of thefts
US7239241B2 (en) Method and system for inventory control
CN112906839A (en) Fixed asset monitoring method, device, equipment and storage medium
EP1567995A2 (en) Surveillance system with identification correlation
CN101957935A (en) Logistics finance integrated system and implementation method thereof
CN110738178A (en) Garden construction safety detection method and device, computer equipment and storage medium
CN101923677B (en) Data storage system and data storage method
CN207938132U (en) Cash register loss prevention system
KR20130035936A (en) Inventory and anti-theft alarm system
US9430654B1 (en) Process of destroying data on units within an organization when they are not functioning or no longer in use
CN111161486A (en) Commodity anti-theft method and system based on settlement box
WO2010011277A1 (en) System and method for correlating supply chain theft with internet auction activity
CN103177524B (en) A kind of monitored object realtime monitoring in place device and method
CN115880611A (en) Cash receiving loss prevention method, device, equipment and storage medium
CN114897117A (en) Asset equipment positioning management system and method based on RFID
CN106022403B (en) A kind of Workshop Production overhaul of the equipments record system and method based on RFID
Viji et al. Intelligent Library Management Using Radio Frequency Identification
KR101375076B1 (en) cloud type logistics sychronization system based AIDC
KR20060103381A (en) Method and system for preserving goods from outflow by using rfid
US20180184144A1 (en) Apparatus and method for asset-based video access
CN201662831U (en) Logistic integration control system based on RFID
CN114330391B (en) Asset electronic fence construction method and device
KR102681813B1 (en) Apparatus and method for worker access control
CN202003396U (en) Data preservation system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210604

RJ01 Rejection of invention patent application after publication