CN113256166B - Security management system and management method based on Internet of things - Google Patents

Security management system and management method based on Internet of things Download PDF

Info

Publication number
CN113256166B
CN113256166B CN202110700689.9A CN202110700689A CN113256166B CN 113256166 B CN113256166 B CN 113256166B CN 202110700689 A CN202110700689 A CN 202110700689A CN 113256166 B CN113256166 B CN 113256166B
Authority
CN
China
Prior art keywords
information
target section
mobile terminal
detected
inspection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110700689.9A
Other languages
Chinese (zh)
Other versions
CN113256166A (en
Inventor
杨耀党
孔庆端
武潭
胡松涛
贾志闯
姚浩伟
王秋溢
穆仕芳
张玉杰
陈晓明
王文龙
纪学峰
王燕
张琳芳
张利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Xinanli Safety Technology Co ltd
Original Assignee
Xin'anlizhong Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xin'anlizhong Beijing Technology Co ltd filed Critical Xin'anlizhong Beijing Technology Co ltd
Priority to CN202110700689.9A priority Critical patent/CN113256166B/en
Publication of CN113256166A publication Critical patent/CN113256166A/en
Application granted granted Critical
Publication of CN113256166B publication Critical patent/CN113256166B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • G06Q10/063114Status monitoring or status determination for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/109Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/1091Recording time for administrative or management purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects

Abstract

The invention discloses a safety management method based on the Internet of things, which comprises the steps of collecting position information of a first mobile terminal at regular time; receiving basic information of a target section identification to be detected read by a first mobile terminal; activating an image acquisition device of a target section to be detected; receiving returned image data and responding to the input inspection information; and calling historical information of the target section to be detected, comparing the historical information with the current routing inspection information, and judging whether the target section to be detected is abnormal or not. The safety management system based on the Internet of things comprises a position supervision module, a first mobile terminal and a second mobile terminal, wherein the position supervision module is used for regularly acquiring the position information of the first mobile terminal; the information receiving module is used for receiving the basic information of the to-be-detected target section identification read by the first mobile terminal; the monitoring equipment control module is used for activating the image acquisition equipment of the target section to be detected; the storage management module is used for responding to the input routing inspection information; and the processing module is used for judging whether the target section to be detected is abnormal or not. The invention can realize paperless inspection and can effectively monitor the behaviors of off-Shift, off-Shift and the like.

Description

Security management system and management method based on Internet of things
Technical Field
The invention relates to the technical field of safety monitoring, in particular to a safety management system and a safety management method based on the Internet of things.
Background
The chemical industry has certain particularity, the production, the transportation and the storage mostly relate to the environment such as high temperature, high pressure, sealing, inflammable and explosive, if the problem in the aspect of safety is not emphasized, the safety accident is very easy to happen. After a chemical safety liability accident occurs, not only casualties can be caused, but also the surrounding environment can be polluted seriously, and adverse effects are caused to the society, so that the potential safety hazards of routing inspection and troubleshooting are the first important affairs in the chemical industry.
At present, inspection is mainly carried out in a traditional mode, namely, an inspector fills required information in a paper document, and during inspection, the inspection is carried out while recording, and then the inspection is returned to an office for recording. Although some enterprises implement inspection paperless and unmanned equipment inspection, the inspection data cannot guarantee authenticity and accuracy.
In addition, worker negligence is also one of the frequent factors of accidents in the chemical industry. If the real-time management of personnel can not be realized during inspection, the specific position of an inspector can not be obtained, whether the equipment and the target section to be inspected are comprehensively and specifically inspected, whether the equipment and the target section to be inspected are missed or are out of bounds, and the like, when the inspector violates the safety behavior criterion, a workshop can not immediately find and early warn, and systematic prediction can not be performed on the subsequent results, so that a series of safety accidents can be caused. For a large number of inspectors, how to know the conditions of the inspectors can realize the supervision of the working state of the inspectors, effectively avoid the problems of crowd chatting, random off-duty, off-duty and the like of the inspectors, and is a problem to be considered and solved in the inspection process.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a safety management method based on the internet of things, which can realize paperless routing inspection and can monitor the on-duty condition of post-patrolling personnel in real time; in addition, a safety management system based on the Internet of things is also provided.
The technical scheme adopted by the invention for solving the technical problems is as follows: the safety management method based on the Internet of things comprises the following steps,
s10, collecting the position information of the first mobile terminal at regular time, and judging whether the position information is located on a preset path;
s20, receiving basic information of a target section identification to be detected read by a first mobile terminal, wherein the target section identification to be detected comprises a bar code or a radio frequency identification chip bound with the target section to be detected, and the basic information comprises position information and serial number of the target section to be detected;
s30, activating an image acquisition device of the target section to be detected, wherein the image acquisition device acquires an image range covering the target section to be detected;
s40, receiving the returned image data, and responding to the routing inspection information input by the first mobile terminal in the routing inspection table popped up by reading the mark of the target section to be inspected;
and S50, judging whether the target section to be detected is abnormal or not based on the routing inspection information.
Further, the step S10 is preceded by,
s01, acquiring the equipment ID of the first mobile terminal; collecting biological information or ID information of a patrol inspector with a first mobile terminal; the biological information comprises one or more of fingerprints, palm prints, facial information and iris information;
s02, acquiring one or more of department schedule, department function list, attendance list, post schedule list, on-post and off-post personnel information, temporary post handover or temporary replacement list, and calling pre-stored biological information;
s03, judging whether the inspector is an on-duty person in the scheduling table; if yes, go to step S10.
Further, the step S10 is to collect the location information sent by the first mobile terminal at regular time, and determine whether the location information is located on the preset path, and further includes,
s101, if the first mobile terminal deviates from a preset path of a target section to be detected; acquiring basic information of a previous target section to be detected;
s102, sending identity authentication request information, wherein the identity authentication request information comprises a request for acquiring biological information of an inspector;
s103, acquiring one or more of a department scheduling list, a department function list, an attendance list, a post scheduling list, on-post and off-post personnel information, temporary post handover or temporary replacement list, calling prestored biological information, and comparing the biological information with the information acquired by the identity authentication request;
s104, judging whether the inspector is an on-duty person in the scheduling table; if not, refusing authorization and sending result information to the preset terminal.
Further, the image acquisition device for activating the target segment to be examined in the step S30 includes,
s301, starting image acquisition equipment arranged in a target section area to be detected, and generating a routing inspection video and a picture;
s302, generating a timestamp, and marking and backing up the collected video and pictures;
s303, detecting the time length for starting the image acquisition equipment, judging whether the starting time length exceeds a threshold value, and if so, closing the image acquisition equipment.
Further, the step S50 further includes,
s501, acquiring historical inspection total time length data and historical inspection target section time length data;
s502, calling the current inspection time length data, and dividing the inspection time length of each target section to be inspected;
s503, comparing the time length of each target section to be detected in the historical inspection with the inspection time length of each target section to be detected at this time, and judging whether the time length difference value of two times exceeds a threshold value;
and S504, if so, marking the target section to be detected.
Further, the step S10 further includes,
s111, detecting whether a second mobile terminal exists in a preset distance range of the first mobile terminal;
s112, if yes, acquiring the duration of the first mobile terminal and the second mobile terminal within a preset distance range;
and S113, if the duration time length exceeds a threshold value, respectively sending identity verification request information and judging whether the second mobile terminal deviates from a preset path of the target section to be detected, wherein the identity verification request information comprises a request for acquiring biological information of the inspector.
Based on the same idea, also provides a safety management system based on the Internet of things, which comprises
The position monitoring module is used for collecting the position information of the first mobile terminal at regular time and judging whether the position information is positioned on a preset path;
the information receiving module is used for receiving basic information of a target section identification to be detected read by a first mobile terminal, wherein the target section identification to be detected comprises a bar code or a radio frequency identification chip bound with the target section to be detected, and the basic information comprises position information and serial number of the target section to be detected; and the image acquisition device is used for receiving the returned image data after the image acquisition device;
the monitoring device control module is used for activating the image acquisition device of the target section to be detected, and the image acquisition device acquires an image range covering the target section to be detected;
the storage management module is used for storing routing inspection information input by the first mobile terminal in a routing inspection table called by reading the identification of the target section to be inspected and storing returned image data;
and the processing module is used for judging whether the target section to be detected is abnormal or not based on the routing inspection information.
Further, the method also comprises the following steps of,
the information management module is used for acquiring the equipment ID of the first mobile terminal; the system comprises a first mobile terminal, a second mobile terminal and a server, wherein the first mobile terminal is used for acquiring biological information or ID information of a patrol inspector holding the first mobile terminal; the biological information comprises one or more of fingerprints, palm prints, facial information and iris information;
the operation scheduling management module is used for acquiring one or more of a department scheduling list, a department function list, an attendance list, a post scheduling list, on-post and off-post personnel information, temporary post handover or temporary replacement list and calling pre-stored biological information; and the system is used for judging whether the patrol inspector is an on-duty person in the scheduling table.
Further, the location supervision module includes,
the path planning module is used for planning a preset path of the target section to be detected, deviating the preset path of the target section to be detected at the first mobile terminal, and acquiring basic information of the target section to be detected;
the identity authentication module is used for sending identity authentication request information, wherein the identity authentication request information comprises a request for acquiring biological information of an inspector;
the operation scheduling management module is used for acquiring one or more of a department scheduling list, a department function list, an attendance list, a post scheduling list, on-post and off-post personnel information, temporary post handover or temporary replacement list, calling prestored biological information and comparing the biological information with the information acquired by the identity authentication request; judging whether the patrol inspector is an on-duty person in the scheduling table; if not, refusing authorization and sending result information to the preset terminal.
Further, the processing module includes, in combination,
the calling module is used for acquiring historical inspection total time length data and historical inspection target section time length data;
the first calculation module is used for calling the inspection time length data and dividing the inspection time length of each target section to be inspected; the system is used for comparing the time length of each target section to be detected in the historical inspection with the inspection time length of each target section to be detected at this time, and judging whether the time length difference value of two times exceeds a threshold value;
the marking management module is used for marking the target section to be detected if the time length difference value of the two times exceeds a threshold value;
the mobile terminal management module is used for detecting whether a second mobile terminal exists in a preset distance range of the first mobile terminal; under the condition of existence, acquiring the duration of the first mobile terminal and the second mobile terminal within a preset distance range;
and respectively sending identity verification request information and judging whether the second mobile terminal deviates from a preset path of the target section to be detected or not when the duration length exceeds a threshold value, wherein the identity verification request information comprises biological information.
The invention has the beneficial effects that: the inspection personnel carry a first mobile terminal to inspect the production equipment or the target section to be inspected according to a preset path, and after the production equipment or the target section to be inspected is reached, basic information of the production equipment or the target section to be inspected is obtained by reading a bound bar code or a bound radio frequency identification chip, and a safety management center sends an inspection table to be filled, wherein the basic information comprises information such as equipment labels, equipment IDs (identity) and position information, and the inspection table to be filled comprises basic information of equipment operation. Meanwhile, after monitoring the reading action, the safety management center activates production equipment or image acquisition equipment of the target section to be detected, and the image acquisition equipment and the first mobile terminal are matched for use, so that real-time transmission of inspection videos, inspection pictures and inspection filling information can be realized. The first mobile terminal is used for opening data communication on site, the first mobile terminal is communicated with the safety management center, the safety management center collects functions of pictures, videos and the like, and meanwhile, the filled inspection table is responded, basic information of equipment or a target section to be inspected and inspection site conditions are input and uploaded to the safety management center, so that inspection information can be immediately and accurately acquired, and paperless inspection targets can be achieved.
In order to solve the problem that the behavior of the staff is restrained by the behavior criterion of the inspector, the method and the system realize the instant transmission of the behavior photos and videos of the inspector by installing the image acquisition equipment and cooperating with a computer network system. After the inspector reads the bar code or the radio frequency identification chip, the image acquisition equipment is activated and the filling of the inspection table by the inspector is monitored, so that the problems of data counterfeiting, inspection-free filling, inspection-gathering, replacement inspection and the like of the inspector are prevented, and the problems of off duty, replacement inspection and the like are avoided to a certain extent.
The image acquisition equipment is arranged in a working mode which is distinguished from a common constant security monitoring equipment, and the mode of starting after activation is adopted, so that unnecessary data redundancy is avoided; secondly, the security monitoring equipment and the image acquisition equipment execute video acquisition of different sections, accurate monitoring of a specific time period and a specific scene is achieved, the problem that playback of videos or pictures takes too much time is solved, the situation of recording of conventional security monitoring equipment without information is abandoned, and the purposes of fixed point, accuracy and no redundancy are achieved.
Drawings
Fig. 1 is a flowchart illustrating steps of a security management method based on the internet of things according to an embodiment of the present invention;
FIG. 2 is a block flow diagram of the process steps for deviating from a predetermined path in an embodiment of the present invention;
FIG. 3 is a block diagram of a process for determining whether more than two terminals are present in an embodiment of the invention;
FIG. 4 is a block flow diagram of activating an image capture device according to an embodiment of the present invention;
FIG. 5 is a block diagram of a process for marking based on utilizing patrol duration according to an embodiment of the present invention;
FIG. 6 is a block diagram of a process of collecting information of an inspector and a first mobile terminal according to an embodiment of the present invention;
fig. 7 is a block diagram of a security management system based on the internet of things according to an embodiment of the present invention.
Detailed Description
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly and may, for example, be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1-2, the security management method based on the internet of things is used in the chemical industry or the industry requiring routing inspection, including,
and S10, collecting the position information of the first mobile terminal at regular time, and judging whether the first mobile terminal is positioned on a preset path. In this implementation, the security management center is responsible for acquiring the location information of the first mobile terminal at regular time, and triggering a corresponding command according to the real-time location, wherein the preset path can be dispatched according to different departments or different patrol inspectors in the same department, and the technology for planning the preset path is mature, for example, the path planning for receiving and dispatching express in the logistics industry or the planning for a takeaway path in the takeaway industry, which is not described herein again. In other embodiments, a task reminding mode is further set, and if the inspector is on the planned path, the nearest next target section to be detected is recommended in a lighting mode.
Wherein, the step S10 collects the position information sent by the first mobile terminal at regular time, and determines whether the position information is located on the preset path, including,
s101, if the first mobile terminal deviates from a preset path of a target section to be detected; acquiring basic information of a previous target section to be detected;
s102, sending identity authentication request information, wherein the identity authentication request information comprises a request for acquiring biological information of an inspector;
s103, acquiring one or more of a department scheduling list, a department function list, an attendance list, a post scheduling list, on-post and off-post personnel information, temporary post handover or temporary replacement list, calling prestored biological information, and comparing the biological information with the information acquired by the identity authentication request;
s104, judging whether the inspector is an on-duty person in the scheduling table; if not, refusing authorization and sending result information to the preset terminal. In this embodiment, the preset terminal may be a mobile phone terminal for monitoring a large screen, and a manager, a responsible person, or other responsible person, so as to contact a relevant inspector or record a relevant situation in time.
The deviation monitoring of the preset path can master all dynamic conditions of the inspector in real time, guarantee the timeliness of information, facilitate real-time dynamic management and timely get contact in emergency. After deviation, identity verification is carried out, whether the inspector is an on-duty person or not is detected and judged, the problems that the inspector faces to the next shift, the inspection is out of range or the inspection task is distributed across departments and the like can be effectively prevented, and the problems of standard off-duty, off-duty inspection, off-range inspection and the like can be timely found.
The method has the advantages that after the deviation path is monitored, the position information of the target to be detected is obtained, the process is favorable for mastering the destination position of an on-duty patrol inspection worker in real time, whether the target to be detected deviates after the position is detected or not is convenient for getting contact in time under emergency, and the target section to be detected which is not patrolled and missed to be detected is found in time.
Referring to fig. 3 together, in order to prevent the inspector from inspecting time crowds or chatting or false inspection problems using working time, the step S10 further includes,
s111, detecting whether a second mobile terminal exists in a preset distance range of the first mobile terminal;
s112, if yes, acquiring the duration of the first mobile terminal and the second mobile terminal within a preset distance range;
and S113, if the duration time length exceeds a threshold value, respectively sending identity verification request information and judging whether the second mobile terminal deviates from a preset path of the target section to be detected, wherein the identity verification request information comprises a request for acquiring biological information of the inspector.
The safety management center collects position information of each first mobile terminal at regular time, calculates the distance between the first mobile terminal and a second mobile terminal closest to the first mobile terminal, if the distance between the first mobile terminal and the second mobile terminal disappears within a preset time threshold range, the distance between the first mobile terminal and the second mobile terminal is an abnormal condition, and the possibility of sentry generation or crowd accumulation exists. At the moment, the security management center sends an identity authentication request to the mobile terminal deviating from the preset path, checks whether the sentry problem exists and timely processes related conditions.
S20, receiving basic information of the target section identification to be detected read by the first mobile terminal, wherein the target section identification to be detected comprises a bar code or a radio frequency identification chip bound with the target section to be detected, and the basic information comprises position information and serial number of the target section to be detected. The barcode of the target section identifier to be detected in this embodiment is a barcode or a two-dimensional code, the radio frequency identification chip is an RFID tag, and the information is generated and sent to the security management center by reading the position information and the number information of the current target section to be detected or the ID number information of the target section to be detected, and the security management center sends the routing inspection table and sends an image acquisition device start instruction at this time.
And S30, activating the image acquisition equipment of the target section to be detected, wherein the image acquisition equipment acquires an image range covering the target section to be detected. And when the inspector reaches the target section to be inspected, the image acquisition equipment receives the instruction sent by the safety management center, the image acquisition equipment is started, and the behavior of the inspector in the acquisition range is acquired and a picture or a video is generated and transmitted back to the safety management center.
Referring to fig. 4 together, the image capturing apparatus for activating the segment of the object to be examined in step S30 includes,
s301, starting image acquisition equipment arranged in a target section area to be detected, and generating a routing inspection video and a picture;
s302, generating a timestamp, and marking and backing up the collected video and pictures;
s303, detecting the time length for starting the image acquisition equipment, judging whether the starting time length exceeds a threshold value, and if so, closing the image acquisition equipment.
Increase the timestamp and to picture or video backup, mark backup information wherein is as index information, including patroller ID, patrol and examine time, patrol and examine the target section, patrol and examine target section positional information, patrol and examine target section production facility or wait to examine target section ID etc. the accessible playback finds the emergence time when mainly taking place the hidden danger to and from normal condition to the time span of taking place to uncontrollable accident.
And S40, receiving the returned image data, and responding to the patrol information input by the first mobile terminal in the patrol table popped up by reading the mark of the target section to be detected. The safety management center receives the returned picture or video file with the inspector in real time, and stores the inspection table, the picture and the video in a correlation manner after the inspector submits the inspection table after the inspection is finished, so that the inspection table, the picture and the video are convenient to search and call in the future.
And S50, judging whether the target section to be detected is abnormal or not based on the routing inspection information. And if the information of each equipment or target section to be detected in the patrol table exceeds a preset value, judging that the equipment or target section to be detected is abnormal.
In this embodiment, utilize first mobile terminal to acquire to patrol and examine table information, acquire the picture and the video information of patrolling and examining of waiting to examine the target section through image acquisition equipment, two kinds of means cooperations are used, can effectively avoid patrolling and examining the condition emergence that the person takes place to take off duty, cross duty and substitute the duty. And historical information of the target section to be detected is called and compared with the current inspection information, whether the target section to be detected is abnormal or not is judged, double insurance can be added, and the conditions of inspection false inspection and missed inspection are fully guaranteed. Under the normal condition of patrolling and examining, the length of time of patrolling and examining of waiting to examine the target section is long in reasonable control time, and it is long to patrol and examine the standard promptly, if take place the transition in a certain target section of waiting to examine and prolong the situation of patrolling and examining the time, can judge one of the factors that wait to examine the section and have a problem, and the latter later stage is as the key monitoring district section. Referring to fig. 5 together, the step S50 further includes,
s501, acquiring historical inspection total time length data and historical inspection target section time length data;
s502, calling the current inspection time length data, and dividing the inspection time length of each target section to be inspected;
s503, comparing the time length of each target section to be detected in the historical inspection with the inspection time length of each target section to be detected at this time, and judging whether the time length difference value of two times exceeds a threshold value;
and S504, if so, marking the target section to be detected.
The inspection personnel carry a first mobile terminal to inspect the production equipment or the target section to be inspected according to a preset path, and after the production equipment or the target section to be inspected is reached, basic information of the production equipment or the target section to be inspected is obtained by reading a bound bar code or a bound radio frequency identification chip, and a safety management center sends an inspection table to be filled, wherein the basic information comprises information such as equipment labels, equipment IDs (identity) and position information, and the inspection table to be filled comprises basic information of equipment operation.
And after monitoring the reading action, the safety management center activates production equipment or image acquisition equipment of the target section to be detected, and the image acquisition equipment and the first mobile terminal are matched for use, so that the real-time transmission of inspection video, inspection pictures and inspection table filling information can be realized. The first mobile terminal is used for opening data communication on site, the first mobile terminal is communicated with the safety management center, the safety management center collects pictures, videos and the like, meanwhile, a check table submitted in response to completion of filling is responded, basic information of equipment or a target section to be detected and a check site situation are recorded and stored in the safety management center, and therefore the check information can be obtained timely and accurately, and a paperless check target is achieved.
In order to solve the problem that the behavior of the staff is restrained by the behavior criterion of the inspector, the method and the system realize the instant transmission of the behavior photos and videos of the inspector by installing the image acquisition equipment and cooperating with a computer network system. After the inspector reads the bar code or the radio frequency identification chip, the image acquisition equipment is activated and the filling of the inspection table by the inspector is monitored, so that the problems of data counterfeiting, inspection-free filling, inspection-gathering, replacement inspection and the like of the inspector are prevented, and the problems of off duty, replacement inspection and the like are avoided to a certain extent. And this first mobile terminal is through regularly sending positional information, and the safety management center compares the positional information who gathers with preset route, looks over equipment or waits to examine whether the target section is on the route, prevents that the inspector from appearing omitting to patrol and examine the problem.
In addition, the image acquisition equipment is set in a mode of being activated and started by being distinguished from a working mode of common constant-equipment security monitoring equipment, so that unnecessary data redundancy is avoided; secondly, the security monitoring equipment and the image acquisition equipment execute video acquisition of different sections, accurate monitoring of a specific time period and a specific scene is achieved, the problem that playback of videos or pictures takes too much time is solved, the situation of recording of conventional security monitoring equipment without information is abandoned, and the purposes of fixed point, accuracy and no redundancy are achieved.
Referring to fig. 6, in order to ensure the configuration and use of the first mobile terminal during the polling stage and before polling, the problem that the polling person mistakenly picks up the first mobile terminal or mistakenly binds the polling person is prevented. Therefore, the method further includes, before step S10,
s01, acquiring the equipment ID of the first mobile terminal; collecting biological information or ID information of a patrol inspector with a first mobile terminal; the biological information comprises one or more of fingerprints, palm prints, facial information and iris information; in this embodiment, when the first mobile terminal is activated or unlocked, the security management center receives the device ID of the first mobile terminal, and sends an identity authentication request to request the inspector to input biological information, such as job number ID information or a task code.
S02, acquiring one or more of department schedule, department function schedule, attendance sheet, post schedule, on-post and off-post personnel information, temporary post handover or temporary replacement table, and calling the pre-stored biological information.
S03, judging whether the inspector is an on-duty person in the scheduling table; if yes, go to step S10. The process can effectively avoid errors and greatly improve the working efficiency. Meanwhile, the situation of unmanned inspection after off duty or off duty can be effectively avoided.
In addition, in order to ensure the normal operation of the routing inspection task under the preset path, the electric quantity of the first mobile terminal needs to be compared with the consumed time of the preset path, so that the phenomena of off-duty, off-duty and the like caused by insufficient electric quantity of the first mobile terminal when the routing inspection task is executed remotely are prevented. Therefore, before step S10, the method further includes
Acquiring electric quantity information of a first mobile terminal, and judging average data of electric quantity endurance time and historical patrol total time;
and if the mean value data is larger than the battery endurance time, activating subsequent image acquisition equipment of each target section to be detected.
The safety management system based on the Internet of things comprises a mobile terminal and a safety management center, wherein the mobile terminal comprises a first mobile terminal and a second mobile terminal. Wherein, as shown in FIG. 7, the security management center comprises
The position monitoring module is used for collecting the position information of the first mobile terminal at regular time and judging whether the position information is positioned on a preset path;
the information receiving module is used for receiving basic information of an identification of a target section to be detected, which is read by the first mobile terminal, wherein the identification of the target section to be detected comprises a bar code or a radio frequency identification chip bound with the target section to be detected, and the basic information comprises position information and serial number of the target section to be detected; and the image acquisition device is used for receiving the returned image data after the image acquisition device;
the monitoring equipment control module is used for activating image acquisition equipment of the target section to be detected, and the image acquisition equipment acquires an image range covering the target section to be detected;
the storage management module is used for storing inspection information input in an inspection table popped up by reading the mark of the target section to be inspected in response to the first mobile terminal and storing returned image data;
and the processing module is used for judging whether the target section to be detected is abnormal or not based on the routing inspection information.
The security management center also comprises a security management center,
the information management module is used for acquiring the equipment ID of the first mobile terminal; the system comprises a first mobile terminal, a second mobile terminal and a server, wherein the first mobile terminal is used for acquiring biological information or ID information of a patrol inspector holding the first mobile terminal; the biological information comprises one or more of fingerprints, palm prints, facial information and iris information;
the operation scheduling management module is used for acquiring one or more of a department scheduling list, a department function list, an attendance list, a post scheduling list, on-post and off-post personnel information, temporary post handover or temporary replacement list and calling pre-stored biological information; and the system is used for judging whether the patrol inspector dispatches the on-duty staff in the schedule table.
The position supervision module is used for managing the position of the mobile terminal,
the path planning module is used for planning a preset path of the target section to be detected, deviating the preset path of the target section to be detected at the first mobile terminal, and acquiring basic information of the target section to be detected;
the identity authentication module is used for sending identity authentication request information, and the identity authentication request information comprises a request for acquiring biological information of the inspector;
the operation scheduling management module is used for acquiring one or more of a department scheduling list, a department function list, an attendance list, a post scheduling list, on-post and off-post personnel information, temporary post handover or temporary replacement list, calling prestored biological information and comparing the biological information with the information acquired by the identity authentication request; judging whether the patrol inspector is an on-duty person in the scheduling table; if not, refusing authorization and sending result information to the preset terminal. In this embodiment, the preset terminal may be a mobile phone terminal for monitoring a large screen, and a manager, a responsible person, or other responsible person, so as to contact a relevant inspector or record a relevant situation in time.
The processing module comprises a processing module and a control module,
the calling module is used for acquiring historical inspection total time length data and historical inspection target section time length data;
the first calculation module is used for calling the inspection time length data and dividing the inspection time length of each target section to be inspected; the system is used for comparing the time length of each target section to be detected in the historical inspection with the inspection time length of each target section to be detected at this time, and judging whether the time length difference value of two times exceeds a threshold value;
the marking management module is used for marking the target section to be detected if the time length difference value of the two times exceeds a threshold value;
the mobile terminal management module is used for detecting whether a second mobile terminal exists in a preset distance range of the first mobile terminal; under the condition of existence, acquiring the duration of the first mobile terminal and the second mobile terminal within a preset distance range;
and when the duration time length exceeds a threshold value, respectively sending identity verification request information and judging whether the second mobile terminal deviates from a preset path of the target section to be detected, wherein the identity verification request information comprises a request for acquiring biological information of the inspector.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments or portions thereof without departing from the spirit and scope of the invention.

Claims (8)

1. A security management method based on the Internet of things is characterized by comprising the following steps,
s10, collecting the position information of the first mobile terminal at regular time, and judging whether the position information is located on a preset path; step S10 further includes step S111, detecting whether a second mobile terminal exists within a preset distance range of the first mobile terminal;
s112, if yes, acquiring the duration of the first mobile terminal and the second mobile terminal within a preset distance range;
s113, if the duration time length exceeds a threshold value, respectively sending identity verification request information and judging whether a second mobile terminal deviates from a preset path of a target section to be detected, wherein the identity verification request information comprises a request for acquiring biological information of an inspector;
s20, receiving basic information of a target section identification to be detected read by a first mobile terminal, wherein the target section identification to be detected comprises a bar code or a radio frequency identification chip bound with the target section to be detected, and the basic information comprises position information and a serial number of the target section to be detected;
s30, activating an image acquisition device of the target section to be detected, wherein the image acquisition device acquires an image range covering the target section to be detected; wherein the image acquisition device for activating the target segment to be examined in step S30 includes,
s301, starting image acquisition equipment arranged in a target section area to be detected, and generating a routing inspection video and a picture;
s302, generating a timestamp, and marking and backing up the collected video and pictures;
s303, detecting the time length for starting the image acquisition equipment, judging whether the starting time length exceeds a threshold value, and if so, closing the image acquisition equipment;
s40, receiving the returned image data, and responding to the routing inspection information input by the first mobile terminal in the routing inspection table popped up by reading the mark of the target section to be inspected;
and S50, judging whether the target section to be detected is abnormal or not based on the routing inspection information.
2. The Internet of things-based security management method according to claim 1, wherein the step S10 is preceded by further comprising,
s01, acquiring the equipment ID of the first mobile terminal; collecting biological information or ID information of a patrol inspector with a first mobile terminal; the biological information comprises one or more of fingerprints, palm prints, facial information and iris information;
s02, acquiring one or more of department schedule, department function list, attendance list, post schedule list, on-post and off-post personnel information, temporary post handover or temporary replacement list, and calling pre-stored biological information;
s03, judging whether the inspector is an on-duty person in the scheduling table; if yes, go to step S10.
3. The internet of things-based security management method according to claim 1, wherein the step S10 is to periodically collect the location information of the first mobile terminal and determine whether the first mobile terminal is located on a preset path, and further comprising,
s101, if the first mobile terminal deviates from a preset path of a target section to be detected; acquiring basic information of a previous target section to be detected;
s102, sending identity authentication request information, wherein the identity authentication request information comprises a request for acquiring biological information of an inspector;
s103, acquiring one or more of a department scheduling list, a department function list, an attendance list, a post scheduling list, on-post and off-post personnel information, temporary post handover or temporary replacement list, calling prestored biological information, and comparing the biological information with the information acquired by the identity authentication request;
s104, judging whether the inspector is an on-duty person in the scheduling table; if not, refusing authorization and sending result information to the preset terminal.
4. The internet of things-based security management method according to claim 1, wherein the step S50 further includes S501, obtaining historical patrol total time length data and historical patrol time length data of each target section to be checked;
s502, calling the current inspection time length data, and dividing the inspection time length of each target section to be inspected;
s503, comparing the time length of each target section to be detected in the historical inspection with the inspection time length of each target section to be detected at this time, and judging whether the time length difference value of two times exceeds a threshold value;
and S504, if so, marking the target section to be detected.
5. A safety management system based on the Internet of things is characterized by comprising
The position monitoring module is used for collecting the position information of the first mobile terminal at regular time and judging whether the position information is positioned on a preset path;
the system comprises an information receiving module, a first mobile terminal and a second mobile terminal, wherein the information receiving module is used for receiving basic information of an identification of a target section to be detected, which is read by the first mobile terminal, the identification of the target section to be detected comprises a bar code or a radio frequency identification chip bound with the target section to be detected, and the basic information comprises position information and a serial number of the target section to be detected; and the image processing device is used for receiving the returned image data of the image acquisition equipment;
the monitoring device control module is used for activating the image acquisition device of the target section to be detected, and the image acquisition device acquires an image range covering the target section to be detected; the system is used for controlling and starting image acquisition equipment arranged in a target section area to be detected and generating a routing inspection video and a picture; generating a time stamp and marking and backing up the collected video and picture; detecting the time length for starting the image acquisition equipment, judging whether the starting time length exceeds a threshold value, and if so, closing the image acquisition equipment;
the storage management module is used for storing inspection information input in an inspection table popped up by reading the mark of the target section to be inspected in response to the first mobile terminal and storing returned image data;
the processing module is used for judging whether the target section to be detected is abnormal or not based on the routing inspection information;
the mobile terminal management module is used for detecting whether a second mobile terminal exists in a preset distance range of the first mobile terminal; under the condition of existence, acquiring the duration of the first mobile terminal and the second mobile terminal within a preset distance range;
and respectively sending identity verification request information and judging whether the second mobile terminal deviates from a preset path of the target section to be detected or not when the duration length exceeds a threshold value, wherein the identity verification request information comprises a request for acquiring biological information of the inspector.
6. The IOT-based security management system of claim 5, further comprising,
the information management module is used for acquiring the equipment ID of the first mobile terminal; the system comprises a first mobile terminal, a second mobile terminal and a server, wherein the first mobile terminal is used for acquiring biological information or ID information of a patrol inspector holding the first mobile terminal; the biological information comprises one or more of fingerprints, palm prints, facial information and iris information;
the operation scheduling management module is used for acquiring one or more of a department scheduling list, a department function list, an attendance list, a post scheduling list, on-post and off-post personnel information, temporary post handover or temporary replacement list and calling pre-stored biological information; and the system is used for judging whether the patrol inspector is an on-duty person in the scheduling table.
7. The IOT-based security management system of claim 5, wherein the location supervision module comprises,
the path planning module is used for planning a preset path of the target section to be detected, deviating the preset path of the target section to be detected at the first mobile terminal, and acquiring basic information of the target section to be detected;
the identity authentication module is used for sending identity authentication request information, wherein the identity authentication request information comprises a request for acquiring biological information of an inspector;
the operation scheduling management module is used for acquiring one or more of a department scheduling list, a department function list, an attendance list, a post scheduling list, on-post and off-post personnel information, temporary post handover or temporary replacement list, calling prestored biological information and comparing the biological information with the information acquired by the identity authentication request; judging whether the patrol inspector is an on-duty person in the scheduling table; if not, refusing authorization and sending result information to the preset terminal.
8. The IOT-based security management system of claim 5, wherein the processing module comprises,
the calling module is used for acquiring historical inspection total time length data and historical inspection target section time length data;
the first calculation module is used for calling the inspection time length data and dividing the inspection time length of each target section to be inspected; the system is used for comparing the time length of each target section to be detected in the historical inspection with the inspection time length of each target section to be detected at this time, and judging whether the time length difference value of two times exceeds a threshold value;
and the marking management module is used for marking the target section to be detected if the time length difference value of the two times exceeds the threshold value.
CN202110700689.9A 2021-06-24 2021-06-24 Security management system and management method based on Internet of things Active CN113256166B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110700689.9A CN113256166B (en) 2021-06-24 2021-06-24 Security management system and management method based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110700689.9A CN113256166B (en) 2021-06-24 2021-06-24 Security management system and management method based on Internet of things

Publications (2)

Publication Number Publication Date
CN113256166A CN113256166A (en) 2021-08-13
CN113256166B true CN113256166B (en) 2022-03-22

Family

ID=77189453

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110700689.9A Active CN113256166B (en) 2021-06-24 2021-06-24 Security management system and management method based on Internet of things

Country Status (1)

Country Link
CN (1) CN113256166B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115240288A (en) * 2022-07-04 2022-10-25 上海易同科技股份有限公司 Bluetooth positioning-based rapid attendance checking method for pedestrian flow, computer equipment and storage medium
CN116992907B (en) * 2023-07-27 2024-03-29 珠海昊宇科技有限公司 Internet of things management system and method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103280000B (en) * 2013-04-11 2016-10-19 魏大伦 Visualization cruising inspection system based on Internet of Things and method for inspecting
CN105303636B (en) * 2015-10-28 2018-06-19 深圳市慧友安电子技术有限公司 Wireless polling system and inspection management method
CN108052058B (en) * 2018-01-31 2023-11-24 广州市建筑科学研究院有限公司 Construction engineering site safety patrol transaction flow system based on Internet +'
CN110443907A (en) * 2019-06-28 2019-11-12 北京市政建设集团有限责任公司 Patrol task processing method and patrol task processing server

Also Published As

Publication number Publication date
CN113256166A (en) 2021-08-13

Similar Documents

Publication Publication Date Title
CN113256166B (en) Security management system and management method based on Internet of things
CN102616613B (en) Elevator monitoring system
CN103274272B (en) Elevator integrated management system and elevator integrated management method
US6721685B2 (en) Remote maintenance system
CN106846530A (en) A kind of property movement cruising inspection system and method based on NFC technique
CN102602762B (en) Elevator repair monitoring method
CN111310947A (en) Building facility operation and maintenance method, equipment, storage medium and system based on 5G
KR101386591B1 (en) CCTV integrated management system
CN109996182B (en) Positioning method, device and system based on combination of UWB positioning and monitoring
CN102616617A (en) Elevator monitoring method
CN112348444A (en) Internet-based remote monitoring and management system for material warehouse
CN112101495A (en) Risk monitoring method, system and related equipment
CN103413264A (en) Fire-fighting equipment information processing system and method based on PDA (Personal Digital Assistant)
CN110047164A (en) Electromechanical equipment patrolling and checking management system
CN112764376B (en) Intelligent power cut and transmission monitoring management system and monitoring management method thereof
CN110675540B (en) Lock management method and device for equipment maintenance and intelligent electronic lock
CN115618427B (en) Data chaining method, device and data platform
US11138542B2 (en) Confirming field technician work based on photographic time and location device
CN214896700U (en) Prevent to patrol and examine dual positioning system of cheating
CN112165526B (en) Mobile inspection method based on intelligent sensor
JP2015022414A (en) Patrol task support system, patrol task support method, and program for patrol task support system
CN114463873A (en) Patrol system for community
CN112820004A (en) Intelligent ring main unit management system and method thereof
CN202548632U (en) Safety production element management system
CN112152851A (en) Data access method for inspection robot

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230413

Address after: 450000 building 59, headquarters, 1 Cui Zhu street, hi tech Zone, Zhengzhou, Henan

Patentee after: HENAN XINANLI SAFETY TECHNOLOGY CO.,LTD.

Address before: 100020 2905, 25 / F, building 1, yard a 6, Shuguang Sili, Chaoyang District, Beijing

Patentee before: XIN'ANLIZHONG (BEIJING) TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right