CN113723694B - Police officer control method, device, equipment and storage medium - Google Patents

Police officer control method, device, equipment and storage medium Download PDF

Info

Publication number
CN113723694B
CN113723694B CN202111036216.XA CN202111036216A CN113723694B CN 113723694 B CN113723694 B CN 113723694B CN 202111036216 A CN202111036216 A CN 202111036216A CN 113723694 B CN113723694 B CN 113723694B
Authority
CN
China
Prior art keywords
key personnel
control
positions
alarm
personnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111036216.XA
Other languages
Chinese (zh)
Other versions
CN113723694A (en
Inventor
黄希
欧瑞
张登星
聂贻俊
刘翼
张磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Pvirtech Co ltd
Original Assignee
Chengdu Pvirtech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Pvirtech Co ltd filed Critical Chengdu Pvirtech Co ltd
Priority to CN202111036216.XA priority Critical patent/CN113723694B/en
Publication of CN113723694A publication Critical patent/CN113723694A/en
Application granted granted Critical
Publication of CN113723694B publication Critical patent/CN113723694B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/04Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/29Geographical information databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • G06Q10/063118Staff planning in a project environment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06313Resource planning in a project environment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety

Abstract

The embodiment of the application discloses a police officer control method, a police officer control device, a police officer equipment and a storage medium, relates to the technical field of data processing, and aims to reasonably determine a plurality of control positions, the number of police officers in each control position and the police officer equipment in the occurrence time of a major event. The method comprises the following steps: the server side acquires a plurality of alarm records in a preset period before the occurrence time of the major event from an alarm subsystem, determines target key personnel in the alarm records, and predicts the movement track of the target key personnel in the occurrence time of the major event; and finally, allocating the number of police officers and police equipment in the deployment and control position within the occurrence time of the major event according to the danger levels of different deployment and control positions.

Description

Police officer control method, device, equipment and storage medium
Technical Field
The application relates to the technical field of data processing, in particular to a police officer control method, a police officer control device, a police officer control equipment and a storage medium.
Background
The traditional security plan for major events is generally defined by related department personnel according to the surrounding environment and the place of the place where the major event is held, the security plan area is artificially defined, and a plurality of deployment and control positions in the security plan area and the number of police officers and the equipment of the police officers at each deployment and control position are determined. The control method not only needs related departments to detect and deduce the surrounding environment and the place of the important events, but also is influenced by the experience of the personnel making the security plan, so that the control positions, the number of the policemen at each control position and the distribution reasonability of the policemen equipment are greatly challenged, and certain threat is brought to the smooth handling of the important events.
Disclosure of Invention
The embodiment of the application provides a police officer control method, a police officer control device, a police officer equipment and a storage medium, and aims to reasonably determine a plurality of control positions within the occurrence time of a major event, and the number of police officers and the equipment of the police officers at each control position so as to overcome the technical problems.
In order to solve the above problem, a first aspect of the embodiments of the present application provides a police officer control method, which is applied to a security management system, where the security management system includes a server, a three-dimensional geographic information subsystem, an alarm subsystem, and a security management terminal, where the three-dimensional geographic information subsystem, the alarm subsystem, and the security management terminal are respectively in communication connection with the server, and the method includes:
the server receives a deployment and control request sent by the security management terminal, wherein the deployment and control request is generated by the security management terminal when a triggering operation of a user for major event deployment and control is received;
the server side obtains a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the control request, determines target key personnel in the alarm records, and predicts the movement track of the target key personnel in the occurrence time of the major event;
the server side acquires a plurality of early warning positions in a security plan area of the major event from the three-dimensional geographic information subsystem according to the deployment and control request;
the server side determines a plurality of deployment and control positions and danger levels of different deployment and control positions in the security protection pre-case area according to the activity track and the plurality of early warning positions;
and the server determines the number of police officers and the equipment of the police officers in each control position within the occurrence time of the major event according to the plurality of control positions and the danger levels of different control positions.
Further, the security management system further comprises a key personnel background library in communication connection with the server, and identity information of a plurality of key personnel is recorded in the key personnel background library; the server side obtains a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the control request, and the step of determining target key personnel in the alarm records comprises the following steps:
the server side obtains a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the deployment and control request, wherein the alarm records are recorded with identity information of the personnel involved in the case;
the server matches the identity information of the involved personnel with the identity information of a plurality of key personnel recorded in the key personnel background library to determine target key personnel; wherein the target key personnel are key personnel in a free movement state.
Furthermore, semantic information of historical criminal events of each key person is recorded in the key person background library; under the condition that the server cannot match the identity information of the involved personnel with the identity information of a plurality of key personnel recorded in the key personnel background library to determine target key personnel, the server acquires a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the deployment request, and the step of determining the target key personnel in the alarm records comprises the following steps:
the server side acquires a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the deployment and control request;
the server side screens alarm events which accord with preset semantics from the alarm records;
and the server performs semantic matching on the semantic information of the alarm event and the semantic information of the historical criminal event of each key person recorded in the key person background library to determine target key persons.
Furthermore, the security management system further comprises a skynet subsystem, a special commodity management subsystem and a key personnel background library which are respectively in communication connection with the server, wherein the key personnel background library records identity information of a plurality of key personnel and interpersonal relationships of the key personnel; the step of predicting the activity track of the target key personnel within the occurrence time of the significant event by the server side comprises the following steps:
the server side acquires a monitoring record of the target key personnel in a second preset period from the skynet subsystem, acquires a special commodity purchasing record of the target key personnel in the second preset period from the special commodity management subsystem, and acquires the interpersonal relationship of the target key personnel from the key personnel background library;
the server predicts the activity track of the target key personnel in the occurrence time of the major event according to the monitoring record, the special commodity purchasing record and the interpersonal relationship of the target key personnel;
the second preset time period is a time period from the alarm receiving time of the target key personnel to the occurrence time of the major event.
Further, the activity track comprises a dwell position; the step that the server side determines a plurality of deployment and control positions and danger levels of different deployment and control positions in the security protection pre-case area according to the activity track and the plurality of early warning positions comprises the following steps:
the server side screens target activity tracks located in the security pre-case area from the activity tracks;
the server side judges whether the staying position in the target activity track is overlapped with the plurality of early warning positions or not;
if the stopping positions in the target activity track are overlapped with the early warning positions, the server determines the overlapped positions as first-class distribution control positions, determines the danger level of the first-class distribution control positions as high, determines the non-overlapped stopping positions as second-class distribution control positions, determines the danger level of the second-class distribution control positions as medium, determines the non-overlapped early warning positions as third-class distribution control positions, and determines the danger level of the third-class distribution control positions as low.
Furthermore, the number of the target key persons is multiple; after the server screens out the target activity tracks of a plurality of target key personnel, the step of determining a plurality of deployment and control positions and the danger levels of different deployment and control positions in the security and protection pre-plan area by the server according to the activity tracks and the plurality of early warning positions further comprises the following steps:
the server collects target activity tracks of the target key personnel;
and the server determines the positions with high aggregation degree in the target activity tracks of the target key personnel as the class of deployment and control positions, and determines the danger level of the class of deployment and control positions as high.
A second aspect of the embodiments of the present application provides a police officer's arrangement and control device, is applied to security management system, security management system include the server, with three-dimensional geographic information subsystem, warning subsystem and security management terminal that the server is communication connection respectively, the device dispose in the server, the device includes:
the control deployment request receiving module is used for receiving a control deployment request sent by the security management terminal, wherein the control deployment request is generated by the security management terminal when the security management terminal receives triggering operation of a user for controlling a major event;
the activity track prediction module is used for acquiring a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the deployment and control request, determining target key personnel in the alarm records and predicting the activity track of the target key personnel in the occurrence time of the major event;
the early warning position acquisition module is used for acquiring a plurality of early warning positions in a security plan area of the major event from the three-dimensional geographic information subsystem according to the deployment and control request;
the distribution and control position determining module is used for determining a plurality of distribution and control positions and danger levels of different distribution and control positions in the security and protection pre-case area according to the activity track and the plurality of early warning positions;
and the control scheme determining module is used for determining the number of police officers and the equipment of the police officers in each control position within the occurrence time of the major event according to the plurality of control positions and the danger levels of different control positions.
Further, the security management system further comprises a key personnel background library in communication connection with the server, and identity information of a plurality of key personnel is recorded in the key personnel background library;
the activity trajectory prediction module includes:
the first alarm record obtaining submodule is used for obtaining a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the deployment and control request, wherein the alarm records are recorded with identity information of the personnel involved in the case;
the first determination submodule of the key personnel is used for matching the identity information of the involved personnel with the identity information of a plurality of key personnel recorded in the key personnel background library to determine target key personnel; wherein the target key personnel are key personnel in a free movement state.
Furthermore, semantic information of historical criminal events of each key person is recorded in the key person background library; the activity trajectory prediction module further comprises:
the second alarm record obtaining submodule is used for obtaining a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the deployment and control request;
the alarm event screening submodule is used for screening the alarm events which accord with preset semantics from the plurality of alarm records;
and the second determination submodule of the key personnel is used for performing semantic matching on the semantic information of the alarm event and the semantic information of the historical criminal event of each key personnel recorded in the background library of the key personnel to determine target key personnel.
Furthermore, the security management system further comprises a skynet subsystem, a special commodity management subsystem and a key personnel background library which are respectively in communication connection with the server, wherein the key personnel background library records identity information of a plurality of key personnel and interpersonal relationships of the key personnel;
the activity trajectory prediction module further comprises:
the information acquisition sub-module is used for acquiring a monitoring record of the target key personnel in a second preset period from the skynet sub-system, acquiring a special commodity purchase record of the target key personnel in the second preset period from the special commodity management sub-system, and acquiring the interpersonal relationship of the target key personnel from the key personnel background library;
the track prediction determining submodule is used for predicting the activity track of the target key personnel in the major event occurrence time according to the monitoring record, the special commodity purchasing record and the interpersonal relationship of the target key personnel;
the second preset time period is a time period from the alarm receiving time of the target key personnel to the occurrence time of the major event.
Further, the activity track comprises a dwell position; the deployment position determining module comprises:
the target track screening submodule is used for screening target activity tracks in the security case area from the activity tracks;
the position overlapping judgment submodule is used for judging whether the stopping position in the target activity track is overlapped with the plurality of early warning positions or not;
and the distributed control position grading first sub-module is used for determining the overlapped positions as one type of distributed control positions under the condition that the stop positions in the target activity track are overlapped with the early warning positions, determining the danger level of the one type of distributed control positions as high, taking the non-overlapped stop positions as two types of distributed control positions, determining the danger level of the two types of distributed control positions as medium, taking the non-overlapped early warning positions as three types of distributed control positions, and determining the danger level of the three types of distributed control positions as low.
Furthermore, the number of the target key persons is multiple; the deployment position determining module further comprises:
the activity track aggregation sub-module is used for aggregating the target activity tracks of the target key personnel;
and the control position grading second sub-module is used for determining the positions with high aggregation degree in the target activity tracks of the target key personnel as the class of control positions and determining the danger level of the class of control positions as high.
A third aspect of embodiments of the present application provides a readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the steps in the method according to the first aspect of the present application.
A fourth aspect of the embodiments of the present application provides an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the steps of the method according to the first aspect of the present application.
The embodiment of the application has the following advantages:
in the police officer control method provided by the embodiment of the application, a server side obtains a plurality of alarm records in a preset period before the occurrence time of a major event from an alarm subsystem according to a control request initiated by a security management terminal, determines target major personnel in the alarm records, and predicts the movement track of the target major personnel in the occurrence time of the major event; and finally, the server matches the activity track with a plurality of early warning positions automatically generated by the three-dimensional geographic information subsystem aiming at the major event, determines a plurality of deployment and control positions and danger levels of different deployment and control positions in a security and precaution area of the major event, and distributes the number of police officers and police equipment of the deployment and control positions in the occurrence time of the major event aiming at the danger levels of the different deployment and control positions. According to the method and the system, the deployment and control positions and the danger levels of different deployment and control positions are determined by two position factors, namely the movement track of the target key personnel and the plurality of early warning positions automatically generated by the three-dimensional geographic information subsystem, so that the deployment and control angles are more diversified, and the problem that the current deployment and control mode is influenced by the experience of personnel in a security plan can be effectively solved. Meanwhile, the arrangement and control position is associated with an actual dangerous position (such as a position in an activity track of a target key person), and the danger level of the arrangement and control position is associated with the number of police officers and the equipment of the police officers distributed by the arrangement and control position, so that the distribution reasonability of the number of the police officers and the equipment of the police officers in each arrangement and control position is improved, and compared with the prior art, the arrangement and control mode has more practical precaution significance.
Drawings
Fig. 1 is a flowchart of a police officer control method according to an embodiment of the present application;
fig. 2 is a schematic diagram of a police officer control device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Aiming at the technical problems pointed out by the application, the application provides a police officer control method, a police officer control device, a police officer equipment and a storage medium through the following embodiments, and aims to reasonably determine a plurality of control positions within the occurrence time of a major event, the number of police officers in each control position and the equipment of the police officers, and reduce the threat brought by key personnel to successfully hold the major event.
Referring to fig. 1, fig. 1 is a flowchart of a police officer control method according to an embodiment of the present application, where the police officer control method is applied to a security management system, and the security management system includes a server, a three-dimensional geographic information subsystem, an alarm subsystem, and a security management terminal, where the three-dimensional geographic information subsystem, the alarm subsystem, and the security management terminal are respectively in communication connection with the server. As shown in fig. 1, the method comprises the steps of:
step S11: the server receives a deployment and control request sent by the security management terminal, wherein the deployment and control request is generated by the security management terminal when a triggering operation of a user for major event deployment and control is received;
the important events include, but are not limited to, large-scale mass sexual activities such as art shows, sports events, parades and the like which are held for the social public, and events such as college entrance examination, important character patrol and the like.
The user can input the major event and the occurrence time of the major event on the security management terminal, click the alarm recording time limit screening condition, select a preset period before the occurrence time of the major event (for example, the preset period is 3 months or 7 months and 30 days in 2021 year-9 months and 30 days in 2021 year), then click the determination button, and the security management terminal sends a deployment and control request to the server. The occurrence time of the major event refers to the starting time of the major event, such as 10 months and 1 day 10 click in 2021.
Step S12: the server side obtains a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the control request, determines target key personnel in the alarm records, and predicts the movement track of the target key personnel in the occurrence time of the major event;
the alarm record refers to information such as alarm types, alarm events, alarm time, identity information of case-related personnel aiming at the alarm events and the like recorded by alarm receiving personnel after an alarm person makes an alarm call, wherein the alarm events are local alarm events, and the alarm events and the place where major events are held belong to the same administrative region, such as the same jurisdiction city or the same jurisdiction. The alarm records are stored and managed by the alarm subsystem.
The key personnel refer to personnel who are in a free activity state at present and have national security or social security suspicion.
According to the criminal psychology, in a short time period after a criminal case occurs, the psychology of related personnel is more unstable, the criminal motivation is stronger in the flow fleeing process, certain reportable social psychology is achieved, and the probability that the reportable behavior is generated or the social security behavior is influenced is higher. Therefore, in order to guarantee the successful behavior of major events, the node is selected by taking the occurrence time of the major events as the time, the server side can acquire a plurality of alarm records in a preset period before the occurrence time of the major events from the alarm subsystem after receiving the deployment and control request, then key personnel are determined from the involved personnel of the alarm records, the activity tracks of the key personnel are predicted, police personnel are deployed and controlled according to the activity tracks of the key personnel, and the key personnel can be targeted to kill the threat of the key personnel to the successful behavior of the major events in the cradle.
In the present application, there are various ways to determine the target important person in the plurality of alarm records. In an embodiment of the application, the security management system further includes a key personnel background library in communication connection with the server, and the key personnel background library records identity information of a plurality of key personnel; the specific implementation steps of step S12 may include:
substep S12-11: the server side obtains a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the deployment and control request, wherein the alarm records are recorded with identity information of the personnel involved in the case;
in the application, the deployment and control request may include an alarm record retrieval authorization code, and the server generates a first retrieval request from the alarm record retrieval authorization code and then sends the first retrieval request to the alarm subsystem. After receiving the first retrieval request, the alarm subsystem can match the alarm record retrieval authorization code in the first retrieval request according to the prestored alarm record retrieval authorization code, and under the condition that the alarm subsystem and the first retrieval request are matched, the alarm subsystem returns a plurality of alarm records in a preset period before the occurrence time of the major event to the server side.
In practice, not all alarm events can lead the involved personnel to be detained or detained, so that the involved personnel still can be in a free activity state in some alarm events even after the law enforcement personnel normally take the police. For example, in some business administration penalty events, after a law enforcement officer performs administration penalty on a case involved officer, the case involved officer is still in a freely movable state. For example, in some dispute resolution events, law enforcement officers normally police to resolve dispute problems of case-related officers, and the case-related officers may still be in a free-moving state.
In such an alarm event, although the involved person is still freely active, the involved person may be liable to report sexual behavior or affect social security behavior due to dissatisfaction with the penalty behavior or the mediation result. However, since the law enforcement officer takes an alarm, the alarm record of the alarm event will be described with the identity information of the officer involved in the case. Therefore, for the alarm records of the alarm events, the server side can directly extract the identity information of the personnel involved in the case from the alarm records after obtaining the alarm records.
Substep S12-12: the server matches the identity information of the involved personnel with the identity information of a plurality of key personnel recorded in the key personnel background library to determine target key personnel; wherein the target key personnel are key personnel in a free movement state.
The key personnel background library is a database which records identity information of a plurality of key personnel and crime records of each key personnel and is obtained by integrating, interconnecting and intercommunicating a contradiction dispute platform with a drug rehabilitation management platform, a traffic incident (local traffic management platform), entry and exit management information and other platforms.
In the application, if the server matches the identity information of the involved persons with the identity information of a plurality of key persons recorded in the key person background library, and can determine the target key person in the database, the server indicates that the involved persons are the offenders, and the secondary crime and the recovery psychology of the involved persons are stronger, and at the moment, the server takes the involved persons as the target key persons.
In practice, some alarm calls are dialed by third-party personnel when finding an alarm event, and when the third-party personnel cannot directly and definitely determine the identity information of case-involved personnel aiming at the alarm event and the case-involved personnel are not caught, the server cannot directly match the identity information of the case-involved personnel with the identity information of a plurality of key personnel recorded in the key personnel background library so as to determine target key personnel. Therefore, in another embodiment of the present application, a scheme for determining target key personnel based on semantic information is further provided, wherein semantic information of historical criminal events of each key personnel is further recorded in the key personnel background library; in this case, the specific implementation step of step S12 may further include:
substeps 12-21: the server side acquires a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the deployment and control request;
substeps 12-22: the server side screens alarm events which accord with preset semantics from the alarm records;
in the application, the preset semantics can be 'occurrence of a cut injury event', 'people lifting a banner and saying xx, xx returning to my public road'. The server side can screen the alarm events which accord with the semantics from a plurality of alarm records by utilizing the semantic model obtained by pre-training. The semantic model is a new data model which is added with a brand-new data constructor and a data processing primitive on the basis of a relational model and is used for expressing complex structures and rich semantics, and related technologies can be referred to for a training method of the semantic model, so that the detail is omitted.
Substeps 12-23: and the server performs semantic matching on the semantic information of the alarm event and the semantic information of the historical criminal event of each key person recorded in the key person background library to determine target key persons.
And the server performs semantic matching on the semantic information in the alarm event which is obtained after screening and accords with the preset semantics and the semantic information of the historical criminal event of each key person recorded in the key person background library, so that the target key person can be determined.
For example, the semantic information of an alarm event recorded in an alarm record is "a knife-holding and man-cutting event occurs at xx street, a knife holder is about 40 years old, and a male has a scar … … with a length of about 5cm on the left face". And the server performs semantic matching on the voice information and semantic information of the historical criminal event of each key person recorded in the key person background library to obtain 3 screening results, wherein each screening result comprises semantic matching probability. The server side can directly take key personnel corresponding to the screening result with the highest semantic matching probability as target key personnel, also can take key personnel corresponding to the 3 screening results as target key personnel respectively, and also can return the 3 screening results to the security management terminal, a user at the side of the security management terminal carries out manual investigation on the key personnel corresponding to the 3 screening results respectively, and if the key personnel corresponding to the 3 screening results are examined to be normal in recent activity and have no crime abnormality, the determination of the target key personnel is not carried out aiming at the alarm event. And if the key personnel corresponding to a certain screening result are checked to have abnormal recent activities and are currently in a missing state, taking the key personnel as target key personnel.
After the server determines the target key personnel, the activity track of the target key personnel in the occurrence time of the major event can be predicted through the related technology. In an embodiment of the present application, the security management system further includes a skynet subsystem, a special commodity management subsystem, and a key personnel background library, where the server is in communication connection with the skynet subsystem, the key personnel background library records identity information of a plurality of key personnel and interpersonal relationships of the key personnel, and the server predicts the target key personnel at the specific implementation steps of the activity track within the occurrence time of the major event in step S12 may include:
substeps 12-31: the server side acquires a monitoring record of the target key personnel in a second preset period from the skynet subsystem, acquires a special commodity purchasing record of the target key personnel in the second preset period from the special commodity management subsystem, and acquires the interpersonal relationship of the target key personnel from the key personnel background library;
substeps 12-32: the server predicts the activity track of the target key personnel in the occurrence time of the major event according to the monitoring record, the special commodity purchasing record and the interpersonal relationship of the target key personnel; the second preset time period is a time period from the alarm receiving time of the target key personnel to the occurrence time of the major event.
In the application, the target key personnel can be determined from the key personnel background library or can be directly determined according to the alarm records, so that the server can obtain the biological information characteristics of the target key personnel in detail, wherein the biological information characteristics can be human face characteristics, body type characteristics, gait characteristics and behavior characteristics. The server side can send tracking information such as face features, body type features, gait features and behavior features of the target key personnel to the skynet subsystem, the skynet subsystem screens monitoring pictures and occurrence time and places of the target key personnel in a second preset period according to the tracking information, and the skynet subsystem packs the monitoring pictures and the occurrence time and places of the target key personnel in the second preset period, which are obtained through tracking, into monitoring records and sends the monitoring records to the server side.
The special commodity is an article which accords with relevant regulations, has a certain danger coefficient and is supervised by relevant departments, and after the special commodity is purchased by a customer, a merchant must report the purchasing person identity information, the purchasing time and the purchasing place of the special commodity. Therefore, the server can inquire the special commodity management subsystem whether the target key personnel has the special commodity purchase record in the second preset period.
And the server can predict the movement track of the target key personnel in the occurrence time of the major event according to the monitoring record, the special commodity purchasing record and the time characteristic and the position characteristic in the interpersonal relationship of the target key personnel. Specifically, the server inputs the time characteristics and the position characteristics of the occurrence of the target key personnel, which are recorded in the monitoring record, the time characteristics and the position characteristics of the occurrence of the special commodity purchase record, and the time characteristics and the position characteristics of the occurrence of the target key personnel, which are obtained by examining the interpersonal relationship, into a path dynamic model in the related art as the path characteristics of the target key personnel, and can predict the movement path of the target key personnel within the occurrence time of the major event through the output result of the path dynamic model. Regarding the implementation principle of the path dynamic model, reference may be made to related technologies, and details of this application are not repeated herein.
Further, the interpersonal relationship of the target key personnel also comprises personnel information with contradictory relationship with the target key personnel, and the server side can determine whether personnel with contradictory relationship with the target key personnel exist in the participants of the major event or not by matching the personnel information with contradictory relationship with the target key personnel with the participant information of the major event. For example, the server first obtains the interpersonal relationship of the target important person from the important person background library, matches the interpersonal relationship of the target important person with the information of the participants of the important event, and under the condition that the participants of the important event have contradictory relationship with the target important person, the server judges whether the monitoring record of the target important person in the second preset period has the behavior of the important event or not, and if so, predicts the behavior of the target important person including the behavior of the important event in the activity track.
Step S13: the server side acquires a plurality of early warning positions in a security plan area of the major event from the three-dimensional geographic information subsystem according to the deployment and control request;
the three-dimensional geographic Information subsystem can also be called as a GIS (geographic Information system), and the system can quickly and accurately measure the height, the width and the like of buildings, roads and the like, so that a large amount of time for on-site investigation on site is saved, and the system can also quickly plan, deduce and plot site boundaries, lines, personnel, point positions and the like, so that the traditional manual plan deduction is replaced, and the efficiency of plan making and security work is greatly improved.
The multiple early warning positions can be automatically generated by the three-dimensional geographic information subsystem after the security plan design user inputs the relevant parameters of the security plan of the major event aiming at the major event. For example, when the significant event is a college entrance examination event, the relevant parameters of the security protocol input by the user on the three-dimensional geographic information subsystem may include: the system comprises an examination room, an examination sending guarantee line leading to the examination room, an examination room warning range, an ultrahigh building, interference equipment, key intersection police force deployment and the like. Then, the three-dimensional geographic information subsystem takes the examination room as a central point, automatically marks each examination sending guarantee route leading to the central point, an examination room warning range surrounding the central point, a key attention building in the examination room warning range, a key intersection for placing the position of the interference equipment and needing to deploy the police force and the like on a three-dimensional map. The early warning position can comprise a key intersection which focuses on buildings, positions for placing interference equipment and needs to deploy police force.
In the application, the deployment and control request may include an early warning position retrieval authorization code, and the server generates a second retrieval request from the early warning position retrieval authorization code and then sends the second retrieval request to the three-dimensional geographic information subsystem. After receiving the second retrieval request, the three-dimensional geographic information subsystem can match the early warning position retrieval authorization code in the second retrieval request according to the pre-stored early warning position retrieval authorization code, and under the condition that the two are matched, the three-dimensional geographic information subsystem returns a plurality of early warning positions in the security pre-case area of the major event to the server side.
Step S14: the server side determines a plurality of deployment and control positions and danger levels of different deployment and control positions in the security protection pre-case area according to the activity track and the plurality of early warning positions;
according to the method and the system, the deployment and control positions and the danger levels of different deployment and control positions are determined by two position factors, namely the movement track of the target key personnel and the plurality of early warning positions automatically generated by the three-dimensional geographic information subsystem, so that the deployment and control angles are more diversified, and the problem that the current deployment and control mode is influenced by the experience of personnel in a security plan can be effectively solved. Meanwhile, the deployment and control position of the system is associated with an actual dangerous position (such as a position in an activity track of a target key person), so that the deployment and control mode of the system has more practical precautionary significance compared with the prior art.
In the following content, the present application specifically provides an implementation scheme in which a server determines a plurality of deployment and control positions and risk levels of different deployment and control positions in a security and protection pre-plan area according to an activity track of a target key person and a plurality of early warning positions.
In an embodiment of the present application, the activity track may include a stop position of the target key person; the implementing step of step S14 may include:
substep S14-11: the server side screens target activity tracks located in the security pre-case area from the activity tracks;
substep S14-12: the server side judges whether the staying position in the target activity track is overlapped with the plurality of early warning positions or not;
substeps 14-13: if the stopping positions in the target activity track are overlapped with the early warning positions, the server determines the overlapped positions as first-class distribution control positions, determines the danger level of the first-class distribution control positions as high, determines the non-overlapped stopping positions as second-class distribution control positions, determines the danger level of the second-class distribution control positions as medium, determines the non-overlapped early warning positions as third-class distribution control positions, and determines the danger level of the third-class distribution control positions as low.
In another embodiment of the present application, the target key-point persons are multiple; after the server filters out the target activity tracks of the target key personnel, the implementation step of step S14 may further include:
substeps 14-14: the server collects target activity tracks of the target key personnel;
substeps 14-15: and the server determines the positions with high aggregation degree in the target activity tracks of the target key personnel as the class of deployment and control positions, and determines the danger level of the class of deployment and control positions as high.
Step S15: and the server determines the number of police officers and the equipment of the police officers in each control position within the occurrence time of the major event according to the plurality of control positions and the danger levels of different control positions.
The danger levels of the distribution control positions can include a high level, a middle level and a low level, and the number of police officers and police officer equipment are set to be the largest for the distribution control positions with the high danger levels; for the distribution control position with the middle danger level, the number of police officers and the equipment of the police officers are set to be many times; for a deployment location with a low risk level, the number of police officers and police equipment is set to a minimum.
According to the method and the device, the incidence relation is established between the danger level of the control position and the number of the police officers and the police officer equipment distributed by the control position, and the number of the police officers and the police officer equipment are controlled at different control positions according to the incidence relation.
Based on the same inventive concept, an embodiment of the application provides a police officer control device. Referring to fig. 2, fig. 2 is a schematic diagram of a police officer control device according to an embodiment of the present application. The device is configured at the server side, and as shown in fig. 2, the device includes:
a deployment and control request receiving module 201, configured to receive a deployment and control request sent by the security management terminal, where the deployment and control request is generated by the security management terminal when a triggering operation of a user for major event deployment and control is received;
the activity track prediction module 202 is configured to obtain, according to the deployment and control request, multiple alarm records in a preset period before the occurrence time of the major event from the alarm subsystem, determine a target major person in the multiple alarm records, and predict an activity track of the target major person in the occurrence time of the major event;
the early warning position acquisition module 203 is used for acquiring a plurality of early warning positions in a security plan area of the major event from the three-dimensional geographic information subsystem according to the deployment and control request;
a deployment and control position determining module 204, configured to determine, according to the activity track and the plurality of early warning positions, a plurality of deployment and control positions and risk levels of different deployment and control positions in the security and protection pre-plan area;
and the control scheme determining module 205 is configured to determine, according to the plurality of control positions and the risk levels of different control positions, the number of police officers and the equipment of each control position within the occurrence time of the significant event.
Further, the security management system further comprises a key personnel background library in communication connection with the server, and identity information of a plurality of key personnel is recorded in the key personnel background library;
the activity trajectory prediction module 202 includes:
the first alarm record obtaining submodule is used for obtaining a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the deployment and control request, wherein the alarm records are recorded with identity information of the personnel involved in the case;
the first determination submodule of the key personnel is used for matching the identity information of the involved personnel with the identity information of a plurality of key personnel recorded in the key personnel background library to determine target key personnel; wherein the target key personnel are key personnel in a free movement state.
Furthermore, semantic information of historical criminal events of each key person is recorded in the key person background library; the activity trajectory prediction module 202 further comprises:
the second alarm record obtaining submodule is used for obtaining a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the deployment and control request;
the alarm event screening submodule is used for screening the alarm events which accord with preset semantics from the plurality of alarm records;
and the second determination submodule of the key personnel is used for performing semantic matching on the semantic information of the alarm event and the semantic information of the historical criminal event of each key personnel recorded in the background library of the key personnel to determine target key personnel.
Furthermore, the security management system further comprises a skynet subsystem, a special commodity management subsystem and a key personnel background library which are respectively in communication connection with the server, wherein the key personnel background library records identity information of a plurality of key personnel and interpersonal relationships of the key personnel;
the activity trajectory prediction module 202 further comprises:
the information acquisition sub-module is used for acquiring a monitoring record of the target key personnel in a second preset period from the skynet sub-system, acquiring a special commodity purchase record of the target key personnel in the second preset period from the special commodity management sub-system, and acquiring the interpersonal relationship of the target key personnel from the key personnel background library;
the track prediction determining submodule is used for predicting the activity track of the target key personnel in the major event occurrence time according to the monitoring record, the special commodity purchasing record and the interpersonal relationship of the target key personnel;
the second preset time period is a time period from the alarm receiving time of the target key personnel to the occurrence time of the major event.
Further, the activity track comprises a dwell position; the deployment position determining module 204 includes:
the target track screening submodule is used for screening target activity tracks in the security case area from the activity tracks;
the position overlapping judgment submodule is used for judging whether the stopping position in the target activity track is overlapped with the plurality of early warning positions or not;
and the distributed control position grading first sub-module is used for determining the overlapped positions as one type of distributed control positions under the condition that the stop positions in the target activity track are overlapped with the early warning positions, determining the danger level of the one type of distributed control positions as high, taking the non-overlapped stop positions as two types of distributed control positions, determining the danger level of the two types of distributed control positions as medium, taking the non-overlapped early warning positions as three types of distributed control positions, and determining the danger level of the three types of distributed control positions as low.
Furthermore, the number of the target key persons is multiple; the deployment position determining module 204 further includes:
the activity track aggregation sub-module is used for aggregating the target activity tracks of the target key personnel;
and the control position grading second sub-module is used for determining the positions with high aggregation degree in the target activity tracks of the target key personnel as the class of control positions and determining the danger level of the class of control positions as high.
Based on the same inventive concept, another embodiment of the present application provides a readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps in the police officer control method according to any of the above embodiments of the present application.
Based on the same inventive concept, another embodiment of the present application provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and running on the processor, and when the processor executes the computer program, the electronic device implements the steps in the police officer control method according to any of the above embodiments of the present application.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one of skill in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. "and/or" means that either or both of them can be selected. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The above detailed description is given to the police officer control method, apparatus, device and storage medium provided by the present application, and a specific example is applied in the present application to explain the principle and implementation manner of the present application, and the description of the above embodiment is only used to help understanding the method and core ideas of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A police officer control method is characterized by being applied to a security management system, wherein the security management system comprises a server, a three-dimensional geographic information subsystem, an alarm subsystem and a security management terminal, the three-dimensional geographic information subsystem, the alarm subsystem and the security management terminal are respectively in communication connection with the server, and the method comprises the following steps:
the server receives a deployment and control request sent by the security management terminal, wherein the deployment and control request is generated by the security management terminal when a triggering operation of a user for major event deployment and control is received;
the server side obtains a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the control request, determines target key personnel in the alarm records, and predicts the movement track of the target key personnel in the occurrence time of the major event;
the server side acquires a plurality of early warning positions in a security plan area of the major event from the three-dimensional geographic information subsystem according to the deployment and control request;
the server side determines a plurality of deployment and control positions and danger levels of different deployment and control positions in the security protection pre-case area according to the activity track and the plurality of early warning positions;
and the server determines the number of police officers and the equipment of the police officers in each control position within the occurrence time of the major event according to the plurality of control positions and the danger levels of different control positions.
2. The police officer arranging and controlling method according to claim 1, wherein the security management system further comprises a key personnel background library in communication connection with the server, and identity information of a plurality of key personnel is recorded in the key personnel background library;
the server side obtains a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the control request, and the step of determining target key personnel in the alarm records comprises the following steps:
the server side obtains a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the deployment and control request, wherein the alarm records are recorded with identity information of the personnel involved in the case;
the server matches the identity information of the involved personnel with the identity information of a plurality of key personnel recorded in the key personnel background library to determine target key personnel; wherein the target key personnel are key personnel in a free movement state.
3. The police officer arranging and controlling method according to claim 2, wherein semantic information of historical criminal events of each important person is further recorded in the important person background library;
under the condition that the server cannot match the identity information of the involved personnel with the identity information of a plurality of key personnel recorded in the key personnel background library to determine target key personnel, the server acquires a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the deployment request, and the step of determining the target key personnel in the alarm records comprises the following steps:
the server side acquires a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the deployment and control request;
the server side screens alarm events which accord with preset semantics from the alarm records;
and the server performs semantic matching on the semantic information of the alarm event and the semantic information of the historical criminal event of each key person recorded in the key person background library to determine target key persons.
4. The police officer arrangement and control method according to claim 1, wherein the security management system further comprises a skynet subsystem, a special commodity management subsystem and a key personnel background library which are respectively in communication connection with the server, wherein the key personnel background library records identity information of a plurality of key personnel and interpersonal relationships of the key personnel;
the step of predicting the activity track of the target key personnel within the occurrence time of the significant event by the server side comprises the following steps:
the server side acquires a monitoring record of the target key personnel in a second preset period from the skynet subsystem, acquires a special commodity purchasing record of the target key personnel in the second preset period from the special commodity management subsystem, and acquires the interpersonal relationship of the target key personnel from the key personnel background library;
the server predicts the activity track of the target key personnel in the occurrence time of the major event according to the monitoring record, the special commodity purchasing record and the interpersonal relationship of the target key personnel;
the second preset time period is a time period from the alarm receiving time of the target key personnel to the occurrence time of the major event.
5. The police officer arranging and controlling method according to claim 1 or 4, wherein the activity track comprises a stopping position; the step that the server side determines a plurality of deployment and control positions and danger levels of different deployment and control positions in the security protection pre-case area according to the activity track and the plurality of early warning positions comprises the following steps:
the server side screens target activity tracks located in the security pre-case area from the activity tracks;
the server side judges whether the staying position in the target activity track is overlapped with the plurality of early warning positions or not;
if the stopping positions in the target activity track are overlapped with the early warning positions, the server determines the overlapped positions as first-class distribution control positions, determines the danger level of the first-class distribution control positions as high, determines the non-overlapped stopping positions as second-class distribution control positions, determines the danger level of the second-class distribution control positions as medium, determines the non-overlapped early warning positions as third-class distribution control positions, and determines the danger level of the third-class distribution control positions as low.
6. The police officer arranging and controlling method according to claim 5, wherein the target key personnel are a plurality of; after the server screens out the target activity tracks of a plurality of target key personnel, the step of determining a plurality of deployment and control positions and the danger levels of different deployment and control positions in the security and protection pre-plan area by the server according to the activity tracks and the plurality of early warning positions further comprises the following steps:
the server collects target activity tracks of the target key personnel;
and the server determines the positions with high aggregation degree in the target activity tracks of the target key personnel as the class of deployment and control positions, and determines the danger level of the class of deployment and control positions as high.
7. The police officer control device is applied to a security management system, the security management system comprises a server, a three-dimensional geographic information subsystem, an alarm subsystem and a security management terminal, the three-dimensional geographic information subsystem, the alarm subsystem and the security management terminal are respectively in communication connection with the server, the police officer control device is configured at the server, and the police officer control device comprises:
the control deployment request receiving module is used for receiving a control deployment request sent by the security management terminal, wherein the control deployment request is generated by the security management terminal when the security management terminal receives triggering operation of a user for controlling a major event;
the activity track prediction module is used for acquiring a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the deployment and control request, determining target key personnel in the alarm records and predicting the activity track of the target key personnel in the occurrence time of the major event;
the early warning position acquisition module is used for acquiring a plurality of early warning positions in a security plan area of the major event from the three-dimensional geographic information subsystem according to the deployment and control request;
the distribution and control position determining module is used for determining a plurality of distribution and control positions and danger levels of different distribution and control positions in the security and protection pre-case area according to the activity track and the plurality of early warning positions;
and the control scheme determining module is used for determining the number of police officers and the equipment of the police officers in each control position within the occurrence time of the major event according to the plurality of control positions and the danger levels of different control positions.
8. The police officer arrangement and control device of claim 7, wherein the security management system further comprises a key personnel background library in communication connection with the server, and identity information of a plurality of key personnel is recorded in the key personnel background library; the activity trajectory prediction module includes:
the first alarm record obtaining submodule is used for obtaining a plurality of alarm records in a preset period before the occurrence time of the major event from the alarm subsystem according to the deployment and control request, wherein the alarm records are recorded with identity information of the personnel involved in the case;
the first determination submodule of the key personnel is used for matching the identity information of the involved personnel with the identity information of a plurality of key personnel recorded in the key personnel background library to determine target key personnel; wherein the target key personnel are key personnel in a free movement state.
9. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 6.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method according to any of claims 1 to 6 are implemented when the computer program is executed by the processor.
CN202111036216.XA 2021-09-06 2021-09-06 Police officer control method, device, equipment and storage medium Active CN113723694B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111036216.XA CN113723694B (en) 2021-09-06 2021-09-06 Police officer control method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111036216.XA CN113723694B (en) 2021-09-06 2021-09-06 Police officer control method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113723694A CN113723694A (en) 2021-11-30
CN113723694B true CN113723694B (en) 2022-01-18

Family

ID=78681713

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111036216.XA Active CN113723694B (en) 2021-09-06 2021-09-06 Police officer control method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113723694B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115186881B (en) * 2022-06-27 2023-08-01 红豆电信有限公司 Urban safety prediction management method and system based on big data

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103258397A (en) * 2013-04-23 2013-08-21 四川天翼网络服务有限公司 Intelligent skynet public security maintaining and analyzing system
CN104820905A (en) * 2015-05-19 2015-08-05 威海北洋电气集团股份有限公司 Space trajectory big data analysis-based person management and control method and system
CN108052882A (en) * 2017-11-30 2018-05-18 广东云储物联视界科技有限公司 A kind of operating method of intelligent safety defense monitoring system
CN109299642A (en) * 2018-06-08 2019-02-01 嘉兴弘视智能科技有限公司 Logic based on Identification of Images is deployed to ensure effective monitoring and control of illegal activities early warning system and method
CN110209835A (en) * 2019-05-09 2019-09-06 四川九洲电器集团有限责任公司 A kind of method for detecting abnormality and device, computer storage medium and electronic equipment
CN110210651A (en) * 2019-05-09 2019-09-06 四川九洲电器集团有限责任公司 A kind of intelligent security method and device, computer storage medium and electronic equipment
CN110533564A (en) * 2019-06-12 2019-12-03 珠海朋奇科技有限责任公司 Large-scale activity prevention and control management system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6856246B2 (en) * 2001-05-24 2005-02-15 Aot Public Safety Corporation System and methods for automated alarm tracking and billing

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103258397A (en) * 2013-04-23 2013-08-21 四川天翼网络服务有限公司 Intelligent skynet public security maintaining and analyzing system
CN104820905A (en) * 2015-05-19 2015-08-05 威海北洋电气集团股份有限公司 Space trajectory big data analysis-based person management and control method and system
CN108052882A (en) * 2017-11-30 2018-05-18 广东云储物联视界科技有限公司 A kind of operating method of intelligent safety defense monitoring system
CN109299642A (en) * 2018-06-08 2019-02-01 嘉兴弘视智能科技有限公司 Logic based on Identification of Images is deployed to ensure effective monitoring and control of illegal activities early warning system and method
CN110209835A (en) * 2019-05-09 2019-09-06 四川九洲电器集团有限责任公司 A kind of method for detecting abnormality and device, computer storage medium and electronic equipment
CN110210651A (en) * 2019-05-09 2019-09-06 四川九洲电器集团有限责任公司 A kind of intelligent security method and device, computer storage medium and electronic equipment
CN110533564A (en) * 2019-06-12 2019-12-03 珠海朋奇科技有限责任公司 Large-scale activity prevention and control management system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
公安信息多维感知管控平台的设计与应用;孙五东等;《公安信息化》;20190707(第4期);第32-35页 *
风险社会背景下大型活动安保工作优化路径探析;刘晗;《四川警察学院学报》;20191031;第31卷(第5期);第25-30页 *

Also Published As

Publication number Publication date
CN113723694A (en) 2021-11-30

Similar Documents

Publication Publication Date Title
Nagin et al. Deterrence, criminal opportunities, and police
Joh The new surveillance discretion: Automated suspicion, big data, and policing
Maxson et al. “It's getting crazy out there”: Can a civil gang injunction change a community?
Braga et al. Policing crime and disorder hot spots: A randomized controlled trial
CN108777703A (en) A kind of abnormal behaviour processing method and system based on block chain
Koss Leveraging predictive policing algorithms to restore fourth amendment protections in high-crime areas in a post-Wardlow world
US20140004817A1 (en) Cell phone detection and alert information system
US20180315283A1 (en) Method and Information System for Security Intelligence and Alerts
Williams et al. Data-driven Policing: The hardwiring of discriminatory policing practices across Europe.
Mares et al. Evaluating the effectiveness of an acoustic gunshot location system in St. Louis, MO
Marchment et al. Risk factors for violent dissident republican incidents in Belfast: A comparison of bombings and bomb hoaxes
CN113723694B (en) Police officer control method, device, equipment and storage medium
Nancarrow et al. Electronic monitoring in the context of domestic and family violence: Report for the Queensland Department of Justice and Attorney-General
Kennedy et al. The risk in crime
US20180253814A1 (en) System and method for incident validation and ranking using human and non-human data sources
US11600166B1 (en) Occurrence-record driven monitoring system and method of use thereof
Henderson Real-time and historic location surveillance after United States v. Jones: An administrable, mildly mosaic approach
Wormeli Developing policies for countering terrorism
CN112016809A (en) Resident building grading system and method based on intelligent community construction
CN110060437A (en) Regional Management System
Faull How to map violence without police data
McCahill Plural policing and CCTV surveillance
Gowen Remote location monitoring-A supervision strategy to enhance risk control
Murray Landscape review on stop and search in Scotland
Costales et al. Simulation Model in Real-Time Application for Emergency Response Management System using Genetic Algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant