CN114173284A - Visitor management method and device, electronic equipment and medium - Google Patents

Visitor management method and device, electronic equipment and medium Download PDF

Info

Publication number
CN114173284A
CN114173284A CN202111593845.2A CN202111593845A CN114173284A CN 114173284 A CN114173284 A CN 114173284A CN 202111593845 A CN202111593845 A CN 202111593845A CN 114173284 A CN114173284 A CN 114173284A
Authority
CN
China
Prior art keywords
visitor
area
module
target
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111593845.2A
Other languages
Chinese (zh)
Inventor
骆伯俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202111593845.2A priority Critical patent/CN114173284A/en
Publication of CN114173284A publication Critical patent/CN114173284A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2491Intrusion detection systems, i.e. where the body of an intruder causes the interference with the electromagnetic field
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management

Abstract

The utility model provides a visitor management method, which relates to the technical field of visitor management and can be used in the financial field or other fields. The visitor management method comprises the following steps: determining the position of the visited person; dividing the activity area of the visitor into a target area, a restricted area and a forbidden area according to the position of the visitor; binding a mobile terminal with the visitor, and determining the position of the visitor according to the position of the mobile terminal; and taking emergency measures when the residence time of the visitor in the restricted area exceeds the preset residence time or the visitor enters the prohibited area. The present disclosure also provides a visitor management apparatus, device, storage medium, and program product.

Description

Visitor management method and device, electronic equipment and medium
Technical Field
The present disclosure relates to the field of visitor management technology, and may also be used in the financial field or other fields, and in particular, to a visitor management method, apparatus, electronic device, and medium.
Background
At present, a unit such as a bank often has people of other units to visit and deal with business negotiation work. Because the bank office building has important data such as valuable property such as office computers, hard disks, files and archives, and infrastructure such as networks and electric power, the movable area of the visitor needs to be strictly limited, so as to prevent the visitor from entering the important area, and the bank is damaged by intention or mistake. However, currently, after the outside officer enters the bank office building, there is no good management means except for the traditional manual registration and signature confirmation of the visited person. Meanwhile, since the access areas of the visitors are not divided and managed, the positions of the visitors in the office building cannot be effectively positioned, and outside unit personnel can randomly arrive at other areas of the building after visiting the visited persons, even can leave the important areas of the bank by supposing the names of the visitors, thereby bringing possible risk hazards such as theft or damaged facilities to the bank and affecting financial security.
Disclosure of Invention
In view of the above, the present disclosure provides a visitor management method, apparatus, electronic device, and medium.
A first aspect of the present disclosure provides a visitor management method, including: determining the position of the visited person; dividing the activity area of the visitor into a target area, a restricted area and a forbidden area according to the position of the visitor; binding a mobile terminal with the visitor, and determining the position of the visitor according to the position of the mobile terminal; and taking emergency measures when the residence time of the visitor in the restricted area exceeds the preset residence time or the visitor enters the prohibited area.
According to an embodiment of the present disclosure, the method further comprises: acquiring first face information of the visitor; when the mobile terminal is located in a camera shooting area, second face information at the position of the mobile terminal is obtained; and taking emergency measures under the condition that the first face information is inconsistent with the second face information.
According to an embodiment of the present disclosure, the confinement region includes m sub-confinement regions, each of the m sub-confinement regions having its corresponding preset dwell time, where m ≧ 1.
According to an embodiment of the present disclosure, the method further comprises: determining a preset access time of the visitor; and when the visit time of the visitor in the target area exceeds the preset visit time, taking emergency measures.
According to an embodiment of the present disclosure, the method further comprises: obtaining an access record for the visitor based on the visitor's location, the access time, and the dwell time.
According to the embodiment of the disclosure, the emergency measure includes controlling the mobile terminal to send out an alarm and/or notify a manager.
According to an embodiment of the present disclosure, the method further comprises: determining a target floor and a target indicator lamp according to the position of the visited person; controlling the elevator to reach the target floor when the visitor is within the elevator; and controlling the target indicator light to light up when the visitor is at the target floor.
According to an embodiment of the present disclosure, the target indication lamp includes a route indication lamp for indicating a route to a location of the visited person and a location indication lamp for indicating a location of the visited person.
A second aspect of the present disclosure provides a visitor management apparatus, including: the target module is used for determining the position of the visited person; the division module is used for dividing the activity area of the visitor into a target area, a restricted area and a forbidden area according to the position of the visitor; the positioning module is used for binding the mobile terminal with the visitor and determining the position of the visitor in the activity area according to the position of the mobile terminal; the first alarm module is used for taking emergency measures when the staying time of the visitor in the limited area exceeds the preset staying time; and the second alarm module is used for taking emergency measures when the visitor enters the forbidden area.
According to an embodiment of the present disclosure, the apparatus further comprises: the first acquisition module is used for acquiring first face information of the visitor; the second acquisition module is used for acquiring second face information at the position of the mobile terminal when the mobile terminal is positioned in the camera shooting area; and the third alarm module is used for taking emergency measures under the condition that the first face information is inconsistent with the second face information.
According to an embodiment of the present disclosure, the apparatus further comprises: the indicating module is used for determining a target floor and a target indicating lamp according to the position of the visited person; a landing control module for controlling the elevator to reach the target floor when the visitor is in the elevator; and the indicator light module is used for controlling the target indicator light to be lightened when the visitor is at the target floor.
A third aspect of the present disclosure provides an electronic device, comprising: one or more processors; a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the guest management method described above.
A fourth aspect of the present disclosure also provides a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the above-described guest management method.
A fifth aspect of the present disclosure also provides a computer program product comprising a computer program which, when executed by a processor, implements the guest management method described above.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be apparent from the following description of embodiments of the disclosure, which proceeds with reference to the accompanying drawings, in which:
FIG. 1 schematically illustrates an application scenario diagram of a guest management method, apparatus, device, medium and program product according to embodiments of the present disclosure;
FIG. 2 schematically shows a flow diagram of a guest management method according to an embodiment of the present disclosure;
FIG. 3 schematically shows a block diagram of a guest management apparatus according to an embodiment of the present disclosure;
fig. 4 schematically shows a block diagram of a structure of a face recognition apparatus according to an embodiment of the present disclosure;
fig. 5 schematically shows a block diagram of a path indicating device according to an embodiment of the present disclosure; and
figure 6 schematically shows a block diagram of an electronic device adapted to implement a guest management method according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
It should be noted that the method and apparatus determined by the present disclosure may be used for visitor management in the financial field, and may also be used for visitor management in any field other than the financial field.
In the technical scheme of the disclosure, the acquisition, storage, application and the like of the personal information of the related user all accord with the regulations of related laws and regulations, necessary security measures are taken, and the customs of the public order is not violated.
An embodiment of the present disclosure provides a visitor management method, including: determining the position of the visited person; dividing the activity area of the visitor into a target area, a restricted area and a forbidden area according to the position of the visitor; binding a mobile terminal with the visitor, and determining the position of the visitor according to the position of the mobile terminal; and taking emergency measures when the residence time of the visitor in the restricted area exceeds the preset residence time or the visitor enters the prohibited area.
Fig. 1 schematically illustrates an application scenario diagram of a guest management method, apparatus, device, medium, and program product according to embodiments of the present disclosure. It should be noted that fig. 1 is only an example of an application scenario in which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, but does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the application scenario 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104 and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as shopping-like applications, web browser applications, search-like applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to bracelets, smart phones, tablets, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the guest management method provided by the embodiment of the present disclosure may be generally performed by the server 105. Accordingly, the guest management apparatus provided by the embodiments of the present disclosure may be generally provided in the server 105. The visitor management method provided by the embodiments of the present disclosure may also be performed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the visitor management apparatus provided by the embodiment of the present disclosure may also be provided in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The guest management method of the disclosed embodiment will be described in detail through fig. 2 to 6 based on the scenario described in fig. 1.
Figure 2 schematically shows a flow chart of a guest management method according to an embodiment of the present disclosure.
As shown in fig. 2, the guest management method of this embodiment includes operations S201 to S204.
In operation S201, a location of a visited person is determined.
In operation S202, an activity area of a visitor is divided into a target area, a restricted area, and a prohibited area according to a location of the visitor.
Wherein, a management terminal can be set up at an entrance of a building where visitor management is required. When the external person visits and registers the visited person on the management terminal, the management server automatically generates an electronic fence of a normal area in the peripheral area of the position of the visited person, and the electronic fence is used for limiting and managing the activity area of the external person. The area within the electronic fence is the target area, where visitors can move freely. When the passenger protection device is located in a limited area or a prohibited area, corresponding emergency measures can be triggered due to the fact that the passenger protection device is located outside the electronic fence. The restricted area belongs to a relatively forbidden area, and the access authority and the residence time of the restricted area can be adjusted according to the actual situation, such as the areas of an elevator, a corridor and the like. The prohibited area is an area where visitors are absolutely prohibited from entering, such as a machine room, an electric room, and a filing room.
In operation S203, a mobile terminal is bound with the visitor, and a location of the visitor is determined according to the location of the mobile terminal. Wherein, mobile terminal internally mounted has a positioning module, and positioning module includes but not limited to bluetooth positioning module, wireless positioning module and sound wave positioning module etc. and all modules that can be used for the location can all use, and this disclosure does not do the restriction to this. After the mobile terminal is bound with the visitor, the management server can judge the position of the visitor according to the position of the mobile terminal, and then limits the activity area of the visitor.
It should be noted that the mobile terminal may be in the form of a bracelet, a work card, or a handheld device, and any device that can be conveniently bound with a visitor may be used, which is not limited in this disclosure.
In operation S204, when the visitor stays in the restricted area for more than a preset stay time or the visitor enters the prohibited area, an emergency measure is taken.
Take the mobile terminal of bracelet form as an example, this bracelet adopts bluetooth orientation module. Wherein, bluetooth module contains unique identification number (MAC address), can contain the broadcast signal of MAC address to the bluetooth gateway transmission of outside, through RSSI bluetooth signal strength and triangulation location principle, fixes a position visitor bracelet, and positioning accuracy can be within 1 meter, realizes carrying out operations such as accurate location and tracking to external personnel. When the foreign person visits, the management terminal of the registration department registers the visited person and the expected visited time, the face information is input, the visitor bracelet is received, and the management terminal of the registration department binds the identification number of the visitor bracelet. The visitor bracelet is worn by the external person, the external person normally arrives at the position of the visited person, after the visit is completed, the visited person passes the visited person at the visited person management terminal, the external person normally returns to the entrance of the building, the visitor bracelet is returned, and the visitor bracelet identification number is unbound by the registration department management terminal. Bluetooth gateways are reasonably distributed in the building to realize the full coverage of signal reception in the building, and a vector map of the building has a known coordinate position. The bluetooth gateway passes through the bluetooth communication mode and is connected with visitor's bracelet, receives the broadcast signal of visitor's bracelet. The Bluetooth gateway is internally provided with a WIFI module, can be connected with a management server through a wireless network, and forwards related operation instruction information sent by the management server to the visitor bracelet. Specifically, when the visitor bracelet enters the coverage of the bluetooth gateway, the bluetooth gateway scans and acquires the broadcast signal sent by the bluetooth module on the visitor bracelet, and acquires the RSSI bluetooth signal strength value and the identification number (MAC address) of the visitor-proof bracelet at the same time. Under same identification number (MAC address), the RSSI bluetooth signal strength value of at least three bluetooth gateway takes place for management server through the built-in WIFI module of bluetooth gateway, and management server can calculate the position that reachs visitor's bracelet promptly through with RSSI bluetooth signal strength value conversion distance value and according to the triangle location principle this moment. After the position of the bracelet is determined, the management server can judge the position of the visitor according to the position of the bracelet, and then judge whether the visitor is located in a target area, a restricted area or a forbidden area. When the visitor appears in a restricted area or a prohibited area, emergency measures can be taken to avoid causing major accidents.
Through the visitor management method of the embodiment of the disclosure, the position of the visitor can be determined at any time, the activity area of the visitor is conveniently and effectively managed and limited, the access process is scientifically and effectively managed, major accidents caused by random activities of the visitor are avoided, and the safety and the convenience of visitor management are improved.
According to an embodiment of the present disclosure, the method further comprises: acquiring first face information of the visitor; when the mobile terminal is located in a camera shooting area, second face information at the position of the mobile terminal is obtained; and taking emergency measures under the condition that the first face information is inconsistent with the second face information.
Since the location of the visitor is determined by the location of the mobile terminal, it is necessary to ensure that the visitor cannot privately unbind or replace the mobile terminal in order to ensure accurate location of the visitor's location. Therefore, it is required to confirm whether information of the visitor bound to the mobile terminal is identical to the initially registered visitor information through the management server during the visitor access. The determination can be made by face recognition techniques. For example, a management terminal at a registration place is provided with a camera, and initial face information of a foreign person can be acquired. Then, the consistency of the face information is judged as long as the visitor appears in the camera shooting area, and the judgment can be carried out at regular intervals, wherein the interval time can be adjusted according to the actual situation. Illustratively, camera guns can be reasonably distributed in a building, and no camera dead angle is caused in a public area. The camera shooting gun is a horizontal 360-degree vertical 90-degree cloud deck spherical high-definition camera shooting gun, can realize mobile detection tracking and face recognition capturing, and sends face information captured by the camera shooting gun through the Ethernet and the management server. The camera area range of each camera gun is distributed in a quadrangle in a vector map of a building, and four end points of the quadrangle have four known coordinate positions. Specifically, after the position of the visitor bracelet is determined, namely the xy coordinate position in the building vector map is determined, the management server extracts the face information captured and identified by the camera gun in the camera area range corresponding to the bracelet at regular intervals, compares the face information with the face information input by the bracelet at the registration place, if the comparison is successful, the identity of the visitor is normal, if the comparison is unsuccessful, the identity of the visitor is suspected, immediately automatically sends out an alarm to the management server, and a worker can check the video playback to perform corresponding processing. Thereby can ensure that bracelet and bracelet wearing people's face information keep unanimous, realize that exotic personnel's identity uniformity carries out intelligent authentication.
According to an embodiment of the present disclosure, the confinement region includes m sub-confinement regions, each of the m sub-confinement regions having its corresponding preset dwell time, where m ≧ 1.
In practical situations, visitors, in order to reach the visited location, inevitably need to enter some public areas, such as stairways, stairwells, elevators; meanwhile, in the access process, a specific functional area such as a tea room or a toilet needs to be accessed. In order to reduce false alarm and make the visitor management mode more scientific and intelligent, the limit area needs to be divided, the limit area can be divided into a certain number of sub-limit areas according to the actual situation, and a certain preset stay time is specified for each sub-limit area. In particular, the restricted area may be subdivided into a first sub-restricted area, including corridors, stairwells, elevators, etc.; and a second sub-restricted area including a tea room, a toilet room, and the like. Wherein the preset residence time of the first sub-restriction area is 15 minutes, and the preset residence time of the second sub-restriction area is 30 minutes. Emergency measures are triggered only when the visitor is within the first restricted area and stays for longer than 15 minutes. And similarly, when the visitor is in the second limited area and the staying time exceeds 30 minutes, the emergency measures are triggered. Thereby, scientific and effective management of the restricted area can be realized.
It should be noted that the number of the limiting areas and the preset retention time are only exemplary, and those skilled in the art can adjust the limiting areas and the preset retention time according to specific situations in practical application to achieve reasonable division.
According to an embodiment of the present disclosure, the method further comprises: determining a preset access time of the visitor; and when the visit time of the visitor in the target area exceeds the preset visit time, taking emergency measures. The visitor needs to register the expected access time while registering the visitor at the management terminal of the registration office. When the actual access time exceeds the preset access time, emergency measures can be taken. At this time, if the visited person judges that the continuous operation is still needed, the management server can be accessed through the visited person terminal, and the proper access time is set and prolonged in the access time control module.
According to an embodiment of the present disclosure, the method further comprises: and obtaining the visitor-proof access record based on the visitor-proof position, the visit time and the stay time. The management server can record the track path of the external personnel in the bank office building and the time of staying in each area, and provides data basis for subsequent statistics and examination.
According to the embodiment of the disclosure, the emergency measure includes controlling the mobile terminal to send out an alarm and/or notify a manager. The mobile terminal can include the warning module inside, specifically can include LED and miniature vibrations components and parts, when needs take emergency measures, can control mobile terminal and send out flashing light and vibrations alarm. Meanwhile, the manager of the building can be informed to take further measures according to the needs. Wherein the visitor's entry into the restricted area and the prohibited area may take different emergency measures. For example, when the staying time of the visitor in the restricted area exceeds the preset staying time of the restricted area, the alarm can be sent out through the bracelet to remind the visitor to leave the restricted area as soon as possible. When the visitor got into when banning the region like computer lab, archives room etc. during, can take emergency measures rapidly, direct notice managers goes to and looks over the condition, under this kind of condition, can judge whether need the bracelet to remind according to actual need, managers can set up at management terminal.
According to the embodiment of the disclosure, the mobile terminal comprises the micro battery inside, so that power can be supplied to the mobile terminal, and long-time cruising is realized.
According to an embodiment of the present disclosure, the method further comprises: determining a target floor and a target indicator lamp according to the position of the visited person; controlling the elevator to reach the target floor when the visitor is within the elevator; and controlling the target indicator light to light up when the visitor is at the target floor.
According to an embodiment of the present disclosure, the target indication lamp includes a route indication lamp for indicating a route to a location of the visited person and a location indication lamp for indicating a location of the visited person.
Specifically, when the visited person is determined, that is, the floor and seat information of the visited person is determined, the management server may design a path from the management terminal to the seat of the visited person. Specifically, after the management server detects that an external person enters the elevator through the mobile device, the elevator control module can automatically light the floor indicator lamp of the visited person and control the elevator to automatically arrive at the target floor. After the positioning server detects that the foreign person arrives at the floor of the visited person, the indicating lamp module can automatically light the indicating lamp of the visited person, and meanwhile, after the positioning server detects that the foreign person is at the specific position of the floor channel, the indicating lamp module can automatically light the indicating lamp nearby, so that the foreign person is guided to travel according to the indicated direction, and clear path indication is provided for the foreign person and the foreign person is guided to rapidly arrive at the position of the visited person.
Based on the visitor management method, the disclosure also provides a visitor management device. The apparatus will be described in detail below with reference to fig. 3.
Fig. 3 schematically shows a block diagram of a guest management apparatus according to an embodiment of the present disclosure.
As shown in fig. 3, the guest management apparatus 300 of this embodiment includes a target module 310, a division module 320, a location module 330, a first alarm module 340, and a second alarm module 350.
The target module 310 is used to determine the location of the visited person. In an embodiment, the target module 310 may be configured to perform the operation S201 described above, which is not described herein again.
The dividing module 320 is used for dividing the activity area of the visitor into a target area, a restricted area and a forbidden area according to the position of the visitor. In an embodiment, the dividing module 320 may be configured to perform the operation S202 described above, which is not described herein again.
The positioning module 330 is configured to bind the mobile terminal with the visitor, and determine a location of the visitor in the activity area according to the location of the mobile terminal. In an embodiment, the positioning module 330 may be configured to perform the operation S203 described above, which is not described herein again.
And the first alarm module 340 is used for taking emergency measures when the residence time of the visitor in the restricted area exceeds the preset residence time. In an embodiment, the first alarm module 340 may be configured to perform the operation S204 described above, which is not described herein again.
A second alarm module 350, configured to take emergency measures when the visitor enters the prohibited area. In an embodiment, the second alarm module 350 may be configured to perform the operation S204 described above, and is not described herein again.
Fig. 4 schematically shows a block diagram of a structure of a face recognition apparatus according to an embodiment of the present disclosure.
As shown in fig. 4, according to the embodiment of the present disclosure, the apparatus 300 further includes a face recognition apparatus 400, and the face recognition apparatus 400 includes a first obtaining module 410, a second obtaining module 420, and a third warning module 430.
A first obtaining module 410, configured to obtain first face information of the visitor;
a second obtaining module 420, configured to obtain second face information at the position of the mobile terminal when the mobile terminal is located in the image capturing area; and
and the third alarm module 430 takes emergency measures when the first face information is inconsistent with the second face information.
Fig. 5 schematically shows a block diagram of a path indicating apparatus according to an embodiment of the present disclosure.
As shown in fig. 5, according to an embodiment of the present disclosure, the apparatus 300 further includes an indication apparatus 500, and the indication apparatus 500 includes an indication module 510, a ladder control module 520, and an indication lamp module 530.
An indication module 510, configured to determine a target floor and a target indicator light according to the location of the visited person;
a landing control module 520 for controlling the elevator to reach the target floor when the visitor is in the elevator; and
an indicator light module 530 for controlling the target indicator light to be turned on when the visitor is at the target floor.
According to the visitor management method and device disclosed by the embodiment of the disclosure, visitors entering an outside unit of a building are positioned in real time and face recognition, tracking and comparison are carried out, identity consistency of the visitors is intelligently identified, residence areas and residence time of the visitors are strictly managed, effectiveness of visiting time periods is managed, the positions and visiting processes of the visitors are accurately mastered in real time, the visitors are effectively prevented from randomly arriving at other non-visited areas, and related risk hazards are eliminated. In addition, through real-time localization tracking, intelligent control and indication functions are utilized to provide clear path indication for the foreign people and guide the foreign people to quickly arrive at the position of the visited person.
According to the embodiment of the present disclosure, any plurality of the target module 310, the dividing module 320, the positioning module 330, the first alarm module 340 and the second alarm module 350 may be combined into one module to be implemented, or any one of them may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the target module 310, the dividing module 320, the positioning module 330, the first alarm module 340, and the second alarm module 350 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or in any one of three implementations of software, hardware, and firmware, or in any suitable combination of any of them. Alternatively, at least one of the goal module 310, the partitioning module 320, the positioning module 330, the first alarm module 340, and the second alarm module 350 may be implemented at least in part as computer program modules that, when executed, may perform corresponding functions.
Figure 6 schematically shows a block diagram of an electronic device adapted to implement a guest management method according to an embodiment of the present disclosure.
As shown in fig. 6, an electronic device 600 according to an embodiment of the present disclosure includes a processor 601, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. Processor 601 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 601 may also include onboard memory for caching purposes. Processor 601 may include a single processing unit or multiple processing units for performing different actions of a method flow according to embodiments of the disclosure.
In the RAM603, various programs and data necessary for the operation of the electronic apparatus 600 are stored. The processor 601, the ROM602, and the RAM603 are connected to each other via a bus 604. The processor 601 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM602 and/or RAM 603. It is to be noted that the programs may also be stored in one or more memories other than the ROM602 and RAM 603. The processor 601 may also perform various operations of the method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
Electronic device 600 may also include input/output (I/O) interface 605, input/output (I/O) interface 605 also connected to bus 604, according to an embodiment of the disclosure. The electronic device 600 may also include one or more of the following components connected to the I/O interface 605: an input portion 606 including a keyboard, a mouse, and the like; an output portion 607 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The driver 610 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that a computer program read out therefrom is mounted in the storage section 608 as necessary.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM602 and/or RAM603 described above and/or one or more memories other than the ROM602 and RAM 603.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the method illustrated in the flow chart. The program code is for causing a computer system to perform the methods of the embodiments of the disclosure when the computer program product is run on the computer system.
The computer program performs the above-described functions defined in the system/apparatus of the embodiments of the present disclosure when executed by the processor 601. The systems, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In one embodiment, the computer program may be hosted on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed in the form of a signal on a network medium, downloaded and installed through the communication section 609, and/or installed from the removable medium 611. The computer program containing program code may be transmitted using any suitable network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 609, and/or installed from the removable medium 611. The computer program, when executed by the processor 601, performs the above-described functions defined in the system of the embodiments of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In accordance with embodiments of the present disclosure, program code for executing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, these computer programs may be implemented using high level procedural and/or object oriented programming languages, and/or assembly/machine languages. The programming language includes, but is not limited to, programming languages such as Java, C + +, python, the "C" language, or the like. The program code may execute entirely on the user computing device, partly on the user device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.

Claims (14)

1. A visitor management method, comprising:
determining the position of the visited person;
dividing the activity area of the visitor into a target area, a restricted area and a forbidden area according to the position of the visitor;
binding a mobile terminal with the visitor, and determining the position of the visitor according to the position of the mobile terminal; and
and when the residence time of the visitor in the restricted area exceeds the preset residence time or the visitor enters the prohibited area, taking emergency measures.
2. The method of claim 1, further comprising:
acquiring first face information of the visitor;
when the mobile terminal is located in a camera shooting area, second face information at the position of the mobile terminal is obtained; and
and taking emergency measures under the condition that the first face information is inconsistent with the second face information.
3. The method of claim 1, wherein the confinement region comprises m sub-confinement regions, each of the m sub-confinement regions having its corresponding preset dwell time,
wherein m is more than or equal to 1.
4. The method of claim 1, further comprising:
determining a preset access time of the visitor; and
and when the visit time of the visitor in the target area exceeds the preset visit time, taking emergency measures.
5. The method of claim 4, further comprising:
obtaining an access record for the visitor based on the visitor's location, the access time, and the dwell time.
6. The method according to any of claims 1-5, wherein the emergency measures comprise controlling the mobile terminal to issue an alarm and/or to notify a manager.
7. The method of claim 1, further comprising:
determining a target floor and a target indicator lamp according to the position of the visited person;
controlling the elevator to reach the target floor when the visitor is within the elevator; and
and when the visitor is at the target floor, controlling the target indicator lamp to light up.
8. The method of claim 7, wherein the target indicator light comprises a route indicator light for indicating a route to the location of the visited person and a location indicator light for indicating the location of the visited person.
9. A visitor management apparatus, comprising:
the target module is used for determining the position of the visited person;
the division module is used for dividing the activity area of the visitor into a target area, a restricted area and a forbidden area according to the position of the visitor;
the positioning module is used for binding the mobile terminal with the visitor and determining the position of the visitor in the activity area according to the position of the mobile terminal;
the first alarm module is used for taking emergency measures when the residence time of the passenger-proof in the limited area exceeds the preset residence time; and
and the second alarm module is used for taking emergency measures when the visitor enters the forbidden area.
10. The apparatus of claim 9, further comprising:
the first acquisition module is used for acquiring first face information of the visitor;
the second acquisition module is used for acquiring second face information at the position of the mobile terminal when the mobile terminal is positioned in the camera shooting area; and
and the third alarm module is used for taking emergency measures under the condition that the first face information is inconsistent with the second face information.
11. The apparatus of claim 9, further comprising:
the indicating module is used for determining a target floor and a target indicating lamp according to the position of the visited person;
a landing control module for controlling the elevator to reach the target floor when the visitor is in the elevator; and
and the indicator light module is used for controlling the target indicator light to be lightened when the visitor is at the target floor.
12. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-8.
13. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method of any one of claims 1 to 8.
14. A computer program product comprising a computer program which, when executed by a processor, implements a method according to any one of claims 1 to 8.
CN202111593845.2A 2021-12-23 2021-12-23 Visitor management method and device, electronic equipment and medium Pending CN114173284A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111593845.2A CN114173284A (en) 2021-12-23 2021-12-23 Visitor management method and device, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111593845.2A CN114173284A (en) 2021-12-23 2021-12-23 Visitor management method and device, electronic equipment and medium

Publications (1)

Publication Number Publication Date
CN114173284A true CN114173284A (en) 2022-03-11

Family

ID=80487959

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111593845.2A Pending CN114173284A (en) 2021-12-23 2021-12-23 Visitor management method and device, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN114173284A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112668762A (en) * 2020-12-17 2021-04-16 深圳市富思源智慧消防股份有限公司 Visitor navigation method and system based on fire evacuation indication terminal and terminal
CN112804240A (en) * 2021-01-19 2021-05-14 深圳市天彦通信股份有限公司 Function control method, device, server, storage medium and product

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112668762A (en) * 2020-12-17 2021-04-16 深圳市富思源智慧消防股份有限公司 Visitor navigation method and system based on fire evacuation indication terminal and terminal
CN112804240A (en) * 2021-01-19 2021-05-14 深圳市天彦通信股份有限公司 Function control method, device, server, storage medium and product

Similar Documents

Publication Publication Date Title
US10715653B2 (en) Systems and methods for providing geolocation services
US10958341B2 (en) Systems and methods for providing geolocation services in a mobile-based crowdsourcing platform
US9195866B1 (en) Systems and methods for tracking subjects
US10269255B2 (en) Unmanned aircraft systems and methods
Mitchell et al. Hajj crowd management and navigation system: People tracking and location based services via integrated mobile and RFID systems
CN103338350B (en) Construction transportation safety supervisory systems
US8862159B2 (en) Business process oriented navigation
KR101648827B1 (en) System for providing event real time location based and method for managing mobile device using the same
EP3195239A1 (en) Regulation via geofence boundary segment crossings
KR101152239B1 (en) Mobile service system with a space information structure and method thereof
Corral-De-Witt et al. From E-911 to NG-911: Overview and challenges in Ecuador
CN208143488U (en) indoor Bluetooth positioning system
Al Mamari et al. IoT based smart parking and traffic management system for middle east college
Luschi et al. Designing and developing a mobile application for indoor real-time positioning and navigation in healthcare facilities
KR102274108B1 (en) Method and computer readable storage medium to operate parking lot for monitoring designated vehicles
CN114173284A (en) Visitor management method and device, electronic equipment and medium
KR102034143B1 (en) Method and application for judgement of fake gps location information
CN112070936B (en) Pedestrian target identification monitoring method and system
KR101612003B1 (en) Method for providing travel information and procuring travel safety
US11263716B2 (en) Rendering digitized services in a smart environment
Li et al. Building/environment data/information system for fine-scale indoor location specific services
US20220335810A1 (en) Method and system for locating one or more users in an emergency
KR20160072361A (en) The method and device for protecting infant and evaluating bevavior of infant and The method and device for tracking infant based on network
KR102580367B1 (en) Control method for the access control system for visitors to apartment house
Lahti et al. Bluetooth beacon enabled mobility services and opportunities in public transit

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination