CN112906839A - Fixed asset monitoring method, device, equipment and storage medium - Google Patents
Fixed asset monitoring method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN112906839A CN112906839A CN202110196757.2A CN202110196757A CN112906839A CN 112906839 A CN112906839 A CN 112906839A CN 202110196757 A CN202110196757 A CN 202110196757A CN 112906839 A CN112906839 A CN 112906839A
- Authority
- CN
- China
- Prior art keywords
- fixed asset
- information
- taken away
- away
- fixed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 81
- 238000000034 method Methods 0.000 title claims abstract description 60
- 238000012545 processing Methods 0.000 claims abstract description 23
- 238000004590 computer program Methods 0.000 claims description 8
- 238000012806 monitoring device Methods 0.000 claims description 7
- 230000006870 function Effects 0.000 description 8
- 238000007726 management method Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0029—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/40—Scenes; Scene-specific elements in video content
- G06V20/41—Higher-level, semantic clustering, classification or understanding of video scenes, e.g. detection, labelling or Markovian modelling of sport events or news items
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Computational Linguistics (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a fixed asset monitoring method, a device, equipment and a storage medium, which are applied to a locally deployed fixed asset monitoring system, and the method comprises the following steps: when any fixed asset is taken away, acquiring label information corresponding to the fixed asset; judging whether the fixed assets support being taken away or not according to the label information and a preset white list; if the fixed assets do not support being taken away, identifying identity information of the person who is taken away according to the obtained real-time video information; and executing monitoring processing operation according to the blacklist comparison result aiming at the identity information. Therefore, the fixed asset checking workload is reduced, the asset taking-away condition is judged more effectively in a data mode, the asset taken away is effectively tracked in position, and the monitoring function is separated from the cloud end to operate.
Description
Technical Field
The present invention relates to the field of asset monitoring technologies, and in particular, to a fixed asset monitoring method, apparatus, device, and storage medium.
Background
In some scenarios with fixed assets, such as a campus and a system equipment library of an enterprise, due to working requirements, many valuable devices in the system equipment library may need to be occasionally changed or transferred, and equipment change may introduce a hidden danger that the assets cannot be monitored, which may easily result in asset loss.
The existing asset monitoring method generally adopts a mobile reader-writer to carry out routing inspection so as to read an electronic tag on a fixed asset, judge whether the asset is illegally transferred and effectively finish safety audit.
However, the above scheme is based on regular inventory of fixed assets by enterprises, and when the number of devices is large, the following defects exist:
1) the inventory workload is large, and the fixed assets in the warehouse and the use condition cannot be acquired in time.
2) Whether the fixed assets in the current library support to be taken out of the asset library or not can not be judged in a data mode, and the judgment of personnel is relied on, so that the method is time-consuming, large in workload of personnel, low in efficiency and high in misjudgment rate.
3) The location tracking of the assets being taken away is not possible.
4) The monitoring function is deployed at the cloud end to operate, and the problems of low data security, increased deployment cost, high dependence on cloud service maintenance and the like exist.
Disclosure of Invention
The invention provides a fixed asset monitoring method, a fixed asset monitoring device, fixed asset monitoring equipment and a storage medium, and solves the technical problems that the existing inherent asset monitoring method has large inventory checking workload due to the fact that the number of inventory checking devices is large, the taking-off condition of assets cannot be judged in a data mode, the position of the taken-off assets is difficult to track, and the monitoring function depends on a cloud side.
The invention provides a fixed asset monitoring method, which is characterized in that the method is applied to a locally deployed fixed asset monitoring system, and comprises the following steps:
when any fixed asset is taken away, acquiring label information corresponding to the fixed asset;
judging whether the fixed asset supports being taken away or not according to the label information and a preset white list;
if the fixed asset does not support being taken away, identifying identity information of the person who is taken away according to the obtained real-time video information;
and executing monitoring processing operation according to the blacklist comparison result aiming at the identity information.
Optionally, the step of determining whether the fixed asset supports being taken away according to the tag information and a preset white list includes:
traversing a preset white list; wherein the preset white list comprises a plurality of information of the labels which can be taken away and a plurality of information of the labels which cannot be taken away
If the tag information is the same as any one of the detachable tag information, determining that the fixed asset support is detached;
and if the tag information is the same as any one of the non-detachable tag information, judging that the fixed asset does not support being detached.
Optionally, the step of executing a monitoring processing operation according to the blacklist comparison result for the identity information includes:
if the identity information is in a blacklist, eliminating the passing permission of the taken-away personnel;
and outputting first alarm information and displaying the real-time video information on a real-time monitoring page.
Optionally, the method further comprises:
and if the identity information is not in a blacklist, the real-time video information is stored.
Optionally, the preset white list further includes an effective band-off time period corresponding to each of the band-off tag information, and the method further includes:
and if the fixed asset support is taken away and is not in the effective taking away time period, eliminating the passing authority of the taken away personnel and outputting second alarm information.
Optionally, the method further comprises:
and if the fixed asset support is taken away and is within the effective taking away time period, the real-time video information is saved.
Optionally, the method further comprises:
and if the tag information does not exist in the preset white list, judging that the fixed asset is not registered, recording the identity information in the black list and outputting third alarm information.
The invention also provides a fixed asset monitoring device, which is applied to a locally deployed fixed asset monitoring system and comprises a tag information acquisition module, a fixed asset management module, an AI camera module and a monitoring processing module;
the tag information acquisition module is used for acquiring tag information corresponding to any fixed asset when the fixed asset is taken away;
the fixed asset management module is used for judging whether the fixed asset supports being taken away or not according to the label information and a preset white list;
the AI camera module is used for identifying the identity information of the person to be carried away according to the acquired real-time video information if the fixed asset does not support being carried away;
and the monitoring processing module is used for executing monitoring processing operation according to the blacklist comparison result aiming at the identity information.
The invention also provides an electronic device comprising a memory and a processor, wherein the memory stores a computer program, and the computer program, when executed by the processor, causes the processor to perform the steps of the fixed asset monitoring method according to any one of the above.
The invention also provides a computer readable storage medium having stored thereon a computer program which, when executed by the processor, implements a fixed asset monitoring method as defined in any one of the preceding claims.
According to the technical scheme, the invention has the following advantages:
according to the method, through acquiring the tag information corresponding to the fixed assets, when any one fixed asset is taken away, whether the taken away fixed asset supports the taken away is judged according to the tag information and the preset white list, if the taken away fixed asset does not support the taken away fixed asset, the real-time video information is acquired, the identity information of the person taking away the fixed asset is identified according to the acquired real-time video information, and corresponding monitoring processing operation is executed based on the comparison result of the identity information and the preset black list, so that the technical problems that the inventory workload is large due to the fact that the inventory equipment is large in quantity, the asset taking away condition cannot be judged in a data mode, the taken away asset is difficult to track the position of the taken away asset, and the monitoring function depends on the cloud end in the conventional inherent asset monitoring method are solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
FIG. 1 is a flowchart illustrating steps of a method for monitoring fixed assets according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating steps of a fixed asset monitoring method according to a second embodiment of the present invention;
fig. 3 is a block diagram of a fixed asset monitoring device according to a third embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a fixed asset monitoring method, a fixed asset monitoring device, fixed asset monitoring equipment and a storage medium, which are used for solving the technical problems that the existing inherent asset monitoring method has large inventory checking workload due to the fact that the number of inventory checking devices is large, the asset taking-off condition cannot be judged in a datamation mode, the taken-off asset is difficult to track in position, and the monitoring function depends on a cloud end.
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the embodiments described below are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart illustrating steps of a fixed asset monitoring method according to an embodiment of the present invention.
The invention provides a fixed asset monitoring method, which is characterized in that the method is applied to a locally deployed fixed asset monitoring system and comprises the following steps:
the tag information refers to an Electronic Product Code (EPC), and is provided on each fixed asset in the form of an RFID (Radio Frequency Identification) tag, so that the fixed asset can be tagged, the RFID tag of each fixed asset is registered in the fixed asset monitoring system, the fixed asset corresponding to the RFID tag is identified by a communication method such as TCP/IP, and the in-library range of the fixed asset is specified by the output power of the RFID tag; the label information may further include information such as a code, purchase price, purchase time, custodian, and custody location.
In a specific implementation, the tag information of the fixed assets can be set when the fixed assets are put in storage, the fixed assets are registered in the fixed asset monitoring system, the tag information corresponding to each fixed asset is obtained in real time, and when any fixed asset is taken away, the tag information corresponding to the fixed asset is obtained, so that whether the fixed asset supports being taken away or not can be determined.
the fixed assets may not all be stored in the warehouse and each have their own location during use, where some fixed assets may need to be moved more frequently and some fixed assets do not need to be moved. When any one of the fixed assets is taken away, the tag information of the taken-away fixed asset can be compared with a preset white list, and whether the fixed asset supports being taken away is judged according to the comparison result.
103, if the fixed asset does not support being taken away, identifying identity information of the person who is taken away according to the obtained real-time video information;
in the embodiment of the invention, if the fixed asset is judged not to be carried away, the fixed asset is in the abnormal carried away condition at the moment, and the position of the fixed asset can be positioned according to the tag information carried by the fixed asset at the moment so as to obtain the real-time video information of the fixed asset; and finally, identifying the person who takes away the fixed asset by adopting the real-time video information to obtain the identity information of the person who takes away so as to determine whether the operation of taking away the person from the fixed asset is needed to carry out subsequent alarm processing.
The identity information may include face information of a person to be taken away, and registration information of the person to be taken away, such as name, job number, department, etc., of the person to be taken away, or a person marked as stranger.
And 104, executing monitoring processing operation according to the blacklist comparison result aiming at the identity information.
And after the identity information of the people who leave the system is acquired, monitoring processing operation is executed according to a blacklist comparison result obtained by comparing the identity information with the blacklist, so that the operations of real-time monitoring of the people who leave the system, real-time alarming, recording of the process of leaving the fixed asset and the like are realized.
In the embodiment of the invention, by acquiring the tag information corresponding to the fixed assets, when any one fixed asset is taken away, whether the taken away fixed asset supports the taken away is judged according to the tag information and the preset white list, if the taken away fixed asset does not support the taken away fixed asset, the real-time video information is acquired, the identity information of the person taking away from the fixed asset is identified according to the acquired real-time video information, and the corresponding monitoring processing operation is executed based on the comparison result of the identity information and the preset black list, so that the technical problems that the existing inherent asset monitoring method is large in inventory workload due to the fact that the quantity of inventory equipment is large, the taking away condition of the asset cannot be judged in a datamation manner, the position tracking of the taken away asset is difficult, and the monitoring function depends on the cloud are solved.
Referring to fig. 2, fig. 2 is a flowchart illustrating steps of a fixed asset monitoring method according to a second embodiment of the present invention.
The invention provides a fixed asset monitoring method, which is characterized in that the method is applied to a locally deployed fixed asset monitoring system and comprises the following steps:
in the embodiment of the present invention, the specific implementation process of step 201 is similar to that of step 101, and is not described herein again.
It is worth mentioning that, the method for judging whether the fixed asset is taken away can regulate the in-warehouse range of the fixed asset through the output power of the RFID tag, when the RFID tag carried by the fixed asset is taken out of the in-warehouse range, it is judged that the fixed asset is taken away, and the tag information corresponding to the fixed asset is obtained to perform subsequent monitoring processing.
Alternatively, the tag of the fixed asset can be identified by a multi-tag identification algorithm, and when the tag is not in the predetermined position, the fixed asset is taken away.
optionally, step 202 may include the following sub-steps:
when any fixed asset is taken away, traversing a preset white list; the preset white list comprises a plurality of information of labels which can be taken away and a plurality of information of labels which cannot be taken away;
if the tag information is the same as any one of the label information capable of being taken away, judging that the fixed asset support is taken away;
and if the tag information is the same as any one of the non-detachable tag information, judging that the fixed asset is not supported to be detached.
In a specific implementation, since fixed assets are all tagged, a white list can be preset in the system, and corresponding information of the taken-off tag and information of the taken-off tag are set in the white list.
When any fixed asset is taken away, the preset white list can be traversed to determine whether information identical to the label information exists, and if the label information is identical to any label information capable of being taken away, the fixed asset is judged to support being taken away; and if the tag information is the same as any one of the non-detachable tag information, judging that the fixed asset is not supported to be detached.
in the real-time embodiment of the invention, if the fixed asset does not support being taken away but is taken away by the person, the real-time video information of the fixed asset at the current moment can be acquired through the camera device such as an AI camera, and the identity information of the person who is taken away is identified according to the real-time video information.
For example, real-time video information can be acquired through an AI camera, the face information of the person to be carried away can be obtained by performing operations such as video recording and snapshot on the field situation, and then the acquired face information is matched from a database to determine the identity information of the person to be carried away.
Optionally, the preset white list further includes an effective band-off time period corresponding to each piece of band-off tag information, and the method further includes:
and if the fixed asset support is taken away and is not in the effective taking away time period, eliminating the passing authority of the taken away personnel and outputting second alarm information.
In the embodiment of the present invention, when the fixed asset is in the preset white list, it is determined that the fixed asset is supported to be taken away, and in order to prevent the fixed asset from being taken away for too long, an effective taking away time period corresponding to each information of the label capable of being taken away may be further set in the preset white list. When the fixed asset is judged to support being taken away and is not in the effective taking away time period, the current taking away operation is determined to be not legal, at the moment, the passing permission of the person who is taken away can be directly eliminated, and meanwhile, alarm information can be output.
Wherein the fixed asset not being brought away during the active bring-away period further comprises the fixed asset being brought away during the active bring-away period, but not being returned during the active bring-away period.
Further, the method further comprises:
and if the fixed asset support is brought away and is in the effective brought away time period, the real-time video information is saved.
In specific implementation, if the fixed asset supports being taken away and is within an effective taking away time period, it is indicated that the taking away operation at this time belongs to a legal operation, but in order to further prevent the fixed asset from being lost, the acquired real-time video information can be stored to provide a history tracing function, so that an enterprise manager can query a history record through conditions such as time, specific equipment, personnel and the like, and acquire evidences such as a taking away record and video monitoring.
in specific implementation, the blacklist can be set by a manager, or the blacklist of the alarm system is directly synchronized, and the manager can add the identity information to the blacklist after recognizing the identity information of the person to be taken away.
In the embodiment of the invention, if the identity information is in the blacklist, the operation of taking away the person is not legal, at this time, the passing permission of the person, such as entrance guard permission, passage permission and the like, can be directly eliminated, the person to be taken away is limited at the current position, the person to be taken away cannot enter the door and the passage maintained by the system, and the fixed asset is effectively prevented from being taken away too far.
Meanwhile, alarm information can be output, and real-time video information is displayed on a real-time monitoring page, so that management personnel can be informed to process the illegal operation in time.
Alternatively, the alert information may include fixed asset information, identity information, image information, location information, and the like.
Furthermore, after the administrator checks the alarm information, the alarm is found to be false alarm, and the alarm can be cancelled according to the alarm information; or under the condition that the range of a park or an enterprise is large, an alarm notice can be issued, and units are called to catch the people away.
And step 206, if the identity information is not in the blacklist, storing the real-time video information.
In another example of the present invention, if the identity information is not in the blacklist, the real-time video information is saved to provide a history tracing function, so that an enterprise administrator can query the history record through conditions such as time, specific equipment, personnel, and the like, and obtain evidence such as a leave record, video monitoring, and the like.
In another example of the present invention, the method further comprises:
and if the tag information does not exist in the preset white list, judging that the fixed asset is not registered, recording identity information in a black list and outputting third alarm information.
In the embodiment of the invention, if the tag information does not exist in the preset white list, the fixed asset is not registered, and in order to prevent the fixed asset from being lost, the identity information of the person away from the fixed asset can be recorded in the black list and alarm information is output so as to inform a manager to process the fixed asset.
In specific implementation, the manager can set the alarm condition according to the taking-away action.
In the embodiment of the invention, by acquiring the tag information corresponding to the fixed assets, when any one fixed asset is taken away, whether the taken away fixed asset supports the taken away is judged according to the tag information and the preset white list, if the taken away fixed asset does not support the taken away fixed asset, the real-time video information is acquired, the identity information of the person taking away from the fixed asset is identified according to the acquired real-time video information, and the corresponding monitoring processing operation is executed based on the comparison result of the identity information and the preset black list, so that the technical problems that the existing inherent asset monitoring method is large in inventory workload due to the fact that the quantity of inventory equipment is large, the taking away condition of the asset cannot be judged in a datamation manner, the position tracking of the taken away asset is difficult, and the monitoring function depends on the cloud are solved.
Referring to fig. 3, fig. 3 is a block diagram of a fixed asset monitoring device according to a third embodiment of the present invention.
The invention provides a fixed asset monitoring device, which is applied to a locally deployed fixed asset monitoring system and comprises a tag information acquisition module, a fixed asset management module, an AI camera module and a monitoring processing module;
a tag information obtaining module 301, configured to obtain tag information corresponding to a fixed asset when any fixed asset is taken away;
the fixed asset management module 302 is configured to determine whether the fixed asset is supported to be taken away according to the tag information and a preset white list;
the AI camera module 303 is configured to identify identity information of a person who is away from the fixed asset according to the acquired real-time video information if the fixed asset does not support being away from the fixed asset;
and the monitoring processing module 304 is configured to execute a monitoring processing operation according to the blacklist comparison result for the identity information.
Optionally, the fixed asset management module 302 comprises:
the traversal submodule is used for traversing a preset white list; the preset white list comprises a plurality of information of the labels which can be taken away and a plurality of information of the labels which cannot be taken away
The first taking-away judgment sub-module is used for judging that the fixed asset support is taken away if the tag information is the same as any one of the label information capable of being taken away;
and the first taking-off judgment sub-module is used for judging that the fixed asset is not supported to be taken off if the tag information is the same as any one of the non-taken-off tag information.
Optionally, the monitoring processing module 304 includes:
the permission eliminating submodule is used for eliminating the passing permission of the person if the identity information is in the blacklist;
and the alarm submodule is used for outputting first alarm information and displaying real-time video information on a real-time monitoring page.
Optionally, the method further comprises:
and the first video storage module is used for storing the real-time video information if the identity information is not in the blacklist.
Optionally, the preset white list further includes an effective band-off time period corresponding to each piece of band-off tag information, and the system further includes:
and the permission and alarm module is used for eliminating the passing permission of the person to be carried away and outputting second alarm information if the fixed asset support is carried away and is not in the effective carrying away time period.
Optionally, the system further comprises:
and the second video storage module is used for storing the real-time video information if the fixed asset support is taken away and is in an effective taking away time period.
Optionally, the system further comprises:
and the recording and alarming module is used for judging that the fixed asset is not registered if the tag information does not exist in the preset white list, recording the identity information in the black list and outputting third alarming information.
The invention also provides an electronic device comprising a memory and a processor, wherein the memory stores a computer program, and the computer program, when executed by the processor, causes the processor to perform the steps of the fixed asset monitoring method according to any one of the embodiments.
The invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a fixed asset monitoring method as in any of the embodiments described above.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (10)
1. A fixed asset monitoring method applied to a locally deployed fixed asset monitoring system, the method comprising:
when any fixed asset is taken away, acquiring label information corresponding to the fixed asset;
judging whether the fixed asset supports being taken away or not according to the label information and a preset white list;
if the fixed asset does not support being taken away, identifying identity information of the person who is taken away according to the obtained real-time video information;
and executing monitoring processing operation according to the blacklist comparison result aiming at the identity information.
2. The fixed asset monitoring method according to claim 1, wherein said step of determining whether the fixed asset supports being taken away according to the tag information and a preset white list comprises:
traversing a preset white list; wherein the preset white list comprises a plurality of information of the labels which can be taken away and a plurality of information of the labels which cannot be taken away
If the tag information is the same as any one of the detachable tag information, determining that the fixed asset support is detached;
and if the tag information is the same as any one of the non-detachable tag information, judging that the fixed asset does not support being detached.
3. The fixed asset monitoring method according to claim 1, wherein the step of performing a monitoring processing operation according to the blacklist comparison result for the identity information includes:
if the identity information is in a blacklist, eliminating the passing permission of the taken-away personnel;
and outputting first alarm information and displaying the real-time video information on a real-time monitoring page.
4. The fixed asset monitoring method of claim 3, further comprising:
and if the identity information is not in a blacklist, the real-time video information is stored.
5. The fixed asset monitoring method according to claim 2, wherein said predefined white list further comprises a valid bring-away time period corresponding to each of said leave-able tag information, said method further comprising:
and if the fixed asset support is taken away and is not in the effective taking away time period, eliminating the passing authority of the taken away personnel and outputting second alarm information.
6. The fixed asset monitoring method of claim 5, further comprising:
and if the fixed asset support is taken away and is within the effective taking away time period, the real-time video information is saved.
7. The fixed asset monitoring method according to any of claims 1-6, wherein the method further comprises:
and if the tag information does not exist in the preset white list, judging that the fixed asset is not registered, recording the identity information in the black list and outputting third alarm information.
8. A fixed asset monitoring device is characterized in that a fixed asset monitoring system applied to local deployment comprises a tag information acquisition module, a fixed asset management module, an AI camera module and a monitoring processing module;
the tag information acquisition module is used for acquiring tag information corresponding to any fixed asset when the fixed asset is taken away;
the fixed asset management module is used for judging whether the fixed asset supports being taken away or not according to the label information and a preset white list;
the AI camera module is used for identifying the identity information of the person to be carried away according to the acquired real-time video information if the fixed asset does not support being carried away;
and the monitoring processing module is used for executing monitoring processing operation according to the blacklist comparison result aiming at the identity information.
9. An electronic device comprising a memory and a processor, the memory having stored therein a computer program that, when executed by the processor, causes the processor to perform the steps of the fixed asset monitoring method of any of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a fixed asset monitoring method according to any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110196757.2A CN112906839A (en) | 2021-02-22 | 2021-02-22 | Fixed asset monitoring method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110196757.2A CN112906839A (en) | 2021-02-22 | 2021-02-22 | Fixed asset monitoring method, device, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112906839A true CN112906839A (en) | 2021-06-04 |
Family
ID=76124460
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110196757.2A Pending CN112906839A (en) | 2021-02-22 | 2021-02-22 | Fixed asset monitoring method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112906839A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114189799A (en) * | 2021-11-12 | 2022-03-15 | 珠海大横琴科技发展有限公司 | Fixed asset monitoring method and device |
CN114418281A (en) * | 2021-12-08 | 2022-04-29 | 浙江创泰科技有限公司 | Fixed asset full life cycle management method and system |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090160646A1 (en) * | 2007-12-20 | 2009-06-25 | General Electric Company | System and method for monitoring and tracking inventories |
CN201984523U (en) * | 2011-01-20 | 2011-09-21 | 北京金宇盛通科技有限公司 | Information security management system (ISMS) for personnel and carrier |
CN103021044A (en) * | 2011-09-23 | 2013-04-03 | 北京天一众合科技股份有限公司 | Method, device and system for area monitoring |
CN103778449A (en) * | 2014-01-20 | 2014-05-07 | 中国科学院数据与通信保护研究教育中心 | Tracking and monitoring system and method for intra-area mobile storage device |
CN103955781A (en) * | 2014-03-14 | 2014-07-30 | 李志敏 | Intelligent identification confidential article management system based on Internet of Things |
CN105809868A (en) * | 2016-04-07 | 2016-07-27 | 河海大学常州校区 | RFID-technology-based campus anti-theft system and method |
CN106447143A (en) * | 2015-08-06 | 2017-02-22 | 宁波福玛特金属制品实业有限公司 | Intelligent material evidence management system |
CN109615158A (en) * | 2018-10-15 | 2019-04-12 | 平安科技(深圳)有限公司 | Asset management monitoring method, device, computer equipment and storage medium |
CN210270972U (en) * | 2019-07-18 | 2020-04-07 | 国电宁波风电开发有限公司 | Warehouse supervisory system |
CN111724288A (en) * | 2020-06-18 | 2020-09-29 | 深圳市海恒智能科技有限公司 | Book borrowing method and system based on mobile terminal |
CN111971703A (en) * | 2019-12-12 | 2020-11-20 | 深圳市微蓝智能科技有限公司 | Article management method, background system, data processing device and storage medium |
-
2021
- 2021-02-22 CN CN202110196757.2A patent/CN112906839A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090160646A1 (en) * | 2007-12-20 | 2009-06-25 | General Electric Company | System and method for monitoring and tracking inventories |
CN201984523U (en) * | 2011-01-20 | 2011-09-21 | 北京金宇盛通科技有限公司 | Information security management system (ISMS) for personnel and carrier |
CN103021044A (en) * | 2011-09-23 | 2013-04-03 | 北京天一众合科技股份有限公司 | Method, device and system for area monitoring |
CN103778449A (en) * | 2014-01-20 | 2014-05-07 | 中国科学院数据与通信保护研究教育中心 | Tracking and monitoring system and method for intra-area mobile storage device |
CN103955781A (en) * | 2014-03-14 | 2014-07-30 | 李志敏 | Intelligent identification confidential article management system based on Internet of Things |
CN106447143A (en) * | 2015-08-06 | 2017-02-22 | 宁波福玛特金属制品实业有限公司 | Intelligent material evidence management system |
CN105809868A (en) * | 2016-04-07 | 2016-07-27 | 河海大学常州校区 | RFID-technology-based campus anti-theft system and method |
CN109615158A (en) * | 2018-10-15 | 2019-04-12 | 平安科技(深圳)有限公司 | Asset management monitoring method, device, computer equipment and storage medium |
CN210270972U (en) * | 2019-07-18 | 2020-04-07 | 国电宁波风电开发有限公司 | Warehouse supervisory system |
CN111971703A (en) * | 2019-12-12 | 2020-11-20 | 深圳市微蓝智能科技有限公司 | Article management method, background system, data processing device and storage medium |
CN111724288A (en) * | 2020-06-18 | 2020-09-29 | 深圳市海恒智能科技有限公司 | Book borrowing method and system based on mobile terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114189799A (en) * | 2021-11-12 | 2022-03-15 | 珠海大横琴科技发展有限公司 | Fixed asset monitoring method and device |
CN114418281A (en) * | 2021-12-08 | 2022-04-29 | 浙江创泰科技有限公司 | Fixed asset full life cycle management method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7245221B2 (en) | Inventory control | |
RU2740619C2 (en) | Tracking and anticipation system of thefts | |
US7239241B2 (en) | Method and system for inventory control | |
CN112906839A (en) | Fixed asset monitoring method, device, equipment and storage medium | |
EP1567995A2 (en) | Surveillance system with identification correlation | |
CN101957935A (en) | Logistics finance integrated system and implementation method thereof | |
CN110738178A (en) | Garden construction safety detection method and device, computer equipment and storage medium | |
CN101923677B (en) | Data storage system and data storage method | |
CN207938132U (en) | Cash register loss prevention system | |
KR20130035936A (en) | Inventory and anti-theft alarm system | |
US9430654B1 (en) | Process of destroying data on units within an organization when they are not functioning or no longer in use | |
CN111161486A (en) | Commodity anti-theft method and system based on settlement box | |
WO2010011277A1 (en) | System and method for correlating supply chain theft with internet auction activity | |
CN103177524B (en) | A kind of monitored object realtime monitoring in place device and method | |
CN115880611A (en) | Cash receiving loss prevention method, device, equipment and storage medium | |
CN114897117A (en) | Asset equipment positioning management system and method based on RFID | |
CN106022403B (en) | A kind of Workshop Production overhaul of the equipments record system and method based on RFID | |
Viji et al. | Intelligent Library Management Using Radio Frequency Identification | |
KR101375076B1 (en) | cloud type logistics sychronization system based AIDC | |
KR20060103381A (en) | Method and system for preserving goods from outflow by using rfid | |
US20180184144A1 (en) | Apparatus and method for asset-based video access | |
CN201662831U (en) | Logistic integration control system based on RFID | |
CN114330391B (en) | Asset electronic fence construction method and device | |
KR102681813B1 (en) | Apparatus and method for worker access control | |
CN202003396U (en) | Data preservation system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210604 |
|
RJ01 | Rejection of invention patent application after publication |