CN113724426A - Multi-dimensional security rule configuration early warning method - Google Patents
Multi-dimensional security rule configuration early warning method Download PDFInfo
- Publication number
- CN113724426A CN113724426A CN202110706025.3A CN202110706025A CN113724426A CN 113724426 A CN113724426 A CN 113724426A CN 202110706025 A CN202110706025 A CN 202110706025A CN 113724426 A CN113724426 A CN 113724426A
- Authority
- CN
- China
- Prior art keywords
- visitor
- early warning
- visitors
- information
- fixed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/08—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Alarm Systems (AREA)
- Image Analysis (AREA)
Abstract
The invention discloses a multi-dimensional security rule configuration early warning method, which comprises the following specific steps: identifying visitors through all video image collecting devices in the area, classifying the visitors, and fixing whether the visitors pay attention to the destinations and the traveling paths of the visitors deviate from the current day or not; the temporary visitor is concerned about whether its travel path deviates from the destination it fills out and stays in a non-destination area for a long time. The invention discloses a method for early warning a fixed visitor and a temporary visitor simultaneously, which is more comprehensive and simpler in operation and calculation.
Description
Technical Field
The invention relates to the technical field of security early warning, in particular to a multi-dimensional security rule configuration early warning method.
Background
In recent years, artificial intelligence is rapidly developed, deep learning is used as a bottom core technology to play a vital role, and more attention is paid. The face recognition technology based on the deep learning neural network is widely applied, and has natural and unique advantages in practical application: the camera is used for directly obtaining the information, so that the identification process can be completed in a non-contact mode, and convenience and rapidness are realized. This means how much face information recognized by the face snapshot machine is converted into effective early warning information. Whether the face photo needs early warning or not, to whom the early warning message is pushed, whether the early warning mode is to flick the screen, push the cell phone or push the interface, what the time of early warning, the place and the scope that need the early warning are, who the object that needs the early warning is, it just needs one set of high-efficient, nimble configurable early warning strategy system to handle this a series of problems.
The existing early warning mode has too low sensitivity, places the focus of attention on strangers, does not pay attention to fixed visitors, and is not comprehensive enough.
Disclosure of Invention
The invention aims to overcome the technical defects and provides a multi-dimensional security rule configuration early warning method.
In order to solve the problems, the technical scheme of the invention is as follows: a multi-dimensional security rule configuration early warning method comprises the following specific steps:
(1) a large amount of video image collecting device are equipped with in this region, and when the visitor got into from certain regional entry, at entrance guard department identification information, divide into two kinds with the visitor through information identification: the fixed visitor and the temporary visitor in the area directly release the fixed visitor, intercept the temporary visitor, inquire and record the access destination and intention of the visitor, synchronously upload the information to the network terminal, and the network terminal marks each visitor and then releases the visitor;
(2) recording the proceeding path of each visitor through all external monitoring equipment in the area, projecting the proceeding path of each visitor onto a building plan of the area, if the proceeding path of a fixed visitor is the proceeding path of the fixed visitor, comparing the personal information of the rest fixed visitors, comparing the personal information with the ordinarily reserved proceeding path, neglecting the higher coincidence degree, listing a yellow early warning list with the lower coincidence degree, paying more attention, if the proceeding path of a temporary visitor, listing the time of each place shot to the visitor at the earliest time and the time of shooting the visitor at the latest time on a stop point of a moving track, comparing the path of the visitor from an entrance to a destination with an actual proceeding path, and listing the red early warning list with the important attention if the important deviation occurs, no deviation exists, neglecting, and the important deviation occurs;
(3) comparing the destinations of the fixed visitors listed in the yellow early warning list in the step (2) with the personal information, deleting the fixed visitors from the yellow early warning list if the destinations are consistent with the personal information, and moving the fixed visitors into a red early warning list if the destinations are inconsistent with the personal information;
(4) and (3) the visitors who are listed in the red early warning list in the steps (2) and (3) adopt monitoring equipment to watch the real-time image, after watching the image, security personnel find no abnormality, delete the visitors from the red early warning list, find abnormal behaviors, generate a buzz alarm through an early warning device on the nearby monitoring equipment, inform security personnel who patrol in the area to arrive at the position in time, if the visitors with the abnormal behaviors are fixed visitors, the network terminal contacts the patrol personnel and simultaneously contacts relevant units in the area, and if the visitors with the abnormal behaviors are temporary visitors, the network terminal contacts the patrol personnel and simultaneously sends the facial information of the visitors to the nearby police station.
As an improvement, the video image collecting device in step (1) comprises a camera arranged outside the building in the area, a camera arranged in a public space inside the building, a security robot performing automatic cruising in the area, a license plate recognizer and a face recognizer at an entrance and an exit, and a camera worn on patrol security personnel, and the video image collecting device is connected with a network terminal.
As an improvement, when information is identified at a entrance guard in the step (1), license plate and face information need to be identified when a driver enters, face information needs to be identified by other people, and information such as access purposes can be uploaded to a network terminal in a voice input mode.
As an improvement, the personal information of the fixed visitor in the step (2) needs to be updated by the relevant units in the area in time.
As an improvement, the personal information of the fixed visitor in the step (2) includes a change of work unit, a change of vehicle, and face information collected regularly.
As an improvement, the regularly collected face information is optimized at three month intervals.
As an improvement, in the step (4), when the security personnel watches the real-time image, the influence uploaded to the screen by the network terminal may be to frame the head of the visitor with a rectangular frame, and display the label on the rectangular frame.
Compared with the prior art, the invention has the advantages that: the invention discloses a method for early warning a fixed visitor and a temporary visitor simultaneously, which is more comprehensive and simpler in operation and calculation.
Detailed Description
The present invention is further described below by way of specific examples, but the present invention is not limited to only the following examples. Variations, combinations, or substitutions of the invention, which are within the scope of the invention or the spirit, scope of the invention, will be apparent to those of skill in the art and are within the scope of the invention.
A multi-dimensional security rule configuration early warning method comprises the following specific steps:
(1) a large amount of video image collecting device are equipped with in this region, and when the visitor got into from certain regional entry, at entrance guard department identification information, divide into two kinds with the visitor through information identification: the fixed visitor and the temporary visitor in the area directly release the fixed visitor, intercept the temporary visitor, inquire and record the access destination and intention of the visitor, synchronously upload the information to the network terminal, and the network terminal marks each visitor and then releases the visitor;
(2) recording the proceeding path of each visitor through all external monitoring equipment in the area, projecting the proceeding path of each visitor onto a building plan of the area, if the proceeding path of a fixed visitor is the proceeding path of the fixed visitor, comparing the personal information of the rest fixed visitors, comparing the personal information with the ordinarily reserved proceeding path, neglecting the higher coincidence degree, listing a yellow early warning list with the lower coincidence degree, paying more attention, if the proceeding path of a temporary visitor, listing the time of each place shot to the visitor at the earliest time and the time of shooting the visitor at the latest time on a stop point of a moving track, comparing the path of the visitor from an entrance to a destination with an actual proceeding path, and listing the red early warning list with the important attention if the important deviation occurs, no deviation exists, neglecting, and the important deviation occurs;
(3) comparing the destinations of the fixed visitors listed in the yellow early warning list in the step (2) with the personal information, deleting the fixed visitors from the yellow early warning list if the destinations are consistent with the personal information, and moving the fixed visitors into a red early warning list if the destinations are inconsistent with the personal information;
(4) and (3) the visitors who are listed in the red early warning list in the steps (2) and (3) adopt monitoring equipment to watch the real-time image, after watching the image, security personnel find no abnormality, delete the visitors from the red early warning list, find abnormal behaviors, generate a buzz alarm through an early warning device on the nearby monitoring equipment, inform security personnel who patrol in the area to arrive at the position in time, if the visitors with the abnormal behaviors are fixed visitors, the network terminal contacts the patrol personnel and simultaneously contacts relevant units in the area, and if the visitors with the abnormal behaviors are temporary visitors, the network terminal contacts the patrol personnel and simultaneously sends the facial information of the visitors to the nearby police station.
The video image collecting equipment in the step (1) comprises a camera arranged outside the building in the area, a camera arranged in a public space inside the building, a security robot performing automatic cruise in the area, a license plate recognizer and a face recognizer at an entrance and an exit, and a camera worn on patrol security personnel, wherein the video image collecting equipment is connected with a network terminal.
When the entrance guard identifies information in the step (1), license plate and face information need to be identified when a driver enters the entrance guard, face information needs to be identified by other personnel, and information such as access purposes can be uploaded to a network terminal in a voice input mode.
The personal information of the fixed visitor in the step (2) needs to be updated in time by the relevant units in the area.
The personal information of the fixed visitor in the step (2) includes a change in work units, a change in vehicles, and face information collected periodically.
The regularly collected facial information is optimized at three month intervals.
And (4) when the security personnel watch the real-time image in the step (4), the influence uploaded to the screen by the network terminal can frame the head of the visitor by adopting a rectangular frame, and the label of the visitor is displayed on the rectangular frame.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the present invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (7)
1. A multi-dimensional security rule configuration early warning method is characterized by comprising the following specific steps:
(1) a large amount of video image collecting device are equipped with in this region, and when the visitor got into from certain regional entry, at entrance guard department identification information, divide into two kinds with the visitor through information identification: the fixed visitor and the temporary visitor in the area directly release the fixed visitor, intercept the temporary visitor, inquire and record the access destination and intention of the visitor, synchronously upload the information to the network terminal, and the network terminal marks each visitor and then releases the visitor;
(2) recording the proceeding path of each visitor through all external monitoring equipment in the area, projecting the proceeding path of each visitor onto a building plan of the area, if the proceeding path of a fixed visitor is the proceeding path of the fixed visitor, comparing the personal information of the rest fixed visitors, comparing the personal information with the ordinarily reserved proceeding path, neglecting the higher coincidence degree, listing a yellow early warning list with the lower coincidence degree, paying more attention, if the proceeding path of a temporary visitor, listing the time of each place shot to the visitor at the earliest time and the time of shooting the visitor at the latest time on a stop point of a moving track, comparing the path of the visitor from an entrance to a destination with an actual proceeding path, and listing the red early warning list with the important attention if the important deviation occurs, no deviation exists, neglecting, and the important deviation occurs;
(3) comparing the destinations of the fixed visitors listed in the yellow early warning list in the step (2) with the personal information, deleting the fixed visitors from the yellow early warning list if the destinations are consistent with the personal information, and moving the fixed visitors into a red early warning list if the destinations are inconsistent with the personal information;
(4) and (3) the visitors who are listed in the red early warning list in the steps (2) and (3) adopt monitoring equipment to watch the real-time image, after watching the image, security personnel find no abnormality, delete the visitors from the red early warning list, find abnormal behaviors, generate a buzz alarm through an early warning device on the nearby monitoring equipment, inform security personnel who patrol in the area to arrive at the position in time, if the visitors with the abnormal behaviors are fixed visitors, the network terminal contacts the patrol personnel and simultaneously contacts relevant units in the area, and if the visitors with the abnormal behaviors are temporary visitors, the network terminal contacts the patrol personnel and simultaneously sends the facial information of the visitors to the nearby police station.
2. The method for multi-dimensional security rule configuration early warning according to claim 1, wherein the method comprises the following steps: the video image collecting equipment in the step (1) comprises a camera arranged outside the building in the area, a camera arranged in a public space inside the building, a security robot performing automatic cruise in the area, a license plate recognizer and a face recognizer at an entrance and an exit, and a camera worn on patrol security personnel, wherein the video image collecting equipment is connected with a network terminal.
3. The method for multi-dimensional security rule configuration early warning according to claim 1, wherein the method comprises the following steps: when the entrance guard identifies information in the step (1), license plate and face information need to be identified when a driver enters the entrance guard, face information needs to be identified by other personnel, and information such as access purposes can be uploaded to a network terminal in a voice input mode.
4. The method for multi-dimensional security rule configuration early warning according to claim 1, wherein the method comprises the following steps: the personal information of the fixed visitor in the step (2) needs to be updated in time by the relevant units in the area.
5. The method for multi-dimensional security rule configuration early warning according to claim 1, wherein the method comprises the following steps: the personal information of the fixed visitor in the step (2) includes a change in work units, a change in vehicles, and face information collected periodically.
6. The method for multi-dimensional security rule configuration early warning according to claim 5, wherein the method comprises the following steps: the regularly collected facial information is optimized at three month intervals.
7. The method for multi-dimensional security rule configuration early warning according to claim 1, wherein the method comprises the following steps: and (4) when the security personnel watch the real-time image in the step (4), the influence uploaded to the screen by the network terminal can frame the head of the visitor by adopting a rectangular frame, and the label of the visitor is displayed on the rectangular frame.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110706025.3A CN113724426A (en) | 2021-06-24 | 2021-06-24 | Multi-dimensional security rule configuration early warning method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110706025.3A CN113724426A (en) | 2021-06-24 | 2021-06-24 | Multi-dimensional security rule configuration early warning method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113724426A true CN113724426A (en) | 2021-11-30 |
Family
ID=78672930
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110706025.3A Pending CN113724426A (en) | 2021-06-24 | 2021-06-24 | Multi-dimensional security rule configuration early warning method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113724426A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106056516A (en) * | 2016-05-31 | 2016-10-26 | 杭州致峰网络科技有限公司 | Monitoring method and monitoring system |
CN108460674A (en) * | 2018-02-01 | 2018-08-28 | 平安科技(深圳)有限公司 | Information processing method, device, computer equipment and storage medium |
CN109285261A (en) * | 2018-12-05 | 2019-01-29 | 广州顺维电子科技有限公司 | A kind of visitor's centralized management system based on big data |
CN110428087A (en) * | 2019-06-25 | 2019-11-08 | 万翼科技有限公司 | Business stability prediction technique, device, computer equipment and storage medium |
CN110443109A (en) * | 2019-06-11 | 2019-11-12 | 万翼科技有限公司 | Abnormal behaviour monitor processing method, device, computer equipment and storage medium |
CN110689693A (en) * | 2019-09-25 | 2020-01-14 | 中国建设银行股份有限公司 | Path monitoring method, device, equipment and storage medium |
CN111145514A (en) * | 2019-12-27 | 2020-05-12 | 中通服公众信息产业股份有限公司 | Multi-dimensional early warning strategy method |
CN111400424A (en) * | 2020-03-17 | 2020-07-10 | 北京明略软件系统有限公司 | GIS-based automatic identification method and device for abnormal gathering of people |
CN211979798U (en) * | 2020-06-05 | 2020-11-20 | 国家电网有限公司 | Information operation and maintenance personnel behavior compliance linkage early warning system |
-
2021
- 2021-06-24 CN CN202110706025.3A patent/CN113724426A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106056516A (en) * | 2016-05-31 | 2016-10-26 | 杭州致峰网络科技有限公司 | Monitoring method and monitoring system |
CN108460674A (en) * | 2018-02-01 | 2018-08-28 | 平安科技(深圳)有限公司 | Information processing method, device, computer equipment and storage medium |
CN109285261A (en) * | 2018-12-05 | 2019-01-29 | 广州顺维电子科技有限公司 | A kind of visitor's centralized management system based on big data |
CN110443109A (en) * | 2019-06-11 | 2019-11-12 | 万翼科技有限公司 | Abnormal behaviour monitor processing method, device, computer equipment and storage medium |
CN110428087A (en) * | 2019-06-25 | 2019-11-08 | 万翼科技有限公司 | Business stability prediction technique, device, computer equipment and storage medium |
CN110689693A (en) * | 2019-09-25 | 2020-01-14 | 中国建设银行股份有限公司 | Path monitoring method, device, equipment and storage medium |
CN111145514A (en) * | 2019-12-27 | 2020-05-12 | 中通服公众信息产业股份有限公司 | Multi-dimensional early warning strategy method |
CN111400424A (en) * | 2020-03-17 | 2020-07-10 | 北京明略软件系统有限公司 | GIS-based automatic identification method and device for abnormal gathering of people |
CN211979798U (en) * | 2020-06-05 | 2020-11-20 | 国家电网有限公司 | Information operation and maintenance personnel behavior compliance linkage early warning system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103248534B (en) | Safeguard system for kindergarten | |
WO2019238142A2 (en) | Vehicle monitoring system and vehicle monitoring method | |
CN109996182B (en) | Positioning method, device and system based on combination of UWB positioning and monitoring | |
CN105741560A (en) | Vehicle identification method used for gas station | |
CN112738468B (en) | Safety early warning method for intelligent park | |
CN113128418A (en) | Campus intelligent monitoring system and method for recognizing abnormity in monitoring | |
WO2009058043A1 (en) | Traffic monitoring system | |
CN112712600B (en) | Parking lot mobile duty system and method based on mobile Internet of things | |
KR100719298B1 (en) | Detection Method and Its System of Parking Violation Vehicle, Arrangement Vehicle, Signal Violation Vehicle and Parking Violation Vehicle | |
CN108197801A (en) | Site staff's management method and system and method based on visualized presence monitoring system | |
CN112216010A (en) | Campus security management method, system, equipment and storage medium | |
CN112306051A (en) | Robot system for unmanned traffic police vehicle on highway | |
CN112132048A (en) | Community patrol analysis method and system based on computer vision | |
Desai et al. | Accident detection using ml and ai techniques | |
CN114092868B (en) | Human-vehicle traceability monitoring management system and method | |
CN115169777A (en) | Intelligent supervision system for safety operation | |
CN104269061B (en) | Yellow label car detection and management system and detection and management method based on network | |
CN114187681A (en) | Intelligent cloud security management and control system | |
CN112330960A (en) | Multidimensional data acquisition system | |
CN113724426A (en) | Multi-dimensional security rule configuration early warning method | |
TWI607323B (en) | Method and system for vehicle data integration | |
KR101395095B1 (en) | Auto searching system to search car numbers | |
KR101686851B1 (en) | Integrated control system using cctv camera | |
CN106530711A (en) | Video image intelligent traffic analysis method for high-speed vehicle | |
KR102496003B1 (en) | Integrated safety management system for children school bus and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20211130 |
|
RJ01 | Rejection of invention patent application after publication |