CN113552832A - Frontier defense safety monitoring management system - Google Patents

Frontier defense safety monitoring management system Download PDF

Info

Publication number
CN113552832A
CN113552832A CN202010331232.0A CN202010331232A CN113552832A CN 113552832 A CN113552832 A CN 113552832A CN 202010331232 A CN202010331232 A CN 202010331232A CN 113552832 A CN113552832 A CN 113552832A
Authority
CN
China
Prior art keywords
information
personnel
vehicle
monitoring
data processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010331232.0A
Other languages
Chinese (zh)
Inventor
李元景
李荐民
吴相豪
戴俊娣
王继生
张海涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nuctech Technology Jiangsu Co ltd
Nuctech Co Ltd
Original Assignee
Nuctech Technology Jiangsu Co ltd
Nuctech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nuctech Technology Jiangsu Co ltd, Nuctech Co Ltd filed Critical Nuctech Technology Jiangsu Co ltd
Priority to CN202010331232.0A priority Critical patent/CN113552832A/en
Publication of CN113552832A publication Critical patent/CN113552832A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/048Monitoring; Safety

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a frontier defense safety monitoring and management system, which comprises: the system comprises a frontier defense central subsystem and a plurality of frontier inspection station subsystems, wherein the frontier defense central subsystem and the plurality of frontier inspection station subsystems are connected with the frontier defense central subsystem and comprise personnel information acquisition components; a vehicle information acquisition component; a border monitoring component; and the frontier defense center subsystem is used for tracking the entrance and exit forbidden personnel or the entrance and exit forbidden vehicles by moving the entrance and exit forbidden personnel or the border monitoring component in the early warning area where the entrance and exit forbidden vehicles are located when the alarm information is received. The system realizes 'scheduling integration, information real-time, operational cooperation and decision-making assistance intellectualization', comprehensively improves frontier defense management and scheduling capability, and provides strong technical support for frontier security.

Description

Frontier defense safety monitoring management system
Technical Field
The invention relates to a frontier defense safety monitoring and management system.
Background
At present, the main protection means in the border line frontier defense safety protection aspect is protection by means of defense work type soil piles, wire nets, gullies and the like, patrol prevention and control are regularly carried out on the border line in a manual patrol mode, and video monitoring equipment is installed in partial areas for monitoring and protection. In the border inspection station, isolated security inspection equipment is used for carrying out security inspection on passers and vehicles, and intelligent and automatic means are lacked for carrying out security inspection on passers, vehicles and objects, gathering and reporting data in real time. The established information system of the border check stations is relatively independent, information interconnection and intercommunication among the border check stations cannot be realized, and effective coordination cannot be carried out in management.
The internal information of each border inspection station of the existing border line is isolated, the information among the border inspection stations can not be interconnected and intercommunicated, the safety information collection and aggregation are lacked, and the coordination command is lacked among the border stations in the area. Meanwhile, information synchronization, resource coordination and command scheduling of the border check stations cannot be realized, the command center cannot comprehensively know all border check stations of the border line, and unified scheduling and coordinated command scheduling of resources cannot be realized.
The above information disclosed in this background section is only for enhancement of understanding of the background of the invention and therefore it may contain information that does not constitute prior art that is already known to a person of ordinary skill in the art.
Disclosure of Invention
In this summary, concepts in a simplified form are introduced that are further described in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
It is a primary object of the present invention to overcome at least one of the above-mentioned drawbacks of the prior art, and to provide a frontier security monitoring and management system, which includes:
frontier central subsystem, and
a plurality of side inspection station subsystems which are all connected with the side defense central subsystem, comprising
The personnel information acquisition component is used for acquiring personnel checking information of the entry and exit personnel and sending the personnel checking information to the data processing component;
the vehicle information acquisition component is used for acquiring vehicle inspection information of the vehicles entering and exiting and sending the vehicle inspection information to the data processing component;
the border monitoring component is used for acquiring monitoring information and sending the monitoring information to the data processing component;
the data processing assembly is used for judging whether the current entry and exit person is the entry and exit prohibition person or not according to the person checking information and judging whether the current entry and exit vehicle is the entry and exit prohibition vehicle or not according to the vehicle checking information, and the data processing assembly uploads alarm information to the frontier defense central subsystem when the current entry and exit person is the entry and exit prohibition person or the current vehicle is the entry and exit prohibition vehicle;
the frontier defense center subsystem is used for tracking the entrance-forbidden personnel or the entrance-forbidden vehicles by moving the entrance-forbidden personnel or the entrance-forbidden vehicles through the frontier monitoring component in the early warning area where the entrance-forbidden personnel or the entrance-forbidden vehicles are located when the alarm information is received.
According to one embodiment of the invention, the frontier defense center subsystem is further configured to deploy the pre-warning area by mobilizing security resources of the plurality of entry and exit frontier inspection stations upon receiving the alarm information.
According to an embodiment of the invention, the data processing component is further configured to perform behavior analysis on all people appearing in the monitoring video after receiving the monitoring video in the monitoring information, and upload alarm information to the frontier defense center subsystem when any one of the people has a preset behavior.
According to one embodiment of the invention, the personnel information acquisition assembly comprises a personnel information input device, a luggage security check assembly and a personnel security check assembly;
the personnel checking information comprises personnel identity information, luggage security check information and human body security check information, the personnel information input device is used for acquiring the personnel identity information of the entry and exit personnel and sending the personnel identity information to the data processing assembly, the luggage security check assembly is used for acquiring the luggage security check information and sending the luggage security check information to the data processing assembly, and the personnel security check assembly is used for acquiring the personnel security check information and sending the personnel security check information to the data processing assembly.
According to one embodiment of the invention, the vehicle information acquisition assembly comprises a vehicle security inspection assembly, a license plate recognition device and a certificate recognition device;
the vehicle inspection information comprises vehicle security inspection information, certificate information and license plate information, the vehicle security inspection component is used for collecting the vehicle security inspection information and sending the vehicle security inspection information to the data processing component, the license plate recognition device is used for collecting the license plate information of a vehicle and sending the license plate information to the data processing component, and the certificate recognition device is used for collecting the certificate information and sending the certificate information to the data processing component.
According to one embodiment of the invention, the border monitoring component comprises video monitoring equipment, an unmanned aerial vehicle, surrounding early warning equipment and a radar;
the monitoring information comprises monitoring videos collected by video monitoring equipment, videos of unmanned aerial vehicles collected by unmanned aerial vehicles, surrounding early warning information collected by surrounding early warning equipment and radar monitoring information collected by radars.
According to one embodiment of the invention, the personnel information collection component further adds the identifier to the personnel check information before sending the personnel check information to the data processing component, and the vehicle information collection component further adds the identifier to the vehicle check information before sending the vehicle check information to the data processing component;
the frontier defense security monitoring management system also comprises a file server;
and the data processing component is used for associating the received personnel checking information with the same identification with the text information in the vehicle checking information and then structurally storing the personnel checking information and the text information in the vehicle checking information into the file server to form the structured checking information.
According to one embodiment of the invention, the data processing component is further used for storing the images, videos and files in the received personnel inspection information and vehicle inspection information into the file server, and then associating the storage addresses of the images, videos and files with the structured inspection information with the same identification.
According to one embodiment of the invention, the frontier defense center subsystem performs identification of the prohibited entry person while tracking the prohibited entry person.
According to one embodiment of the invention, the frontier defense center subsystem is further configured to perform real-time statistics and presentation on the received alarm information.
According to the technical scheme, the frontier defense safety monitoring and management system has the advantages and positive effects that:
in the invention, the frontier defense center subsystem tracks the entry-forbidden person or the entry-forbidden vehicle by moving the frontier monitoring component in the early warning area when receiving the warning information. The early warning area can be a jurisdiction range covering a plurality of entry and exit frontier defense inspection stations, targets are tracked by controlling the frontier monitoring components of the entry and exit frontier defense inspection stations, and unified scheduling of boundary monitoring component resources is achieved.
Drawings
Various objects, features and advantages of the present invention will become more apparent from the following detailed description of preferred embodiments of the invention, when considered in conjunction with the accompanying drawings. The drawings are merely exemplary of the invention and are not necessarily drawn to scale. In the drawings, like reference characters designate the same or similar parts throughout the different views. Wherein:
fig. 1 is a schematic structural diagram illustrating a frontier defense security monitoring management system according to an exemplary embodiment.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals in the drawings denote the same or similar structures, and thus their detailed description will be omitted.
Referring to fig. 1, fig. 1 shows a schematic structural diagram of a frontier defense security monitoring and management system 100. The frontier defense security monitoring management system 100 includes a plurality of frontier inspection station subsystems 1 and a frontier defense center subsystem 2. The plurality of side inspection station subsystems 1 arrange and gather the acquired data to the side inspection central subsystem 2, and the side inspection central subsystem 2 can call the resources of each side inspection station subsystem 1 to realize the linkage scheduling of the plurality of side inspection station subsystems 1.
Each entry and exit frontier defense inspection station is provided with a set of frontier defense inspection station subsystems 1 for processing the information of the entry and exit personnel and vehicles in the jurisdiction range of the entry and exit frontier defense inspection station. The edgestation subsystem 1 includes a data acquisition component 10, a data processing component 14 and a file server 15. The data collection assembly 10 includes a border monitoring assembly 11, a personnel information collection assembly 12, and a vehicle information collection assembly 13.
The personnel information collection component 12 is used for collecting personnel checking information of the inbound and outbound personnel and luggage thereof, and sending the personnel checking information to the data processing component 14 after adding identification to the personnel checking information. Each entry-exit person corresponds to an identification, which may be a coded string. An identification is added to the ping information. The personnel checking information comprises personnel identity information, luggage security check information and human body security check information.
The personnel information collection assembly 12 includes personnel information entry means for collecting personnel identification information of the inbound and outbound personnel and sending the personnel identification information to the data processing assembly 14. The personal identification information includes the name, gender, facial photograph, occupation, address, entry and exit reason, certificate number, fingerprint, etc. of the entry and exit person.
The personnel information collection assembly 12 also includes a baggage screening assembly. The entry and exit personnel also need to check the baggage as they pass through the entry and exit frontier screening stations. The luggage security check assembly is used for collecting luggage security check information and sending the luggage security check information to the data processing assembly 14. The luggage security inspection assembly comprises a luggage security inspection machine, a luggage security inspection information manual entry device and the like. The luggage security check information comprises information such as a luggage X-ray image recorded by the luggage security check machine, the name number of luggage articles actively declared by an entry-exit person, and a check result manually recorded after unpacking and checking.
The luggage security check assembly also comprises a personnel security check assembly. The personnel security check component is used for acquiring personnel security check information and sending the personnel security check information to the data processing component 14. The personnel security check assembly comprises a human body security check machine, personnel security check information manual input equipment and the like. The entry and exit personnel still need to carry out security inspection on the human body when passing through the entry and exit frontier defense inspection station so as to prevent the entry and exit frontier defense inspection station from carrying prohibited articles. The human body security check machine can obtain a human body X-ray image by carrying out X-ray scanning on a human body, and security check personnel can judge whether the checked person entering and exiting carries prohibited articles with him or her through the human body X-ray image. The personnel security check information comprises human body X-ray images collected by a human body security check machine, search results manually input after manual search and the like.
The vehicle information collection component 13 is configured to collect vehicle inspection information of the inbound and outbound vehicles, and send the vehicle inspection information to the data processing component 14 after adding an identifier to the vehicle inspection information. The vehicle inspection information includes vehicle security inspection information, certificate information, and license plate information.
The vehicle information collection assembly 13 includes a vehicle security check assembly. The vehicle security check assembly is used for collecting vehicle security check information and sending the vehicle security check information to the data processing assembly 14. The vehicle security inspection assembly comprises vehicle security inspection equipment, vehicle security inspection information manual entry equipment and the like. The vehicle security device may be a large vehicle security machine. When the vehicle passes through the vehicle security check device, the vehicle is subjected to X-ray scanning to obtain an X-ray image of the vehicle. The security personnel can judge whether the vehicle is hidden with prohibited articles through the X-ray image of the vehicle. Generally, security personnel can also judge whether the vehicles are provided with forbidden articles by manually searching the vehicles, and manually input the search results of whether the vehicles are provided with the forbidden articles into the system through vehicle security information input equipment. The vehicle security inspection information comprises vehicle X-ray images and search results manually input.
The vehicle information collection assembly 13 further includes a license plate recognition device. Each vehicle inspection passage can be provided with a vehicle recognition device, when the vehicle enters the vehicle inspection passage, the license plate of the vehicle is recognized, and the license plate number is automatically recognized. The vehicle identification device is used to collect license plate information of the vehicle and send the license plate information to the data processing assembly 14. The license plate information includes information such as a license plate photograph, a license plate number, and the like.
The vehicle information collection assembly 13 also includes credential identification means. The credential information can be obtained by a credential identification device. The entry and exit frontier defense inspection station needs to verify the identity of each entry and exit person, and the entry and exit persons can prove the driving ability and the real identity of the entry and exit persons by showing various certificates such as passports, driving licenses, identity cards and the like. When the identity of the entry and exit personnel is verified, the personnel identity information of the entry and exit personnel is collected by the personnel at the side inspection station through the certificate recognition device. The certificate information comprises information such as name, gender, certificate photo, certificate number, home address, certificate issuing unit, certificate validity period and the like. The certificate recognition device comprises a camera and a certificate recognition module. The camera captures a document image and transmits the document image to the document identification module. The certificate identification module rotates and corrects the direction of the certificate image according to the character direction in the certificate image, identifies the edge of the certificate pattern in the certificate image, performs layout analysis on the certificate pattern to obtain each character block in the certificate pattern, performs character cutting on characters in each character block to obtain a single character block, identifies characters in each character block, combines corresponding characters in each character block into character strings according to the original sequence, and finally identifies the content of the character strings and fills the character strings in different columns according to the type of the content to obtain structured certificate information.
The border monitoring component 11 is connected to the data processing component 14, and is configured to collect monitoring information and send the monitoring information to the data processing component 14. The monitoring information comprises monitoring videos, unmanned aerial vehicle videos, surrounding early warning information and radar monitoring information. The border monitoring component 11 comprises video monitoring equipment, an unmanned aerial vehicle, surrounding early warning equipment and a radar. The video surveillance equipment comprises a plurality of cameras distributed in the jurisdiction of the entry and exit frontier inspection station. Each camera can collect monitoring video. Be provided with camera device on the unmanned aerial vehicle, this camera device shoots near unmanned aerial vehicle video of flight route when unmanned aerial vehicle carries out the flight task. For example, the drone shoots the scene on the patrol route as a drone video while performing the patrol task. The unmanned aerial vehicle video can be transmitted to the data processing component 14 in real time through a wireless communication module on the unmanned aerial vehicle. The enclosure early warning equipment comprises sensors such as a vibration sensor, a thermal infrared human body sensor and the like and an early warning server. The early warning server is connected with the sensors. When any of these sensors is triggered or any of these sensors operates abnormally, the warning server sends the surrounding warning information including the location of the triggered sensor and the trigger time to the data processing component 14. For example, the vibration sensor may be disposed on a fence at the boundary, and is triggered when the vibration of the fence is detected to be greater than a preset threshold, the vibration sensor sends a trigger signal to the warning server, and the warning server sends, after receiving the trigger signal of the vibration sensor, the surrounding warning information including the position and the trigger time of the vibration sensor to the data processing component 14. For example, the thermal infrared human body sensor is disposed on the boundary, and when a person approaches the thermal infrared human body sensor, the thermal infrared human body sensor is triggered, the thermal infrared human body sensor sends a trigger signal to the pre-warning server, and the pre-warning server sends surrounding pre-warning information including the trigger time of the thermal infrared human body sensor and the position of the thermal infrared human body sensor to the data processing component 14 after receiving the trigger signal. The radar managed by the inbound and outbound frontier checkpoints uploads the radar monitoring information detected by the inbound and outbound frontier checkpoints to the data processing component 14 in real time. The radar monitoring information comprises information such as the position, the speed, the movement direction and the height of a monitored target.
The data processing component 14 is configured to associate the received person inspection information with the same identifier and the text information in the vehicle inspection information, and then store the associated person inspection information and the text information in the file server 15 in a structured manner to form the structured inspection information. The text information can comprise identification of the entry and exit personnel, name, sex, occupation, address and entry and exit reasons in personnel identity information, name and quantity of luggage articles in luggage security check information, search results in the personnel security check information, search results in vehicle security check information, and character information such as license plate number in the license plate information, name, family address, certificate number, issuing unit, certificate validity period and the like in the certificate information. The structured check information may be stored in a table structure, for example, the table header sequentially indicates identification, name, gender, occupation, address, entry and exit reasons, baggage item name, baggage item number, search result, license number, home address, certificate number, certificate issuing unit, certificate validity period, and the like.
The data processing component 14 is further configured to perform feature extraction and labeling processing on the non-structural data such as images, videos, and files in the received personnel inspection information and vehicle inspection information, store the images, videos, and files in the file server 15, and then associate the labels and storage addresses of the images, videos, and files with the structured inspection information having the same identifier. The purpose of performing feature extraction and labeling processing on non-structural data such as images, videos and files is to accurately classify the images, videos and files so as to quickly find the images, videos and files according to labels.
The data processing component 14 stores the text information in the received various inspection data in the file server 15 in a structured manner, and associates the storage link with the structured inspection information after storing the non-structured data such as pictures, files and videos, so as to realize the quick query of the information.
And the data processing component 14 is used for judging whether the current entry-exit person is the entry-forbidden person according to the person checking information and judging whether the current entry-exit vehicle is the entry-forbidden vehicle according to the vehicle checking information, and issuing alarm information when the current entry-exit person is the entry-forbidden person or the current vehicle is the entry-forbidden vehicle. The alarm information includes a position where the entry person is currently prohibited or the vehicle is currently a vehicle prohibited from entering.
Specifically, the data processing component 14 is further configured to determine whether the certificate number in the personal identification information exists in the personal blacklist after receiving the personal identification information in the personal check information, and issue the alarm information if the name exists in the personal blacklist. The certificate numbers of a plurality of entry forbidden persons, such as certificate numbers of all criminal suspects escaping from crime, are pre-entered in the person blacklist. And the staff of the entry and exit frontier defense inspection station disposes the entry and exit staff according to the plan after receiving the alarm information.
The data processing component 14 is further configured to determine whether the license plate number in the license plate information exists in the vehicle blacklist after receiving the license plate information in the vehicle inspection information, and issue an alarm message if the license plate number exists in the vehicle blacklist. The vehicle blacklist has a number of license plate numbers of vehicles prohibited from entering, for example, a number of license plate numbers of vehicles reported to be lost. And the staff of the entry and exit frontier defense inspection station disposes the entry and exit staff according to the prevention and control plan after receiving the alarm information.
The data processing component 14 is further configured to perform feature analysis on the image after receiving the image class data, and issue an alarm message if a feature matching degree between the image and any one of the images in the blacklist gallery is greater than or equal to a preset threshold value. The image in the blacklist image library can be a portrait of a person who forbids the entry and exit, and can also be a fingerprint image of the person who forbids the entry and exit. The feature may be a face feature or a fingerprint feature, for example, if the degree of matching between the face feature in the image and the face feature in one picture in the blacklist gallery is greater than a preset threshold, an alarm is issued. And the staff of the entry and exit frontier defense inspection station disposes the entry and exit staff according to the prevention and control plan after receiving the alarm information.
The data processing component 14 is further configured to perform feature analysis on a plurality of frames of images of the video after receiving the video data, and issue alarm information if a feature matching degree between any one frame of image and any one image in the blacklist image library is greater than or equal to a preset threshold value. The feature may be a face feature, for example, if the degree of matching between the face feature in any frame of image in the video and the face feature in one image in the blacklist image library is greater than a preset threshold, an alarm is issued. And the staff of the entry and exit frontier defense inspection station disposes the entry and exit staff according to the prevention and control plan after receiving the alarm information.
The data processing component 14 is further configured to, after receiving the monitoring video in the monitoring information, perform behavior analysis on people appearing in the monitoring video, and issue alarm information if any one person in the video has a preset behavior. The alarm information at least comprises the position of the agent. The predetermined action may be intrusion into an exclusion zone, crossing a railing, chasing, passing a gate, holding a knife, fire, fighting, etc. And the staff of the entry and exit frontier defense inspection station disposes the entry and exit staff according to the prevention and control plan after receiving the alarm information.
The data processing component 14 is further configured to issue alarm information after receiving the enclosure early warning information in the monitoring information. The data processing component 14 receives the boundary warning information, which indicates that the sensor for monitoring on the boundary is triggered. And the staff of the border defense inspection station enters and exits the border defense inspection station and performs deployment and control according to the prevention and control plan after receiving the alarm information.
The data processing component 14, while issuing any alarm information, also uploads the alarm information to the frontier defense central subsystem 2.
And the frontier defense center subsystem 2 is used for determining the position of a target and demarcating an early warning area according to the alarm information after receiving the alarm information, and calling video monitoring equipment, an unmanned aerial vehicle and a radar in the range of the early warning area to track the target. The video surveillance equipment or drone sends the captured video or images to the data processing component 14. The data processing component 14 identifies the identity of the target in the video or image after receiving the video or image captured by the video monitoring device or the unmanned aerial vehicle, and uploads the identity information to the frontier defense center subsystem 2.
The frontier defense center subsystem 2 is also used for dispatching security resources according to the dispatching instruction so as to deploy and control the early warning area. The dispatching instruction is issued by a commander of the frontier defense center, and can issue the dispatching instruction to one or more frontier defense station subsystems 1 through the frontier defense center subsystem 2 so as to dispatch security resources of one or more entry and exit frontier defense inspection stations to perform defense deployment and control on the early warning area. Therefore, unified scheduling and commanding of the resources are realized.
The frontier defense center subsystem 2 is also used for carrying out real-time statistics and display on the received alarm information, control information and combat information.
The frontier defense safety monitoring management system 100 meets the business requirements of frontier defense safety control departments in the aspects of personnel management, vehicle management, frontier management and the like, integrates information acquisition, safety monitoring and linkage scheduling as targets, runs through a frontier defense safety monitoring system from a website to a center, realizes scheduling integration, information real-time, combat assimilation and decision-making assistance intellectualization, comprehensively improves frontier defense management and scheduling capability, and provides strong technical support for frontier safety. The intelligent frontier defense safety protection command center is realized based on the frontier line panorama visualization technical means and the integrated multimedia communication means
Although the present invention has been disclosed with reference to certain embodiments, numerous variations and modifications may be made to the described embodiments without departing from the scope and ambit of the present invention. It is to be understood, therefore, that this invention is not limited to the particular embodiments disclosed, but it is intended to cover modifications within the scope of the appended claims and their equivalents.

Claims (10)

1. A frontier defense safety monitoring management system, comprising:
frontier central subsystem, and
a plurality of side inspection station subsystems which are all connected with the side defense central subsystem, comprising
The personnel information acquisition component is used for acquiring personnel checking information of the entry and exit personnel and sending the personnel checking information to the data processing component;
the vehicle information acquisition component is used for acquiring vehicle inspection information of the vehicles entering and exiting and sending the vehicle inspection information to the data processing component;
the border monitoring component is used for acquiring monitoring information and sending the monitoring information to the data processing component;
the data processing assembly is used for judging whether the current entry and exit person is the entry and exit prohibition person or not according to the person checking information and judging whether the current entry and exit vehicle is the entry and exit prohibition vehicle or not according to the vehicle checking information, and the data processing assembly uploads alarm information to the frontier defense central subsystem when the current entry and exit person is the entry and exit prohibition person or the current vehicle is the entry and exit prohibition vehicle;
the frontier defense center subsystem is used for tracking the entrance-forbidden personnel or the entrance-forbidden vehicles by moving the entrance-forbidden personnel or the entrance-forbidden vehicles through the frontier monitoring component in the early warning area where the entrance-forbidden personnel or the entrance-forbidden vehicles are located when the alarm information is received.
2. The frontier defense security monitoring and management system according to claim 1, wherein the frontier defense center subsystem is further configured to deploy and control the early warning area by mobilizing security resources of a plurality of entry and exit frontier defense checkpoints upon receiving the alarm information.
3. The frontier defense security monitoring management system according to claim 1, wherein the data processing component is further configured to perform behavior analysis on all persons appearing in the monitoring video after receiving the monitoring video in the monitoring information, and upload alarm information to the frontier defense center subsystem when any one of the persons has a preset behavior.
4. The frontier defense security monitoring and management system according to claim 1, characterized in that the personnel information collection assembly comprises a personnel information entry device, a luggage security check assembly and a personnel security check assembly;
the personnel checking information comprises personnel identity information, luggage security check information and human body security check information, the personnel information input device is used for acquiring the personnel identity information of the entry and exit personnel and sending the personnel identity information to the data processing assembly, the luggage security check assembly is used for acquiring the luggage security check information and sending the luggage security check information to the data processing assembly, and the personnel security check assembly is used for acquiring the personnel security check information and sending the personnel security check information to the data processing assembly.
5. The frontier defense security monitoring and management system according to claim 1, wherein the vehicle information collection assembly comprises a vehicle security check assembly, a license plate recognition device and a certificate recognition device;
the vehicle inspection information comprises vehicle security inspection information, certificate information and license plate information, the vehicle security inspection component is used for collecting the vehicle security inspection information and sending the vehicle security inspection information to the data processing component, the license plate recognition device is used for collecting the license plate information of a vehicle and sending the license plate information to the data processing component, and the certificate recognition device is used for collecting the certificate information and sending the certificate information to the data processing component.
6. The frontier defense security monitoring management system according to claim 1, wherein the frontier monitoring component comprises a video monitoring device, an unmanned aerial vehicle, a perimeter warning device and a radar;
the monitoring information comprises monitoring videos collected by video monitoring equipment, videos of unmanned aerial vehicles collected by unmanned aerial vehicles, surrounding early warning information collected by surrounding early warning equipment and radar monitoring information collected by radars.
7. The frontier defense security monitoring management system according to any one of claims 1 to 6,
the personnel information acquisition component also adds the identifier into the personnel checking information before sending the personnel checking information to the data processing component, and the vehicle information acquisition component also adds the identifier into the vehicle checking information before sending the vehicle checking information to the data processing component;
the frontier defense security monitoring management system also comprises a file server;
and the data processing component is used for associating the received personnel checking information with the same identification with the text information in the vehicle checking information and then structurally storing the personnel checking information and the text information in the vehicle checking information into the file server to form the structured checking information.
8. The frontier defense security monitoring management system according to claim 7, wherein the data processing component is further configured to store the images, videos and files in the received personnel inspection information and vehicle inspection information into the file server, and then associate the storage addresses of the images, videos and files with the structured inspection information with the same identification.
9. The frontier security monitor and management system according to claim 1, wherein the frontier central subsystem performs identification of the prohibited entry person while tracking the prohibited entry person.
10. The frontier defense security monitoring and management system according to claim 1, wherein the frontier defense center subsystem is further configured to perform real-time statistics and display on the received alarm information.
CN202010331232.0A 2020-04-24 2020-04-24 Frontier defense safety monitoring management system Pending CN113552832A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010331232.0A CN113552832A (en) 2020-04-24 2020-04-24 Frontier defense safety monitoring management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010331232.0A CN113552832A (en) 2020-04-24 2020-04-24 Frontier defense safety monitoring management system

Publications (1)

Publication Number Publication Date
CN113552832A true CN113552832A (en) 2021-10-26

Family

ID=78101210

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010331232.0A Pending CN113552832A (en) 2020-04-24 2020-04-24 Frontier defense safety monitoring management system

Country Status (1)

Country Link
CN (1) CN113552832A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101093603A (en) * 2007-07-03 2007-12-26 北京智安邦科技有限公司 Module set of intellective video monitoring device, system and monitoring method
CN201974677U (en) * 2010-12-24 2011-09-14 北京捷康特光通讯技术有限公司 Port restricted area safety monitoring system
CN102393949A (en) * 2011-06-30 2012-03-28 江苏欧索软件有限公司 Custom monitoring and commanding system
CN204537277U (en) * 2015-04-17 2015-08-05 浙江蓝洋电子科技有限公司 Port Vehicular intelligent checking system
CN204631867U (en) * 2015-05-08 2015-09-09 中华人民共和国北京出入境检验检疫局 A kind of frontier port entry personnel's information automatic acquisition system
CN109246395A (en) * 2018-10-23 2019-01-18 青岛银成智能安防科技有限公司 A kind of frontier defense early warning and defence monitoring management system and method
CN109785615A (en) * 2018-12-28 2019-05-21 合肥品恩智能科技有限公司 A kind of early warning shunting subsystem for public security checking station

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101093603A (en) * 2007-07-03 2007-12-26 北京智安邦科技有限公司 Module set of intellective video monitoring device, system and monitoring method
CN201974677U (en) * 2010-12-24 2011-09-14 北京捷康特光通讯技术有限公司 Port restricted area safety monitoring system
CN102393949A (en) * 2011-06-30 2012-03-28 江苏欧索软件有限公司 Custom monitoring and commanding system
CN204537277U (en) * 2015-04-17 2015-08-05 浙江蓝洋电子科技有限公司 Port Vehicular intelligent checking system
CN204631867U (en) * 2015-05-08 2015-09-09 中华人民共和国北京出入境检验检疫局 A kind of frontier port entry personnel's information automatic acquisition system
CN109246395A (en) * 2018-10-23 2019-01-18 青岛银成智能安防科技有限公司 A kind of frontier defense early warning and defence monitoring management system and method
CN109785615A (en) * 2018-12-28 2019-05-21 合肥品恩智能科技有限公司 A kind of early warning shunting subsystem for public security checking station

Similar Documents

Publication Publication Date Title
US11823492B2 (en) Technique for providing security
EP4105101A1 (en) Monitoring system, monitoring method, and monitoring device for railway train
CN111770266B (en) Intelligent visual perception system
US7683929B2 (en) System and method for video content analysis-based detection, surveillance and alarm management
US9911294B2 (en) Warning system and method using spatio-temporal situation data
US9767663B2 (en) GPS directed intrusion system with data acquisition
US20040240542A1 (en) Method and apparatus for video frame sequence-based object tracking
US20060200307A1 (en) Vehicle identification and tracking system
CN106815958A (en) Warning system, alarm analysis/display device, alarm analysis/display methods
US20030210139A1 (en) Method and system for improved security
CN109598426A (en) A kind of railway police intelligent security system
US20180182053A1 (en) Security Process And Security Tower Controlling Coming Vehicles At Checkpoint
KR102011226B1 (en) Security management system by face recognition and method
CN112132315A (en) Escape route prediction method and deployment and control platform of target object
KR101492473B1 (en) Context-aware cctv intergrated managment system with user-based
WO2018037355A1 (en) A system and method for automated vehicle and face detection and their classification
US20100033572A1 (en) Ticket-holder security checkpoint system for deterring terrorist attacks
CN113096337B (en) Moving target identification processing method for complex background and intelligent security system
KR20190072323A (en) Image Monitoring System and Method for Monitoring Image
CN113552832A (en) Frontier defense safety monitoring management system
CN210983509U (en) Entry key group distribution and control system
KR20160086536A (en) Warning method and system using prompt situation information data
Sujkowski et al. Artificial Intelligence Systems for Supporting Video Surveillance Operators at International Airport
KR20140050185A (en) System and method for preventing crimes through publishing crime scene images
Breul Protecting America’s Biggest Sporting Spectacle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20211026

RJ01 Rejection of invention patent application after publication