CN113393607A - Intelligent electric power security method and system - Google Patents

Intelligent electric power security method and system Download PDF

Info

Publication number
CN113393607A
CN113393607A CN202110706323.2A CN202110706323A CN113393607A CN 113393607 A CN113393607 A CN 113393607A CN 202110706323 A CN202110706323 A CN 202110706323A CN 113393607 A CN113393607 A CN 113393607A
Authority
CN
China
Prior art keywords
visiting
outbound
vehicle
module
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110706323.2A
Other languages
Chinese (zh)
Other versions
CN113393607B (en
Inventor
张永挺
谢绍敏
谢幸生
林永昌
吴啟民
张勇志
冯灿成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Power Grid Co Ltd
Zhongshan Power Supply Bureau of Guangdong Power Grid Co Ltd
Original Assignee
Guangdong Power Grid Co Ltd
Zhongshan Power Supply Bureau of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Power Grid Co Ltd, Zhongshan Power Supply Bureau of Guangdong Power Grid Co Ltd filed Critical Guangdong Power Grid Co Ltd
Priority to CN202110706323.2A priority Critical patent/CN113393607B/en
Publication of CN113393607A publication Critical patent/CN113393607A/en
Application granted granted Critical
Publication of CN113393607B publication Critical patent/CN113393607B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/20Checking timed patrols, e.g. of watchman
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B19/00Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
    • G08B19/005Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow combined burglary and fire alarm systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

The application discloses an electric power intelligent security method and system, wherein differentiated management and control are carried out according to the type of a visitor, when the visitor is a visitor, the identity information of the visitor and the number of the visitor are automatically identified, and the identification result is preliminarily judged whether to pass or not according to preset conditions; when the vehicle is a visiting vehicle, the license plate information is automatically identified, and whether the vehicle passes is preliminarily judged according to the identification result under the preset condition. After the visitor and the visiting vehicle are preliminarily judged and are not released, the visitor is confirmed in a manual checking mode, meanwhile, the visiting vehicle can be automatically checked through the security robot, the personnel identity information, the number of visitors and the substances on the visiting vehicle are collected, whether the visiting vehicle is released or not is further judged, if the visitor and the visiting vehicle are not released, the visiting vehicle can be confirmed in the manual checking mode, therefore, the complexity scene can be solved, and the flexibility of security management and control is improved.

Description

Intelligent electric power security method and system
Technical Field
The application relates to the technical field of security management, in particular to an intelligent electric power security method and system.
Background
The electric power security system is a comprehensive security facility comprising security personnel, video monitoring, electronic fences, a vehicle identification system and security equipment, and is an important measure for protecting the personal safety of non-electric power production personnel and electric power equipment of a transformer substation.
The traditional electric power security system mainly uses security personnel and is combined with auxiliary electronic equipment such as a video monitoring system, an infrared correlation system, a pulse electronic fence system and the like to carry out security monitoring management so as to improve the regional safety.
However, the existing power security system monitoring can only identify specific people or things, and in the case of a transformer substation in a power production operation place with a complicated and variable or no fixed scene, a visual blind area exists, so that people and materials can not be monitored accurately in all directions when entering and leaving the transformer substation, serious potential safety hazards are brought to safety production in the power production place, and development of digital unmanned operation and maintenance of the transformer substation is hindered.
Disclosure of Invention
The application provides an electric power intelligent security method and system, which are used for solving the technical problem that when an existing security system faces a transformer substation in an electric power production operation place with a complex and changeable or no fixed scene, a visual blind area exists, and therefore all-around accurate monitoring can not be carried out on personnel and vehicles.
In view of this, the first aspect of the present application provides an intelligent power security method, including the following steps:
s1, obtaining a visiting monitoring video of the substation gate;
s2, judging whether a visitor or a visiting vehicle exists in the visiting monitoring video, and if so, executing a step S3; if there is a visiting vehicle, go to step S5;
s3, identifying the visiting identity information of the visitor through identification equipment, judging whether the visitor is a legal visitor or not based on a preset accessible personnel library and an identification result, and executing the step S4 if the visitor is judged to be a legal visitor; if the visitor is not a legal visitor, executing step S8;
s4, judging whether the number of the visitors is lower than a preset number threshold, and if so, executing a step S9; if the number of visitors is not lower than the preset number threshold, the step S8 is executed;
s5, acquiring visiting license plate information of the visiting vehicle through license plate recognition equipment, judging whether the visiting vehicle is a legal visiting vehicle or not based on a preset accessible vehicle library and the visiting license plate information, if the visiting vehicle is judged to be the legal visiting vehicle, turning to the step S9, and if the visiting vehicle is judged not to be the legal visiting vehicle, turning to the step S6;
s6, responding to a trigger signal that the visiting vehicle reaches a preset visiting inspection station through a security robot, so as to generate a first motion instruction, wherein the security robot drives to the preset visiting inspection station according to the first motion instruction to inspect the visiting vehicle;
s7, collecting the visiting identity information, the number of visiting persons and visiting carriage images of the visiting persons on the visiting vehicle in the process that the security robot patrols the visiting vehicle, identifying the visiting material information in the visiting carriage images, storing the visiting identity information, the number of visiting persons and the visiting material information of the visiting persons on the visiting vehicle, and executing the step S3;
s8, judging whether the visiting person or the visiting vehicle can pass or not based on a preset manual checking process, and if so, executing a step S9; if the visitor or the visiting vehicle cannot pass through, the visitor or the visiting vehicle is not released;
s9, the visitor or the visiting vehicle is allowed to pass.
Preferably, the step S2 of determining whether there is a visitor or a visiting vehicle in the visiting monitoring video specifically includes:
performing target recognition on the visiting monitoring video based on a pre-trained target feature recognition model so as to judge whether a visiting person or a visiting vehicle exists in the visiting monitoring video; the pre-trained target feature recognition model is obtained through deep learning algorithm training.
Preferably, step S3 is preceded by:
s301, obtaining identity information of legal passers from work tickets of the transformer substation, and generating a passable personnel library according to the identity information of the legal passers.
Preferably, after step S9, the method includes:
s10, obtaining an outbound monitoring video of the substation gate;
s11, judging whether an outbound person or an outbound vehicle exists in the outbound monitoring video, and if so, executing a step S12; if the vehicle is out of the station, executing step S14;
s12, identifying the outbound identity information of the outbound personnel through the identification equipment, judging whether the outbound personnel is legal or not based on the preset passable personnel library and the identification result, and executing the step S13 if the outbound personnel is judged to be legal; if the outbound person is judged not to be a legal outbound person, executing step S18;
s13, judging whether the number of the outbound persons is the same as the number of the visiting persons, if so, executing a step S19; if the above checks are not the same, go to step S18;
s14, acquiring the outbound license plate information of the outbound vehicle through license plate recognition equipment, judging whether the outbound vehicle is a legal outbound vehicle or not based on the preset passable vehicle library and the outbound license plate information, if so, turning to the step S19, and if not, turning to the step S15;
s15, responding to a trigger signal that the outbound vehicle reaches a preset outbound inspection station through the security robot, so as to generate a second motion instruction, wherein the security robot drives to the preset outbound inspection station according to the second motion instruction to inspect the outbound vehicle;
s16, acquiring the outbound identity information, the number of outbound persons and outbound carriage images of the outbound persons on the outbound vehicle in the process of patrolling the outbound vehicle by the security robot;
s17, identifying outbound material information in the outbound carriage image, performing matching check on the outbound material information and the corresponding visiting material information, judging whether the outbound material information is consistent with the corresponding visiting material information, if so, executing a step S18, and if so, executing a step S12;
s18, judging whether the outbound personnel or the outbound vehicle can pass or not based on a preset manual checking process, and if so, executing a step S19; if the outbound personnel or the outbound vehicle cannot pass through, the outbound personnel or the outbound vehicle cannot pass through;
and S19, releasing the outbound personnel or the outbound vehicle.
In a second aspect, the present invention further provides a system for implementing the above intelligent power security method, including:
the video monitoring module is used for acquiring a visiting monitoring video of a gate of the transformer substation;
the first judgment module is used for receiving the visiting monitoring video acquired by the video monitoring module and also used for judging whether a visiting person or a visiting vehicle exists in the visiting monitoring video;
the identity recognition module is used for recognizing the visiting identity information of the visiting person and judging whether the visiting person is a legal visiting person or not based on a preset accessible person library and a recognition result;
the second judgment module is used for judging whether the number of visitors is lower than a preset number threshold value;
the license plate recognition module is used for acquiring visiting license plate information of the visiting vehicle and judging whether the visiting vehicle is a legal visiting vehicle or not based on a preset passable vehicle library and the visiting license plate information;
the security robot is used for responding to a trigger signal that the visiting vehicle reaches a preset visiting inspection station, generating a first motion instruction, and driving to the preset visiting inspection station according to the first motion instruction to inspect the visiting vehicle; the system is also used for acquiring the visiting identity information, the number of visiting persons and visiting carriage images of the visiting persons on the visiting vehicle; the system is also used for respectively transmitting the visiting identity information and the number of visiting persons to the identity recognition module and the second judgment module;
the material identification module is used for identifying the visiting material information in the visiting carriage image;
the storage module is used for storing the visiting identity information of the visiting person on the visiting vehicle, the number of the visiting persons and the visiting material information;
the manual checking module is used for judging whether the visitor or the visiting vehicle can pass or not based on a preset manual checking process, and is also used for generating a visiting passing signal when the visitor or the visiting vehicle can pass; the system is also used for generating a visiting passing refusing signal when judging that the visiting passing is not possible;
and the access control module is used for performing access releasing operation on the visitor or the visiting vehicle according to the access passing signal and also used for performing access releasing operation on the visitor or the visiting vehicle according to the access passing refusing signal.
Preferably, the method further comprises the following steps:
the legal identity acquisition module is used for acquiring the identity information of legal passers from the work ticket of the transformer substation;
and the database module is used for generating a passable personnel database according to the identity information of the legal passable personnel.
Preferably, the video monitoring module is further configured to obtain an outbound monitoring video of a substation gate;
the first judgment module is also used for judging whether the outbound monitoring video contains outbound personnel or outbound vehicles;
the identity recognition module also recognizes the outbound identity information of the outbound personnel, and judges whether the outbound personnel is legal or not based on the preset passable personnel library and the recognition result;
the second judgment module is also used for judging whether the number of the outbound persons is the same as the number of the visiting persons;
the license plate recognition module is also used for acquiring the outbound license plate information of the outbound vehicle and judging whether the outbound vehicle is a legal outbound vehicle or not based on the preset passable vehicle library and the outbound license plate information;
the security robot is further used for responding to a trigger signal when the outbound vehicle reaches a preset outbound inspection station so as to generate a second motion instruction, and is also used for driving the outbound vehicle to the preset outbound inspection station according to the second motion instruction so as to inspect the outbound vehicle; the system is also used for acquiring the outbound identity information, the number of outbound persons and the outbound carriage image of the outbound persons on the outbound vehicle, and respectively transmitting the outbound identity information and the number of outbound persons to the identity recognition module and the second judgment module;
the material identification module is used for identifying the outbound material information in the outbound carriage image; the system is also used for matching and checking the outbound material information and the corresponding visiting material information, and judging whether the outbound material information is consistent with the corresponding visiting material information or not;
the manual checking module is further configured to judge whether the outbound personnel or the outbound vehicle can pass based on the preset manual checking process, and generate an outbound passing signal when the outbound passing is judged to be possible; the system is also used for generating an outbound passing refusing signal when judging that the outbound passing is not possible;
the entrance guard module is further used for performing the operation of releasing the outbound of the outbound personnel or the outbound vehicle according to the outbound passing signal and also used for performing the operation of releasing the outbound of the outbound personnel or the outbound vehicle according to the signal of releasing the outbound.
Preferably, the identity recognition module comprises a face recognition sub-module, a fingerprint recognition sub-module and a card reading recognition sub-module;
the face recognition sub-module is used for recognizing the face;
the fingerprint identification submodule is used for identifying a fingerprint;
the card reading identification submodule is used for identifying the IC card.
Preferably, the monitoring system further comprises a perimeter alarm module, wherein the perimeter alarm module is connected with the video monitoring module and used for sending alarm information when monitoring that illegal visitors or illegal visitors intrude into the transformer substation.
Preferably, still include a plurality of temperature sensor and fire alarm module, a plurality of temperature sensor is used for gathering the temperature data of transformer substation, fire alarm module with a plurality of temperature sensor electricity is connected for receive the transformer substation that a plurality of temperature sensor gathered temperature data still is used for when temperature data surpasss predetermined safe temperature, then sends alarm information.
According to the technical scheme, the invention has the following advantages:
the method carries out differential management and control according to the type of the visitors, automatically identifies the identity information of the visitors and the number of the visitors when the visitors are the visitors, and preliminarily judges whether the identification result is released or not according to preset conditions; when the vehicle is a visiting vehicle, the license plate information is automatically identified, and whether the vehicle passes is preliminarily judged according to the identification result under the preset condition. After the visitor and the visiting vehicle are preliminarily judged and are not released, the visitor is confirmed in a manual checking mode, meanwhile, the visiting vehicle can be automatically checked through the security robot, the personnel identity information, the number of visiting persons and substances on the visiting vehicle are collected, whether the visiting vehicle is released is further judged, if the visiting vehicle is not released, the visiting vehicle can be confirmed in the manual checking mode, the complexity scene can be solved, the flexibility of security management and control is improved, the technical problem that when a transformer substation is faced to an electric power production operation place with a complicated and changeable or unfixed scene, a vision blind area exists, and all-round and accurate monitoring on the personnel and the vehicle cannot be achieved is solved.
Drawings
Fig. 1 is a flowchart of an intelligent power security method according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of an intelligent power security system provided in an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Because the existing electric power security system monitoring can only identify specific people or things, visual blind areas exist in the transformer substation facing the electric power production operation places with complicated and variable or no fixed scenes, and all-around accurate monitoring on the entering and exiting of personnel and materials in the transformer substation cannot be carried out.
Therefore, the invention provides an intelligent electric power security method, please refer to fig. 1, which comprises the following steps:
s1, obtaining a visiting monitoring video of the substation gate;
s2, judging whether a visitor or a visiting vehicle exists in the visiting monitoring video, and if so, executing a step S3; if there is a visiting vehicle, go to step S5;
it should be noted that after the visiting surveillance video is obtained, the visiting surveillance video is subjected to target recognition based on a pre-trained target feature recognition model, so as to judge whether a visiting person or a visiting vehicle exists in the visiting surveillance video; the pre-trained target feature recognition model is obtained through deep learning algorithm training. Meanwhile, when the target feature recognition model is trained, a large number of people and vehicles can be used as a training set to be input into the deep learning algorithm for training.
S3, identifying the visiting identity information of the visitor through the identification device, judging whether the visitor is a legal visitor or not based on a preset accessible personnel library and an identification result, and executing the step S4 if the visitor is judged to be a legal visitor; if the visitor is not a legal visitor, executing step S8;
it can be understood that the preset passable person library has the identity information of the passable person, and whether the visitor is a legal visitor can be judged by comparing the visiting identity information of the visitor with the identity information of the passable person.
In addition, the preset passable personnel library can be manually input, and the identity information comprises names, units, fingerprints, faces, identity cards, work tickets and the like.
S4, judging whether the number of the visitors is lower than a preset number threshold, and if so, executing a step S9; if the number of visitors is not lower than the preset number threshold, the step S8 is executed;
it should be noted that the number of visitors can be identified through the visiting monitoring video, and the number of visitors needs to be limited due to the safety limitation of the substation, so the number threshold needs to be set in advance according to the safety rule, and if the number threshold is set to be 6 and the number of visitors is 7, the number of visitors is an unsafe number, and whether the visitors can pass or not needs to be further confirmed.
S5, acquiring visiting license plate information of a visiting vehicle through license plate recognition equipment, judging whether the visiting vehicle is a legal visiting vehicle or not based on a preset passable vehicle library and the visiting license plate information, if the visiting vehicle is judged to be the legal visiting vehicle, turning to the step S9, and if the visiting vehicle is judged not to be the legal visiting vehicle, turning to the step S6;
it can be understood that personnel responsible for operation and maintenance of the transformer substation are arranged in the transformer substation, and license plate information needs to be recorded by the operation and maintenance personnel and is input into the passable vehicle library, so that when the condition that a detected visiting vehicle can be matched with the wheel information recorded in the passable vehicle library, the vehicle can be directly released without further verification.
S6, responding to a trigger signal that a visiting vehicle reaches a preset visiting inspection station through the security robot, so as to generate a first motion instruction, and driving the security robot to the preset visiting inspection station according to the first motion instruction to inspect the visiting vehicle;
it should be noted that a vehicle identification device may be disposed at the visiting inspection station, and when the visiting vehicle reaches a predetermined visiting inspection station, a trigger signal is generated, so as to send a first motion instruction to the security robot, where a motion trajectory between the security robot and the predetermined visiting inspection station may be preset, and when the security robot receives the first motion instruction, the security robot reaches an assigned position of the predetermined visiting inspection station according to the predetermined motion trajectory to inspect the visiting vehicle.
S7, in the process that the security robot patrols the visiting vehicle, acquiring visiting identity information, the number of visiting persons and visiting carriage images of the visiting persons on the visiting vehicle, identifying visiting material information in the visiting carriage images, storing the visiting identity information, the number of visiting persons and the visiting material information of the visiting persons on the visiting vehicle, and executing the step S3;
it can be understood that, when the security robot patrols and examines the in-process to the visiting vehicle, remind personnel in the vehicle through multiple mode, if send out pronunciation and remind, inform personnel in the vehicle and show visiting identity information, simultaneously, the security robot has the function of making a video recording, can gather visiting identity information, the visitor number and the visiting carriage image that personnel in the vehicle showed.
When the image of the visiting carriage is collected, the key point is that for a vehicle with a trunk, the trunk is opened by reminding people in the vehicle, so that a security robot shoots the trunk, the visiting material information in the image of the visiting carriage is identified based on a target feature identification model trained by a deep learning algorithm, such as a tool box, a maintenance tool and the like, and meanwhile, the visiting identity information, the number of visitors and the visiting material information of the visitors on the visiting vehicle can be stored through a server to be filed.
S8, judging whether the visitor or the visiting vehicle can pass through based on the preset manual checking process, and if so, executing the step S9; if the visitor or the visiting vehicle is judged not to be allowed to pass, the visitor or the visiting vehicle is not allowed to pass;
it can be understood that the manual verification process is performed manually, in a general example, the transformer substation can be provided with a security centralized control center, the security centralized control center can call collected images of the surveillance camera and the security robot, the verification is performed manually, a complex scene can be dealt with, and whether visitors or vehicles are released can be determined according to actual requirements, so that the flexibility of security is improved.
And S9, passing through the visitor or the visiting vehicle.
According to the method, differential management and control are carried out according to the visiting types, when the visiting persons belong to the visiting persons, the identity information of the persons and the number of the visiting persons are automatically identified, and whether the identification results are released or not is preliminarily judged according to preset conditions; when the vehicle is a visiting vehicle, the license plate information is automatically identified, and whether the vehicle passes is preliminarily judged according to the identification result under the preset condition. After the visitor and the visiting vehicle are preliminarily judged and are not released, the visitor is confirmed in a manual checking mode, meanwhile, the visiting vehicle can be automatically checked through the security robot, the personnel identity information, the number of visiting persons and substances on the visiting vehicle are collected, whether the visiting vehicle is released is further judged, if the visiting vehicle is not released, the visiting vehicle can be confirmed in the manual checking mode, the complexity scene can be solved, the flexibility of security management and control is improved, the technical problem that when a transformer substation is faced to an electric power production operation place with a complicated and changeable or unfixed scene, a vision blind area exists, and all-round and accurate monitoring on the personnel and the vehicle cannot be achieved is solved.
Further, step S3 is preceded by:
s301, obtaining identity information of legal passers from work tickets of the transformer substation, and generating a passable personnel library according to the identity information of the legal passers.
It can be understood that the work ticket has the identity information of the personnel, such as name, unit and other information, and the identity information of the legal passing personnel can be generated by identifying the identity information of the personnel on the work ticket and is recorded into the passable personnel library to be used as the basis for the identity verification of the personnel.
The above is a detailed description of the security monitoring process when the personnel or the vehicle is out of the station by the intelligent electric power security method provided by the invention.
Specifically, step S9 is followed by:
s10, obtaining an outbound monitoring video of the substation gate;
s11, judging whether an outbound person or an outbound vehicle exists in the outbound monitoring video, and if so, executing a step S13; if the vehicle is out of the station, executing step S15;
it should be noted that the identification process in step S11 is identical to that in step S2, and is not described herein again.
S12, identifying the outbound identity information of the outbound personnel through identification equipment, judging whether the outbound personnel is legal or not based on a preset passable personnel library and an identification result, and executing the step S13 if the outbound personnel is judged to be legal; if the outbound person is judged not to be a legal outbound person, executing step S18;
it should be noted that the process of step S12 is identical to that of step S3, and is not described herein again.
S13, judging whether the number of the people leaving the station is the same as the number of the people visiting the station, if so, executing a step S19; if the above checks are not the same, go to step S18;
it should be noted that, the number of people in the corresponding visit can be determined by the identification information of the number of people who come out, and whether the number of people who come in and go out is consistent can be determined by judging whether the number of people who come out and the number of people who come in are the same, so that the safety is improved.
S14, acquiring the outbound license plate information of the outbound vehicle through license plate recognition equipment, judging whether the outbound vehicle is a legal outbound vehicle or not based on a preset passable vehicle library and the outbound license plate information, if so, turning to S19, and if not, turning to S15;
it should be noted that the process of step S14 is identical to that of step S5, and is not described herein again.
S15, responding to a trigger signal that the outbound vehicle reaches a preset outbound inspection station through the security robot, so as to generate a second motion instruction, and driving the security robot to the preset outbound inspection station according to the second motion instruction to inspect the outbound vehicle;
it should be noted that the process of step S15 is identical to that of step S6, and is not described herein again.
S16, acquiring the outbound identity information, the number of outbound persons and outbound carriage images of the outbound persons on the outbound vehicle in the process of patrolling the outbound vehicle by the security robot;
it should be noted that the process of step S16 is consistent with the process of collecting the visiting identity information, the number of visitors and the visiting car image of the visitor in the visiting vehicle in step S7, and will not be described herein again.
S17, identifying outbound material information in the outbound carriage image, performing matching check on the outbound material information and corresponding visiting material information, judging whether the outbound material information is consistent with the corresponding visiting material information, if so, executing a step S18, and if so, executing a step S12;
in step S7, the material information at the time of the visit is identified and archived, and after the outbound material information in the outbound car image is identified in this step, the outbound material information and the corresponding visiting material information can be automatically matched and verified.
Considering that materials may be used or transferred before the vehicle leaves, the information of the materials leaving the station cannot be accurately identified in the image identification process of the vehicle compartment leaving the station, and the matching verification in the step is inaccurate, therefore, when the verification is inconsistent, the manual further verification is needed to cope with the complex and diverse scenes.
S18, judging whether the outbound personnel or the outbound vehicle can pass or not based on the preset manual checking process, and if so, executing the step S19; if the outbound personnel or the outbound vehicle cannot pass through, the outbound personnel or the outbound vehicle cannot pass through;
it should be noted that this step S18 is consistent with the process of step S8, so that the verification is performed manually, the complicated scene can be dealt with, and the determination of whether to release the outbound person or vehicle can be performed according to the actual requirement, thereby improving the flexibility of security.
And S19, releasing the person or vehicle.
The embodiment manages and controls the personnel or vehicles entering and exiting, realizes the security-free management and control of the personnel and materials entering and exiting, and accordingly guarantees the safety of personnel, equipment and a power grid on an operation site.
For the convenience of understanding, please refer to fig. 2, the following is a system for implementing the intelligent security method for electric power provided by the present invention, and includes:
the video monitoring module 10 is used for acquiring a visiting monitoring video of a gate of the transformer substation;
the first judging module 20 is configured to receive the visiting monitoring video acquired by the video monitoring module 10, and further configured to judge whether a visiting person or a visiting vehicle exists in the visiting monitoring video;
the identity recognition module 30 is used for recognizing the visiting identity information of the visiting person and judging whether the visiting person is a legal visiting person or not based on a preset accessible person library and a recognition result;
the second judgment module 40 is used for judging whether the number of visitors is lower than a preset number threshold;
the license plate recognition module 50 is used for acquiring visiting license plate information of a visiting vehicle and judging whether the visiting vehicle is a legal visiting vehicle or not based on a preset passable vehicle library and the visiting license plate information;
the security robot 60 is used for responding to a trigger signal that the visiting vehicle reaches a preset visiting inspection station, generating a first motion instruction, and driving to the preset visiting inspection station according to the first motion instruction to inspect the visiting vehicle; the system is also used for acquiring the visiting identity information, the number of visiting persons and visiting carriage images of the visiting persons on the visiting vehicle; the system is also used for respectively transmitting the visiting identity information and the number of visiting persons to the identity recognition module 30 and the second judgment module 40;
the material identification module 70 is used for identifying the visiting material information in the visiting carriage image;
the storage module 80 is used for storing the visiting identity information, the number of visiting persons and the visiting material information of the visiting persons on the visiting vehicle;
the manual checking module 90 is configured to determine whether a visitor or a visiting vehicle can pass through based on a preset manual checking process, and generate a visiting passing signal when the visitor or the visiting vehicle is determined to pass through; the system is also used for generating a visiting passing refusing signal when judging that the visiting passing is not possible;
the access control module 100 is configured to perform an access releasing operation on the visitor or the visiting vehicle according to the access passing signal, and further perform an access releasing rejection operation on the visitor or the visiting vehicle according to the access passing rejection signal.
According to the method, differential management and control are carried out according to the visiting types, when the visiting persons belong to the visiting persons, the identity information of the persons and the number of the visiting persons are automatically identified, and whether the identification results are released or not is preliminarily judged according to preset conditions; when the vehicle is a visiting vehicle, the license plate information is automatically identified, and whether the vehicle passes is preliminarily judged according to the identification result under the preset condition. After the visitor and the visiting vehicle are preliminarily judged and are not released, the visitor is confirmed in a manual checking mode, meanwhile, the visiting vehicle can be automatically checked through the security robot, the personnel identity information, the number of visiting persons and substances on the visiting vehicle are collected, whether the visiting vehicle is released is further judged, if the visiting vehicle is not released, the visiting vehicle can be confirmed in the manual checking mode, the complexity scene can be solved, the flexibility of security management and control is improved, the technical problem that when a transformer substation is faced to an electric power production operation place with a complicated and changeable or unfixed scene, a vision blind area exists, and all-round and accurate monitoring on the personnel and the vehicle cannot be achieved is solved.
Further, the system also includes:
the legal identity acquisition module is used for acquiring the identity information of legal passers from the work ticket of the transformer substation;
and the database module is used for generating a passable personnel database according to the identity information of the legal passable personnel.
Furthermore, the video monitoring module is also used for acquiring an outbound monitoring video of the substation gate;
the first judgment module is also used for judging whether the outbound monitoring video contains outbound personnel or outbound vehicles;
the identity recognition module is used for recognizing the outbound identity information of the outbound personnel and judging whether the outbound personnel is legal or not based on a preset passable personnel library and a recognition result;
the second judgment module is also used for judging whether the number of the outbound persons is the same as the number of the visiting persons;
the license plate recognition module is also used for acquiring the outbound license plate information of the outbound vehicle and judging whether the outbound vehicle is a legal outbound vehicle or not based on a preset passable vehicle library and the outbound license plate information;
the security robot is also used for responding to a trigger signal that the outbound vehicle reaches a preset outbound inspection station so as to generate a second motion instruction, and is also used for driving to the preset outbound inspection station according to the second motion instruction so as to inspect the outbound vehicle; the system is also used for acquiring the outbound identity information, the number of outbound persons and the outbound carriage image of the outbound persons on the outbound vehicle, and respectively transmitting the outbound identity information and the number of outbound persons to the identity recognition module and the second judgment module;
the material identification module is used for identifying the outbound material information in the outbound carriage image; the system is also used for matching and checking the outbound material information and the corresponding visiting material information and judging whether the outbound material information is consistent with the corresponding visiting material information or not;
the manual checking module is also used for judging whether the outbound personnel or the outbound vehicle can pass or not based on a preset manual checking flow, and is also used for generating an outbound passing signal when judging that the outbound passing can be passed; the system is also used for generating an outbound passing refusing signal when judging that the outbound passing is not possible;
the entrance guard module is also used for carrying out the operation of releasing the outbound of the outbound personnel or the outbound vehicle according to the outbound passing signal and also used for carrying out the operation of releasing the outbound of the outbound personnel or the outbound vehicle according to the signal of releasing the outbound.
Furthermore, the identity recognition module comprises a face recognition sub-module, a fingerprint recognition sub-module and a card reading recognition sub-module;
the face recognition sub-module is used for recognizing the face;
the fingerprint identification submodule is used for identifying a fingerprint;
the card reading identification submodule is used for identifying the IC card.
Furthermore, the system also comprises a perimeter alarm module, wherein the perimeter alarm module is connected with the video monitoring module and used for sending alarm information when monitoring that illegal visitors or illegal visitors intrude into the transformer substation.
It can be understood that after a series of passing permission confirmations, the entrance guard module performs a passing refusal operation on the visiting person or the visiting vehicle, and thus the visiting person or the visiting vehicle can be determined as an illegal visiting person or an illegal visiting vehicle. However, when illegal visitors or illegal visiting vehicles break into the transformer substation, the perimeter alarm module sends alarm information to give an alarm, so that security personnel can find the alarm in time and take emergency measures quickly.
Furthermore, the system further comprises a plurality of temperature sensors and a fire alarm module, wherein the plurality of temperature sensors are used for acquiring the temperature data of the transformer substation, the fire alarm module is electrically connected with the plurality of temperature sensors and used for receiving the temperature data of the transformer substation acquired by the plurality of temperature sensors, and the fire alarm module is further used for sending alarm information when the temperature data exceeds a preset safe temperature.
It can be understood that a plurality of temperature sensors can be installed in each instruction position of the transformer substation according to requirements, so that temperature data of the designated position can be collected, the fire alarm module processes the temperature data, whether abnormal fire occurs or not is judged, when abnormal fire occurs, an alarm message is sent out, and the message form comprises an audible and visual alarm mode and the like.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for executing all or part of the steps of the method described in the embodiments of the present application through a computer device (which may be a personal computer, a server, or a network device). And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. An intelligent electric power security method is characterized by comprising the following steps:
s1, obtaining a visiting monitoring video of the substation gate;
s2, judging whether a visitor or a visiting vehicle exists in the visiting monitoring video, and if so, executing a step S3; if there is a visiting vehicle, go to step S5;
s3, identifying the visiting identity information of the visitor through identification equipment, judging whether the visitor is a legal visitor or not based on a preset accessible personnel library and an identification result, and executing the step S4 if the visitor is judged to be a legal visitor; if the visitor is not a legal visitor, executing step S8;
s4, judging whether the number of the visitors is lower than a preset number threshold, and if so, executing a step S9; if the number of visitors is not lower than the preset number threshold, the step S8 is executed;
s5, acquiring visiting license plate information of the visiting vehicle through license plate recognition equipment, judging whether the visiting vehicle is a legal visiting vehicle or not based on a preset accessible vehicle library and the visiting license plate information, if the visiting vehicle is judged to be the legal visiting vehicle, turning to the step S9, and if the visiting vehicle is judged not to be the legal visiting vehicle, turning to the step S6;
s6, responding to a trigger signal that the visiting vehicle reaches a preset visiting inspection station through a security robot, so as to generate a first motion instruction, wherein the security robot drives to the preset visiting inspection station according to the first motion instruction to inspect the visiting vehicle;
s7, collecting the visiting identity information, the number of visiting persons and visiting carriage images of the visiting persons on the visiting vehicle in the process that the security robot patrols the visiting vehicle, identifying the visiting material information in the visiting carriage images, storing the visiting identity information, the number of visiting persons and the visiting material information of the visiting persons on the visiting vehicle, and executing the step S3;
s8, judging whether the visiting person or the visiting vehicle can pass or not based on a preset manual checking process, and if so, executing a step S9; if the visitor or the visiting vehicle cannot pass through, the visitor or the visiting vehicle is not released;
s9, the visitor or the visiting vehicle is allowed to pass.
2. The intelligent power security method of claim 1, wherein the step of determining whether the visiting person or the visiting vehicle is in the visiting surveillance video in step S2 specifically comprises:
performing target recognition on the visiting monitoring video based on a pre-trained target feature recognition model so as to judge whether a visiting person or a visiting vehicle exists in the visiting monitoring video; the pre-trained target feature recognition model is obtained through deep learning algorithm training.
3. The power intelligent security method according to claim 1, wherein before step S3, the method includes:
s301, obtaining identity information of legal passers from work tickets of the transformer substation, and generating a passable personnel library according to the identity information of the legal passers.
4. The power intelligent security method according to claim 1, wherein after step S9, the method comprises:
s10, obtaining an outbound monitoring video of the substation gate;
s11, judging whether an outbound person or an outbound vehicle exists in the outbound monitoring video, and if so, executing a step S12; if the vehicle is out of the station, executing step S14;
s12, identifying the outbound identity information of the outbound personnel through the identification equipment, judging whether the outbound personnel is legal or not based on the preset passable personnel library and the identification result, and executing the step S13 if the outbound personnel is judged to be legal; if the outbound person is judged not to be a legal outbound person, executing step S18;
s13, judging whether the number of the outbound persons is the same as the number of the visiting persons, if so, executing a step S19; if the above checks are not the same, go to step S18;
s14, acquiring the outbound license plate information of the outbound vehicle through license plate recognition equipment, judging whether the outbound vehicle is a legal outbound vehicle or not based on the preset passable vehicle library and the outbound license plate information, if so, turning to the step S19, and if not, turning to the step S15;
s15, responding to a trigger signal that the outbound vehicle reaches a preset outbound inspection station through the security robot, so as to generate a second motion instruction, wherein the security robot drives to the preset outbound inspection station according to the second motion instruction to inspect the outbound vehicle;
s16, acquiring the outbound identity information, the number of outbound persons and outbound carriage images of the outbound persons on the outbound vehicle in the process of patrolling the outbound vehicle by the security robot;
s17, identifying outbound material information in the outbound carriage image, performing matching check on the outbound material information and the corresponding visiting material information, judging whether the outbound material information is consistent with the corresponding visiting material information, if so, executing a step S18, and if so, executing a step S12;
s18, judging whether the outbound personnel or the outbound vehicle can pass or not based on a preset manual checking process, and if so, executing a step S19; if the outbound personnel or the outbound vehicle cannot pass through, the outbound personnel or the outbound vehicle cannot pass through;
and S19, releasing the outbound personnel or the outbound vehicle.
5. A system for implementing the intelligent power security method of claim 1, comprising:
the video monitoring module is used for acquiring a visiting monitoring video of a gate of the transformer substation;
the first judgment module is used for receiving the visiting monitoring video acquired by the video monitoring module and also used for judging whether a visiting person or a visiting vehicle exists in the visiting monitoring video;
the identity recognition module is used for recognizing the visiting identity information of the visiting person and judging whether the visiting person is a legal visiting person or not based on a preset accessible person library and a recognition result;
the second judgment module is used for judging whether the number of visitors is lower than a preset number threshold value;
the license plate recognition module is used for acquiring visiting license plate information of the visiting vehicle and judging whether the visiting vehicle is a legal visiting vehicle or not based on a preset passable vehicle library and the visiting license plate information;
the security robot is used for responding to a trigger signal that the visiting vehicle reaches a preset visiting inspection station, generating a first motion instruction, and driving to the preset visiting inspection station according to the first motion instruction to inspect the visiting vehicle; the system is also used for acquiring the visiting identity information, the number of visiting persons and visiting carriage images of the visiting persons on the visiting vehicle; the system is also used for respectively transmitting the visiting identity information and the number of visiting persons to the identity recognition module and the second judgment module;
the material identification module is used for identifying the visiting material information in the visiting carriage image;
the storage module is used for storing the visiting identity information of the visiting person on the visiting vehicle, the number of the visiting persons and the visiting material information;
the manual checking module is used for judging whether the visitor or the visiting vehicle can pass or not based on a preset manual checking process, and is also used for generating a visiting passing signal when the visitor or the visiting vehicle can pass; the system is also used for generating a visiting passing refusing signal when judging that the visiting passing is not possible;
and the access control module is used for performing access releasing operation on the visitor or the visiting vehicle according to the access passing signal and also used for performing access releasing operation on the visitor or the visiting vehicle according to the access passing refusing signal.
6. The system of claim 5, further comprising:
the legal identity acquisition module is used for acquiring the identity information of legal passers from the work ticket of the transformer substation;
and the database module is used for generating a passable personnel database according to the identity information of the legal passable personnel.
7. The system of claim 5, wherein the video monitoring module is further configured to obtain an outbound monitoring video of a substation gate;
the first judgment module is also used for judging whether the outbound monitoring video contains outbound personnel or outbound vehicles;
the identity recognition module also recognizes the outbound identity information of the outbound personnel, and judges whether the outbound personnel is legal or not based on the preset passable personnel library and the recognition result;
the second judgment module is also used for judging whether the number of the outbound persons is the same as the number of the visiting persons;
the license plate recognition module is also used for acquiring the outbound license plate information of the outbound vehicle and judging whether the outbound vehicle is a legal outbound vehicle or not based on the preset passable vehicle library and the outbound license plate information;
the security robot is further used for responding to a trigger signal when the outbound vehicle reaches a preset outbound inspection station so as to generate a second motion instruction, and is also used for driving the outbound vehicle to the preset outbound inspection station according to the second motion instruction so as to inspect the outbound vehicle; the system is also used for acquiring the outbound identity information, the number of outbound persons and the outbound carriage image of the outbound persons on the outbound vehicle, and respectively transmitting the outbound identity information and the number of outbound persons to the identity recognition module and the second judgment module;
the material identification module is used for identifying the outbound material information in the outbound carriage image; the system is also used for matching and checking the outbound material information and the corresponding visiting material information, and judging whether the outbound material information is consistent with the corresponding visiting material information or not;
the manual checking module is further configured to judge whether the outbound personnel or the outbound vehicle can pass based on the preset manual checking process, and generate an outbound passing signal when the outbound passing is judged to be possible; the system is also used for generating an outbound passing refusing signal when judging that the outbound passing is not possible;
the entrance guard module is further used for performing the operation of releasing the outbound of the outbound personnel or the outbound vehicle according to the outbound passing signal and also used for performing the operation of releasing the outbound of the outbound personnel or the outbound vehicle according to the signal of releasing the outbound.
8. The system of claim 5, wherein the identity recognition module comprises a face recognition sub-module, a fingerprint recognition sub-module, and a card reading recognition sub-module;
the face recognition sub-module is used for recognizing the face;
the fingerprint identification submodule is used for identifying a fingerprint;
the card reading identification submodule is used for identifying the IC card.
9. The system of claim 5, further comprising a perimeter alarm module, wherein the perimeter alarm module is connected with the video monitoring module and used for sending alarm information when monitoring that an illegal visitor or an illegal visiting vehicle intrudes into the transformer substation.
10. The system of claim 5, further comprising a plurality of temperature sensors and a fire alarm module, wherein the plurality of temperature sensors are used for collecting temperature data of a transformer substation, and the fire alarm module is electrically connected with the plurality of temperature sensors, is used for receiving the temperature data of the transformer substation collected by the plurality of temperature sensors, and is further used for sending alarm information when the temperature data exceeds a preset safe temperature.
CN202110706323.2A 2021-06-24 2021-06-24 Intelligent electric power security method and system Active CN113393607B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110706323.2A CN113393607B (en) 2021-06-24 2021-06-24 Intelligent electric power security method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110706323.2A CN113393607B (en) 2021-06-24 2021-06-24 Intelligent electric power security method and system

Publications (2)

Publication Number Publication Date
CN113393607A true CN113393607A (en) 2021-09-14
CN113393607B CN113393607B (en) 2023-01-10

Family

ID=77623838

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110706323.2A Active CN113393607B (en) 2021-06-24 2021-06-24 Intelligent electric power security method and system

Country Status (1)

Country Link
CN (1) CN113393607B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113903112A (en) * 2021-09-17 2022-01-07 苏州城之瞳安防智能科技有限公司 Intelligent monitoring system, method and medium for community management
CN114821879A (en) * 2022-06-29 2022-07-29 河北远东通信系统工程有限公司 Park visitor management system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6476732B1 (en) * 2000-05-10 2002-11-05 Ford Global Technologies, Inc. Passive automatic door opener
CN105139490A (en) * 2015-08-04 2015-12-09 国网上海市电力公司 Door access management method for unattended transformer station
CN108269407A (en) * 2018-04-09 2018-07-10 中山火炬高新企业孵化器有限公司 A kind of automatic management stream of people, the security robot of logistics
CN108269336A (en) * 2018-01-18 2018-07-10 西安艾润物联网技术服务有限责任公司 A kind of vehicle and authorization management method of occupant, device and storage medium
CN108615279A (en) * 2018-03-06 2018-10-02 安徽电科恒钛智能科技有限公司 Intelligent door access control system for transformer substations based on Internet of Things
CN109118617A (en) * 2018-07-13 2019-01-01 河南腾龙信息工程有限公司 A kind of access control system and its recognition methods applied to substation
CN109688373A (en) * 2018-12-11 2019-04-26 国网河北省电力有限公司保定供电分公司 A kind of video fusion management system of substation project scene
CN110136315A (en) * 2019-06-27 2019-08-16 广东电网有限责任公司 A kind of substation safety region prevention and control system based on Internet of Things and recognition of face
CN111833502A (en) * 2020-06-28 2020-10-27 云南电网有限责任公司昆明供电局 Intelligent monitoring and management method for personnel entering and leaving station of unattended transformer substation

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6476732B1 (en) * 2000-05-10 2002-11-05 Ford Global Technologies, Inc. Passive automatic door opener
CN105139490A (en) * 2015-08-04 2015-12-09 国网上海市电力公司 Door access management method for unattended transformer station
CN108269336A (en) * 2018-01-18 2018-07-10 西安艾润物联网技术服务有限责任公司 A kind of vehicle and authorization management method of occupant, device and storage medium
CN108615279A (en) * 2018-03-06 2018-10-02 安徽电科恒钛智能科技有限公司 Intelligent door access control system for transformer substations based on Internet of Things
CN108269407A (en) * 2018-04-09 2018-07-10 中山火炬高新企业孵化器有限公司 A kind of automatic management stream of people, the security robot of logistics
CN109118617A (en) * 2018-07-13 2019-01-01 河南腾龙信息工程有限公司 A kind of access control system and its recognition methods applied to substation
CN109688373A (en) * 2018-12-11 2019-04-26 国网河北省电力有限公司保定供电分公司 A kind of video fusion management system of substation project scene
CN110136315A (en) * 2019-06-27 2019-08-16 广东电网有限责任公司 A kind of substation safety region prevention and control system based on Internet of Things and recognition of face
CN111833502A (en) * 2020-06-28 2020-10-27 云南电网有限责任公司昆明供电局 Intelligent monitoring and management method for personnel entering and leaving station of unattended transformer substation

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113903112A (en) * 2021-09-17 2022-01-07 苏州城之瞳安防智能科技有限公司 Intelligent monitoring system, method and medium for community management
CN114821879A (en) * 2022-06-29 2022-07-29 河北远东通信系统工程有限公司 Park visitor management system

Also Published As

Publication number Publication date
CN113393607B (en) 2023-01-10

Similar Documents

Publication Publication Date Title
CN113393607B (en) Intelligent electric power security method and system
CN112489272A (en) Intelligent security control system special for garden
CN113408683A (en) Construction site safety supervision method and system
EP2779133A2 (en) System and method of anomaly detection
CN212208379U (en) Automatic attendance temperature measuring system
CN110675582A (en) Automatic alarm method and device
KR101492799B1 (en) Entrance control integrated video recording system and method thereof
CN115809949A (en) Smart park management system based on big data processing technology
CN110796776A (en) Intelligent access control system and control method thereof
CN112132048A (en) Community patrol analysis method and system based on computer vision
CN110544312A (en) Video display method and device in virtual scene, electronic equipment and storage device
CN110517397B (en) Unmanned system and method for oil depot
CN115271612A (en) Logistics park safety monitoring method, device, equipment and storage medium
CN114999141A (en) Battery car parking management method, device, equipment, system and readable storage medium
CN111696239A (en) Artificial intelligence identification system based on computer
EP3109837A1 (en) System and method of smart incident analysis in control system using floor maps
CN111599119A (en) Self-service police article borrowing and returning system
CN106127903A (en) Electronic equipment detection gate inhibition's control device and method thereof
KR101381524B1 (en) Visitor management system using image
CN113792665B (en) Forbidden area intrusion detection method aiming at different role authorities
CN210222869U (en) A unmanned on duty system for oil depot
CN115565284A (en) Identity verification method and device based on security scene
CN211349449U (en) Intelligent access control system
CN111476933B (en) Data acquisition system based on bank counter business
TWM560675U (en) Apparatus for displaying information about parking site, and management system thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant