CN114419823A - Visitor management method and device - Google Patents

Visitor management method and device Download PDF

Info

Publication number
CN114419823A
CN114419823A CN202111603585.2A CN202111603585A CN114419823A CN 114419823 A CN114419823 A CN 114419823A CN 202111603585 A CN202111603585 A CN 202111603585A CN 114419823 A CN114419823 A CN 114419823A
Authority
CN
China
Prior art keywords
target
visitor
information
request
preset area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111603585.2A
Other languages
Chinese (zh)
Inventor
杨凯
唐畅
肖玄
李睿
周围
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Dahengqin Technology Development Co Ltd
Original Assignee
Zhuhai Dahengqin Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Dahengqin Technology Development Co Ltd filed Critical Zhuhai Dahengqin Technology Development Co Ltd
Priority to CN202111603585.2A priority Critical patent/CN114419823A/en
Publication of CN114419823A publication Critical patent/CN114419823A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/33Services specially adapted for particular environments, situations or purposes for indoor environments, e.g. buildings

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Alarm Systems (AREA)

Abstract

The embodiment of the invention provides a visitor management method and a visitor management device, which are applied to a visitor system, wherein the visitor system is connected with intelligent equipment in an intelligent building, and the visitor management method comprises the following steps: acquiring first image data acquired by intelligent equipment aiming at a preset area, and determining target user information of a target visitor entering the preset area according to the first image data; judging whether target visitor request information aiming at the target user information exists or not; the target visitor request information includes a target request access area; when target visitor request information aiming at target user information exists, judging whether a preset area belongs to a target access request area or not; and when the preset area does not belong to the target access request area, initiating visitor intrusion warning information. By the embodiment of the invention, the visitor entering the intelligent building is monitored by the visitor system, and the visitor is warned when the visitor is identified to enter the area which is not allowed to enter, so that the visitor entering the intelligent building is monitored and managed.

Description

Visitor management method and device
Technical Field
The invention relates to the technical field of security protection, in particular to a visitor management method and a visitor management device.
Background
In order to facilitate management of visitors entering a building or an enterprise, a manager of the building or the enterprise registers visitor information and opens an access control after registration to allow the visitors to enter the building or the enterprise.
However, the existing visitor system can only manage the visitor entering, but is difficult to manage after the visitor enters a building or an enterprise; for example: visitors may promote or move to areas where visitors cannot enter, thereby affecting users within a building or enterprise.
Therefore, how to monitor visitors who have entered a building or a business and determine whether the visitors enter an illegal access area is an urgent problem to be solved by the visitor system.
Disclosure of Invention
In view of the above, it is proposed to provide a guest management method and apparatus that overcomes or at least partially solves the above problems, comprising:
a visitor management method is applied to a visitor system, the visitor system is connected with intelligent equipment in an intelligent building, and the method comprises the following steps:
acquiring first image data acquired by intelligent equipment aiming at a preset area, and determining target user information of a target visitor entering the preset area according to the first image data;
judging whether target visitor request information aiming at the target user information exists or not; the target visitor request information includes a target request access area;
when target visitor request information aiming at target user information exists, judging whether a preset area belongs to a target access request area or not;
when the preset area does not belong to the target access request area, initiating visitor intrusion warning information;
and when the preset area belongs to the target access request area, executing the step of acquiring first image data acquired by the intelligent equipment aiming at the preset area.
Optionally, the target visitor request information further includes a target request access time period, and when the preset area belongs to the target request access area, the method further includes:
acquiring the current system time of a visitor system;
judging whether the current system time is in a target request access time period or not;
and when the current system time is not within the target request access time period, initiating visitor intrusion warning information.
Optionally, the step of determining whether the preset area belongs to the access request area includes:
determining floor information of a preset area;
judging whether the floor information of the preset area belongs to the target access request floor information or not;
when the floor information where the preset area is located belongs to the target access request floor information, judging that the preset area belongs to the target access request area;
and when the floor information where the preset area is located does not belong to the target access request floor information, judging that the preset area does not belong to the target access request area.
Optionally, the target user information includes target facial feature information, and determining whether there is a target visitor request information for the target user information includes:
the method comprises the steps of obtaining visitor request information received by a visitor system and aiming at a target time period;
when the visitor request information matched with the target facial feature information does not exist in the visitor request information in the preset access time period, judging that the target visitor request information aiming at the target user information does not exist;
when there is guest request information matching the target facial feature information among the guest request information for a preset access period, it is determined that there is target guest request information for the target user information.
Optionally, the method further comprises:
when the preset area belongs to a target access request area, acquiring second image data acquired by the intelligent equipment aiming at a target visitor corresponding to the target user information;
determining the current behavior information of the target visitor according to the second image data;
and when the current behavior information meets the preset abnormal behavior event, initiating visitor intrusion warning information.
Optionally, initiating guest intrusion alert information, comprising:
generating visitor intrusion warning information according to the position information and the target user information of the preset area;
and displaying the visitor intrusion warning information.
Optionally, the method further comprises:
acquiring third image data, which are acquired by the intelligent equipment aiming at a target user corresponding to the target user information;
and generating and saving the travel track information of the target user according to the third image data.
The embodiment of the invention also provides a visitor management device, which is applied to a visitor system, the visitor system is connected with the intelligent equipment in the intelligent building, and the visitor management device comprises:
the user information determining module is used for acquiring first image data acquired by the intelligent equipment aiming at a preset area and determining target user information of a target visitor entering the preset area according to the first image data;
the first judgment module is used for judging whether target visitor request information aiming at the target user information exists or not; the target visitor request information includes a target request access area;
the second judgment module is used for judging whether the preset area belongs to a target access request area or not when target visitor request information aiming at the target user information exists;
the first warning module is used for initiating visitor intrusion warning information when the preset area does not belong to the target access request area;
the user information determining module is further used for acquiring first image data acquired by the intelligent device aiming at the preset area when the preset area belongs to the target access request area.
The embodiment of the invention also provides a server, which comprises a processor, a memory and a computer program which is stored on the memory and can run on the processor, wherein when the computer program is executed by the processor, the visitor management method is realized.
The embodiment of the invention also provides a computer readable storage medium, a computer program is stored on the computer readable storage medium, and the visitor management method is realized when the computer program is executed by a processor.
The embodiment of the invention has the following advantages:
in the embodiment of the invention, the visitor system can acquire first image data acquired by the intelligent equipment aiming at a preset area, and determine the target user information of a target visitor entering the preset area according to the first image data; judging whether target visitor request information aiming at the target user information exists or not; the target visitor request information includes a target request access area; when target visitor request information aiming at target user information exists, judging whether a preset area belongs to a target access request area or not; and when the preset area does not belong to the target access request area, initiating visitor intrusion warning information. By the embodiment of the invention, the visitor entering the intelligent building is monitored by the visitor system, and the visitor is warned when the visitor is identified to enter the area which is not allowed to enter, so that the visitor entering the intelligent building is monitored and managed.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings needed to be used in the description of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a flowchart illustrating the steps of a method for guest management according to an embodiment of the present invention;
FIG. 2 is a flow chart of steps in another method of guest management according to an embodiment of the present invention;
fig. 3 is a block diagram of a guest management apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a flowchart illustrating steps of a visitor management method according to an embodiment of the present invention is shown, where the visitor management method is applied to a visitor system, and the visitor system is connected to an intelligent device in an intelligent building;
specifically, the method may include the steps of:
step 101, acquiring first image data acquired by intelligent equipment aiming at a preset area, and determining target user information of a target visitor entering the preset area according to the first image data;
therein, a smart device may refer to a device deployed in a smart building that is controlled by a guest system, such as: the intelligent building image acquisition system can be an intelligent vending machine, an intelligent locker, an intelligent monitoring camera device and the like, the intelligent device is a device with an image acquisition function, and the image acquisition function can be controlled by a visitor system, so that image data of different areas in the intelligent building can be acquired under the control of the visitor system.
In practical application, after the visitor enters the intelligent building, the visitor system can call the intelligent device to monitor the visitor entering the intelligent building, so that the visitor entering the intelligent building can be monitored.
Specifically, the visitor system can divide different areas in the intelligent building, wherein the preset area can be any area in the intelligent building, and can also be an area needing important monitoring in the intelligent building, for example: financial-related areas, data-storage-related areas, etc., as embodiments of the present invention are not limited in this respect.
Therefore, the visitor system can call the intelligent equipment to acquire the first image data in the preset area; after the first image data aiming at the preset area are collected, the intelligent building can send the first image data to the visitor system in real time, so that the visitor system can monitor visitors entering the preset area based on the first image data.
After the visitor system acquires the first image data, the visitor system can identify the first image data so as to acquire target user information of a target visitor entering a preset area; the target user information may include characteristic information characterizing the target guest, such as: face feature information, etc., which are not limited in this respect in the embodiments of the present invention.
Step 102, judging whether target visitor request information aiming at target user information exists or not; the target visitor request information includes a target request access area;
in practical applications, before entering the smart building, the visitor may submit a visitor request message in the visitor system, where the visitor request message may include user information of the visitor, such as: the facial feature information can also comprise a request access area to be accessed; of course, other information may also be included, such as: access time, etc., which are not limited in this respect by the embodiments of the present invention.
Therefore, after the visitor system determines the target user information of the target visitor entering the preset area, the visitor system can determine whether the visitor system has received the target visitor request information corresponding to the target user information.
Specifically, after receiving access request information submitted by a visitor, a visitor system can store the access request information and user information of the visitor into a database; then, when the visitor system needs to determine whether the visitor system has previously received the target visitor request information corresponding to the target user information, whether the target visitor request information corresponding to the target user information exists can be judged by searching whether the access request information matched with the target user information exists in the database.
If the access request information matched with the target user information is found in the database, the target visitor request information aiming at the target user information can be represented; if the access request information matched with the target user information is not found in the database, it may indicate that the target visitor request information for the target user information does not exist.
103, judging whether a preset area belongs to a target access request area or not when target visitor request information aiming at target user information exists;
when the visitor system determines that the target visitor of the target user information requests information, the visitor system may determine that the target visitor entering the preset area is a visitor who has submitted a request in the visitor system.
Then, the visitor system may submit a target request to access the area when determining whether the preset area belongs to a target visitor corresponding to the target user information and submitting the target visitor request information, so as to determine whether the target visitor entering the preset area is allowed to enter the preset area.
If the preset area belongs to the target access request area, the target visitor entering the preset area can be shown to be allowed to enter the preset area; if the preset area does not belong to the target request access area, it may indicate that the target visitor entering the preset area is not allowed to enter the preset area.
104, when the preset area does not belong to the target access request area, initiating visitor intrusion warning information;
when it is determined that the preset area does not belong to the target access request area, it may indicate that the target visitor entering the preset area enters an area not allowed to enter; at the moment, the visitor system can generate visitor intrusion warning information and send the visitor intrusion warning information to the corresponding display equipment for displaying so as to remind a manager to process the intrusion behavior of the target visitor, and therefore the visitor system can automatically monitor the visitor entering the intelligent building based on the image data.
And 105, when the preset area belongs to the target access request area, executing the step of acquiring first image data acquired by the intelligent device aiming at the preset area.
When it is determined that the preset area belongs to the target access request area, it may indicate that a target visitor entering the preset area enters an area allowed to enter; at this time, step 101 may be re-executed, which is not limited in this embodiment of the present invention.
In the embodiment of the invention, the visitor system can acquire first image data acquired by the intelligent equipment aiming at a preset area, and determine the target user information of a target visitor entering the preset area according to the first image data; judging whether target visitor request information aiming at the target user information exists or not; the target visitor request information includes a target request access area; when target visitor request information aiming at target user information exists, judging whether a preset area belongs to a target access request area or not; and when the preset area does not belong to the target access request area, initiating visitor intrusion warning information. By the embodiment of the invention, the visitor entering the intelligent building is monitored by the visitor system, and the visitor is warned when the visitor is identified to enter the area which is not allowed to enter, so that the visitor entering the intelligent building is monitored and managed.
Referring to fig. 2, a flowchart illustrating steps of another method for managing a guest according to an embodiment of the present invention is shown, including the steps of:
step 201, acquiring first image data acquired by an intelligent device aiming at a preset area, and determining target user information of a target visitor entering the preset area according to the first image data, wherein the target user information comprises target facial feature information;
the visitor system can divide different areas in the intelligent building, wherein the preset area can be any area in the intelligent building, and can also be an area needing important monitoring in the intelligent building, for example: financial-related areas, data-storage-related areas, etc., as embodiments of the present invention are not limited in this respect.
Therefore, the visitor system can call the intelligent equipment to acquire the first image data in the preset area; after the first image data aiming at the preset area are collected, the intelligent building can send the first image data to the visitor system in real time, so that the visitor system can monitor visitors entering the preset area based on the first image data.
After the visitor system acquires the first image data, the visitor system can identify the first image data, so that target facial feature information of a target visitor entering a preset area is acquired.
Step 202, obtaining visitor request information received by a visitor system in a target time period;
the visitor system can also acquire visitor request information in a target time period, which is received by the visitor system, when determining target facial feature information of a target visitor entering a preset area; the target time period may be determined based on the current system time, for example: the current system time is 1/2021 and 12:00:03, and the target time period may be 8:00-22:00 of 1/2021, which is not limited in this embodiment of the present invention.
The guest request information for the target time period may be obtained by the guest system from a database based on the current system time; the database may have stored therein all access request information received by the guest system.
Step 203, when the visitor request information matched with the target facial feature information does not exist in the visitor request information in the target time period, judging that the target visitor request information aiming at the target user information does not exist;
after judging that the visitor request information aiming at the target visitor in the target time period does not exist, the visitor system can further judge that the visitor system does not receive the target visitor request information aiming at the current time period and submitted by the target visitor entering the preset area; namely, the target visitor entering the preset area does not normally enter the intelligent building through the visitor system.
As an example, if it is determined that there is no target visitor request message for the target user information, the guest system may also generate a visitor intrusion warning message and send the message to a corresponding display device for display, so as to remind a manager to handle the intrusion behavior of the target visitor.
The guest system may then re-execute step 201, which is not limited in this embodiment of the present invention.
Step 204, when the visitor request information matched with the target facial feature information exists in the visitor request information in the target time period, judging that the target visitor request information aiming at the target user information exists;
after the visitor system judges that the visitor request information matched with the target facial feature information of the target visitor entering the preset area exists in the visitor request information aiming at the target time period, the visitor system can further judge that the visitor system receives the visitor request information aiming at the target visitor in the current time period and submitted by the target visitor entering the preset area; namely, the target visitor entering the preset area normally enters the intelligent building through the visitor system.
The guest system may then proceed to step 205.
Step 205, the target access request area comprises target access request floor information, and when target visitor request information aiming at target user information exists, the floor information of the preset area is determined;
the destination access request floor information may refer to information corresponding to a floor to be accessed selected by a destination visitor, for example: layer 18.
In practical applications, the visitor system may determine floor information taken by a preset area when it is determined that there is a target visitor request message for the target user message.
Step 206, judging whether the floor information of the preset area belongs to the target access request floor information;
then, the visitor system can judge whether the floor information of the preset area is included in the target access request floor information; for example: the destination request floor information is [ 18 th to 20 th ] and the floor information of the preset area is [ 15 th ], it can be determined that the floor information of the preset area does not belong to the destination request access floor information.
Step 207, when the floor information of the preset area belongs to the target access request floor information, judging that the preset area belongs to the target access request area;
when the floor information of the preset area is judged to belong to the target access request floor information, the floor where a target visitor entering the preset area goes can be shown, namely the floor selected by the target visitor when the target visitor submits the target visitor request information in advance, and the current access of the target visitor is normal access; at this time, the guest system may determine that the preset area belongs to the target request access area.
When it is determined that the preset area belongs to the target request access area, the guest system may re-execute step 201, which is not limited in this embodiment of the present invention.
In an embodiment of the present invention, in order to further monitor a target visitor, a normally accessed target visitor may also be monitored through the following steps:
when the preset area belongs to a target access request area, acquiring second image data acquired by the intelligent equipment aiming at a target visitor corresponding to the target user information; determining the current behavior information of the target visitor according to the second image data; and when the current behavior information meets the preset abnormal behavior event, initiating visitor intrusion warning information.
After the visitor system judges that the preset area belongs to the target access request area, second image data acquired by a target visitor corresponding to the user target user information can be acquired, and whether the target visitor has abnormal behaviors or not is monitored based on the second image data.
Specifically, the guest system may recognize the second image data, and determine current behavior information corresponding to the current behavior of the target guest based on the recognition result, for example: the current behavior information may be determined by human recognition techniques.
Then, the visitor system can match the current behavior information with the behavior information in the preset abnormal behavior event; if the behavior information in the preset abnormal behavior information is matched with the current behavior information, it can be indicated that the current behavior of the target visitor is abnormal, and the current behavior information meets the preset abnormal behavior event.
At this time, the visitor system can also generate visitor intrusion warning information and send the visitor intrusion warning information to the corresponding display device for display so as to remind a manager to process the abnormal behavior of the target visitor.
The guest system may then re-execute step 201, which is not limited in this embodiment of the present invention.
Step 208, when the floor information of the preset area does not belong to the target access request floor information, judging that the preset area does not belong to the target access request area;
when the floor information of the preset area is judged not to belong to the target access request floor information, the floor where a target visitor entering the preset area goes can be shown, and is not the floor selected by the target visitor when the target visitor previously submits the request information, and the current access of the target visitor is abnormal; at this time, the guest system may determine that the preset area does not belong to the target requested access area.
The guest system may then proceed to step 209.
Step 209, when the preset area does not belong to the target access request area, generating visitor intrusion warning information according to the position information of the preset area and the target user information;
when the guest system determines that the preset area does not belong to the target access request area, the guest system may generate a guest intrusion warning message according to the location information and the target user information of the preset area, for example: a graphics-text-driven visitor intrusion alert message carrying a facial image of the target user and a text of "please note that there is an intrusion in area a" may be generated.
And step 210, displaying visitor intrusion warning information.
Then, the visitor system may present the visitor intrusion alert message on a corresponding display screen to prompt the manager to proceed with the process.
The guest may fill in an access time period when submitting access request information, such as: 14:00-15:30, when the visitor is still in the smart building for more than this period of time, the visitor may be considered to have intrusion behavior. Therefore, in order to discover the intrusion behavior in time, the embodiment of the present invention may further include the following steps:
the target visitor request information also comprises a target request access time period, and when the preset area belongs to the target request access area, the current system time of the visitor system is obtained; judging whether the current system time is in a target request access time period or not; and when the current system time is not within the target request access time period, initiating visitor intrusion warning information.
When the guest system determines that the preset area belongs to the target access request area, the current time of the guest system can be obtained again, and the target request access time period can be obtained from the target access request information.
The guest system may then determine whether the current system time is within the target requested access time period, thereby determining whether the target guest has exceeded its previously submitted target requested access time period and is still resident within the smart building.
If the current system time is within the target request access time period, it may indicate that the target guest is still currently normally accessed; but may indicate that the target guest is currently in abnormal access if the current system time is not within the target request access time period.
When the current system time is not in the target request access time period, the visitor system can generate visitor intrusion warning information and send the visitor intrusion warning information to the corresponding display equipment for display so as to remind a manager to process the intrusion behavior of the target visitor.
In an embodiment of the present invention, the method may further include the following steps:
acquiring third image data acquired by the intelligent equipment aiming at a target visitor corresponding to the target user information; and generating and saving the traveling track information aiming at the target visitor according to the third image data.
In practical application, the visitor system can also store the traveling track of the target visitor in the database, so that when a problem occurs, the traveling track information of the target visitor can be called from the database to troubleshoot the problem.
Specifically, the visitor system may obtain, from the smart device, third image data acquired by the smart device for a target visitor corresponding to the target user information.
Then, the visitor system may generate path trajectory information of the target visitor from the third image data and store it in the database. In the embodiment of the invention, the visitor system can acquire first image data acquired by the intelligent equipment aiming at a preset area, and determine target user information of a target visitor entering the preset area according to the first image data, wherein the target user information comprises target facial feature information; the method comprises the steps of obtaining visitor request information received by a visitor system and aiming at a target time period; when visitor request information matched with the target facial feature information exists in the visitor request information in the target time period, judging that target visitor request information aiming at the target user information exists; the target access request area comprises target access request floor information, and when target visitor request information aiming at target user information exists, the floor information where the preset area is located is determined; judging whether the floor information of the preset area belongs to the target access request floor information or not; when the floor information of the preset area does not belong to the target access request floor information, judging that the preset area does not belong to the target access request area; when the preset area does not belong to the target access request area, generating visitor intrusion warning information according to the position information of the preset area and the target user information; and displaying the visitor intrusion warning information. By the embodiment of the invention, the visitor entering the intelligent building is monitored by the visitor system, and the visitor is warned when the visitor is identified to enter the area which is not allowed to enter, so that the visitor entering the intelligent building is monitored and managed.
In addition, warning information is generated based on the position information and the user information, and management personnel can conveniently and accurately track and process the abnormal visitor.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Referring to fig. 3, a schematic structural diagram of a visitor management apparatus according to an embodiment of the present invention is shown, and the visitor management apparatus is applied to a visitor system, where the visitor system is connected to a smart device in a smart building;
specifically, the following modules may be included:
the user information determining module 301 is configured to acquire first image data acquired by the intelligent device for a preset area, and determine target user information of a target visitor entering the preset area according to the first image data;
a first determining module 302, configured to determine whether there is a target visitor request message for target user information; the target visitor request information includes a target request access area;
a second judging module 303, configured to, when there is target visitor request information for the target user information, judge whether the preset area belongs to a target request access area;
a first warning module 304, configured to initiate visitor intrusion warning information when the preset area does not belong to the target request access area;
the user information determining module 301 is further configured to, when the preset area belongs to the target access request area, obtain first image data acquired by the intelligent device for the preset area.
In an embodiment of the present invention, the target guest request information further includes a target request access time period, and the apparatus further includes:
the second warning module is used for acquiring the current system time of the visitor system when the preset area belongs to the target access request area; judging whether the current system time is in a target request access time period or not; and when the current system time is not within the target request access time period, initiating visitor intrusion warning information.
In an embodiment of the present invention, the target access request area includes target access request floor information, and the second determining module 303 includes:
the floor determining submodule is used for determining floor information of a preset area;
the floor judgment submodule is used for judging whether the floor information of the preset area belongs to the target access floor information or not;
the first judgment submodule is used for judging that the preset area belongs to the target access request area when the floor information where the preset area is located belongs to the target access request floor information;
and the second judgment submodule is used for judging that the preset area does not belong to the target access request area when the floor information where the preset area is located does not belong to the target access request floor information.
In an embodiment of the present invention, the target user information includes target facial feature information, and the first determining module 302 includes:
the request information acquisition submodule is used for acquiring visitor request information received by the visitor system in a target time period;
a third determination sub-module, configured to determine that there is no target visitor request information for the target user information when there is no visitor request information matching the target facial feature information in the visitor request information for the preset access time period;
and the fourth judgment sub-module is used for judging that target visitor request information aiming at the target user information exists when the visitor request information matched with the target facial feature information exists in the visitor request information aiming at the preset access time period.
In an embodiment of the present invention, the apparatus further includes:
the third warning module is used for acquiring second image data acquired by the intelligent equipment aiming at a target visitor corresponding to the target user information when the preset area belongs to the target access request area; determining the current behavior information of the target visitor according to the second image data; and when the current behavior information meets the preset abnormal behavior event, initiating visitor intrusion warning information.
In an embodiment of the present invention, the first warning module 304 includes:
the warning information generation submodule is used for generating visitor intrusion warning information according to the position information and the target user information of the preset area;
and the warning information display submodule is used for displaying visitor intrusion warning information.
In an embodiment of the present invention, the apparatus further includes:
the storage module is used for acquiring third image data, which are acquired by the intelligent equipment aiming at a target user corresponding to the target user information; and generating and saving the travel track information of the target user according to the third image data.
In the embodiment of the invention, the visitor system can acquire first image data acquired by the intelligent equipment aiming at a preset area, and determine the target user information of a target visitor entering the preset area according to the first image data; judging whether target visitor request information aiming at the target user information exists or not; the target visitor request information includes a target request access area; when target visitor request information aiming at target user information exists, judging whether a preset area belongs to a target access request area or not; and when the preset area does not belong to the target access request area, initiating visitor intrusion warning information. By the embodiment of the invention, the visitor entering the intelligent building is monitored by the visitor system, and the visitor is warned when the visitor is identified to enter the area which is not allowed to enter, so that the visitor entering the intelligent building is monitored and managed.
The embodiment of the invention also provides a server, which comprises a processor, a memory and a computer program which is stored on the memory and can run on the processor, wherein when the computer program is executed by the processor, the visitor management method is realized.
The embodiment of the invention also provides a computer readable storage medium, a computer program is stored on the computer readable storage medium, and the visitor management method is realized when the computer program is executed by a processor.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The visitor management method and device provided above are introduced in detail, and a specific example is applied in this document to explain the principle and the implementation of the present invention, and the description of the above embodiment is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A visitor management method, applied to a visitor system connected to a smart device in a smart building, the method comprising:
acquiring first image data acquired by the intelligent equipment aiming at a preset area, and determining target user information of a target visitor entering the preset area according to the first image data;
judging whether target visitor request information aiming at the target user information exists or not; the target visitor request information comprises a target request access area;
when target visitor request information aiming at the target user information exists, judging whether a preset area belongs to the target request access area or not;
when the preset area does not belong to the target access request area, initiating visitor intrusion warning information;
and when the preset area belongs to the target access request area, executing the step of acquiring first image data acquired by the intelligent equipment aiming at the preset area.
2. The method of claim 1, wherein the target guest request information further includes a target request access time period, and when the preset area belongs to the target request access area, the method further comprises:
acquiring the current system time of the visitor system;
judging whether the current system time is in the target request access time period or not;
and when the current system time is not in the target request access time period, initiating visitor intrusion warning information.
3. The method of claim 1, wherein the target access request area includes target access request floor information, and wherein the determining whether the preset area belongs to the access request area includes:
determining floor information of the preset area;
judging whether the floor information of the preset area belongs to the target access request floor information or not;
when the floor information of the preset area belongs to the target access request floor information, judging that the preset area belongs to the target access request area;
and when the floor information where the preset area is located does not belong to the target access request floor information, judging that the preset area does not belong to the target access request area.
4. The method of claim 1, wherein the target user information includes target facial feature information, and wherein the determining whether target visitor request information exists for the target user information comprises:
obtaining visitor request information received by the visitor system and aiming at a target time period;
when the visitor request information matched with the target facial feature information does not exist in the visitor request information in the preset access time period, judging that target visitor request information aiming at the target user information does not exist;
when the visitor request information matched with the target facial feature information exists in the visitor request information aiming at the preset access time period, judging that target visitor request information aiming at the target user information exists.
5. The method of claim 1, further comprising:
when the preset area belongs to the target access request area, acquiring second image data acquired by the intelligent equipment aiming at a target visitor corresponding to the target user information;
determining current behavior information of the target visitor according to the second image data;
and when the current behavior information meets a preset abnormal behavior event, initiating visitor intrusion warning information.
6. The method of claim 1, wherein the initiating guest intrusion alert information comprises:
generating visitor intrusion warning information according to the position information of the preset area and the target user information;
and displaying the visitor intrusion warning information.
7. The method according to any one of claims 1-6, further comprising:
acquiring third image data, which are acquired by the intelligent equipment aiming at a target user corresponding to the target user information;
and generating and storing the traveling track information aiming at the target user according to the third image data.
8. A visitor management apparatus, for use in a visitor system connected to a smart device in a smart building, the apparatus comprising:
the user information determining module is used for acquiring first image data acquired by the intelligent equipment aiming at a preset area and determining target user information of a target visitor entering the preset area according to the first image data;
the first judgment module is used for judging whether target visitor request information aiming at the target user information exists or not; the target visitor request information comprises a target request access area;
the second judgment module is used for judging whether a preset area belongs to the target request access area or not when target visitor request information aiming at the target user information exists;
the first warning module is used for initiating visitor intrusion warning information when the preset area does not belong to the target access request area;
the user information determining module is further configured to acquire first image data acquired by the intelligent device for a preset area when the preset area belongs to the target access request area.
9. A server comprising a processor, a memory, and a computer program stored on the memory and executable on the processor, the computer program when executed by the processor implementing the guest management method of any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, implements the guest management method of any one of claims 1 to 7.
CN202111603585.2A 2021-12-24 2021-12-24 Visitor management method and device Pending CN114419823A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111603585.2A CN114419823A (en) 2021-12-24 2021-12-24 Visitor management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111603585.2A CN114419823A (en) 2021-12-24 2021-12-24 Visitor management method and device

Publications (1)

Publication Number Publication Date
CN114419823A true CN114419823A (en) 2022-04-29

Family

ID=81269366

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111603585.2A Pending CN114419823A (en) 2021-12-24 2021-12-24 Visitor management method and device

Country Status (1)

Country Link
CN (1) CN114419823A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117912154A (en) * 2024-03-14 2024-04-19 深圳湾科技发展有限公司 Park operation management method, system and device thereof

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102008039130A1 (en) * 2008-08-21 2010-02-25 Billy Hou Automatic tracing and identification system for movable object e.g. human, in building, has safety monitoring sensor connected with safety monitoring system such that tracing camera receives desired data when sensor is operated
CN109360314A (en) * 2018-10-24 2019-02-19 平安科技(深圳)有限公司 Reserve access method, system, computer equipment and storage medium
CN110415469A (en) * 2019-07-26 2019-11-05 安徽静深实业有限公司 A kind of home furnishings intelligent antitheft security system based on Internet of Things
CN110766895A (en) * 2019-09-17 2020-02-07 重庆特斯联智慧科技股份有限公司 Intelligent community abnormity alarm system and method based on target trajectory analysis
CN110807888A (en) * 2019-09-24 2020-02-18 北京畅景立达软件技术有限公司 Intelligent security method, system and storage medium for park

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102008039130A1 (en) * 2008-08-21 2010-02-25 Billy Hou Automatic tracing and identification system for movable object e.g. human, in building, has safety monitoring sensor connected with safety monitoring system such that tracing camera receives desired data when sensor is operated
CN109360314A (en) * 2018-10-24 2019-02-19 平安科技(深圳)有限公司 Reserve access method, system, computer equipment and storage medium
CN110415469A (en) * 2019-07-26 2019-11-05 安徽静深实业有限公司 A kind of home furnishings intelligent antitheft security system based on Internet of Things
CN110766895A (en) * 2019-09-17 2020-02-07 重庆特斯联智慧科技股份有限公司 Intelligent community abnormity alarm system and method based on target trajectory analysis
CN110807888A (en) * 2019-09-24 2020-02-18 北京畅景立达软件技术有限公司 Intelligent security method, system and storage medium for park

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117912154A (en) * 2024-03-14 2024-04-19 深圳湾科技发展有限公司 Park operation management method, system and device thereof
CN117912154B (en) * 2024-03-14 2024-06-04 深圳湾科技发展有限公司 Park operation management method

Similar Documents

Publication Publication Date Title
US20180349685A1 (en) Identity verification via validated facial recognition and graph database
TWI743987B (en) Behavioral analysis methods, electronic devices and computer storage medium
JP5747116B1 (en) Security system
CN110136091B (en) Image processing method and related product
CN108537243B (en) Violation warning method and device
CN107403108A (en) A kind of method and system of data processing
CN105912709A (en) Big data-based accompanying vehicle analysis method and system
CN111081017A (en) Vehicle information management system, method, computer device, and storage medium
CN114419823A (en) Visitor management method and device
CN111228706A (en) GIS-based building interior fire fighting equipment control method and device
CN111125648B (en) Equipment change method and device
CN111639879B (en) Intelligent security personnel information management method, device and system, storage medium and server
CN110781743B (en) Crowd gathering event processing method and device and electronic equipment
CN113066182A (en) Information display method and device, electronic equipment and storage medium
CN116824455A (en) Event detection method, device, equipment and storage medium
CN114253518B (en) Intelligent project management method and system
CN111064924A (en) Video monitoring method and system based on artificial intelligence
Shinde et al. Design and development of geofencing based attendance system for mobile application
CN112669509A (en) Access control management method, system, electronic device and storage medium
CN115037790A (en) Abnormal registration identification method, device, equipment and storage medium
CN111666786B (en) Image processing method, device, electronic equipment and storage medium
CN113592902A (en) Target tracking method and device, computer equipment and storage medium
CN112287830A (en) Image detection method and device
CN110929191A (en) Picture loading method and device, terminal and storage medium
CN112241671A (en) Personnel identity identification method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination