CN113537078A - Personnel management method and device, intelligent terminal and computer readable storage medium - Google Patents

Personnel management method and device, intelligent terminal and computer readable storage medium Download PDF

Info

Publication number
CN113537078A
CN113537078A CN202110813720.XA CN202110813720A CN113537078A CN 113537078 A CN113537078 A CN 113537078A CN 202110813720 A CN202110813720 A CN 202110813720A CN 113537078 A CN113537078 A CN 113537078A
Authority
CN
China
Prior art keywords
target object
personnel
target
data
identity type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110813720.XA
Other languages
Chinese (zh)
Inventor
孙远
苏鹏飞
高咏开
马江伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Konka Electronic Technology Co Ltd
Original Assignee
Shenzhen Konka Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Konka Electronic Technology Co Ltd filed Critical Shenzhen Konka Electronic Technology Co Ltd
Priority to CN202110813720.XA priority Critical patent/CN113537078A/en
Publication of CN113537078A publication Critical patent/CN113537078A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Alarm Systems (AREA)
  • Image Analysis (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a personnel management method, a personnel management device, an intelligent terminal and a computer readable storage medium, wherein the personnel management method comprises the following steps: acquiring characteristic information of a target object; acquiring historical personnel data, wherein the historical personnel data is obtained and stored before a preset moment; acquiring the identity type of the target object based on the characteristic information of the target object and all the historical personnel data; and managing the target object based on the identity type of the target object. Compared with the prior art, the scheme of the invention can automatically acquire the characteristic information of the target object and acquire the identity type of the target object based on the historical personnel data and the characteristic information of the target object, so that personnel management is carried out, personnel do not need to be manually judged and registered one by security personnel, the identity type of the acquired personnel can be more accurately and efficiently identified and the personnel management is facilitated, and the labor cost of the required security personnel can be reduced.

Description

Personnel management method and device, intelligent terminal and computer readable storage medium
Technical Field
The invention relates to the technical field of security protection, in particular to a personnel management method, a personnel management device, an intelligent terminal and a computer readable storage medium.
Background
With the development of scientific technology, security prevention and control management is receiving more and more attention. The personnel management is an important component of security prevention and control management. Especially, for most commercial complex buildings, such as office buildings, the types of people entering and exiting are many, and the flow of people is large, and the personnel management thereof is one of the important guarantees for maintaining the safety of the buildings.
Conventionally, management of entrance and exit persons of a building mainly depends on manual judgment, registration, and the like of security personnel. The prior art has the problems that the identification capability of security personnel is limited, the judgment and the registration are carried out by the security personnel, the accurate and efficient identification of personnel types and personnel management are not facilitated, and higher labor cost is required.
Thus, there is still a need for improvement and development of the prior art.
Disclosure of Invention
The invention mainly aims to provide a personnel management method, a personnel management device, an intelligent terminal and a computer readable storage medium, and aims to solve the problem that in the prior art, judgment and registration are carried out by security personnel, so that the personnel type is not easy to accurately and efficiently identify and manage.
In order to achieve the above object, a first aspect of the present invention provides a person management method, wherein the method includes:
acquiring characteristic information of a target object;
acquiring historical personnel data, wherein the historical personnel data is obtained and stored before a preset moment;
acquiring the identity type of the target object based on the characteristic information of the target object and all the historical personnel data;
and managing the target object based on the identity type of the target object.
Optionally, the feature information includes a face feature array of the target object, and elements in the face feature array are numbers for representing face features of the target object.
Optionally, the obtaining of the feature information of the target object includes:
acquiring a plurality of face images of the target object in real time;
performing image quality detection on each face image to obtain a quality score corresponding to each face image;
acquiring a target face image based on the quality fraction;
and acquiring a face feature array corresponding to the target object based on the target face image.
Optionally, the obtaining the identity type of the target object based on the feature information of the target object and all the historical person data includes:
judging whether target personnel data exist in all the historical personnel data or not, wherein personnel characteristic information included in the target personnel data is correspondingly matched with the characteristic information of the target object;
when the target person data does not exist, marking the identity type of the target object as stranger, creating a piece of historical person data corresponding to the target object and storing the historical person data;
and when the target person data exists, acquiring the identity type of the target object based on the target person data, and adding the characteristic information of the target object into the target person data for storage.
Optionally, the obtaining the identity type of the target object based on the target person data includes:
acquiring the access times and the access intervals of the target object based on the target personnel data;
and when the access times are not more than the preset target times or the access interval is more than the preset interval time, marking the identity type of the target object as stranger.
Optionally, the obtaining the identity type of the target object based on the target person data further includes:
acquiring each stay time of the target object based on the target personnel data;
when the access times are greater than the preset target times and the access interval is not greater than the preset interval time, if the residence time is greater than the preset time length, the identity type of the target object is marked as resident personnel, and if the residence time is not greater than the preset time length, the identity type of the target object is marked as temporary personnel.
Optionally, the managing the target object based on the identity type of the target object includes:
and when the identity type of the target object is stranger, giving an alarm prompt.
A second aspect of the present invention provides a person management apparatus, wherein the apparatus includes:
the characteristic information acquisition module is used for acquiring the characteristic information of the target object;
the system comprises a historical personnel data acquisition module, a historical personnel data acquisition module and a historical personnel data storage module, wherein the historical personnel data is obtained and stored before a preset moment;
the identity type acquisition module is used for acquiring the identity type of the target object based on the characteristic information of the target object and all the historical personnel data;
and the management module is used for managing the target object based on the identity type of the target object.
A third aspect of the present invention provides an intelligent terminal, where the intelligent terminal includes a memory, a processor, and a staff management program stored in the memory and operable on the processor, and the staff management program implements any one of the steps of the staff management method when executed by the processor.
A fourth aspect of the present invention provides a computer-readable storage medium, in which a personnel management program is stored, and the personnel management program, when executed by a processor, implements any one of the steps of the personnel management method.
Therefore, in the scheme of the invention, the characteristic information of the target object is obtained; acquiring historical personnel data, wherein the historical personnel data is obtained and stored before a preset moment; acquiring the identity type of the target object based on the characteristic information of the target object and all the historical personnel data; and managing the target object based on the identity type of the target object. Compared with the scheme of manually judging and registering the access object by security personnel in the prior art, the scheme of the invention can automatically acquire the characteristic information of the target object and acquire the identity type of the target object based on the historical personnel data and the characteristic information of the target object, thereby carrying out personnel management without manually judging and registering the security personnel one by one, being beneficial to more accurately and efficiently identifying the identity type of the acquired personnel and carrying out personnel management, and reducing the labor cost of the required security personnel.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic flow chart of a personnel management method according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating the step S100 in FIG. 1 according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a detailed process of step S300 in FIG. 1 according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a personnel management device according to an embodiment of the present invention;
fig. 5 is a schematic diagram of device connection of a security management system according to an embodiment of the present invention;
fig. 6 is a schematic flowchart of a process for performing face comparison according to an embodiment of the present invention;
fig. 7 is a schematic flowchart of identity type identification according to an embodiment of the present invention;
fig. 8 is a schematic block diagram of an internal structure of an intelligent terminal according to an embodiment of the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when …" or "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted depending on the context to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings of the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways than those specifically described and will be readily apparent to those of ordinary skill in the art without departing from the spirit of the present invention, and therefore the present invention is not limited to the specific embodiments disclosed below.
With the development of scientific technology, security prevention and control management is receiving more and more attention. The personnel management is an important component of security management. Especially, for most commercial complex buildings, such as office buildings, the types of people entering and exiting are many, and the flow of people is large, and the personnel management thereof is one of the important guarantees for maintaining the safety of the buildings.
Conventionally, management of entrance and exit persons of a building mainly depends on manual judgment, registration, and the like of security personnel. Specifically, the security personnel are relied on to carry out subjective identification on site, monitoring videos can be shot and stored in a part of scenes to provide posterior analysis, but the identification accuracy and efficiency are low. Especially, in the peak period of people coming in and going out, such as the working hours and the traffic of people increase sharply, security personnel cannot judge in time, if the security personnel intercept one by one, user experience is seriously affected, strangers cannot be intercepted effectively, and the increased security personnel bring larger labor cost overhead. And more enterprises are resident in the office of the complex, the personnel types are complex, the user pays more and more attention to the privacy of personal data at present, all personnel can not be forcedly required to register the personal data (such as face images), and effective personnel management is not convenient to carry out. Therefore, the prior art has problems in that the recognition capability of security personnel is limited, the judgment and registration by the security personnel are not easy to accurately and efficiently recognize the types of the personnel and manage the personnel, and high labor cost is required.
In order to solve the problems in the prior art, the method and the device for detecting the target object acquire the characteristic information of the target object; acquiring historical personnel data, wherein the historical personnel data is obtained and stored before a preset moment; acquiring the identity type of the target object based on the characteristic information of the target object and all the historical personnel data; and managing the target object based on the identity type of the target object. Compared with the scheme of manually judging and registering the access object by security personnel in the prior art, the scheme of the invention can automatically acquire the characteristic information of the target object and acquire the identity type of the target object based on the historical personnel data and the characteristic information of the target object, thereby carrying out personnel management without manually judging and registering the security personnel one by one, being beneficial to more accurately and efficiently identifying the identity type of the acquired personnel and carrying out personnel management, and reducing the labor cost of the required security personnel.
Exemplary method
As shown in fig. 1, an embodiment of the present invention provides a method for managing people, and specifically, the method includes the following steps:
step S100, acquiring characteristic information of the target object.
The target object is a person who enters and exits a target area, and the target area is a preset area requiring person management, and may be, for example, an area such as an exit or an entrance of a building. The characteristic information may include information representing the identity of the person who enters or exits, and may also include information such as the current time, the number of times the person enters or exits, and the time of each stay, and is not particularly limited herein.
Step S200, historical personnel data is obtained, wherein the historical personnel data is obtained and stored before the preset time.
The historical personnel data is data corresponding to the person who comes in and goes out obtained by monitoring the target area. The preset time can be preset, and can be adjusted in real time according to actual requirements, which is not specifically limited herein. In this embodiment, the preset time is the current time, that is, the time when the target object is recognized, and the data of the entrance and exit of each person stored before the target object is recognized is used as the historical person data. Further, after the current data (such as feature information, access time, and the like) of the target object is acquired, the current data of the target object is also saved as historical person data, so that the target object can be identified and managed next time based on the historical person data.
Step S300, obtaining the identity type of the target object based on the feature information of the target object and all the historical personnel data.
Specifically, the characteristic information of the target object is matched and compared with the characteristic information stored in each piece of historical personnel data, whether the target object has passed through the area or not is judged, and further, the passing frequency, the residence time and the like of the target object can be obtained, so that the identity type of the target object is obtained. The identity type of the target object may be resident, stranger, or other types that are preset, such as courier, takeaway, and the like, and is not limited specifically herein.
Step S400, managing the target object based on the identity type of the target object.
Specifically, in this embodiment, different management rules may be preset for target objects with different identity types, and personnel management is performed based on the management rules. For example, the resident persons may be preset to allow free access, the strangers may not be allowed to access, and the takeaway persons may be allowed to freely access in a preset time period (e.g., lunch time period). Specifically, the management rule may also be set and adjusted according to actual requirements, and is not specifically limited herein.
As can be seen from the above, in the personnel management method provided in the embodiment of the present invention, the characteristic information of the target object is obtained; acquiring historical personnel data, wherein the historical personnel data is obtained and stored before a preset moment; acquiring the identity type of the target object based on the characteristic information of the target object and all the historical personnel data; and managing the target object based on the identity type of the target object. Compared with the scheme of manually judging and registering the access object by security personnel in the prior art, the scheme of the invention can automatically acquire the characteristic information of the target object and acquire the identity type of the target object based on the historical personnel data and the characteristic information of the target object, thereby carrying out personnel management without manually judging and registering the security personnel one by one, being beneficial to more accurately and efficiently identifying the identity type of the acquired personnel and carrying out personnel management, and reducing the labor cost of the required security personnel.
Specifically, according to the embodiment of the present invention, personnel management may be performed on one target object, or personnel management may be performed on a plurality of target objects, and when there are a plurality of target objects, each target object is managed based on the personnel management method provided in the present embodiment (the methods in step S100 to step S400 described above), which is not limited specifically herein.
Specifically, in this embodiment, the feature information includes a face feature array of the target object, and elements in the face feature array are numbers for representing face features of the target object.
Specifically, the face feature array may be a binary array, for example, an array composed of numbers 0 and 1, and each element (or a combination thereof) may represent a face feature of the current person (i.e., the target object).
Specifically, in this embodiment, as shown in fig. 2, the step S100 includes:
and step S101, acquiring a plurality of face images of the target object in real time.
And step S102, carrying out image quality detection on each face image, and acquiring a quality score corresponding to each face image.
And step S103, acquiring a target face image based on the quality fraction.
And step S104, acquiring a face feature array corresponding to the target object based on the target face image.
Specifically, at least one image pickup device may be disposed in a target area (e.g., an entrance or an exit of a building) to acquire a face image of a target object entering the target area in real time. In this embodiment, the plurality of face images are continuously captured, and further, a plurality of camera devices can be arranged at different positions, so that the problem that accurate recognition cannot be performed due to unclear images when only one image at one angle or one image is captured is avoided. In this embodiment, image quality detection is performed on each obtained face image, a corresponding quality score is obtained, and the face image with the highest quality score is used as the target face image for further recognition. In an application scenario, the target face image may be uploaded to a preset face analysis server for storage and feature extraction, so as to obtain a corresponding face feature array, or feature extraction may be performed by other devices (such as a computer) or modules, which is not limited specifically herein.
Specifically, features in the face to be recognized, such as pupil distance, eye color, pupil size, and the like, may be preset, so as to recognize the face image of the target object and obtain data information corresponding to each feature. For example, the pupil distance and pupil size of the current person may be represented by each element (or a combination thereof), the eye color may be set in advance and represented by each number, and the like. Therefore, the face feature array capable of reflecting the face features of the target object is obtained, but the face feature array does not directly store the real face of the target object, belongs to non-privacy data and is beneficial to maintaining the privacy of the target object.
Specifically, in this embodiment, as shown in fig. 3, the step S300 includes:
step S301, determining whether target person data exists in all the historical person data, where the person feature information included in the target person data is correspondingly matched with the feature information of the target object.
Step S302, when the target person data does not exist, the identity type of the target object is marked as stranger, and a piece of historical person data corresponding to the target object is created and stored.
Step S303, when the target person data exists, acquiring an identity type of the target object based on the target person data, and adding the feature information of the target object to the target person data for storage.
Specifically, the obtained feature information of the target object (i.e., the corresponding face feature array) is compared and matched with the historical feature information of each person stored in the historical person data, and whether the feature information of the target object exists in the historical person data is determined, i.e., whether the target object is a historical person who has gone in and out is determined. In this embodiment, a similarity score between the feature information of the target object and the feature information of the historical staff in each piece of historical staff data is obtained, and the target staff data is obtained based on the similarity score. Specifically, in each historical personnel data, historical personnel characteristic information obtained when the historical personnel come in and go out every time can be stored, misjudgment caused by slight differences caused by influences such as shooting angles at every time is prevented, and the judgment accuracy is improved.
In an application scenario, a similarity score threshold may be preset, and when the similarity score is greater than the similarity score threshold, the feature information of the target object is considered to match with the historical feature information in the historical person data. And when the characteristic information of the target object is matched with a plurality of pieces of historical characteristic information in the historical personnel data and the plurality of pieces of historical characteristic information belong to the same historical personnel data, the target object and the historical personnel are considered to belong to the same personnel, and the historical personnel data is taken as the target personnel data. In another application scenario, when the feature information of the target object matches with multiple pieces of historical feature information in the historical person data, and the multiple pieces of historical feature information do not belong to the same historical person data, the historical person data corresponding to the historical feature information with the highest matching degree (i.e., the highest similarity score) may be used as the target person data, or the historical person data containing the largest number of pieces of historical feature information matching with the feature information of the target object may be used as the target person data, and a specific scheme may be set and adjusted according to actual needs, which is not specifically limited herein.
Specifically, when the target person data does not exist, that is, when there is no history feature information matching with the feature information of the target object, it is described that the target object never enters the target area, the identity type of the target object is marked as stranger, and a piece of history person data corresponding to the target object is created to store the feature information, the entry and exit time, the location, and other information of the target object as a record of entry of the target object. When the target person data exists, the identity type of the target object needs to be acquired based on the target person data (i.e., the historical access situation of the target object), and meanwhile, information such as feature information, access time, location and the like of the target object is added to the target person data for storage.
Specifically, the step S303 of obtaining the identity type of the target object based on the target person data includes: acquiring the access times and the access intervals of the target object based on the target personnel data; and when the access times are not more than the preset target times or the access interval is more than the preset interval time, marking the identity type of the target object as stranger.
Since the target person data records the historical entry and exit of the person, the entry and exit count and the entry and exit interval of the target object can be acquired based on the target person data. The number of times of entry and exit is the total number of times of entry and exit of the person into and out of the target area recorded in the target person data. In one application scenario, when multiple cameras are set, the faces of the person captured by the multiple cameras within a preset time period (e.g., within one day) are recorded as the same entry record or exit record. The access interval is a time interval (in days) between two adjacent access records of the person, and for example, the access interval may be how many days are between the current access of the person to the target area and the previous access of the person to the target area. Specifically, for building resident persons, for example, employees of a certain company, the number of times of entrance and exit should be large in the case of normal work, and the time interval between entrance and exit should be short, for example, the time interval between entrance and exit during normal work is 2 days at maximum (double holidays), so that the identity of the target object can be determined from the entrance and exit time interval and the number of times of entrance and exit. Specifically, in this embodiment, the preset target number of times is 3 times, the preset interval time is 15 days, and the target number of times and the interval time may also be set and adjusted according to actual requirements, which is not specifically limited herein.
Specifically, the obtaining the identity type of the target object based on the target person data in step S303 further includes: acquiring each stay time of the target object based on the target personnel data; when the access times are greater than the preset target times and the access interval is not greater than the preset interval time, if the residence time is greater than the preset time length, the identity type of the target object is marked as resident personnel, and if the residence time is not greater than the preset time length, the identity type of the target object is marked as temporary personnel.
The above-mentioned each-stay time is the accumulated stay time of the person entering the target area every time, which is recorded in the target person data, and specifically, in this embodiment, the accumulated stay time of the same day after entering the target area. Further, when a plurality of records of each stay time exist in the target person data, the identity type of the target object can be marked as resident persons when each stay time is greater than a preset time length; or the identity type of the target object can be marked as resident personnel as long as the residence time of one object is longer than the preset time length; or, calculating the average value of all the residence times each time and comparing the average value with the preset time length, and marking the identity type of the target object as resident personnel when the average value of the residence times each time is greater than the preset time length; the identity type of the target object can be marked as resident personnel when more than half of the stay time is longer than the preset time length; other determination methods are also possible, and are not specifically limited herein.
Furthermore, the identity type of the target object can be judged according to the staying time of the target object entering the target area each time. For example, for the personnel such as the takeout personnel and the courier, although the number of times of going into and out of the building is large and the time interval is short, even the personnel may go into and out of the building every day due to the work requirement, but actually do not belong to the resident personnel in the building, at this time, the judgment can be carried out by combining the stay time of each time, so as to more accurately obtain the identity type of the target object. The above-mentioned each staying time is a time of the accumulated staying after the target object enters the target area within a preset time period (for example, within one day). In this embodiment, the preset time length is 4 hours, that is, when the number of times of access of the target object is greater than the preset number of times of access and the access interval is not greater than the preset interval time, if the staying time is greater than 4 hours each time, the identity type of the target object is marked as a resident person, and if the staying time is not greater than 4 hours each time, the identity type of the target object is marked as a temporary person. Specifically, the preset time period may also be adjusted according to actual requirements, and is not specifically limited herein.
Further, in this embodiment, the step S400 includes: and when the identity type of the target object is stranger, giving an alarm prompt.
In this embodiment, when stranger gets into the target area, the suggestion of reporting an emergency and asking for help or increased vigilance to security personnel carry out quick accurate management and control. In an application scenario, when a target object enters a target area, relevant data of the target object, such as time, place, accumulated entering times, a corresponding face feature array and other data which do not relate to privacy, are recorded, then an identity type of the target object is obtained, and relevant information of the target object is displayed in a graphic page at a workstation based on the identity type. For resident persons and temporary persons, information which does not relate to privacy (such as the time, the place, the accumulated entering times, the corresponding face feature arrays and the like, and does not contain face images) is displayed, so that the privacy of the persons is protected. For strangers, face images are obtained and stored, the face images of the strangers, the entering time, the accumulated entering times, the places and other information are displayed, and warning prompt is given to prompt security personnel to pay attention and control the strangers. Specifically, the face image of the stranger is displayed, so that the security personnel can quickly determine the stranger. Furthermore, security personnel can inquire all recorded information at any time, and for resident personnel and temporary personnel, personnel related data which do not relate to privacy can be inquired and obtained, such as a human face feature array, personnel numbers, sexes, whether glasses are worn or not and the like; for strangers, the human face image can be further acquired. In this embodiment, the entry records of the persons of each identity type may also be recorded in different time periods, for example, if the corresponding time period is set to one day, the data of each day is statistically stored. Furthermore, after the stranger is confirmed by the security personnel, the identity type can be manually modified according to the information, and when the identity type of the target object is changed to other types (such as resident people) by the stranger, the face image of the target object is deleted to protect the privacy of the target object. In an application scenario, the recording validity period of each historical person data may be set in advance, for example, may be set to 15 days, and then the database may delete data exceeding 15 days, so as to save the storage space of the database. The recording validity period may be set and adjusted according to actual requirements, and is not specifically limited herein. In this embodiment, the validity period of the record may be set to be the same as the preset interval time (both are 15 days), and at this time, when the identity type of the target object is determined, it is not necessary to perform determination according to the access interval, because the historical personnel data exceeding the preset interval time are all deleted, and if the target personnel data exists, the access interval is certainly not greater than the preset interval time.
Exemplary device
As shown in fig. 4, corresponding to the staff management method, an embodiment of the present invention further provides a staff management apparatus, where the staff management apparatus includes:
a characteristic information obtaining module 510, configured to obtain characteristic information of the target object.
The target object is a person who enters and exits a target area, and the target area is a preset area requiring person management, and may be, for example, an area such as an exit or an entrance of a building. The characteristic information may include information representing the identity of the person who enters or exits, and may also include information such as the current time, the number of times the person enters or exits, and the time of each stay, and is not particularly limited herein.
A historical personnel data obtaining module 520, configured to obtain historical personnel data, where the historical personnel data is obtained and stored before a preset time.
The historical personnel data is data corresponding to the person who comes in and goes out obtained by monitoring the target area. The preset time can be preset, and can be adjusted in real time according to actual requirements, which is not specifically limited herein. In this embodiment, the preset time is the current time, that is, the time when the target object is recognized, and the data of the entrance and exit of each person stored before the target object is recognized is used as the historical person data. Further, after the current data (such as feature information, access time, and the like) of the target object is acquired, the current data of the target object is also saved as historical person data, so that the target object can be identified and managed next time based on the historical person data.
An identity type obtaining module 530, configured to obtain an identity type of the target object based on the feature information of the target object and all the historical person data.
Specifically, the characteristic information of the target object is matched and compared with the characteristic information stored in each piece of historical personnel data, whether the target object has passed through the area or not is judged, and further, the passing frequency, the residence time and the like of the target object can be obtained, so that the identity type of the target object is obtained. The identity type of the target object may be resident, stranger, or other types that are preset, such as courier, takeaway, and the like, and is not limited specifically herein.
And a management module 540, configured to manage the target object based on the identity type of the target object.
Specifically, in this embodiment, different management rules may be preset for target objects with different identity types, and personnel management is performed based on the management rules. For example, the resident persons may be preset to allow free access, the strangers may not be allowed to access, and the takeaway persons may be allowed to freely access in a preset time period (e.g., lunch time period). Specifically, the management rule may also be set and adjusted according to actual requirements, and is not specifically limited herein.
As can be seen from the above, the personnel management apparatus provided in the embodiment of the present invention obtains the characteristic information of the target object through the characteristic information obtaining module 510; acquiring historical personnel data through a historical personnel data acquisition module 520, wherein the historical personnel data is obtained and stored before a preset moment; acquiring the identity type of the target object based on the characteristic information of the target object and all the historical personnel data through an identity type acquisition module 530; the target object is managed by the management module 540 based on the identity type of the target object. Compared with the scheme of manually judging and registering the access object by security personnel in the prior art, the scheme of the invention can automatically acquire the characteristic information of the target object and acquire the identity type of the target object based on the historical personnel data and the characteristic information of the target object, thereby carrying out personnel management without manually judging and registering the security personnel one by one, being beneficial to more accurately and efficiently identifying the identity type of the acquired personnel and carrying out personnel management, and reducing the labor cost of the required security personnel.
Specifically, in this embodiment, the specific functions of each module of the staff management apparatus may refer to the corresponding descriptions in the staff management method, and are not described herein again.
In the embodiment of the invention, the personnel management method is further specifically explained based on an actual application scene, and specifically, the personnel management method is executed based on a security management system applied to personnel entry management. Fig. 5 is a schematic diagram of device connection of a security management system according to an embodiment of the present invention, as shown in fig. 5, in this embodiment, a face snapshot machine (i.e., a face snapshot camera), a face server, and a database are provided to snapshot a face of a person entering a building and form a record, accumulate statistics times and form an entry/exit record, thereby identifying an identity type of the person, solving the problems of complicated types of the person in a complex building and difficulty in management due to privacy protection, and optimizing and improving a person entry management manner. Specifically, a face snapshot machine is deployed at a main entrance and an exit of a building and at an entrance of a floor, a face server (for face comparison) and a database are deployed in a data room, a workstation is deployed in a security personnel working area such as a monitoring room or a foreground, each device or server is connected with the same network, and the system performs personnel classification on all personnel in the database through logic judgment by calculating data (including face feature arrays, time, places, entrance and exit intervals and the like) snapshot within a period of time and takes the data as historical personnel data. On the basis, the function of face comparison is utilized to quickly classify the target object entering each time and acquire the corresponding identity type, the stranger is prompted to give an alarm at a workstation, and the other persons are prompted normally to assist security personnel in completing personnel management work, so that the accuracy and efficiency of personnel identity type identification are improved under the condition that the privacy of the personnel is not involved. Furthermore, whether the target object needs to be released or not can be determined according to the identity type, and the labor cost of security personnel is further reduced. The face snapshot machine is provided with a face imaging technology and is used for acquiring face data; the face server extracts the features of the face data provided by the face snapshot machine, establishes a face feature array, and compares the face feature array with historical personnel data stored in a database, so as to obtain the identity type of each target object; the workstation displays the snapshot picture and the analysis data to security personnel in real time. Fig. 6 is a schematic view of a process for performing face comparison according to an embodiment of the present invention, as shown in fig. 6, a face snapshot machine performs snapshot to obtain a plurality of face photos, and performs face quality detection respectively, and outputs the face photo with the highest quality to a face server, where the face server performs feature extraction on the face photo, establishes a face feature array, and stores related data into data corresponding to existing people or data corresponding to newly-created people in a database (i.e., a face library). And then calling a comparison interface, comparing the face feature array with historical personnel data in a face library, scoring the similarity, and identifying the identity type after acquiring the score. Fig. 7 is a schematic flowchart of an identity type recognition process provided in an embodiment of the present invention, where for a target object for which matching target person data is not found in historical person data, the identity type of the target object is directly marked as a stranger, and otherwise, the identity type of the target object is obtained according to the process shown in fig. 7. Specifically, as shown in fig. 7, the number of times of entrance and exit, the entrance and exit interval, and the residence time of each time of the target object are obtained based on the target person data, and when the number of times of entrance and exit is not more than 3 or the entrance and exit interval is more than 15 days, the target object is directly determined as an unfamiliar person; otherwise, further judging the residence time of each time, judging the residence time to be resident when the residence time of each time is more than 4 hours, and otherwise, judging the residence time to be temporary. So, can be based on video structural analysis ability, combine into personnel and get into the record and carry out the analysis statistics, the identity type that will go out the personnel of building in real time forms the record and produces alarm information to stranger, and the personnel type is distinguished fast to the help security personnel, reduces the potential safety hazard, effectively solves the complex building personnel type of complex, and the problem of external personnel management difficulty, and can reduce security personnel's input.
Based on the above embodiment, the present invention further provides an intelligent terminal, and a schematic block diagram thereof may be as shown in fig. 8. The intelligent terminal comprises a processor, a memory, a network interface and a display screen which are connected through a system bus. Wherein, the processor of the intelligent terminal is used for providing calculation and control capability. The memory of the intelligent terminal comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a person management program. The internal memory provides an environment for the operation of an operating system and a human manager in the nonvolatile storage medium. The network interface of the intelligent terminal is used for being connected and communicated with an external terminal through a network. The personnel management program when executed by the processor implements the steps of any of the personnel management methods described above. The display screen of the intelligent terminal can be a liquid crystal display screen or an electronic ink display screen.
It will be understood by those skilled in the art that the block diagram of fig. 8 is only a block diagram of a part of the structure related to the solution of the present invention, and does not constitute a limitation to the intelligent terminal to which the solution of the present invention is applied, and a specific intelligent terminal may include more or less components than those shown in the figure, or combine some components, or have different arrangements of components.
In one embodiment, an intelligent terminal is provided, where the intelligent terminal includes a memory, a processor, and a staff management program stored in the memory and executable on the processor, and the staff management program performs the following operation instructions when executed by the processor:
acquiring characteristic information of a target object;
acquiring historical personnel data, wherein the historical personnel data is obtained and stored before a preset moment;
acquiring the identity type of the target object based on the characteristic information of the target object and all the historical personnel data;
and managing the target object based on the identity type of the target object.
The embodiment of the present invention further provides a computer-readable storage medium, where a personnel management program is stored on the computer-readable storage medium, and when the personnel management program is executed by a processor, the steps of any one of the personnel management methods provided in the embodiments of the present invention are implemented.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned functions may be distributed as different functional units and modules according to needs, that is, the internal structure of the apparatus may be divided into different functional units or modules to implement all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art would appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the above modules or units is only one logical division, and the actual implementation may be implemented by another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed.
The integrated modules/units described above, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium and can implement the steps of the embodiments of the method when the computer program is executed by a processor. The computer program includes computer program code, and the computer program code may be in a source code form, an object code form, an executable file or some intermediate form. The computer readable medium may include: any entity or device capable of carrying the above-mentioned computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signal, telecommunication signal, software distribution medium, etc. It should be noted that the contents contained in the computer-readable storage medium can be increased or decreased as required by legislation and patent practice in the jurisdiction.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those skilled in the art; the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein.

Claims (10)

1. A people management method, characterized in that the method comprises:
acquiring characteristic information of a target object;
acquiring historical personnel data, wherein the historical personnel data is personnel data acquired and stored before a preset moment;
acquiring the identity type of the target object based on the characteristic information of the target object and all the historical personnel data;
and managing the target object based on the identity type of the target object.
2. The people management method according to claim 1, wherein the feature information includes a face feature array of the target object, and elements in the face feature array are numbers for embodying a face feature of the target object.
3. The personnel management method of claim 2, wherein said obtaining characteristic information of the target object comprises:
acquiring a plurality of face images of the target object in real time;
performing image quality detection on each face image to obtain a quality score corresponding to each face image;
acquiring a target face image based on the quality fraction;
and acquiring a face feature array corresponding to the target object based on the target face image.
4. The people management method according to claim 1, wherein the obtaining the identity type of the target object based on the characteristic information of the target object and all the historical people data comprises:
judging whether target personnel data exist in all the historical personnel data or not, wherein personnel characteristic information included in the target personnel data is correspondingly matched with the characteristic information of the target object;
when the target person data does not exist, the identity type of the target object is marked as stranger, and a piece of historical person data corresponding to the target object is created and stored;
and when the target personnel data exist, acquiring the identity type of the target object based on the target personnel data, and adding the characteristic information of the target object into the target personnel data for storage.
5. The people management method of claim 4, wherein the obtaining the identity type of the target object based on the target people data comprises:
acquiring the access times and the access intervals of the target object based on the target personnel data;
and when the access times are not more than the preset target times or the access interval is more than the preset interval time, marking the identity type of the target object as stranger.
6. The people management method of claim 5, wherein the obtaining the identity type of the target object based on the target people data further comprises:
acquiring each stay time of the target object based on the target personnel data;
when the access times are greater than the preset target times and the access interval is not greater than the preset interval time, if the residence time is greater than the preset time length, the identity type of the target object is marked as resident personnel, and if the residence time is not greater than the preset time length, the identity type of the target object is marked as temporary personnel.
7. The people management method of claim 1, wherein the managing the target object based on the identity type of the target object comprises:
and when the identity type of the target object is stranger, carrying out alarm prompt.
8. A personnel management apparatus, characterized in that the apparatus comprises:
the characteristic information acquisition module is used for acquiring the characteristic information of the target object;
the historical personnel data acquisition module is used for acquiring historical personnel data, wherein the historical personnel data is obtained and stored before a preset moment;
the identity type acquisition module is used for acquiring the identity type of the target object based on the characteristic information of the target object and all the historical personnel data;
and the management module is used for managing the target object based on the identity type of the target object.
9. An intelligent terminal, characterized in that the intelligent terminal comprises a memory, a processor and a staff management program stored on the memory and operable on the processor, the staff management program when executed by the processor implementing the steps of the staff management method according to any one of claims 1-7.
10. A computer-readable storage medium, having a people management program stored thereon, which when executed by a processor, performs the steps of the people management method according to any one of claims 1-7.
CN202110813720.XA 2021-07-19 2021-07-19 Personnel management method and device, intelligent terminal and computer readable storage medium Pending CN113537078A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110813720.XA CN113537078A (en) 2021-07-19 2021-07-19 Personnel management method and device, intelligent terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110813720.XA CN113537078A (en) 2021-07-19 2021-07-19 Personnel management method and device, intelligent terminal and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN113537078A true CN113537078A (en) 2021-10-22

Family

ID=78100183

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110813720.XA Pending CN113537078A (en) 2021-07-19 2021-07-19 Personnel management method and device, intelligent terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN113537078A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480624A (en) * 2017-08-08 2017-12-15 深圳云天励飞技术有限公司 Permanent resident population's acquisition methods, apparatus and system, computer installation and storage medium
CN108038937A (en) * 2017-11-22 2018-05-15 同观科技(深圳)有限公司 A kind of methods of exhibiting, device, terminal device and the storage medium of welcome's information
CN108573555A (en) * 2018-04-12 2018-09-25 广东汇泰龙科技有限公司 A kind of user class automatic distinguishing method and system based on face lock
CN110458062A (en) * 2019-07-30 2019-11-15 深圳市商汤科技有限公司 Face identification method and device, electronic equipment and storage medium
CN110543583A (en) * 2019-06-28 2019-12-06 深圳市商汤科技有限公司 information processing method and apparatus, image device, and storage medium
CN110598548A (en) * 2019-08-07 2019-12-20 万翼科技有限公司 Standing person identification method and device, computer equipment and storage medium
CN112036919A (en) * 2019-06-03 2020-12-04 北京市商汤科技开发有限公司 Data processing method, device and storage medium
CN112699159A (en) * 2020-11-13 2021-04-23 杭州海康威视系统技术有限公司 Data display method, device and equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480624A (en) * 2017-08-08 2017-12-15 深圳云天励飞技术有限公司 Permanent resident population's acquisition methods, apparatus and system, computer installation and storage medium
CN108038937A (en) * 2017-11-22 2018-05-15 同观科技(深圳)有限公司 A kind of methods of exhibiting, device, terminal device and the storage medium of welcome's information
CN108573555A (en) * 2018-04-12 2018-09-25 广东汇泰龙科技有限公司 A kind of user class automatic distinguishing method and system based on face lock
CN112036919A (en) * 2019-06-03 2020-12-04 北京市商汤科技开发有限公司 Data processing method, device and storage medium
CN110543583A (en) * 2019-06-28 2019-12-06 深圳市商汤科技有限公司 information processing method and apparatus, image device, and storage medium
CN110458062A (en) * 2019-07-30 2019-11-15 深圳市商汤科技有限公司 Face identification method and device, electronic equipment and storage medium
CN110598548A (en) * 2019-08-07 2019-12-20 万翼科技有限公司 Standing person identification method and device, computer equipment and storage medium
CN112699159A (en) * 2020-11-13 2021-04-23 杭州海康威视系统技术有限公司 Data display method, device and equipment

Similar Documents

Publication Publication Date Title
CN109166261B (en) Image processing method, device and equipment based on image recognition and storage medium
CN110222640B (en) Method, device and method for identifying suspect in monitoring site and storage medium
CN111275873B (en) Traffic control management method and device, electronic equipment and storage medium
CN108376246A (en) A kind of identification of plurality of human faces and tracking system and method
CN112329688B (en) Intelligent risk management and control system for public places
CN110197158B (en) Security cloud system and application thereof
EP3683717A1 (en) Passenger flow counting method, apparatus and device
JP2013127716A (en) Abnormal state detection system for congestion
CN112464030B (en) Suspicious person determination method and suspicious person determination device
CN111522995A (en) Target object analysis method and device and electronic equipment
US11450186B2 (en) Person monitoring system and person monitoring method
CN112232186A (en) Epidemic prevention monitoring method and system
CN112132048A (en) Community patrol analysis method and system based on computer vision
CN114358980A (en) Intelligent community property management system and method based on Internet of things
WO2022198174A1 (en) Systems and methods of detecting mask usage
KR20190072323A (en) Image Monitoring System and Method for Monitoring Image
CN113537078A (en) Personnel management method and device, intelligent terminal and computer readable storage medium
CN112687044A (en) Method, system, medium, and apparatus for managing staying person
CN111539254A (en) Target detection method, target detection device, electronic equipment and computer-readable storage medium
CN113129494A (en) Region management method and device based on face recognition and terminal equipment
CN110544334B (en) Data processing method and device for access control management, electronic equipment and storage medium
CN112750274A (en) Facial feature recognition-based aggregation early warning system, method and equipment
CN114267006A (en) Security monitoring method, device, system and storage medium
CN111159190A (en) Campus risk analysis system and method based on cloud platform
JP7479988B2 (en) Monitoring information processing device, monitoring information processing method, and monitoring information processing program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination