CN114449228A - Safety monitoring method, monitoring server and storage medium for community visitors - Google Patents

Safety monitoring method, monitoring server and storage medium for community visitors Download PDF

Info

Publication number
CN114449228A
CN114449228A CN202210360530.1A CN202210360530A CN114449228A CN 114449228 A CN114449228 A CN 114449228A CN 202210360530 A CN202210360530 A CN 202210360530A CN 114449228 A CN114449228 A CN 114449228A
Authority
CN
China
Prior art keywords
monitoring
visitor
authorized
monitoring device
chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210360530.1A
Other languages
Chinese (zh)
Other versions
CN114449228B (en
Inventor
陈双顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yalianxun Network Technology Co ltd
Original Assignee
Shenzhen Yalianxun Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yalianxun Network Technology Co ltd filed Critical Shenzhen Yalianxun Network Technology Co ltd
Priority to CN202210360530.1A priority Critical patent/CN114449228B/en
Publication of CN114449228A publication Critical patent/CN114449228A/en
Application granted granted Critical
Publication of CN114449228B publication Critical patent/CN114449228B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/04Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
    • G06Q10/047Optimisation of routes or paths, e.g. travelling salesman problem
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/16Real estate
    • G06Q50/163Real estate management

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Game Theory and Decision Science (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Alarm Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application is suitable for the technical field of safety monitoring, and provides a safety monitoring method, a monitoring server and a storage medium for community visitors, wherein the method comprises the following steps: when a request of a visitor to enter a cell is received, determining a property unit to be visited by the visitor and planning an access route for the visitor; determining a plurality of authorized monitoring devices of which the monitoring range includes an access route from the plurality of monitoring devices of the cell; wherein, each monitoring device has a corresponding monitoring number; generating an equipment chain according to the access route and the monitoring numbers of the plurality of authorized monitoring equipment; after the identification mark is distributed to the visitor, a plurality of authorized monitoring devices on a control device chain carry out video acquisition on the visitor; and outputting the video image collected by each authorized monitoring device in the same terminal monitoring device in sequence according to the sequence of the authorized monitoring devices on the device chain. By adopting the method, the video images collected by a plurality of monitoring devices in the cell can be output in the same terminal monitoring device.

Description

Safety monitoring method, monitoring server and storage medium for community visitors
Technical Field
The application belongs to the technical field of security monitoring, and particularly relates to a security monitoring method, a monitoring server and a storage medium for community visitors.
Background
The construction of the intelligent community effectively promotes the safe and harmonious development of the community. The monitoring equipment is arranged in the public area of the community, so that the comprehensive safety monitoring of the community can be realized, and the safety of public and private properties in the community is ensured.
Take a large residential district as an example. A plurality of monitoring devices are usually installed in a public area in a community, and video images acquired by each monitoring device in real time can be output to corresponding terminal monitoring devices for security personnel in a monitoring room to check. However, in the prior art, since one terminal monitoring device can only output a video image acquired by one monitoring device, when a security personnel wants to check the video images acquired by a plurality of monitoring devices, the security personnel needs to use a plurality of terminal monitoring devices, and the video images acquired by the plurality of monitoring devices cannot be output on the same terminal monitoring device. Illustratively, in the process that a visitor enters a cell to visit a property unit, security personnel in a monitoring room need to complete the safety monitoring of the process through a plurality of terminal monitoring devices, and the video image output by each terminal monitoring device is only the image related to the action of the visitor in a certain time period. For example, when a visitor is at the cell front, a video image of the visitor at the cell front can only be output through a terminal monitoring device associated with a monitoring device at the cell front; when a visitor walks to a certain position in a cell, a video image of the visitor at the position needs to be output through a terminal monitoring device associated with the monitoring device at the position, and a uniform safety monitoring video cannot be formed for the whole action process of the visitor in the cell.
Disclosure of Invention
In view of this, the present application provides a security monitoring method, a monitoring server and a storage medium for a cell visitor, which can form a uniform security monitoring video for all action processes of the visitor in the cell; and the safety monitoring video can be output through the same terminal monitoring equipment.
A first aspect of an embodiment of the present application provides a security monitoring method for a cell visitor, which is applied to a monitoring server, and the method includes:
when a request of a visitor to enter a cell is received, determining a property unit to be visited by the visitor;
planning an access route for the visitor based on the location of the property unit;
determining, from a plurality of monitoring devices of the cell, a plurality of authorized monitoring devices whose monitoring range includes the access route; wherein each monitoring device has a corresponding monitoring number;
generating a device chain for representing the sequence of the authorized monitoring devices according to the access route and the monitoring numbers of the authorized monitoring devices;
after the visitor is distributed with the identification mark, controlling a plurality of authorized monitoring devices on the device chain to carry out video acquisition on the visitor based on the identification mark;
and outputting the video image containing the visitor collected by each authorized monitoring device in the same terminal monitoring device in sequence according to the sequence of the authorized monitoring devices in the device chain.
A second aspect of the embodiments of the present application provides a security monitoring apparatus for a cell visitor, which is applied to a monitoring server, and the apparatus includes:
the property unit determining module is used for determining the property unit to be visited by the visitor when a request of the visitor to enter the cell is received;
an access route planning module to plan an access route for the visitor based on a location of the property unit;
an authorized monitoring device determining module, configured to determine, from among multiple monitoring devices of the cell, multiple authorized monitoring devices whose monitoring ranges include the access route; wherein each monitoring device has a corresponding monitoring number;
the equipment chain generating module is used for generating an equipment chain for representing the sequence of the plurality of authorized monitoring equipment according to the access route and the monitoring numbers of the plurality of authorized monitoring equipment;
the video acquisition control module is used for controlling the authorized monitoring equipment on the equipment chain to acquire videos of the visitor based on the identification mark after the identification mark is distributed to the visitor;
and the video image output module is used for sequentially outputting the video image which contains the visitor and is acquired by each authorized monitoring device in the same terminal monitoring device according to the sequence of the authorized monitoring devices on the device chain.
A third aspect of embodiments of the present application provides a monitoring server, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor, when executing the computer program, implements the method for security monitoring of a cell visitor as described in the first aspect.
A fourth aspect of embodiments of the present application provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the method for security monitoring of a cell visitor as described in the first aspect above is implemented.
A fifth aspect of embodiments of the present application provides a computer program product, which when running on a computer, causes the computer to execute the method for monitoring security of a cell visitor of the first aspect.
Compared with the prior art, the method has the following advantages:
when a request of a visitor to enter a cell is received, a monitoring server can plan a corresponding access route for a property unit to be visited by the visitor by determining the property unit, and after a plurality of monitoring devices of the cell determine that a monitoring range comprises a plurality of authorized monitoring devices of the access route, a device chain can be generated according to the access route and monitoring numbers of the authorized monitoring devices. After the identification mark is distributed to the visitor, the monitoring server can control the authorized monitoring devices on the equipment chain to carry out video acquisition on the visitor based on the identification mark, and sequentially output the video image containing the visitor acquired by each authorized monitoring device in the terminal monitoring equipment according to the sequence of the authorized monitoring devices on the equipment chain. By adopting the method provided by the application, the video images which are acquired by a plurality of monitoring devices and are related to the same visitor can be output in the same terminal monitoring device, and the problem that in the prior art, when a plurality of monitoring devices are adopted to carry out safety monitoring on the same visitor in a large area range, the plurality of terminal monitoring devices are required to output the corresponding monitoring video images respectively is solved. Secondly, the video images related to the same visitor output by the terminal monitoring device in the present application may be continuous video images, including the whole process of the visitor acting in the cell. By storing the continuous video images, the subsequent safety events related to the visitor can be analyzed quickly and efficiently, and the safety of the community is ensured.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the embodiments or the description of the prior art will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the application, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
Fig. 1 is a schematic diagram of a security monitoring method for a cell visitor according to an embodiment of the present disclosure;
FIG. 2 is a schematic view of a partial region of a monitoring map provided in an embodiment of the present application;
fig. 3 is a schematic partial area diagram of a monitoring map with an outdoor area route drawn according to an embodiment of the present application;
4(a) -4(c) are schematic diagrams of a device chain generation process in the form of an ordered tree provided by an embodiment of the present application;
FIG. 5 is a schematic diagram of various regions of a target video image according to an embodiment of the present disclosure;
FIG. 6 is a diagram illustrating security monitoring for multiple guests according to an embodiment of the present application;
fig. 7 is a schematic diagram of a security monitoring apparatus for a cell visitor according to an embodiment of the present application;
fig. 8 is a schematic diagram of a monitoring server according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. However, it will be apparent to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
The technical solution of the present application will be described below by way of specific examples.
Referring to fig. 1, a schematic diagram illustrating a security monitoring method for a cell visitor according to an embodiment of the present application is shown, which may specifically include the following steps:
s101, when a request of a visitor to enter a cell is received, determining a property unit to be visited by the visitor.
It should be noted that the method may be applied to a monitoring server, that is, the execution subject of the embodiment of the present application is the monitoring server.
The visitor in the embodiment of the present application may be any other person who enters the cell except the owner of the cell. Such as couriers, takeaway personnel, real estate agency personnel, friends and colleagues visited by the cell owner, and the like, but the visitor type is not limited in the embodiments of the present application.
Generally, in order to ensure the safety of a cell, security personnel of a cell property management organization need to monitor the safety of the visitor's actions in the cell. Taking a courier as an example, when a courier delivers an express for a community owner, the courier needs to enter the community and deliver the express to the owner, where the owner is a property unit to be visited by the courier serving as a visitor.
S102, planning an access route for the visitor based on the position of the property unit.
Generally, when a visitor enters a cell, security personnel can register the visitor at a cell entrance guard to specify the specific location of the property unit that needs to be visited. In the process, security personnel can register visitor information through the terminal equipment. For example, a face image and a whole body image of the visitor are acquired through the terminal device, a property unit to be visited by the visitor, visiting time and purpose of the visitor are recorded, and the like. After obtaining the visitor information, the terminal device may generate a request to enter the cell based on the visitor information and send the request to the monitoring server. The monitoring server can determine the position of the property unit to be visited by the visitor according to the request and plan a corresponding access route for the visitor.
In the embodiment of the present application, the access route planned by the monitoring server for the visitor may refer to a route from the current location of the visitor to a property unit to be visited by the visitor. In general, one access route may include an outdoor area route in an outdoor area of a cell and a building area route into a building where the property unit is located. Further, the floor area route may be divided into a step route and an elevator route according to whether visitors take an elevator up and down the floor. The step route can be a route through which a visitor walks to a floor where a property unit that the visitor wishes to visit is located after entering a building, and the elevator route is a route through which the visitor takes an elevator to reach the floor after entering the building.
In some embodiments, the monitoring server may send the access route to a terminal used by the visitor after planning the access route for the visitor. In this way, the visitor can walk according to the access route prompted on the terminal to reach the property unit that the visitor wants to visit.
S103, determining a plurality of authorized monitoring devices of which the monitoring ranges comprise the access route from a plurality of monitoring devices of the cell; wherein each monitoring device has a corresponding monitoring number.
Generally, a plurality of monitoring devices may be installed in a cell, and each monitoring device may be used to monitor a certain public area. Therefore, the monitoring equipment is used for carrying out 24-hour real-time monitoring on public areas outdoors in the residential area and in the building, so that security personnel can be helped to find out abnormal events in time, and the safety of the residential area is guaranteed.
In this embodiment, each monitoring device in the cell may have a corresponding monitoring number, and the monitoring number of each monitoring device may be unique. According to the monitoring number, the installation position and the monitoring range of the corresponding monitoring equipment can be determined. The installation position of the monitoring device may be determined when the monitoring device is installed, and the installation position may be written in a preset monitoring map after being associated with the monitoring number.
As an example, the monitoring numbers of the monitoring devices may be expressed as Mout _ E001, Mout _ S002, Min _0301, Min _0302, etc. Wherein M in the monitoring number represents a monitoring device, out represents that the monitoring device is located in an outdoor public area, and in represents that the monitoring device is a monitoring device installed in a building. For E001 in the monitoring number Mout _ E001, it indicates that the monitoring device is the monitoring device number 001 on the east side of the cell; similarly, Mout _ S002 indicates that the monitoring apparatus is No. 002 monitoring apparatus on the south side of the outdoor public area of the cell. And Min _0301 and Min _0302 can be used to indicate that the two monitoring devices are monitoring devices installed in floor 01 and floor 02 of floor 03, respectively.
In addition, the monitoring map can record the monitoring range of each monitoring device.
In a possible implementation manner of the embodiment of the present application, the monitoring map may be drawn based on a cell map. Specifically, the electronic map of the local cell may be processed, objects such as basic roads, buildings, and other landscape facilities in the electronic map are reserved, and the installation position of each monitoring device in the outdoor area is combined to determine the position of each monitoring device in the processed electronic map. And then, drawing an area corresponding to the monitoring range of each monitoring device in the processed electronic map according to the actual monitoring range of each monitoring device to obtain the monitoring map. It should be noted that the monitoring range of each monitoring device in a building is usually clear, and the monitoring range of a monitoring device located at a certain floor is usually the floor. For example, the monitoring range of a monitoring device of 5 stories in a certain residential building is generally a 5-story corridor area. Therefore, the monitoring range of each monitoring device plotted in the monitoring map described above may include only the monitoring range of each monitoring device in the outdoor area.
Fig. 2 is a schematic partial area diagram of a monitoring map according to an embodiment of the present application. In fig. 2, cell S200 includes 5 residential buildings, respectively residential building B01, residential building B02, residential building B03, residential building B04, and residential building B05; in addition, a public garden G01 is included in cell S200. The entrance and exit of the cell S200 is E01 in fig. 2. Each block marked with a monitoring number beginning with the letter M in fig. 2 is a monitoring range of a monitoring device. It should be noted that fig. 2 only shows a partial area of the monitoring map, and in a specific application, the monitoring map should include the monitoring ranges of all monitoring devices in the cell.
In the embodiment of the present application, after the monitoring server plans the access route for the visitor, in order to facilitate monitoring of the entire action process of the visitor in the cell, the monitoring server may determine, from the plurality of monitoring devices of the cell, a plurality of authorized monitoring devices whose monitoring ranges include the access route. Therefore, as the monitoring range of each authorized monitoring device comprises the access route, the subsequent monitoring server can obtain the whole process video of the action of the visitor in the cell after processing the video images collected by the authorized monitoring devices.
In a possible implementation manner of the embodiment of the present application, the monitoring server determines, from the plurality of monitoring devices in the cell, a plurality of authorized monitoring devices whose monitoring ranges include the access route, and may first draw an outdoor area route in the access route in a preset monitoring map.
Fig. 3 is a schematic partial area diagram of a monitoring map with an outdoor area route drawn according to an embodiment of the present application. Route R01 is the route to the outdoor area in the video, and is directed to residential building B03 by cell doorway E01.
As shown in fig. 3, the monitoring server may determine a plurality of monitoring devices having an overlapping area between the corresponding monitoring range and the outdoor area route as authorized monitoring devices. For example, the monitoring devices with the monitoring numbers Mout _ E001, Mout _ E002, Mout _ E003, Mout _ E004, Mout _ E005, and Mout _ E007 in fig. 3 are authorized monitoring devices on the current access route.
It should be noted that the authorized monitoring devices determined according to the monitoring map shown in fig. 3 only include monitoring devices in the outdoor area. Therefore, the monitoring server also needs to determine a plurality of monitoring devices ranging from the entrance of the building where the property unit is located to the floor where the property unit is located as authorized monitoring devices.
For example, if the property unit visited by the visitor is a household on floor 7 of the 03 th residential building B03, the monitoring devices from the entrance of the residential building B03 to floor 7 may be determined by the monitoring server as authorized monitoring devices. Since the visitor can choose to use a stairway or take an elevator to reach the household at the 7 th floor after entering the residential building B03, the authorized monitoring devices in the building can include monitoring devices in the floors from the entrance to the 7 th floor and the corridors between the floors, namely, monitoring devices Min _0300, Min _0301 to Min _0307 and Min _03S02 to Min _03S 07; monitoring devices in the elevators of the residential building B03, i.e. monitoring devices Min _03L01 and Min _03L02, may also be included. Min _0300 represents monitoring equipment at the entrance and exit of residential building B03, Min _ 0301-Min _0307 represent monitoring equipment at each floor from floor 1 to floor 7 of residential building B03, Min _03S 02-Min _03S07 represent monitoring equipment in a corridor between two floors in residential building B03, and for example, Min _03S02 represents monitoring equipment in a corridor between floor 1 and floor 2; min _03L01 shows a monitoring device in elevator number 01 of residential building B03, and Min _03L02 shows a monitoring device in elevator number 02 of residential building B03.
And S104, generating a device chain for representing the sequence of the plurality of authorized monitoring devices according to the access route and the monitoring numbers of the plurality of authorized monitoring devices.
In this embodiment, the device chain may be used to indicate a sequence of video image acquisition performed by the multiple authorized monitoring devices, that is, a sequence of video images including a visitor that can be acquired by each authorized monitoring device in a process in which the visitor walks from a cell entrance to a property unit that the visitor desires to visit.
Generally, the monitoring numbers of the authorized monitoring devices can be combined and arranged according to the direction of the access route to obtain the device chain. For example, referring to fig. 3, if a certain access route is from a cell entrance E01 to a 03 th residential building B03, and authorized monitoring devices on the access route include Mout _ E001, Mout _ E002, Mout _ E003, Mout _ E004, Mout _ E005, and Mout _ E007, a device chain generated according to the authorized monitoring devices may be represented as: { Mout _ E001, Mout _ E002, Mout _ E003, Mout _ E004, Mout _ E005, and Mout _ E007}, where the characters in the device chain represent the monitoring number of each authorized monitoring device, respectively. In which the authorized monitoring device located further forward in the device chain will acquire the video image containing the visitor earlier in practical application. For example, when a visitor follows a planned access route, the authorized monitoring device Mout _ E001 will capture the video image containing the visitor at the earliest.
In one possible implementation of the embodiment of the present application, the device chain may also be organized in the form of an ordered tree. Any node or sub-node in the ordered tree can represent an authorized monitoring device, and any node and the sub-node have a sequence relation which represents the sequence of each authorized monitoring device.
Generally, since one access route generally includes a route in an outdoor area and a route in a building, when generating an equipment chain, sub-chains may be generated for the route in the outdoor area and the route in the building, and then the sub-chains are combined to obtain a final equipment chain.
In a specific implementation, the monitoring server may sequentially combine and arrange the monitoring numbers of the plurality of authorized monitoring devices on the outdoor area route according to the direction of the access route, so as to obtain the outdoor route sub-chain.
Fig. 4(a) -4(c) are schematic diagrams illustrating a device chain generation process in an ordered tree form according to an embodiment of the present application. Fig. 4(a) is a schematic diagram of generating an outdoor route subchain. Each node in fig. 4(a) represents an authorized monitoring device on the route of the outdoor area, that is, the authorized monitoring devices on the route of the outdoor area, which is walked to the 03 th residential building B03 through the cell entrance E01, corresponding to fig. 2.
Multiple paths may be included in a building depending on the number of elevators in the building and whether visitors are riding in the elevators. For example, at least a step path and an elevator path should be included in a building. The elevator paths can be divided into elevator paths No. 01, elevator paths No. 02 and the like according to the number of elevators.
Therefore, for the situation inside the building, the monitoring server may determine a plurality of paths from the entrance of the building where the property unit is located to the floor where the property unit is located, and then combine and arrange the monitoring numbers of the authorized monitoring devices on the respective paths, respectively, to obtain a building route sub-chain corresponding to the respective paths as shown in fig. 4 (b).
In fig. 4(B), three different sub-chains are included, the starting nodes of which are all monitoring devices Min _0300 at the entrance and the exit of the 03-numbered residential building B03, and the ending nodes of which are all monitoring devices at the floor where the property unit that the visitor wishes to visit is located, namely, authorized monitoring device Min _0307 at the 7 th floor of the 03-numbered residential building B03. The sub-chain containing the authorized monitoring device Min _03L01 represents that the visitor arrives at the resident home at the 7 th floor by taking an elevator with number 01, the sub-chain containing the authorized monitoring device Min _03L02 represents that the visitor arrives at the resident home at the 7 th floor by taking an elevator with number 02, and the rest of the data represents that the visitor uses a step to walk to the resident home at the 7 th floor.
From the outdoor route sub-chain shown in fig. 4(a) and the building route sub-chain shown in fig. 4(b), an equipment chain in the form of an ordered tree as shown in fig. 4(c) can be generated. It should be noted that, as an example, the device chain organized in the ordered tree form in fig. 4(c) only shows a part of nodes in the ordered tree, that is, only a part of the authorized monitoring devices are shown in fig. 4(c), and the complete authorized monitoring devices are not included.
S105, after the visitor is distributed with the identification mark, controlling the authorized monitoring devices in the device chain to carry out video acquisition on the visitor based on the identification mark.
In the embodiment of the present application, after the device chain is generated, the monitoring server may control a plurality of authorized monitoring devices in the device chain to perform video acquisition on the actions of the visitor in the cell. In order to improve the accuracy of subsequent processing, the monitoring server can allocate an identification to the visitor. Based on the identification mark, the monitoring server can take the visitor as a tracking target and apply a target tracking algorithm to track the visitor.
In a possible implementation manner of the embodiment of the application, when the monitoring server allocates the identification to the visitor, the characteristic information of the visitor may be identified first. Illustratively, the characteristic information of the visitor may include a biometric characteristic, a clothing characteristic, and/or an associated characteristic of the visitor. The biological characteristics of the visitor can include face information of the visitor identified by a face detection and identification algorithm, the gender of the visitor and the like. The clothing characteristics may include the style of clothing, color, etc. worn by the visitor as identified by the target or object detection algorithm. The associated features may include features of some other external object related to the visitor, such as a bike ridden by the visitor, a large item carried, and the like.
After recognizing the characteristic information of the visitor, the monitoring server may assign an identification to the visitor according to the characteristic information. It should be noted that, after recognizing multiple items of feature information of the visitor, the monitoring server may assign an identification to the visitor according to one of the feature information, or may assign an identification to the visitor according to multiple items of feature information. Illustratively, after the monitoring server acquires the face information of the visitor, the monitoring server can allocate an identification identifier to the visitor according to the face information, and each subsequent authorized monitoring device can judge whether the visitor enters a corresponding monitoring range through the face information. Or, the monitoring server may also assign the identification for the visitor by combining the type and color of the clothing worn by the visitor on the basis of the face information, which is not limited in the embodiment of the present application.
After the identification mark is distributed to the visitor, the monitoring server can control the authorized monitoring devices on the device chain to carry out video acquisition on the visitor based on the identification mark, namely, after the visitor enters the monitoring range of each authorized monitoring device, the authorized monitoring device corresponding to the monitoring range carries out video monitoring on the visitor.
And S106, sequentially outputting the video image which is acquired by each authorized monitoring device and contains the visitor in the same terminal monitoring device according to the sequence of the authorized monitoring devices on the device chain.
In the embodiment of the application, each authorized monitoring device in the device chain can acquire video images at the same time, and only when a certain authorized monitoring device acquires a video image containing a visitor, the monitoring server outputs the video stream of the authorized monitoring device to the terminal monitoring device, so that the video image containing the visitor is displayed on the video display screen of the terminal device. The monitoring server can output the video image containing the visitor collected by each authorized monitoring device in the same terminal monitoring device in sequence according to the sequence of each authorized monitoring device in the device chain. In this way, the monitoring server can always display the video image containing the visitor on the display screen of the terminal monitoring equipment by switching the video streams of different authorized monitoring equipment. Security personnel can monitor the whole process of the action of the visitor in the cell on the same terminal monitoring device.
In a possible implementation manner of the embodiment of the present application, when the monitoring server implements the above function, the target authorized monitoring device in the device chain may be determined first, and the target authorized monitoring device may be an authorized monitoring device of the visitor included in a currently acquired target video image.
In conjunction with the device chain shown in fig. 4(c), when a visitor enters a cell from the entrance/exit of the cell, the monitoring server can start security monitoring. At this time, the visitor is located in the monitoring range of the authorized monitoring device Mout _ E001 at the cell entrance and exit, and the authorized monitoring device Mout _ E001 is the current target authorized monitoring device.
Then, the monitoring server can output the target video image acquired by the target authorized monitoring device in the terminal monitoring device. In this process, the monitoring server may track the movement of the visitor in the target video image based on a target tracking algorithm. When the monitoring server determines that the visitor moves to the edge area of the target video image based on the identification mark of the visitor, the visitor can be considered to be about to move out of the monitoring range of the target authorized monitoring device and enter the monitoring range of the next authorized monitoring device adjacent to the target authorized monitoring device on the device chain. Referring to fig. 4(c), the next authorized monitoring device of the authorized monitoring device Mout _ E001 at the cell entrance/exit of the device chain is Mout _ E002. Accordingly, the monitoring server can stop transmitting the video stream of the authorized monitoring device Mout _ E001 to the terminal monitoring device and switch to start transmitting the video stream of the authorized monitoring device Mout _ E002. At this time, the authorized monitoring device Mout _ E002 will be the new target authorized monitoring device. In this way, the output of the video image captured by the authorized monitoring device Mout _ E002 can be started on the display screen of the terminal monitoring device. Since the visitor enters the monitoring range of the authorized monitoring device Mout _ E002 from the monitoring range of the authorized monitoring device Mout _ E001, the video image displayed on the terminal monitoring device will also be the video image containing the visitor.
In the embodiment of the present application, the number of next authorized monitoring devices adjacent to the target authorized monitoring device in the device chain may include two or more. For example, when a visitor arrives at the entrance of the 03 th residential building B03, the visitor enters the monitoring range of the monitoring device Min _0300 at the entrance. At this time, the monitoring device Min _0300 is the current target authorized monitoring device, and the video image output from the terminal monitoring device is the video image collected by the monitoring device Min _ 0300. As can be seen from fig. 4(c), the next authorized monitoring devices of Min _0300, which are the target authorized monitoring devices, include an authorized monitoring device Min _03L01, an authorized monitoring device Min _03L02 and an authorized monitoring device Min _0301, which respectively represent that the visitor takes an elevator number 01, an elevator number 02 or walks by a step to the resident home at the 7 th floor.
In this case, the monitoring server may determine a correspondence between each region in the target video image and the next authorized monitoring device. When the visitor moves to any area, the monitoring server may determine a next target authorized monitoring device from among two or more next authorized monitoring devices according to a predetermined correspondence.
Fig. 5 is a schematic diagram illustrating various regions of a target video image according to an embodiment of the present disclosure. The target video image shown in fig. 5 may be a video image captured when the authorized monitoring device Min _0300 is used as the target authorized monitoring device, and the area S01, the area S02 and the area S03 in the video image respectively represent the positions of the elevator No. 01, the elevator No. 02 and the elevator. When the visitor P01 moves to area S01 in fig. 5, it can be shown that the visitor P01 is waiting for elevator 01, which has a greater probability of choosing to take elevator 01 to the household at floor 7. Therefore, the monitoring device Min _03L01 in elevator No. 01 can be taken as the next authorized monitoring device for the authorized monitoring device Min _ 0300.
In this way, when it is determined that the visitor moves to the edge area of the target video image based on the identification of the visitor, the monitoring server may output the video image captured by the next target authorized monitoring device, that is, the video image captured by the monitoring device Min _03L01 in the elevator No. 01, in the terminal monitoring device.
In some embodiments, the visitor may not act exactly on the access route planned for it by the monitoring server after entering the cell. Thus, when the visitor moves out of the target video image completely, the visitor may not be included in the video image captured by the next authorized monitoring device in the device chain.
Illustratively, referring to fig. 2 and 4(c), if the visitor enters the monitoring range of the authorized monitoring device Mout _ E007 according to the access route planned by the monitoring server, the next authorized monitoring device is Min _0300, i.e. the monitoring range of the authorized monitoring device Min _0300 at the entrance and exit of the residential building No. 03B 03. However, if the visitor elects to continue to act to the left after moving out of the monitoring range of the authorized monitoring device Mout _ E007, the video image captured by the next authorized monitoring device Min _0300 in the device chain will not contain the visitor.
In this case, the monitoring server may determine which of the associated monitoring devices are the target authorized monitoring devices. Generally, after a visitor moves out of the monitoring range of a certain monitoring device, the visitor will necessarily be within the monitoring range of a certain monitoring device around. Therefore, the associated monitoring device of the target authorized monitoring device may be other unauthorized monitoring devices installed within a preset range of the target authorized monitoring device. For example, as can be seen in fig. 2, the associated monitoring devices authorizing the monitoring device Mout _ E007 may include the monitoring device Mout _ E006 and the monitoring device Mout _ N008.
The monitoring server may then identify whether the visitor is contained in the video image captured by the associated monitoring device. If the visitor is contained in the video image collected by any one of the associated monitoring devices, the visitor is indicated to have moved into the monitoring range of the associated monitoring device. At this time, the monitoring server may update the device chain according to the monitoring device. For example, when a visitor moves out of the monitoring range of the authorized monitoring device Mout _ E007 and chooses to move forward, the associated monitoring device Mout _ N008 will capture a video image containing the visitor. The monitoring server may insert into the equipment chain the associated monitoring equipment Mout _ N008 that captured the video image containing the visitor.
Since the visitor's action has deviated from the access route planned for it by the monitoring server, and its subsequent actions are unpredictable, the monitoring server may continue to determine the next associated monitoring device in the manner described above for determining the associated monitoring server, and continue to update the device chain. The monitoring server can perform security monitoring on the visitor based on the updated device chain and simultaneously generate alarm information for the visitor. The alarm information can be simultaneously sent to terminals used by the visitor and the security personnel respectively so as to remind the visitor to return to the original access route as soon as possible and remind the security personnel to respond to the possible security risks.
In one possible implementation manner of the embodiment of the present application, the number of visitors requesting to enter the cell includes a plurality of visitors. For the case of multiple visitors, the monitoring server may first determine whether the property units that multiple visitors request to visit are the same property unit. If the property units visited by the visitors are different. For example, the property unit visited by visitor P01 is the household on floor 7 of residential building No. 03B 03 in the previous embodiment, while the property unit visited by visitor P02 is the household on floor 3 of residential building No. 04B 04. Then, the monitoring server may perform security monitoring on the whole course of the actions of the visitor P01 and the visitor P02 in the cell respectively by adopting the method described in the foregoing embodiment for the visitor P01 and the visitor P02 respectively. In this way, a video image formed by security monitoring for visitor P01 may be output in one terminal monitoring device, and a video image formed by security monitoring for visitor P02 may be output in another terminal monitoring device. For example, the monitoring server may output a video image formed by security monitoring for the visitor P01 to security personnel through the terminal monitoring device a, and a video image formed by security monitoring for the visitor P02 may be output through the terminal monitoring device B.
In another case, if multiple visitors request the same property unit. For example, visitor P01 and visitor P02 are fellow persons, both of whom are destined for a household at floor 7 of residential building B03, cell 03. Then, the monitoring server may generate a unified id for a plurality of visitors according to the respective id of each visitor after allocating ids for the plurality of visitors. The monitoring server can perform subsequent security monitoring on a plurality of visitors as a whole based on the uniform identification mark so as to output video images containing a plurality of visitors, which are acquired by each authorized monitoring device, in the same terminal monitoring device.
Illustratively, as shown in fig. 6, the security monitoring system is a schematic diagram for security monitoring of multiple guests according to an embodiment of the present application. Fig. 6 shows an example of a video image for security monitoring of visitor P01 and visitor P02, who are fellow persons, using authorized monitoring device Min _0300 at the entrance and exit of number 03 residential building B03. In this example, the monitoring server may generate a unified id U01 from the respective ids of the visitor P01 and the visitor P02, and then perform unified security monitoring on the visitor P01 and the visitor P02 based on the unified id U01.
It should be noted that, when performing unified security monitoring on a plurality of visitors, the monitoring server may perform security monitoring on a single visitor in a similar manner as described above. For example, in the monitoring scenario shown in fig. 6, when the object corresponding to the unified id U01 (the visitor P01 and the visitor P02 as a whole) is determined by the monitoring server to move to the edge area of the target video image, the monitoring server may consider that the visitor P01 and the visitor P02 will move out of the monitoring range of the authorized monitoring device Min _ 0300. At this time, the monitoring server may determine the next authorized monitoring device of the authorized monitoring devices Min _0300 according to the device chain and continue the security monitoring of the visitor P01 and the visitor P02 using the next authorized monitoring device.
In the embodiment of the application, when a request of a visitor to enter a cell is received, a monitoring server determines a property unit to be visited by the visitor, and can plan a corresponding access route for the property unit, and after a plurality of authorized monitoring devices of which the monitoring range includes the access route are determined from a plurality of monitoring devices of the cell, a device chain can be generated according to the access route and monitoring numbers of the authorized monitoring devices. After the identification mark is distributed to the visitor, the monitoring server can control the authorized monitoring devices on the equipment chain to carry out video acquisition on the visitor based on the identification mark, and sequentially output the video image containing the visitor acquired by each authorized monitoring device in the terminal monitoring equipment according to the sequence of the authorized monitoring devices on the equipment chain. By adopting the method provided by the embodiment of the application, the video images which are acquired by a plurality of monitoring devices and are related to the same visitor can be output in the same terminal monitoring device, and the problem that the plurality of terminal monitoring devices are required to respectively output the corresponding monitoring video images when the plurality of monitoring devices are adopted to carry out safety monitoring on the same visitor in a large area range in the prior art is solved. Secondly, the video images related to the same visitor output by the terminal monitoring device in the embodiment of the present application may be continuous video images, including the whole process of the visitor acting in the cell. By storing the continuous video images, the subsequent security events related to the visitor can be analyzed quickly and efficiently, and the safety of the community is ensured.
It should be noted that, the sequence numbers of the steps in the foregoing embodiments do not mean the execution sequence, and the execution sequence of each process should be determined by the function and the inherent logic of the process, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Referring to fig. 7, a schematic diagram of a security monitoring apparatus for a cell visitor according to an embodiment of the present application is shown, where the apparatus may be applied to a monitoring server, and the apparatus may specifically include a property unit determining module 701, an access route planning module 702, an authorized monitoring device determining module 703, a device chain generating module 704, a video acquisition control module 705, and a video image output module 706, where:
a property unit determining module 701, configured to determine, when a request for a visitor to enter a cell is received, a property unit to be visited by the visitor;
an access route planning module 701 for planning an access route for the visitor based on the location of the property unit;
an authorized monitoring device determining module 703, configured to determine, from among multiple monitoring devices of the cell, multiple authorized monitoring devices whose monitoring ranges include the access route; wherein each monitoring device has a corresponding monitoring number;
a device chain generating module 704, configured to generate a device chain for representing a sequence of the multiple authorized monitoring devices according to the access route and the monitoring numbers of the multiple authorized monitoring devices;
a video capture control module 705, configured to, after allocating an identification to the visitor, control the authorized monitoring devices in the device chain to capture a video of the visitor based on the identification;
a video image output module 706, configured to sequentially output, in the same terminal monitoring device, a video image that includes the visitor and is acquired by each authorized monitoring device according to a sequence of the multiple authorized monitoring devices in the device chain.
In this embodiment, the authorization monitoring device determining module 703 may be specifically configured to: drawing an outdoor area route in the access route in a preset monitoring map, wherein the monitoring map records the monitoring range of each monitoring device in an outdoor area, and a plurality of monitoring devices with the corresponding monitoring ranges and the outdoor area route having an overlapping area are determined as a plurality of authorized monitoring devices; and determining a plurality of monitoring devices ranging from the entrance of the building where the property unit is located to the floor where the property unit is located as a plurality of authorized monitoring devices.
In this embodiment of the application, the device chain generating module 704 may specifically be configured to: sequentially combining and arranging the monitoring numbers of the authorized monitoring devices on the outdoor area route according to the direction of the access route to obtain an outdoor route sub-chain; determining a plurality of paths from an entrance of a building where the property unit is located to a floor where the property unit is located, wherein the plurality of paths at least comprise a step path and an elevator path; respectively combining and arranging the monitoring numbers of the authorized monitoring devices on each path to obtain a building route subchain corresponding to each path; and generating the equipment chain in an ordered tree form according to the outdoor route subchain and the building route subchain.
In this embodiment of the present application, the video capture control module 705 may be specifically configured to: identifying feature information of the visitor, the feature information including a biometric feature, a clothing feature, and/or an associated feature of the visitor; and distributing the identification for the visitor according to the characteristic information.
In this embodiment, the video image output module 706 may be specifically configured to: determining target authorized monitoring equipment in the equipment chain, wherein the target authorized monitoring equipment is the authorized monitoring equipment of the visitor contained in the currently acquired target video image; outputting the target video image in the terminal monitoring device; when the visitor is determined to move to the edge area of the target video image based on the identification mark, outputting a video image collected by the next authorized monitoring device adjacent to the target authorized monitoring device on the device chain in the terminal monitoring device.
In this embodiment of the present application, the video image output module 706 may further be configured to: if the number of next authorized monitoring devices adjacent to the target authorized monitoring device on the device chain includes two or more than two, determining the corresponding relationship between each region in the target video image and the next authorized monitoring device; when the visitor moves to any area, determining a next target authorized monitoring device from two or more next authorized monitoring devices according to the corresponding relation; and when the visitor is determined to move to the edge area of the target video image based on the identification mark, outputting the video image collected by the next target authorized monitoring equipment in the terminal monitoring equipment.
In this embodiment, the apparatus may further include a device chain update module and an alarm module. Wherein:
the device chain update module may be specifically configured to: if the visitor is not contained in the video image acquired by the next authorized monitoring device after the visitor completely moves out of the target video image, determining an associated monitoring device of the target authorized monitoring device, wherein the associated monitoring device is an unauthorized monitoring device installed in a preset range of the target authorized monitoring device; and if the video image acquired by any one of the associated monitoring devices contains the visitor, updating the device chain according to the associated monitoring device.
The alarm module may be specifically configured to: and carrying out safety monitoring on the visitor based on the updated equipment chain, and generating alarm information aiming at the visitor.
In the embodiment of the application, the number of the visitors comprises a plurality of property units to be visited by a plurality of visitors, wherein the property units are the same property unit, and the plurality of visitors are respectively distributed with different identification marks.
The video capture control module 705 may be further configured to: and generating a plurality of unified identification marks of the visitors according to the respective identification marks of the visitors.
The video image output module 706 may be further configured to: and carrying out safety monitoring on a plurality of visitors based on the uniform identification mark so as to output video images containing a plurality of visitors, which are acquired by each authorized monitoring device, in the same terminal monitoring device.
For the apparatus embodiment, since it is substantially similar to the method embodiment, it is described relatively simply, and reference may be made to the description of the method embodiment section for relevant points.
Referring to fig. 8, a schematic diagram of a monitoring server provided in an embodiment of the present application is shown. As shown in fig. 8, the monitoring server 800 in the embodiment of the present application includes: a processor 810, a memory 820, and a computer program 821 stored in the memory 820 and operable on the processor 810. The processor 810, when executing the computer program 821, implements the steps in the various embodiments of the security monitoring method for a cell visitor described above, such as the steps S101 to S106 shown in fig. 1. Alternatively, the processor 810, when executing the computer program 821, implements the functions of the modules/units in the device embodiments, such as the functions of the modules 701 to 706 shown in fig. 7.
Illustratively, the computer program 821 may be partitioned into one or more modules/units that are stored in the memory 820 and executed by the processor 810 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which may be used to describe the execution process of the computer program 821 in the monitoring server 800. For example, the computer program 821 may be divided into a property unit determining module, an access route planning module, an authorized monitoring device determining module, a device chain generating module, a video capture control module, and a video image output module, where the specific functions of the modules are as follows:
the property unit determining module is used for determining the property unit to be visited by the visitor when a request of the visitor for entering the cell is received;
an access route planning module to plan an access route for the visitor based on a location of the property unit;
an authorized monitoring device determining module, configured to determine, from a plurality of monitoring devices of the cell, a plurality of authorized monitoring devices whose monitoring ranges include the access route; wherein each monitoring device has a corresponding monitoring number;
the equipment chain generating module is used for generating an equipment chain for representing the sequence of the plurality of authorized monitoring equipment according to the access route and the monitoring numbers of the plurality of authorized monitoring equipment;
the video acquisition control module is used for controlling the authorized monitoring equipment on the equipment chain to acquire videos of the visitor based on the identification mark after the identification mark is distributed to the visitor;
and the video image output module is used for sequentially outputting the video image which contains the visitor and is acquired by each authorized monitoring device in the same terminal monitoring device according to the sequence of the authorized monitoring devices on the device chain.
The monitoring server 800 may be the monitoring server described in the foregoing method embodiments, and the monitoring server may be a desktop computer, a cloud server, or other computing devices. The monitoring server 800 may include, but is not limited to, a processor 810 and a memory 820. Those skilled in the art will appreciate that fig. 8 is merely an example of the monitoring server 800, and does not constitute a limitation on the monitoring server 800, and may include more or less components than those shown, or combine certain components, or different components, for example, the monitoring server 800 may further include input and output devices, network access devices, buses, etc.
The Processor 810 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 820 may be an internal storage unit of the monitoring server 800, such as a hard disk or a memory of the monitoring server 800. The memory 820 may also be an external storage device of the monitoring server 800, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the monitoring server 800. Further, the memory 820 may also include both an internal storage unit and an external storage device of the monitoring server 800. The memory 820 is used for storing the computer program 821 and other programs and data required by the monitoring server 800. The memory 820 may also be used to temporarily store data that has been output or is to be output.
The embodiment of the application also discloses a monitoring server, which comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein when the processor executes the computer program, the safety monitoring method of the cell visitor according to the foregoing embodiments is realized.
The embodiment of the application also discloses a computer readable storage medium, which stores a computer program, and the computer program is executed by a processor to implement the method for monitoring the security of the cell visitor according to the foregoing embodiments.
The embodiment of the application also discloses a computer program product, and when the computer program product runs on a computer, the computer is enabled to execute the safety monitoring method for the cell visitor in the foregoing embodiments.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same. Although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (10)

1. A safety monitoring method for cell visitors is applied to a monitoring server, and comprises the following steps:
when a request of a visitor to enter a cell is received, determining a property unit to be visited by the visitor;
planning an access route for the visitor based on the location of the property unit;
determining, from a plurality of monitoring devices of the cell, a plurality of authorized monitoring devices whose monitoring range includes the access route; wherein each monitoring device has a corresponding monitoring number;
generating a device chain for representing the sequence of the authorized monitoring devices according to the access route and the monitoring numbers of the authorized monitoring devices;
after the visitor is distributed with the identification mark, controlling a plurality of authorized monitoring devices on the device chain to carry out video acquisition on the visitor based on the identification mark;
and outputting the video image containing the visitor collected by each authorized monitoring device in the same terminal monitoring device in sequence according to the sequence of the authorized monitoring devices in the device chain.
2. The method of claim 1, wherein determining that the monitoring area comprises a plurality of authorized monitoring devices of the access route from among a plurality of monitoring devices of the cell comprises:
drawing an outdoor area route in the access route in a preset monitoring map, wherein the monitoring map records the monitoring range of each monitoring device in an outdoor area, and a plurality of monitoring devices with the corresponding monitoring ranges and the outdoor area route having an overlapping area are determined as a plurality of authorized monitoring devices; and the number of the first and second groups,
and determining a plurality of monitoring devices ranging from the entrance of the building where the property unit is located to the floor where the property unit is located as a plurality of authorized monitoring devices.
3. The method according to claim 2, wherein the generating a device chain for characterizing the sequence of the plurality of authorized monitoring devices according to the access route and the monitoring numbers of the plurality of authorized monitoring devices comprises:
sequentially combining and arranging the monitoring numbers of the authorized monitoring devices on the outdoor area route according to the direction of the access route to obtain an outdoor route sub-chain;
determining a plurality of paths from an entrance of a building where the property unit is located to the floor where the property unit is located, the plurality of paths at least including a step path and an elevator path;
respectively combining and arranging the monitoring numbers of the authorized monitoring equipment on each path to obtain a building route subchain corresponding to each path;
and generating the equipment chain in an ordered tree form according to the outdoor route subchain and the building route subchain.
4. The method of claim 1, wherein assigning the visitor an identification comprises:
identifying feature information of the visitor, the feature information including a biometric feature, a clothing feature, and/or an associated feature of the visitor;
and distributing the identification for the visitor according to the characteristic information.
5. The method according to any one of claims 1 to 4, wherein the outputting, in the terminal monitoring device, the video image including the visitor collected by each authorized monitoring device in sequence according to the sequence of the plurality of authorized monitoring devices in the device chain comprises:
determining target authorized monitoring equipment in the equipment chain, wherein the target authorized monitoring equipment is the authorized monitoring equipment of the visitor contained in the currently acquired target video image;
outputting the target video image in the terminal monitoring device;
when the visitor is determined to move to the edge area of the target video image based on the identification mark, outputting a video image collected by the next authorized monitoring device adjacent to the target authorized monitoring device on the device chain in the terminal monitoring device.
6. The method according to claim 5, wherein the outputting, in the terminal monitoring device, the video image captured by a next authorized monitoring device adjacent to the target authorized monitoring device on the device chain comprises:
if the number of next authorized monitoring devices adjacent to the target authorized monitoring device on the device chain includes two or more than two, determining the corresponding relationship between each region in the target video image and the next authorized monitoring device;
when the visitor moves to any area, determining a next target authorized monitoring device from two or more next authorized monitoring devices according to the corresponding relation;
and outputting the video image acquired by the next target authorized monitoring equipment in the terminal monitoring equipment.
7. The method of claim 5, wherein after outputting, in the terminal monitoring device, a video image captured by a next authorized monitoring device adjacent to the target authorized monitoring device on the device chain, the method further comprises:
if the visitor is not contained in the video image acquired by the next authorized monitoring device after the visitor completely moves out of the target video image, determining an associated monitoring device of the target authorized monitoring device, wherein the associated monitoring device is an unauthorized monitoring device installed in a preset range of the target authorized monitoring device;
if the video image acquired by any one of the associated monitoring devices contains the visitor, updating the device chain according to the associated monitoring device;
and carrying out safety monitoring on the visitor based on the updated equipment chain, and generating alarm information aiming at the visitor.
8. The method of claim 1, wherein the number of visitors comprises a plurality of visitors, the property units to be visited by the plurality of visitors are the same property unit, the plurality of visitors are respectively assigned with different identification marks, and the method further comprises:
generating a unified identification of a plurality of visitors according to the identification of each visitor;
and carrying out safety monitoring on a plurality of visitors based on the uniform identification mark so as to output video images containing a plurality of visitors, which are acquired by each authorized monitoring device, in the same terminal monitoring device.
9. A monitoring server comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method for security monitoring of cell visitors as claimed in any of claims 1-8 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out a method for security monitoring of a cell visitor according to any one of claims 1-8.
CN202210360530.1A 2022-04-07 2022-04-07 Safety monitoring method, monitoring server and storage medium for community visitors Active CN114449228B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210360530.1A CN114449228B (en) 2022-04-07 2022-04-07 Safety monitoring method, monitoring server and storage medium for community visitors

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210360530.1A CN114449228B (en) 2022-04-07 2022-04-07 Safety monitoring method, monitoring server and storage medium for community visitors

Publications (2)

Publication Number Publication Date
CN114449228A true CN114449228A (en) 2022-05-06
CN114449228B CN114449228B (en) 2022-08-16

Family

ID=81358827

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210360530.1A Active CN114449228B (en) 2022-04-07 2022-04-07 Safety monitoring method, monitoring server and storage medium for community visitors

Country Status (1)

Country Link
CN (1) CN114449228B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140005423A (en) * 2012-07-03 2014-01-15 에스케이플래닛 주식회사 Method for providing safety come home service, system thereof, terminal thereof and apparatus thereof
CN103617668A (en) * 2013-12-11 2014-03-05 广州中国科学院软件应用技术研究所 Visitor management system and visitor management method
KR20160089677A (en) * 2015-01-20 2016-07-28 렉스젠(주) Security management system and method thereof
CN109816906A (en) * 2019-01-03 2019-05-28 深圳壹账通智能科技有限公司 Safety and protection monitoring method and device, electronic equipment, storage medium
CN110650316A (en) * 2019-09-27 2020-01-03 万翼科技有限公司 Intelligent patrol and early warning processing method and device, electronic equipment and storage medium
CN110852148A (en) * 2019-09-23 2020-02-28 重庆特斯联智慧科技股份有限公司 Visitor destination verification method and system based on target tracking
CN112330864A (en) * 2020-11-05 2021-02-05 浙江宝聚通信息科技有限公司 Visitor management system
CN113053012A (en) * 2021-03-15 2021-06-29 上海深曼科技有限公司 Wisdom community visitor management system
CN113822651A (en) * 2021-09-18 2021-12-21 合肥学院 Wisdom community entrance guard management system based on safety management

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140005423A (en) * 2012-07-03 2014-01-15 에스케이플래닛 주식회사 Method for providing safety come home service, system thereof, terminal thereof and apparatus thereof
CN103617668A (en) * 2013-12-11 2014-03-05 广州中国科学院软件应用技术研究所 Visitor management system and visitor management method
KR20160089677A (en) * 2015-01-20 2016-07-28 렉스젠(주) Security management system and method thereof
CN109816906A (en) * 2019-01-03 2019-05-28 深圳壹账通智能科技有限公司 Safety and protection monitoring method and device, electronic equipment, storage medium
CN110852148A (en) * 2019-09-23 2020-02-28 重庆特斯联智慧科技股份有限公司 Visitor destination verification method and system based on target tracking
CN110650316A (en) * 2019-09-27 2020-01-03 万翼科技有限公司 Intelligent patrol and early warning processing method and device, electronic equipment and storage medium
CN112330864A (en) * 2020-11-05 2021-02-05 浙江宝聚通信息科技有限公司 Visitor management system
CN113053012A (en) * 2021-03-15 2021-06-29 上海深曼科技有限公司 Wisdom community visitor management system
CN113822651A (en) * 2021-09-18 2021-12-21 合肥学院 Wisdom community entrance guard management system based on safety management

Also Published As

Publication number Publication date
CN114449228B (en) 2022-08-16

Similar Documents

Publication Publication Date Title
WO2022121059A1 (en) Intelligent integrated access control management system based on 5g internet of things and ai
Basilico et al. Adversarial patrolling with spatially uncertain alarm signals
JP2021508896A (en) Tracking methods, equipment and systems for potentially infected persons in public places during the epidemic
CN108777719A (en) Entirety is intelligence community platform
US20210043018A1 (en) Smart door system
US20130080120A1 (en) Method for Optimal and Efficient Guard Tour Configuration Utilizing Building Information Model and Adjacency Information
CN109816906B (en) Security monitoring method and device, electronic equipment and storage medium
CN113053013B (en) Access control method and device based on face recognition, computer equipment and medium
KR20180101648A (en) Sharing system for individual parking zone Smart human body counter
CN112348457B (en) Method, system and storage medium for planning mansion patrol path
CN109788037B (en) Cluster management method, device and system and computer storage medium
CN112466146A (en) Park visitor management method and system based on 5G technology
CN115457706B (en) Control method and device of storage cabinet, electronic equipment and storage medium
CN104144180A (en) Internet-of-things management method, internet-of-things client side and internet-of-things platform
US10664986B2 (en) Method and system for assigning space related resources
CN110084917A (en) A kind of prison institute intelligent patrol detection managing and control system on duty and method
CN109637176A (en) A kind of parking stall recommended method and device based on wisdom garden
CN114358980A (en) Intelligent community property management system and method based on Internet of things
CN114449228B (en) Safety monitoring method, monitoring server and storage medium for community visitors
CN109712289A (en) A kind of garden security information processing method and processing device based on intelligent management platform
Jaafar et al. Intelligent guidance parking system using modified Dijkstra’s algorithm
TW202103065A (en) Facility management system, face authentication device, facility management method, and computer system
CN114820241A (en) Scene information management method and system for smart community
CN113205876B (en) Method, system, electronic device and medium for determining effective clues of target person
US20210264621A1 (en) Tracking within and across facilities

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant