CN113672893B - Ship security equipment management method and system - Google Patents

Ship security equipment management method and system Download PDF

Info

Publication number
CN113672893B
CN113672893B CN202111050499.3A CN202111050499A CN113672893B CN 113672893 B CN113672893 B CN 113672893B CN 202111050499 A CN202111050499 A CN 202111050499A CN 113672893 B CN113672893 B CN 113672893B
Authority
CN
China
Prior art keywords
current
image data
main body
equipment
managed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111050499.3A
Other languages
Chinese (zh)
Other versions
CN113672893A (en
Inventor
李喜祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Shenxi Marine Equipment Co ltd
Original Assignee
Wuxi Shenxi Marine Equipment Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Shenxi Marine Equipment Co ltd filed Critical Wuxi Shenxi Marine Equipment Co ltd
Priority to CN202111050499.3A priority Critical patent/CN113672893B/en
Publication of CN113672893A publication Critical patent/CN113672893A/en
Application granted granted Critical
Publication of CN113672893B publication Critical patent/CN113672893B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B63SHIPS OR OTHER WATERBORNE VESSELS; RELATED EQUIPMENT
    • B63BSHIPS OR OTHER WATERBORNE VESSELS; EQUIPMENT FOR SHIPPING 
    • B63B43/00Improving safety of vessels, e.g. damage control, not otherwise provided for
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B63SHIPS OR OTHER WATERBORNE VESSELS; RELATED EQUIPMENT
    • B63BSHIPS OR OTHER WATERBORNE VESSELS; EQUIPMENT FOR SHIPPING 
    • B63B45/00Arrangements or adaptations of signalling or lighting devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T17/00Three dimensional [3D] modelling, e.g. data description of 3D objects

Abstract

The application relates to a method and a system for managing ship security equipment, which sequentially acquire a use trigger instruction of the security equipment to be managed; acquiring main body basic data of a current trigger main body at the current trigger time based on the use trigger instruction, wherein the main body basic data comprise current image data, current microwave detection information and current fingerprint spectrum information of the current trigger main body; respectively judging according to the current image data, the current microwave detection information and the current fingerprint spectrum information, and then generating an equipment use permission result; and judging whether the current trigger main body has the use authority of the security equipment to be managed or not according to the equipment use permission result, if so, generating an equipment usable instruction, and if not, generating an equipment unavailable instruction. The invention realizes the accurate and efficient use of each security device in the ship, greatly improves the convenience and has higher confidentiality.

Description

Ship security equipment management method and system
Technical Field
The application relates to the technical field of computers, in particular to a ship security equipment management method and system.
Background
A ship is a man-made vehicle that operates primarily in geographic water. In addition, a civil ship is generally called a boat, a military ship is called a ship, and a small boat is called a boat or a ship, which is collectively called a ship or a boat. The interior mainly comprises a receiving space, a support structure and a drainage structure, with a propulsion system using external or self-contained energy sources. The appearance is generally favorable for overcoming the streamline envelope of the fluid resistance, the materials are continuously updated along with the technological progress, the early materials are natural materials such as wood, bamboo, hemp and the like, and the modern materials are mostly steel, aluminum, glass fiber, acrylic and various composite materials.
For a ship larger than the ship, various security devices are arranged in the ship, and special equipment, part of which is used for information detection or can control the ship, needs to be subjected to special security management setting.
Disclosure of Invention
In view of the above, it is desirable to provide a ship security facility management method and system that can improve convenience and safety in managing security facilities in a ship.
The technical scheme of the invention is as follows:
a method of managing a ship security device, the method comprising:
step S100: acquiring a use trigger instruction of security equipment to be managed;
step S200: acquiring main body basic data of a current trigger main body at the current trigger time based on the use trigger instruction, wherein the main body basic data comprise current image data, current microwave detection information and current fingerprint spectrum information of the current trigger main body;
step S300: respectively judging according to the current image data, the current microwave detection information and the current fingerprint spectrum information, and then generating an allowable result of equipment use;
step S400: judging whether the current trigger main body has the use permission of the security equipment to be managed or not according to the equipment use permission result, if so, generating an equipment usable instruction, wherein the equipment usable instruction is used for controlling the security equipment to be managed to be converted into a usable state; if not, generating an equipment unavailable instruction, wherein the equipment unavailable instruction is used for controlling the security equipment to be managed to keep an unavailable state.
Specifically, the device uses the permission result including an image determination result, a microwave profile determination result, and a fingerprint spectrum determination result;
step S300: after respectively judging according to the current image data, the current microwave detection information and the current fingerprint spectrum information, generating an equipment use permission result, specifically comprising:
step S310: acquiring standard image data prestored in a current trigger main body according to the current image data, and comparing the current image data with the standard image data to generate an image judgment result;
step S320: when the image judgment result is that security equipment to be managed can be used for initial setting, standard microwave human body contour data prestored in a current trigger main body are obtained according to the current microwave detection information, the current microwave detection information is compared with the standard microwave human body contour data, and a microwave contour judgment result is generated, wherein the standard microwave human body contour data is the human body contour data of the current trigger main body, which is generated by detecting the current trigger main body in advance based on an FMCW microwave sensor;
step S330: when the microwave profile judgment result indicates that the to-be-managed security equipment can be used again, acquiring actual main body fingerprint spectrum information prestored in the current trigger main body according to the current fingerprint spectrum information, and comparing the current fingerprint spectrum information with the actual main body fingerprint spectrum information to generate a fingerprint spectrum judgment result, wherein the actual main body fingerprint spectrum information is spectrum data corresponding to a finger of the current trigger main body, which is generated by detecting the current trigger main body on the basis of a spectrometer in advance;
step S340: and when the fingerprint spectrum judgment result is a fingerprint spectrum matching instruction, judging that the current trigger main body has the use authority of the to-be-managed security equipment, and when the fingerprint spectrum judgment result is a fingerprint spectrum mismatching instruction, judging that the current trigger main body does not have the use authority of the to-be-managed security equipment.
Specifically, step S310: obtaining standard image data prestored in the current trigger main body according to the current image data, comparing the current image data with the standard image data, and generating an image judgment result, the method further comprises the following steps:
step S311: when the image judgment result indicates that the security equipment to be managed cannot be used, combining the current image data with the current microwave detection information and generating a current environment comprehensive processing image;
step S312: and judging whether the current environment comprehensive processing image is matched with the standard image data or not according to the current environment comprehensive processing image.
Specifically, step S311: when the image judgment result indicates that the security equipment to be managed cannot be used, combining the current image data with the current microwave detection information and generating a current environment comprehensive processing image, which specifically comprises:
step S3111: when the image judgment result indicates that the security equipment to be managed cannot be used, performing three-dimensional modeling processing on the current trigger main body according to the current microwave detection information, and generating initial three-dimensional image data;
step S3112: performing time point splitting processing on the current image data, and respectively acquiring actually acquired image data corresponding to each time point, wherein one time point corresponds to one actually acquired image data;
step S3113: screening out image data with the highest image quality from the actually acquired image data, and recording the image data as the image data with the best image quality;
step S3114: aligning the optimal quality image data with each standard point in the initial three-dimensional image data, enclosing an unclear image area in the optimal quality image data, performing three-dimensional reduction on the unclear image area based on the initial three-dimensional image data, and generating a current environment comprehensive processing image after the three-dimensional reduction is completed.
Specifically, step S400: judging whether the current trigger main body has the use permission of the security equipment to be managed or not according to the equipment use permission result, if so, generating an equipment usable instruction, wherein the equipment usable instruction is used for controlling the security equipment to be managed to be converted into a usable state; if not, generating an equipment unavailable instruction, wherein the equipment unavailable instruction is used for controlling the security equipment to be managed to keep an unavailable state, and then the method further comprises the following steps:
step S410: generating a touch warning instruction of the security equipment after controlling the security equipment to be managed to keep an unavailable state;
step S420: and generating a security equipment warning prompt according to the security equipment touch warning instruction, broadcasting the security equipment warning prompt, and sending the security equipment warning prompt to a preset security management and control main body based on the security equipment touch warning instruction to remind the security management and control main body.
Concretely, a ship security equipment management system, the system includes:
the instruction acquisition module is used for acquiring a use trigger instruction of the security equipment to be managed;
the information acquisition module is used for acquiring current trigger time and main body basic data of a current trigger main body based on the use trigger instruction, wherein the main body basic data comprise current image data, current microwave detection information and current fingerprint spectrum information of the current trigger main body;
the use judgment module is used for respectively judging according to the current image data, the current microwave detection information and the current fingerprint spectrum information and then generating an equipment use permission result;
a result generating module, configured to determine, according to the device use permission result, whether the current trigger subject has the use permission of the security device to be managed, and if yes, generate a device-usable instruction, where the device-usable instruction is used to control the security device to be managed to be converted into a usable state; if not, generating an equipment unavailable instruction, wherein the equipment unavailable instruction is used for controlling the security equipment to be managed to keep an unavailable state.
Specifically, the system further comprises:
the data comparison module is used for acquiring standard image data prestored in the current trigger main body according to the current image data, comparing the current image data with the standard image data and generating an image judgment result;
the profile data module is used for acquiring standard microwave human body profile data prestored in a current trigger main body according to the current microwave detection information and comparing the current microwave detection information with the standard microwave human body profile data to generate a microwave profile judgment result when the image judgment result is that the security equipment to be managed can be used for the initial setting, wherein the standard microwave human body profile data is the human body profile data of the current trigger main body, which is generated by detecting the current trigger main body on the basis of an FMCW microwave sensor in advance;
the judging result module is used for acquiring actual main body fingerprint spectrum information prestored in the current trigger main body according to the current fingerprint spectrum information when the microwave profile judging result is that the to-be-managed security equipment can be used again, and comparing the current fingerprint spectrum information with the actual main body fingerprint spectrum information to generate a fingerprint spectrum judging result, wherein the actual main body fingerprint spectrum information is spectrum data corresponding to a finger of the current trigger main body, which is generated by detecting the current trigger main body on the basis of a spectrometer in advance;
and the fingerprint spectrum module is used for judging that the current trigger main body has the use permission of the to-be-managed security equipment when the fingerprint spectrum judgment result is a fingerprint spectrum matching instruction, and judging that the current trigger main body does not have the use permission of the to-be-managed security equipment when the fingerprint spectrum judgment result is a fingerprint spectrum mismatching instruction.
Specifically, the system further comprises:
the use management module is used for combining the current image data with the current microwave detection information and generating a current environment comprehensive processing image when the image judgment result shows that the security equipment to be managed cannot be used;
the comprehensive processing module is used for judging whether the current environment comprehensive processing image is matched with the standard image data or not according to the current environment comprehensive processing image;
the three-dimensional module is used for carrying out three-dimensional modeling processing on the current trigger main body according to the current microwave detection information and generating initial three-dimensional image data when the image judgment result shows that the security equipment to be managed cannot be used;
the time splitting module is used for performing time point splitting processing on the current image data and respectively acquiring actually acquired image data corresponding to each time point, wherein one time point corresponds to one actually acquired image data;
the image quality image module is used for screening out image data with the highest image quality from the actually acquired image data and recording the image data as the optimal image quality image data;
and the initial three-dimensional module is used for aligning the optimal quality image data with each standard point in the initial three-dimensional image data, delineating an unclear image area in the optimal quality image data, performing three-dimensional reduction on the unclear image area based on the initial three-dimensional image data, and generating a current environment comprehensive processing image after the three-dimensional reduction is completed.
Specifically, the computer device comprises a memory and a processor, wherein the memory stores a computer program, and the processor implements the steps of the ship security device management method when executing the computer program.
Specifically, a computer readable storage medium stores thereon a computer program, which when executed by a processor implements the steps of the ship security device management method described above.
The invention has the following technical effects:
according to the ship security equipment management method and system, the use trigger instruction of the security equipment to be managed is obtained in sequence; acquiring main body basic data of a current trigger main body at the current trigger time based on the use trigger instruction, wherein the main body basic data comprise current image data, current microwave detection information and current fingerprint spectrum information of the current trigger main body; respectively judging according to the current image data, the current microwave detection information and the current fingerprint spectrum information, and then generating an equipment use permission result; judging whether the current trigger main body has the use permission of the security equipment to be managed or not according to the equipment use permission result, if so, generating an equipment usable instruction, wherein the equipment usable instruction is used for controlling the security equipment to be managed to be converted into a usable state; if the judgment result is no, an equipment unavailable instruction is generated, the equipment unavailable instruction is used for controlling the security equipment to be managed to keep an unavailable state, namely after a use trigger instruction of the security equipment to be managed is obtained, information acquisition of the current trigger main body is started, namely the main body basic data including the current image data, the current microwave detection information and the current fingerprint spectrum information is obtained, and then the current image data, the current microwave detection information and the current fingerprint spectrum information are sequentially judged on the basis, and the change of the state of the security equipment to be managed in use is realized according to an equipment use permission result generated after judgment.
Drawings
FIG. 1 is a schematic flow chart of a method for managing a ship security device in one embodiment;
FIG. 2 is a block diagram showing the structure of a ship security device management system according to an embodiment;
FIG. 3 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad application.
In an embodiment, an application scenario is provided to apply the ship security equipment management method of the present invention, an electronic terminal is disposed on a security equipment to be managed, the electronic terminal triggers a current trigger main body to obtain a usage trigger instruction of the security equipment to be managed, and then the electronic terminal obtains a current trigger time and a current main body basic data of the current trigger main body based on the usage trigger instruction, wherein the main body basic data includes current image data of the current trigger main body, current microwave detection information and current fingerprint spectrum information; then, after respectively judging according to the current image data, the current microwave detection information and the current fingerprint spectrum information, generating an equipment use permission result; then, the electronic terminal judges whether the current trigger main body has the use permission of the security equipment to be managed according to the equipment use permission result, if so, an equipment usable instruction is generated, and the equipment usable instruction is used for controlling the security equipment to be managed to be converted into a usable state; if not, generating an equipment unavailable instruction, wherein the equipment unavailable instruction is used for controlling the security equipment to be managed to keep an unavailable state.
In one embodiment, as shown in fig. 1, there is provided a ship security equipment management method, including:
step S100: acquiring a use trigger instruction of security equipment to be managed;
specifically, when the usage trigger instruction of the security device to be managed is obtained, the current trigger subject may need to use the security device to be managed. The current trigger main body is a main body which needs to use security equipment to be managed, such as ship workers, ship maintenance personnel, crewman and captain.
Step S200: acquiring main body basic data of a current trigger main body at the current trigger time based on the use trigger instruction, wherein the main body basic data comprise current image data, current microwave detection information and current fingerprint spectrum information of the current trigger main body;
specifically, in order to acquire a more accurate image, current image data, current microwave detection information, and current fingerprint spectrum information of the subject are currently triggered by acquiring the current trigger time.
And the current image data is face and trunk information of the current trigger main body.
The current microwave detection information is human body microwave information of the current trigger main body detected based on the microwave inductor. The current fingerprint spectrum information is spectrum information of a human body part where the fingerprint detected by the current trigger main body is based on spectrum analysis.
Step S300: respectively judging according to the current image data, the current microwave detection information and the current fingerprint spectrum information, and then generating an equipment use permission result;
specifically, the level judgment is realized by respectively judging according to the current image data, the current microwave detection information and the current fingerprint spectrum information, and the accuracy of the judgment result is improved.
Step S400: judging whether the current trigger main body has the use permission of the security equipment to be managed or not according to the equipment use permission result, if so, generating an equipment usable instruction, wherein the equipment usable instruction is used for controlling the security equipment to be managed to be converted into a usable state; if not, generating an equipment unavailable instruction, wherein the equipment unavailable instruction is used for controlling the security equipment to be managed to keep an unavailable state.
Specifically, when judging whether the current trigger main body has the use right of the to-be-managed security equipment according to the equipment use permission result, if so, generating an equipment usable instruction, and if not, generating an equipment unavailable instruction, wherein the equipment unavailable instruction is used for controlling the to-be-managed security equipment to keep an unavailable state, so that accurate use management of the to-be-managed security equipment is realized, and the use of the to-be-managed security equipment in safe reliability is improved.
Further, the security equipment to be managed comprises but is not limited to a ship cockpit operating platform, a ship energy driving switch, a ship power navigation system switch and the like.
In one embodiment, the device uses the permission results to include an image determination result, a microwave profile determination result, and a fingerprint spectrum determination result;
step S300: after respectively judging according to the current image data, the current microwave detection information and the current fingerprint spectrum information, generating an equipment use permission result, specifically comprising:
step S310: acquiring standard image data prestored in a current trigger main body according to the current image data, and comparing the current image data with the standard image data to generate an image judgment result;
specifically, firstly, according to the appearance of the current trigger body, in order to realize quick judgment, the judgment is performed in an image manner, that is, in this step, standard image data pre-stored in the current trigger body is obtained according to the current image data, and the current image data is compared with the standard image data to generate an image judgment result.
The standard image data is pre-stored data and corresponds to the trigger body, that is, each trigger body corresponds to one standard image data.
Step S320: when the image judgment result is that security equipment to be managed can be used for initial determination, standard microwave human body contour data prestored in a current trigger main body are obtained according to the current microwave detection information, the current microwave detection information is compared with the standard microwave human body contour data, and a microwave contour judgment result is generated, wherein the standard microwave human body contour data is the human body contour data of the current trigger main body, which is generated by detecting the current trigger main body on the basis of an FMCW microwave sensor in advance;
specifically, in this step, each detection point on the current trigger main body is respectively obtained based on the FMCW microwave sensor, and then data of the overall contour of the current trigger main body is respectively generated through each detection point, that is, in this step, the human body contour data of the current trigger main body is generated by detecting the current trigger main body based on the FMCW microwave sensor in advance.
In consideration of error conditions caused by different image data acquired in different possible environments, and further, inaccurate judgment conditions are prone to occur, so that more accurate identity judgment on the current trigger subject is realized through the human body contour data of the current trigger subject, which is generated by detecting the current trigger subject based on the FMCW microwave sensor in advance.
Step S330: when the microwave profile judgment result indicates that the to-be-managed security equipment can be used again, acquiring actual main body fingerprint spectrum information prestored in the current trigger main body according to the current fingerprint spectrum information, and comparing the current fingerprint spectrum information with the actual main body fingerprint spectrum information to generate a fingerprint spectrum judgment result, wherein the actual main body fingerprint spectrum information is spectrum data corresponding to a finger of the current trigger main body, which is generated by detecting the current trigger main body on the basis of a spectrometer in advance;
specifically, next, considering the problems that the simple fingerprint unlocking is easy to generate false touch and the fingerprint identification is incomplete, so that the data judgment is slow and the data judgment efficiency is low, another efficient judgment mode is adopted in the step, and the more efficient judgment is realized through a spectrum mode. This produces a difference in spectrum based on the difference in the composition of the human body composed of the bone density and the muscle density of different persons, and therefore, by comparison of the spectrum, a precise difference can be achieved.
Furthermore, compared with pure fingerprint unlocking, the spectrum information can be quickly and efficiently acquired through the fingerprint spectrum information, and the data of the complete finger fingerprint can be acquired without inputting the fingerprint unlocking for many times, so that in the step, the actual main body fingerprint spectrum information prestored in the current trigger main body is acquired according to the current fingerprint spectrum information, and the current fingerprint spectrum information is compared with the actual main body fingerprint spectrum information to generate a fingerprint spectrum judgment result, so that accurate judgment is realized.
Step S340: and when the fingerprint spectrum judgment result is a fingerprint spectrum matching instruction, judging that the current trigger main body has the use authority of the to-be-managed security equipment, and when the fingerprint spectrum judgment result is a fingerprint spectrum mismatching instruction, judging that the current trigger main body does not have the use authority of the to-be-managed security equipment.
Furthermore, when the fingerprint spectrum determination result is determined to be a fingerprint spectrum matching instruction, multiple determinations are already performed, and therefore it is determined that the current trigger subject has the use permission of the security device to be managed. And when the fingerprint spectrum judgment result is a fingerprint spectrum mismatching instruction, judging that the current trigger main body does not have the use authority of the security equipment to be managed.
In one embodiment, step S310: obtaining standard image data prestored in the current trigger main body according to the current image data, comparing the current image data with the standard image data, and generating an image judgment result, the method further comprises the following steps:
step S311: when the image judgment result indicates that the security equipment to be managed cannot be used, combining the current image data with the current microwave detection information and generating a current environment comprehensive processing image;
step S312: and judging whether the current environment comprehensive processing image is matched with the standard image data or not according to the current environment comprehensive processing image.
Specifically, when the image determination result indicates that the to-be-managed security device cannot be used, considering that a situation that an environment may cause an image acquisition error and further a situation that the determination is inaccurate occurs, in order to achieve accurate determination, in this step, current image data and the current microwave detection information are combined to generate a current environment comprehensive processing image, that is, the current environment comprehensive processing image integrates the current image data and the current microwave detection information, and further more accurate determination is achieved.
And further, judging whether the current environment comprehensive processing image is matched with the standard image data or not according to the current environment comprehensive processing image, so that the judgment is carried out again, and the equipment security management precision is improved.
In one embodiment, step S311: when the image judgment result indicates that the security equipment to be managed cannot be used, combining the current image data with the current microwave detection information and generating a current environment comprehensive processing image, which specifically comprises:
step S3111: when the image judgment result indicates that the security equipment to be managed cannot be used, performing three-dimensional modeling processing on the current trigger main body according to the current microwave detection information, and generating initial three-dimensional image data;
specifically, the current microwave detection information is complete data composed of a plurality of detection points, so that the client realizes three-dimensional restoration, namely three-dimensional modeling processing according to the current microwave detection information, and generates initial three-dimensional image data.
Step S3112: splitting the current image data at time points, and respectively acquiring actually acquired image data corresponding to each time point, wherein one time point corresponds to one actually acquired image data;
specifically, the current image data includes image data in a time period, and the time period includes a plurality of time points, so that the screening of subsequent data is facilitated by respectively acquiring actually acquired image data corresponding to each time point.
Step S3113: screening out image data with the highest image quality from the actually acquired image data, and recording the image data as the image data with the best image quality;
specifically, the image data with the highest image quality is screened from the actually acquired image data and recorded as the image data with the best image quality, so that the image with the best image quality is acquired.
Step S3114: aligning the optimal quality image data with each standard point in the initial three-dimensional image data, enclosing an unclear image area in the optimal quality image data, performing three-dimensional reduction on the unclear image area based on the initial three-dimensional image data, and generating a current environment comprehensive processing image after the three-dimensional reduction is completed.
Specifically, in order to achieve more accurate determination, the optimal quality image data is aligned with each standard point in the initial three-dimensional stereoscopic image data, that is, the optimal quality image data is aligned with the initial three-dimensional stereoscopic image data by the standard point, so that deviation is prevented.
Further, by enclosing an unclear image area in the optimal image quality image data, performing three-dimensional restoration on the unclear image area based on the initial three-dimensional stereo image data, and generating a current environment comprehensive processing image after the three-dimensional restoration is completed, the restoration of the image is realized, the current environment comprehensive processing image is generated, and the problem of judgment errors caused by poor environment is solved.
In one embodiment, step S400: judging whether the current trigger main body has the use permission of the security equipment to be managed or not according to the equipment use permission result, if so, generating an equipment usable instruction, wherein the equipment usable instruction is used for controlling the security equipment to be managed to be converted into a usable state; if not, generating an equipment unavailable instruction, wherein the equipment unavailable instruction is used for controlling the security equipment to be managed to keep an unavailable state, and then the method further comprises the following steps:
step S410: generating a touch warning instruction of the security equipment after controlling the security equipment to be managed to keep an unavailable state;
step S420: and generating a security equipment warning prompt according to the security equipment touch warning instruction, broadcasting the security equipment warning prompt, and sending the security equipment warning prompt to a preset security management and control main body based on the security equipment touch warning instruction to remind the security management and control main body.
Specifically, after the control is kept unavailable for the security equipment to be managed, at the moment, the security equipment to be managed is considered to be touched, and at the moment, in order to ensure the safety of the security equipment to be managed and the stability of internal equipment of a ship, a touch warning instruction of the security equipment is generated, a warning prompt of the security equipment is generated according to the touch warning instruction of the security equipment, the generated warning prompt of the security equipment is used for broadcasting, and therefore managers on the ships know the warning prompt, and the warning prompt is given to relevant persons more accurately, and then the warning prompt of the security equipment is sent to a preset security management and control main body based on the touch warning instruction of the security equipment, so that the security management and control main body is reminded, and efficient and accurate management of the security equipment to be managed is guaranteed.
In conclusion, the method and the system sequentially acquire the use triggering instruction of the security equipment to be managed; acquiring main body basic data of a current trigger main body at the current trigger time based on the use trigger instruction, wherein the main body basic data comprise current image data, current microwave detection information and current fingerprint spectrum information of the current trigger main body; respectively judging according to the current image data, the current microwave detection information and the current fingerprint spectrum information, and then generating an allowable result of equipment use; judging whether the current trigger main body has the use permission of the security equipment to be managed or not according to the equipment use permission result, if so, generating an equipment usable instruction, wherein the equipment usable instruction is used for controlling the security equipment to be managed to be converted into a usable state; if the judgment result is no, an equipment unavailable instruction is generated, the equipment unavailable instruction is used for controlling the security equipment to be managed to keep an unavailable state, namely after a use trigger instruction of the security equipment to be managed is obtained, information acquisition of the current trigger main body is started, namely the main body basic data including the current image data, the current microwave detection information and the current fingerprint spectrum information is obtained, and then the current image data, the current microwave detection information and the current fingerprint spectrum information are sequentially judged on the basis, and the change of the state of the security equipment to be managed in use is realized according to an equipment use permission result generated after judgment.
In one embodiment, as shown in fig. 2, a ship security device management system includes:
the instruction acquisition module is used for acquiring a use trigger instruction of the security equipment to be managed;
the information acquisition module is used for acquiring current trigger time and main body basic data of a current trigger main body based on the use trigger instruction, wherein the main body basic data comprise current image data, current microwave detection information and current fingerprint spectrum information of the current trigger main body;
the use judgment module is used for respectively judging according to the current image data, the current microwave detection information and the current fingerprint spectrum information and then generating an equipment use permission result;
a result generating module, configured to determine, according to the device use permission result, whether the current trigger subject has the use permission of the security device to be managed, and if yes, generate a device-usable instruction, where the device-usable instruction is used to control the security device to be managed to be converted into a usable state; if not, generating an equipment unavailable instruction, wherein the equipment unavailable instruction is used for controlling the security equipment to be managed to keep an unavailable state.
In one embodiment, the system further comprises:
the data comparison module is used for acquiring standard image data prestored in the current trigger main body according to the current image data, comparing the current image data with the standard image data and generating an image judgment result;
the profile data module is used for acquiring standard microwave human body profile data prestored in a current trigger main body according to the current microwave detection information when the image judgment result is that the security equipment to be managed can be used for initial setting, and comparing the current microwave detection information with the standard microwave human body profile data to generate a microwave profile judgment result, wherein the standard microwave human body profile data is generated by detecting the current trigger main body in advance based on an FMCW microwave sensor;
the judging result module is used for acquiring actual main body fingerprint spectrum information prestored in the current trigger main body according to the current fingerprint spectrum information when the microwave profile judging result is that the to-be-managed security equipment can be used again, comparing the current fingerprint spectrum information with the actual main body fingerprint spectrum information and generating a fingerprint spectrum judging result, wherein the actual main body fingerprint spectrum information is spectrum data corresponding to a finger of the current trigger main body, which is generated by detecting the current trigger main body based on a spectrometer in advance;
and the fingerprint spectrum module is used for judging that the current trigger main body has the use permission of the security equipment to be managed when the fingerprint spectrum judgment result is a fingerprint spectrum matching instruction, and judging that the current trigger main body does not have the use permission of the security equipment to be managed when the fingerprint spectrum judgment result is a fingerprint spectrum mismatching instruction.
In one embodiment, the system further comprises:
the use management module is used for combining the current image data with the current microwave detection information and generating a current environment comprehensive processing image when the image judgment result shows that the security equipment to be managed cannot be used;
the comprehensive processing module is used for judging whether the current environment comprehensive processing image is matched with the standard image data or not according to the current environment comprehensive processing image;
the three-dimensional module is used for carrying out three-dimensional modeling processing on the current trigger main body according to the current microwave detection information and generating initial three-dimensional image data when the image judgment result shows that the security equipment to be managed cannot be used;
the time splitting module is used for performing time point splitting processing on the current image data and respectively acquiring actually acquired image data corresponding to each time point, wherein one time point corresponds to one actually acquired image data;
the image quality image module is used for screening out image data with the highest image quality from the actually acquired image data and recording the image data as the optimal image quality image data;
and the initial three-dimensional module is used for aligning the optimal quality image data with each standard point in the initial three-dimensional image data, delineating an unclear image area in the optimal quality image data, performing three-dimensional reduction on the unclear image area based on the initial three-dimensional image data, and generating a current environment comprehensive processing image after the three-dimensional reduction is completed.
In one embodiment, the quality image module is further configured to:
generating a touch warning instruction of the security equipment after controlling the security equipment to be managed to keep an unavailable state; and generating a security equipment warning prompt according to the security equipment touch warning instruction, broadcasting the security equipment warning prompt, and sending the security equipment warning prompt to a preset security management and control main body based on the security equipment touch warning instruction so as to remind the security management and control main body.
In one embodiment, as shown in fig. 3, a computer device includes a memory and a processor, where the memory stores a computer program, and the processor implements the steps of the ship security device management method when executing the computer program.
A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of the ship security device management method described above.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct Rambus Dynamic RAM (DRDRAM), and Rambus Dynamic RAM (RDRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (6)

1. A ship security equipment management method is characterized by comprising the following steps:
step S100: acquiring a use trigger instruction of security equipment to be managed;
step S200: acquiring main body basic data of a current trigger main body at the current trigger time based on the use trigger instruction, wherein the main body basic data comprise current image data, current microwave detection information and current fingerprint spectrum information of the current trigger main body;
step S300: respectively judging according to the current image data, the current microwave detection information and the current fingerprint spectrum information, and then generating an allowable result of equipment use;
step S400: judging whether the current trigger main body has the use permission of the security equipment to be managed or not according to the equipment use permission result, if so, generating an equipment usable instruction, wherein the equipment usable instruction is used for controlling the security equipment to be managed to be converted into a usable state; if not, generating an equipment unavailable instruction, wherein the equipment unavailable instruction is used for controlling the security equipment to be managed to keep an unavailable state;
the device usage permission result comprises an image judgment result, a microwave profile judgment result and a fingerprint spectrum judgment result;
step S300: after respectively judging according to the current image data, the current microwave detection information and the current fingerprint spectrum information, generating an equipment use permission result, specifically comprising:
step S310: acquiring standard image data prestored in a current trigger main body according to the current image data, and comparing the current image data with the standard image data to generate an image judgment result;
step S320: when the image judgment result is that security equipment to be managed can be used for initial determination, standard microwave human body contour data prestored in a current trigger main body are obtained according to the current microwave detection information, the current microwave detection information is compared with the standard microwave human body contour data, and a microwave contour judgment result is generated, wherein the standard microwave human body contour data is the human body contour data of the current trigger main body, which is generated by detecting the current trigger main body on the basis of an FMCW microwave sensor in advance;
step S330: when the microwave profile judgment result indicates that the to-be-managed security equipment can be used again, acquiring actual main body fingerprint spectrum information prestored in the current trigger main body according to the current fingerprint spectrum information, and comparing the current fingerprint spectrum information with the actual main body fingerprint spectrum information to generate a fingerprint spectrum judgment result, wherein the actual main body fingerprint spectrum information is spectrum data corresponding to a finger of the current trigger main body, which is generated by detecting the current trigger main body on the basis of a spectrometer in advance;
step S340: when the fingerprint spectrum judgment result is a fingerprint spectrum matching instruction, judging that the current trigger main body has the use permission of the security equipment to be managed, and when the fingerprint spectrum judgment result is a fingerprint spectrum mismatching instruction, judging that the current trigger main body does not have the use permission of the security equipment to be managed;
step S310: obtaining standard image data prestored in the current trigger main body according to the current image data, comparing the current image data with the standard image data, and generating an image judgment result, and the method further comprises the following steps:
step S311: when the image judgment result indicates that the security equipment to be managed cannot be used, combining the current image data with the current microwave detection information and generating a current environment comprehensive processing image;
step S312: judging whether the current environment comprehensive processing image is matched with the standard image data or not according to the current environment comprehensive processing image;
step S311: when the image judgment result indicates that the security equipment to be managed cannot be used, combining the current image data with the current microwave detection information and generating a current environment comprehensive processing image, which specifically comprises:
step S3111: when the image judgment result indicates that the security equipment to be managed cannot be used, performing three-dimensional modeling processing on the current trigger main body according to the current microwave detection information, and generating initial three-dimensional image data;
step S3112: splitting the current image data at time points, and respectively acquiring actually acquired image data corresponding to each time point, wherein one time point corresponds to one actually acquired image data;
step S3113: screening out image data with the highest image quality from the actually acquired image data, and recording the image data as the image data with the best image quality;
step S3114: aligning the optimal quality image data with each standard point in the initial three-dimensional image data, enclosing an unclear image area in the optimal quality image data, performing three-dimensional reduction on the unclear image area based on the initial three-dimensional image data, and generating a current environment comprehensive processing image after the three-dimensional reduction is completed.
2. The ship security device management method according to claim 1, wherein step S400: judging whether the current trigger main body has the use permission of the security equipment to be managed or not according to the equipment use permission result, if so, generating an equipment usable instruction, wherein the equipment usable instruction is used for controlling the security equipment to be managed to be converted into a usable state; if not, generating an equipment unavailable instruction, wherein the equipment unavailable instruction is used for controlling the security equipment to be managed to keep an unavailable state, and then the method further comprises the following steps:
step S410: generating a touch warning instruction of the security equipment after controlling the security equipment to be managed to keep an unavailable state;
step S420: and generating a security equipment warning prompt according to the security equipment touch warning instruction, broadcasting the security equipment warning prompt, and sending the security equipment warning prompt to a preset security management and control main body based on the security equipment touch warning instruction so as to remind the security management and control main body.
3. A ship security device management system, the system comprising:
the instruction acquisition module is used for acquiring a use trigger instruction of the security equipment to be managed;
the information acquisition module is used for acquiring current trigger time and main body basic data of a current trigger main body based on the use trigger instruction, wherein the main body basic data comprise current image data, current microwave detection information and current fingerprint spectrum information of the current trigger main body;
the use judgment module is used for respectively judging according to the current image data, the current microwave detection information and the current fingerprint spectrum information and then generating an equipment use permission result;
a result generating module, configured to determine, according to the device use permission result, whether the current trigger subject has the use permission of the security device to be managed, and if yes, generate a device-usable instruction, where the device-usable instruction is used to control the security device to be managed to be converted into a usable state; if not, generating an equipment unavailable instruction, wherein the equipment unavailable instruction is used for controlling the security equipment to be managed to keep an unavailable state;
the system further comprises:
the use management module is used for combining the current image data with the current microwave detection information and generating a current environment comprehensive processing image when the image judgment result shows that the security equipment to be managed cannot be used;
the comprehensive processing module is used for judging whether the current environment comprehensive processing image is matched with standard image data or not according to the current environment comprehensive processing image;
the three-dimensional module is used for carrying out three-dimensional modeling processing on the current trigger main body according to the current microwave detection information and generating initial three-dimensional image data when the image judgment result shows that the security equipment to be managed cannot be used;
the time splitting module is used for performing time point splitting processing on the current image data and respectively acquiring actually acquired image data corresponding to each time point, wherein one time point corresponds to one actually acquired image data;
the image quality image module is used for screening out image data with the highest image quality from the actually acquired image data and recording the image data as the optimal image quality image data;
and the initial three-dimensional module is used for aligning the optimal quality image data with each standard point in the initial three-dimensional image data, delineating an unclear image area in the optimal quality image data, performing three-dimensional reduction on the unclear image area based on the initial three-dimensional image data, and generating a current environment comprehensive processing image after the three-dimensional reduction is completed.
4. The ship security device management system of claim 3, further comprising:
the data comparison module is used for acquiring standard image data prestored in the current trigger main body according to the current image data, comparing the current image data with the standard image data and generating an image judgment result;
the profile data module is used for acquiring standard microwave human body profile data prestored in a current trigger main body according to the current microwave detection information and comparing the current microwave detection information with the standard microwave human body profile data to generate a microwave profile judgment result when the image judgment result is that the security equipment to be managed can be used for the initial setting, wherein the standard microwave human body profile data is the human body profile data of the current trigger main body, which is generated by detecting the current trigger main body on the basis of an FMCW microwave sensor in advance;
the judging result module is used for acquiring actual main body fingerprint spectrum information prestored in the current trigger main body according to the current fingerprint spectrum information when the microwave profile judging result is that the to-be-managed security equipment can be used again, and comparing the current fingerprint spectrum information with the actual main body fingerprint spectrum information to generate a fingerprint spectrum judging result, wherein the actual main body fingerprint spectrum information is spectrum data corresponding to a finger of the current trigger main body, which is generated by detecting the current trigger main body on the basis of a spectrometer in advance;
and the fingerprint spectrum module is used for judging that the current trigger main body has the use permission of the security equipment to be managed when the fingerprint spectrum judgment result is a fingerprint spectrum matching instruction, and judging that the current trigger main body does not have the use permission of the security equipment to be managed when the fingerprint spectrum judgment result is a fingerprint spectrum mismatching instruction.
5. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 or 2 when executing the computer program.
6. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 or 2.
CN202111050499.3A 2021-09-08 2021-09-08 Ship security equipment management method and system Active CN113672893B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111050499.3A CN113672893B (en) 2021-09-08 2021-09-08 Ship security equipment management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111050499.3A CN113672893B (en) 2021-09-08 2021-09-08 Ship security equipment management method and system

Publications (2)

Publication Number Publication Date
CN113672893A CN113672893A (en) 2021-11-19
CN113672893B true CN113672893B (en) 2023-03-24

Family

ID=78548976

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111050499.3A Active CN113672893B (en) 2021-09-08 2021-09-08 Ship security equipment management method and system

Country Status (1)

Country Link
CN (1) CN113672893B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113361942A (en) * 2021-06-21 2021-09-07 广州嘉航通信科技有限公司 Marine vessel commanding and dispatching method, system, computer equipment and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7953686B2 (en) * 2008-03-17 2011-05-31 International Business Machines Corporation Sensor and actuator based validation of expected cohort behavior
CN111950529B (en) * 2017-05-17 2023-05-16 深圳市汇顶科技股份有限公司 Optical fingerprint sensor with non-contact imaging capability
US10242245B2 (en) * 2017-06-15 2019-03-26 Dell Products L.P. System and method of fingerprint anti-spoofing protection using multi-spectral optical sensor array
CN111986263B (en) * 2020-06-28 2023-09-12 百度在线网络技术(北京)有限公司 Image processing method, device, electronic equipment and storage medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113361942A (en) * 2021-06-21 2021-09-07 广州嘉航通信科技有限公司 Marine vessel commanding and dispatching method, system, computer equipment and storage medium

Also Published As

Publication number Publication date
CN113672893A (en) 2021-11-19

Similar Documents

Publication Publication Date Title
Kaushal et al. Human identification and fingerprints: a review
Wells et al. Eyewitness identification: The importance of lineup models.
EP3224642B1 (en) Magnetic resonance fingerprinting data collection and analysis system
CN106662566A (en) Gemstone verification
US10963714B2 (en) Method for updating biometric reference data
CN113672893B (en) Ship security equipment management method and system
CN108446591A (en) Driver identity recognition methods, device, storage medium and vehicle
CN109063984A (en) Risk passenger method, apparatus, computer equipment and storage medium
Del Bove et al. A geometric morphometric approach to the study of sexual dimorphism in the modern human frontal bone
CN110095410A (en) Pattern measurement method, system and ballistic deflection measurement method are injured in target plate perforation
Miller Package ‘Distance’
CN114299547A (en) Method and system for determining region of target object
Dawood et al. Quantitative matching of forensic evidence fragments utilizing 3D microscopy analysis of fracture surface replicas
CN109978860B (en) Hydrothorax judging method and device and computer equipment
JP2000222361A (en) Authentication method and its device using motion
CN110488337A (en) A kind of monitoring device and method of radiographic inspection
CN112927152B (en) CT image denoising processing method, device, computer equipment and medium
CN113191146B (en) Appeal data distribution method and device, computer equipment and storage medium
CN111295711A (en) Analysis device, analysis method program, and non-volatile storage medium
Xi et al. A method for marine human error probability estimate: APJE-SLIM
Trush et al. Convicts PersonalityS Сriminogenic Contamination Based On The Human Structureology G. Amon Standpoint
Zappa et al. Reliability of personal identification base on optical 3D measurement of a few facial landmarks
Górski The accuracy of geographic profiling methods based on the example of burglaries in Warsaw
Davies et al. The utility of the Violent Crime Linkage Analysis System for conducting comparative case analysis
CN217821675U (en) Health state detection system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant