CN114694288A - Access control safety management system and method - Google Patents

Access control safety management system and method Download PDF

Info

Publication number
CN114694288A
CN114694288A CN202210333033.2A CN202210333033A CN114694288A CN 114694288 A CN114694288 A CN 114694288A CN 202210333033 A CN202210333033 A CN 202210333033A CN 114694288 A CN114694288 A CN 114694288A
Authority
CN
China
Prior art keywords
ward
data
person
local gateway
managed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210333033.2A
Other languages
Chinese (zh)
Inventor
戴聪棋
肖春燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Haoersai Smart Metro Technology Co ltd
Original Assignee
Beijing Haoersai Smart Metro Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Haoersai Smart Metro Technology Co ltd filed Critical Beijing Haoersai Smart Metro Technology Co ltd
Priority to CN202210333033.2A priority Critical patent/CN114694288A/en
Publication of CN114694288A publication Critical patent/CN114694288A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/10Movable barriers with registering means
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)

Abstract

The system comprises an access control device, a first wireless communication device, a local gateway and a remote server. The entrance guard device is arranged at an entrance of the activity space to open or close the entrance. A first wireless communication device disposed at a periphery of the doorway of the activity space and configured to communicate with a second wireless communication device carried by the ward. A remote server is in communication with the local gateway and cooperates for anti-lost management, wherein the remote server is configured to obtain hosted data of a ward and transmit the obtained hosted data to the local gateway. The local gateway is configured to acquire the position of the ward, determine whether the ward is about to leave or leave the allowable moving range, and control the access control device to close the access, so as to reduce the workload of the remote server and maintain stable communication of the management system.

Description

Access control safety management system and method
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a system and a method for security management of an access control.
Background
On the existing market, children prevent products of wandering away mainly have children's wrist-watch bracelet, children's knapsack, prevent the area of wandering away etc. these products mainly utilize GPS location and network communication, carry out data transmission with the head of a family, realize control children position and route, report an emergency and ask for help or increased vigilance the purpose of preventing wandering away through head of a family control and APP warning realization. However, based on the existing children's anti-lost products, on the one hand, accurate positioning of children or other monitored persons cannot be realized, and on the other hand, for example, when children are performing activities alone, parents can only utilize the product technology to perform passive monitoring at home, and the lost behaviors cannot be effectively prevented in time, and the abduction behaviors and dangerous behaviors are prevented.
Disclosure of Invention
The present disclosure is provided to solve the above-mentioned problems occurring in the prior art. There is a need for an access security management system and method that can effectively manage and control a person under surveillance in the case of an unstable network, reduce the workload of a remote server, and solve the problem of poor real-time performance of a local gateway.
According to a first aspect of the present disclosure, there is provided an access control security management system, including an access control device provided at an entrance of an activity space to open or close the entrance; a first wireless communication device arranged at the periphery of the entrance and the exit of the activity space and configured to communicate with a second wireless communication device carried by a monitored person; a local gateway and a remote server in communication with the local gateway and cooperating for anti-lost management, wherein the remote server is configured to: acquiring managed data of a monitored person, wherein the managed data at least comprises the monitored person, a guardian corresponding to the monitored person and an allowable moving range of the monitored person; and transmitting the obtained hosted data to the local gateway; the local gateway is configured to: acquiring the position of the monitored person based on the communication condition of the first wireless communication device and the second wireless communication device; and determining whether the ward leaves or leaves the allowable moving range based on the position of the ward and the managed data of the ward, and controlling the entrance guard device to close the entrance in the case that the ward leaves or leaves the allowable moving range.
According to a second aspect of the present disclosure, there is provided an access control security management method, the method including providing an access control device at an entrance of an activity space to open or close the entrance; arranging a first wireless communication device at the periphery of an entrance and an exit of the activity space, wherein the first wireless communication device is communicated with a second wireless communication device carried by a ward; arranging a local gateway and a remote server which is communicated with the local gateway and works cooperatively to perform anti-lost management, wherein managed data of a monitored person is obtained through the remote server, and the managed data at least comprises the monitored person, a guardian corresponding to the monitored person and an allowed activity range of the monitored person; and transmitting the acquired hosted data to the local gateway; acquiring a location of the ward via the local gateway based on a communication status of the first wireless communication device and the second wireless communication device; and determining whether the ward leaves or leaves the allowable moving range based on the position of the ward and the managed data of the ward, and controlling the entrance guard device to close the entrance in the case where the ward leaves or leaves the allowable moving range.
Compared with the prior art, the beneficial effects of the embodiment of the present disclosure are that:
based on the access control safety management system, the active intervention on the monitored person is realized, and the monitoring timeliness and the monitoring safety are improved. Secondly, the remote server communicates with the local gateway and works cooperatively to perform anti-lost management, the remote server transmits the acquired managed data to the local gateway, the local gateway analyzes the acquired managed data, and judges whether the monitored person leaves or leaves the allowable range of motion, so that the problem of analysis interruption or delay caused by unstable network can be effectively solved. Meanwhile, the remote server transmits the managed data to the local gateway, and the local gateway analyzes the data, so that the workload of the remote server can be reduced, and the power consumption of the management system can be reduced.
The foregoing general description and the following detailed description are exemplary and explanatory only and are not intended to limit the invention as claimed.
Drawings
In the drawings, which are not necessarily drawn to scale, like reference numerals may depict like parts in different views. Like reference numerals having letter suffixes or different letter suffixes may represent different examples of similar components. The drawings illustrate generally, by way of example, but not by way of limitation, various embodiments and, together with the description and the claims, serve to explain the disclosed embodiments. Such embodiments are illustrative and exemplary and are not intended to be exhaustive or exclusive embodiments of the present method, apparatus, system, or non-transitory computer-readable medium having instructions for carrying out the method.
Fig. 1 shows a block diagram of an access security management system according to an embodiment of the present disclosure;
FIG. 2 illustrates a signaling flow diagram based on communication between a remote server and a local gateway in accordance with yet another embodiment of the present disclosure;
fig. 3 shows a schematic view of an access security management system according to yet another embodiment of the present disclosure;
fig. 4 shows a flow chart of a method for entrance guard safety management according to an embodiment of the present disclosure;
fig. 5 illustrates a block diagram of an apparatus for managing a ward by a remote server according to an embodiment of the present disclosure.
Detailed Description
For those skilled in the art to better understand the technical solutions of the present disclosure, the following detailed description of the present disclosure is provided in conjunction with the accompanying drawings and specific embodiments. Embodiments of the disclosure are described in further detail below with reference to the figures and the detailed description, but the disclosure is not limited thereto. The order in which the various steps described herein are described as examples should not be construed as a limitation, if not a requirement of context, and one of ordinary skill in the art would know that the order may be adjusted without destroying the logical interrelationship of the steps, which renders the overall process impractical.
The use of "first," "second," and similar terms in this disclosure does not denote any order, quantity, or importance, but rather the terms are used to distinguish one element from another. The terms "first wireless communication apparatus" and "second wireless communication apparatus" used in the present disclosure are distinguished with respect to the communication manner. The communication mode may be a communication mode level, such as a bluetooth communication mode. The word "comprising" or "comprises", and the like, means that the element preceding the word covers the element listed after the word, and does not exclude the possibility of also covering other elements. "upper", "lower", "left", "right", and the like are used merely to indicate relative positional relationships, and when the absolute position of the object being described is changed, the relative positional relationships may also be changed accordingly.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs unless specifically defined otherwise. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein. Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
Fig. 1 shows a block diagram of a door security management system 100 according to an embodiment of the present disclosure, where the door security management system 100 includes at least a door control device 101, a first wireless communication device 103, a local gateway 105, and a remote server 106. The door access device 101 is disposed at an entrance 102 of an activity space to open or close the entrance 102. The access control device 101 is used to control the opening or closing state of the entrance 102 of the activity space, and the specific position and distribution of the access control device 101 at the entrance 102 of the activity space are not particularly limited as long as the access control device 101 can control the opening or closing of the entrance 102.
Specifically, the first wireless communication device 103 arranged around the entrance 102 of the activity space is configured to communicate with the second wireless communication device 104 carried by the monitored person, so as to realize real-time monitoring and accurate positioning of the activity track of the monitored person, and facilitate obtaining of real-time activity data of the monitored person. The first wireless communication device 103 is disposed around the entrance 102 of the activity space, and the specific position of the first wireless communication device 103 around the entrance 102 is not limited as long as the first wireless communication device 103 can communicate with the second wireless communication device 104. For example, the first wireless communication device 103 may be a base station deployed with iBeacon, and the second wireless communication device 104 may be a watch, a bracelet, a backpack, an anti-lost belt, etc. with GPS positioning and network communication functions, which are not limited herein.
The access control security management system 100 in this embodiment further includes a local gateway 105 and a remote server 106, where the remote server 106 communicates with the local gateway 105 and cooperates with the local gateway 105 to perform anti-lost management, which is beneficial to improving the timeliness and security of the access control security management system 100 and reducing the power consumption of the access control security management system 100.
Wherein the remote server 106 is configured to obtain managed data of the monitored person, the managed data at least comprises the monitored person, the monitored person corresponding to the monitored person, and the allowed activity range of the monitored person, and transmit the obtained managed data to the local gateway 105. Wherein, the person to be monitored includes but is not limited to children, patients with senile dementia or other mental diseases, and other persons needing monitoring. The managed data in this embodiment at least gives information about the ward to verify the ward's identity, such as the face characteristics, age, sex, height, etc. of the ward, which facilitates identification of the physiological characteristics of the identity information. Meanwhile, the managed data in this embodiment further includes a guardian corresponding to the ward, for example, the ward is a child, and the guardian may be a parent, a grandparent, an outlook, a girl, a uncle, or the like. When the ward is an elderly person suffering from senile dementia, the guardian thereof may be a child, a descendant, or other guardian thereof. The managed data of this embodiment further includes the range of the allowed activities of the monitored person, and once the range of the activities of the monitored person exceeds the range of the allowed activities, important monitoring and even prompting are required.
The remote server 106 transmits the acquired hosted data to the local gateway 105. On one hand, when the problems of network instability such as network disconnection, network delay and the like occur, the problem of system failure caused by the fact that the entrance guard safety management system 100 cannot acquire the data to be analyzed in time under the condition that the network is unstable is solved by transmitting the managed data to be analyzed to the local gateway 105; on the other hand, transmitting the obtained managed data to the local gateway 105 is also beneficial to reducing the workload of the remote server 106 and reducing the power consumption of the access security management system 100.
The local gateway 105 is configured to obtain the location of the monitored person based on the communication status of the first wireless communication device 103 and the second wireless communication device 104, so as to implement real-time monitoring on the monitored person. The first wireless communication device 103 and the second wireless communication device 104 cooperate with each other to perform real-time communication, so that the position information of the monitored person can be acquired and monitored in real time, and the acquired real-time position information provides a premise for subsequent monitoring of the monitored person.
The local gateway 105 determines whether the ward is about to leave or leave the allowable moving range based on the position of the ward and the managed data of the ward, and controls the door access device 101 to close the doorway 102 in the case where the ward is about to leave or leave the allowable moving range. The local gateway 105 analyzes and compares the acquired real-time position information of the monitored person with the managed data, the local gateway 105 directly analyzes the data, edge calculation is realized at the gateway end, the gateway end directly compares the data, linkage alarm of the local equipment is realized, and therefore the problem of failure of a broken network system is solved.
Specifically, taking the child's activities in the community as an example, as shown in fig. 2, the parent sets and uploads the hosted data, and the remote server 201 obtains the hosted data (step 204), and transmits the obtained hosted data to the local gateway 202. The iBeacon basic station communication in children's bracelet and the community, the iBeacon basic station acquires children's real-time position data. The local gateway 202 acquires the managed data and the child position data (step 205), analyzes and compares the data based on the managed data and the child position data, determines whether the child leaves the allowable movement range (step 206), closes the entrance if the child leaves (step 207), and records the saved data (step 208) if the child does not leave, thereby reducing the workload of the remote server and keeping the data stable.
In addition, as shown in fig. 3, the entrance guard security management system 100 may further include a entrance guard facility 300, the entrance guard setting 300 includes an alarm device 301, for example, an iBeacon base station is used as the first wireless communication device, if a child walks out of a safe activity area, the entrance guard setting 300 acquires corresponding data, and prompts an entrance guard person to further verify the activity condition of the child in an acousto-optic alarm manner through the alarm device 301, so as to further ensure the security of controlling the activity of the child.
In some embodiments, the first wireless communication device 103 is used as a monitoring device and is further configured to monitor whether a person enters a preset monitoring range. Specifically, the preset monitoring range may be understood as a certain range near a dangerous area, such as a safety distance boundary of a power distribution cabinet, a vicinity of a community entrance 102, an area that is to exceed or exceeds an allowable activity range, where the allowable activity range is set by a guardian, and may be some other area that needs to be monitored safely. Under the condition that a person enters a preset monitoring range, the first wireless communication device 103 acquires identification information of the person, the identification information represents whether the person belongs to a monitored person, whether the person belongs to the monitored person is determined based on the acquired identification information of the person, and if yes, the identification information of the monitored person is sent to the local gateway 105.
For example, if there are still many managed data to be analyzed in the local gateway 105, at this time, the first wireless communication device 103 detects that a child enters the predictive monitoring range, and the first wireless communication device 103 determines whether the child is a person to be monitored by acquiring the identification information of the child. In the specific implementation process, the management system identifies the person to be monitored in the data hosted by the monitoring person, which is beneficial for the first wireless communication device 103 to perform rapid identity recognition on the person who enters the preset monitoring range, and determine whether the person to be monitored is the person to be monitored, so that the situation that the range of motion of the person to be monitored exceeds the allowable range of motion when the relevant hosted data of the person to be monitored is not analyzed and compared can be effectively avoided.
In some embodiments, the local gateway 105 is further configured to obtain identification information of the ward, and verify whether the local has escrow data corresponding to the ward based on the identification information of the ward. Specifically, if the first wireless communication device 103 determines that the person entering the preset monitoring range is the ward, the identification information of the ward is sent to the local gateway 105, the local gateway 105 searches the local database for the hosted data related to the identification information, and if the corresponding hosted data can be searched, the hosted data is analyzed and compared immediately. If the monitored person leaves or leaves the allowable moving range, the access control device 101 is controlled to close the access 102 under the condition that the monitored person leaves or leaves the allowable moving range, so that the monitored person can be managed in time, and the timeliness of managing the monitored person is improved.
In some embodiments, the local gateway 105 is further configured to request the hosted data of the monitored person from the remote server 106 upon verifying that the local does not have the hosted data corresponding to the monitored person. After a person enters a preset monitoring range, if the person is determined to be a monitored person, but the local gateway 105 does not analyze and compare corresponding managed data, the local gateway 105 locally verifies whether the corresponding managed data exists after receiving the identification information of the person, once the local gateway 105 does not find the corresponding managed data in the local database, the managed data may still exist in the remote server 106 and is not sent to the local gateway 105, and the local gateway 105 requests the remote server 106 to verify whether the corresponding managed data exists.
The remote server 106 is further configured to respond to a request by the local gateway 105 for the attendee's hosted data by confirming whether or not there is hosted data for the attendee, and if so, to transmit the attendee's hosted data to the local gateway 105, and if not, to transmit a notification to the local gateway 105 that the attendee does not have hosted data. Whether the managed data of the ward who enters the preset monitoring range is managed or not is confirmed through the interaction of the local gateway 105 and the remote server 106, so that the related data is prevented from being missed.
In some embodiments, the local gateway 105 is further configured to request the hosted data of the monitored person from the remote server 106 upon verifying that the local does not have the hosted data corresponding to the monitored person. The remote server 106 is further configured to confirm whether the attendee's hosted data is available in response to the local gateway 105's request for the attendee's hosted data; if the managed person has the managed data of the monitored person, the managed data of the monitored person is transmitted to the local gateway 105, and it is determined whether the monitored person is to leave or leave the allowable range of activities based on the location of the monitored person and the managed data of the monitored person, and in the case where the monitored person is to leave or leave the allowable range of activities, the access control device 101 is controlled to close the access opening 102. When determining that the managed data of the monitored person exists, the remote server 106 determines whether the monitored person should leave or leave the allowable activity range based on the position of the monitored person and the managed data of the monitored person, and timely controls the entrance 102, so that the entrance security management system 100 can quickly manage and control the person entering the preset monitoring range, and further improve the management security and timeliness.
In some embodiments, the hosted data further includes a timestamp, and the timestamp is used to indicate a time when the remote server 106 and the local gateway 105 respectively obtain the corresponding hosted data, so that it is beneficial for the local gateway to determine whether the hosted data to be processed is the latest hosted data. Further, the local gateway 105 is further configured to confirm whether a timestamp of the local hosted data is advanced beyond a time threshold compared to a current time, in case it is verified that there is locally hosted data corresponding to the ward. The time threshold may be understood as a certain time from the current time by a certain time period, and in this embodiment, it is required to determine whether the time threshold is exceeded in advance, and the time threshold may be understood as any time before the certain time from the current time by the certain time period. For example, if the current time is 15:00 and the certain time period is 5 minutes, the time threshold may be 14:55 or 15:05, and the time threshold exceeded earlier is 14:55 previous time. By determining whether the timestamp of the local hosted data exceeds the time threshold ahead of the current time, it is beneficial to determine whether the data to be analyzed and compared by the local gateway 105 is the latest hosted data.
In the event that the timestamp of the local hosted data is advanced beyond a time threshold compared to the current time, sending an aging verification request for the ward's hosted data to the remote server 106, the aging verification request including the ward's identification information and timestamp in the local hosted data. Specifically, the timestamp of the local hosted data exceeds the current time by more than a time threshold, indicating that the hosted data to be processed by the local gateway 105 is hosted longer and may not be the latest hosted data. It can be appreciated that the monitoring personnel may modify the hosted data after the first setting of the hosted data, which is beneficial to avoid the local gateway 105 processing the failed hosted data by determining whether the timestamp of the local hosted data exceeds the time threshold in advance.
The remote server 106 is further configured to confirm whether the timestamp of the hosted data of the ward of the remote is later than the timestamp of the hosted data of the ward of the local in response to the aging verification request; if so, the remote ward's hosted data is transmitted to the local gateway 105, and if not, a notification is transmitted to the local gateway 105 that the local hosted data is up-to-date, thereby ensuring that the local gateway 105 is processing up-to-date hosted data. For example, the remote server 106 verifies that the timestamp of the hosted data stored at the remote server 106 is 14:58, and the timestamp of the hosted data in the local gateway 105 is 14:55, which indicates that the hosted data is modified and updated. In this case, the remote server 106 transmits the latest managed data to the local gateway 105, and the local gateway 105 performs processing analysis on the updated managed data, thereby greatly improving the timeliness of processing data. However, when the remote server 106 verifies that the timestamp of the hosted data is 14:54, which indicates that the latest hosted data obtained by the remote server 106 is consistent with the hosted data obtained by the local gateway 105, at this time, the remote server 106 issues a notification that the hosted data is the latest hosted data to the local gateway 105, and the local gateway 105 can perform analysis processing.
In some embodiments, the remote server 106 is further configured to record an abnormal exit event if the managed person does not have the hosted data of the monitored person, wherein the abnormal exit event includes physiological identification information of the monitored person, an occurrence time and a location of the abnormal exit event. For example, the first wireless communication device 103 detects that a person enters a predetermined monitoring range, and records an abnormal exit event if it is found by verification that there is no corresponding hosted data about the person at both the remote server 106 and the local gateway 105. Meanwhile, physiological identification information of the person under supervision including facial features, name, age, sex, etc., and the time and place of occurrence of the abnormal departure event of the person are recorded.
In some embodiments, the remote server 106 is configured to determine a risk of loss for the ward corresponding to each abnormal exit event based on the record of the abnormal exit event. For example, the system counts the records of each abnormal exit event and calculates the loss risk of the corresponding monitored person, wherein the loss risk can be understood as that the probability that the corresponding monitored person goes out of the allowable range of motion is higher and the loss risk is higher. In case the risk of a person being monitored getting lost exceeds a preset threshold, prompting the third wireless communication device 107 of the person being monitored for a follow-up handling option of the abnormal exit event, comprising at least one of: and setting managed data, intercepting the ward person and starting voice and/or video call. When the risk of losing is represented by a probability value, the preset threshold may be a probability value, for example, the preset threshold is 60%, and a risk of losing exceeding 60% means that the guardian is out of the allowable range at a high frequency, and has a higher risk of losing, at this time, the system prompts a subsequent processing option of the abnormal leaving event to a mobile phone or a bracelet of the mother of the child with the higher risk of losing, so as to obtain a processing right. For example, a guardian can be prompted to perform data hosting, or the guardian can be prompted to intercept the monitored person, and a voice and/or video call is started to continue to control the monitored person after the authorization of the guardian is obtained. In this way, the safety of the monitored person can be further ensured. The higher the occurrence frequency is, the higher the monitored level indicated by the physiological identification information is, the higher the risk of losing is.
In some embodiments, the local gateway 105 is further configured to control the entrance guard 101 according to any one of the indication of approving leaving, the indication of call request, the indication of interception and the indication of cancellation of interception issued from the remote server 106, and update local escrow data with the escrow data of the ward received from the remote server 106. For example, if the guardian wants to verify the ward through the third wireless communication device 107, a call request indication is sent to the remote server 106, and the local gateway 105 receives the call request indication
Fig. 4 shows a flow chart of a low power loss anti-lost management method according to an embodiment of the present disclosure.
In step S401, the entrance 102 of the activity space is provided with the entrance 101 to open or close the entrance 102, and the entrance 102 is conveniently and efficiently controlled by the entrance 101.
In step S402, the first wireless communication device 103 is disposed around the entrance 102 of the activity space, the first wireless communication device 103 communicates with the second wireless communication device 104 carried by the ward, the first wireless communication device 103 is disposed around the entrance 102 of the activity space, the position around the entrance 102 can be monitored, the position of the ward can be obtained in real time by passing through the second wireless communication device 104, and the monitoring timeliness and accuracy are improved.
As step S403, the local gateway 105 and the remote server 106 are arranged, and the remote server 106 communicates with the local gateway 105 and works in cooperation to perform anti-lost management.
In step S404, obtaining managed data of the ward via the remote server 106, where the managed data at least includes the ward, the guardian corresponding to the ward, and the allowed activity range of the ward; and transmitting the acquired hosted data to the local gateway 105 to reduce the workload of the remote server 106 and improve the timeliness of data processing.
Acquiring the position of the ward via the local gateway 105 based on the communication status of the first wireless communication apparatus 103 and the second wireless communication apparatus 104 as by step S405; it is determined whether the ward is about to leave or leave the allowable moving range based on the position of the ward and the managed data of the ward, and the door access device 101 is controlled to close the doorway 102 in the case where the ward is about to leave or leave the allowable moving range. Through the linkage cooperation of entrance guard's device 101, local gateway 105 and remote server 106, realize the initiative intervention to the person under supervision's home range, when discovering that the person under supervision leaves or has left under the circumstances that allows the home range, self-closing main entrance controls the person under supervision's home range, has improved the security of guardianship.
In some embodiments, the first wireless communication apparatus 103 is used as a monitoring device, and monitors whether a person enters a preset monitoring range via the first wireless communication apparatus 103; under the condition that a person enters a preset monitoring range, acquiring identity identification information of the person, wherein the identity identification information represents whether the person belongs to a person to be monitored; and determining whether the personnel belongs to the monitored personnel based on the acquired identification information of the personnel, and if so, sending the identification information of the monitored personnel to the local gateway 105, thereby being beneficial to avoiding the condition that the monitored personnel is not effectively managed and controlled in time due to time delay.
In some embodiments, the identity information of the ward is obtained via the local gateway 105; the method comprises the steps of verifying whether managed data corresponding to a monitored person exist locally or not based on identification information of the monitored person, analyzing whether the monitored person leaves or leaves the allowable moving range or not if the managed person locally has the managed data corresponding to the monitored person, and controlling the access control device 101 to close the access 102 under the condition that the monitored person leaves or leaves the allowable moving range so as to improve the safety and timeliness of the system for the monitored person to manage.
In some embodiments, the local gateway 105 requests the ward's hosted data from the remote server 106 upon verifying that there is no hosted data corresponding to the ward locally; the remote server 106 responds to the request of the local gateway 105 for the managed data of the ward, confirms whether the managed data of the ward exists, if so, transmits the managed data of the ward to the local gateway 105, and otherwise, transmits a notice that the ward does not manage the data to the local gateway 105, so as to further obtain the managed information for verifying the ward and improve the accuracy of the system.
In some embodiments, the local gateway 105 requests the ward's hosted data from the remote server 106 upon verifying that there is no hosted data corresponding to the ward locally; the remote server 106 confirms whether the managed person has managed data of the monitored person in response to the request of the local gateway 105 for the managed person's managed data; if the managed person has managed data of the monitored person, the managed person's managed data is transmitted to the local gateway 105, and it is determined whether the monitored person should leave or leave the allowable moving range based on the position of the monitored person and the managed person's managed data, and in the case where the monitored person should leave or leave the allowable moving range, the entrance/exit 102 is controlled to be closed by the entrance guard 101, which is advantageous to timely managing the monitored person.
In some embodiments, the hosted data further includes a timestamp, and the local gateway 105 confirms whether the timestamp of the hosted data locally is ahead of the current time by more than a time threshold if the core locally has hosted data corresponding to the ward; sending an aging verification request of the managed data of the monitored person to a remote server 106 when the timestamp of the local managed data is more than a time threshold value in advance than the current time, wherein the aging verification request comprises the identification information and the timestamp of the monitored person in the local managed data; the remote server 106, in response to the aging verification request, confirms whether the timestamp of the remotely hosted data of the ward is later than the timestamp of the locally hosted data of the ward; if so, the managed data of the remote ward is transmitted to the local gateway 105, otherwise, the notification that the local managed data is the latest is transmitted to the local gateway 105, so that the processing and analysis of the updated managed data are facilitated, the timeliness of system processing is provided, and the management and control safety of the system is further ensured.
Taking the remote server 106 as an example, fig. 5 shows a block diagram of an apparatus for managing monitored persons by the remote server according to an embodiment of the present disclosure. As shown in fig. 5, the apparatus 500 may include a communication interface 503 to obtain data such as the managed data of the ward and the real-time location information of the ward; and a processor 501 configured to determine whether the ward is about to leave or leave the allowable moving range based on the acquired position of the ward and the managed data of the ward, and control the door access device 101 to close the doorway 102 in a case where the ward is about to leave or leave the allowable moving range. The processor 501 executes functions or methods implemented at least by code or instructions included in a program stored in the storage 505 (e.g., the managed data handler 508), performs the steps of acquiring managed data of a ward, and transmitting the acquired managed data to the local gateway. Examples of the processor 501 include a Central Processing Unit (CPU), a Micro Processing Unit (MPU), a GPU, a microprocessor, a processor core, a multiprocessor, an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), and the like.
The managed data handler 508 is configured to obtain managed data of a ward, the managed data including at least the ward, a guardian corresponding to the ward, and an allowed range of activity of the ward; and transmitting the acquired hosted data to the local gateway 105. However, the hosted data handler stored by the local gateway 105 is configured to acquire the location of the ward based on the communication status of the first wireless communication device 103 and the second wireless communication device 104; and determining whether the ward leaves or leaves the allowable moving range based on the position of the ward and the managed data of the ward, and controlling the access control device 101 to close the entrance 102 in the case where the ward leaves or leaves the allowable moving range.
The memory 504 temporarily stores the program loaded from the storage 505. Various data generated when the processor 501 executes the program, such as but not limited to physiological information characteristics 506, may also be temporarily stored in the memory 504. The memory 504 includes, for example, Random Access Memory (RAM) and Read Only Memory (ROM).
The storage 505 stores programs executed by the processor 501, for example. The storage 505 includes, for example, a Hard Disk Drive (HDD), a Solid State Drive (SSD), and a flash memory.
The input/output interface 502 may include an input device for inputting various operations and an output device for outputting various processing results of the apparatus 500.
The communication interface 503 performs transmission and reception of various data via a network. The communication may be performed by cable or wirelessly, and any communication protocol may be used as long as it can communicate with each other.
Various components in the apparatus 500 may communicate information with each other via the bus 507. The storage medium may store the program in a "non-transitory tangible medium". Further, the program includes, for example, a software program or a computer program.
Further, at least some processing in apparatus 500 may be implemented by cloud computing configured by one or more computers. In some embodiments, at least some processing in apparatus 500 may be performed by another apparatus. In this case, at least some of the processing of each functional unit realized by the processor 501 may be performed by alternative means.
Various operations or functions are described herein that may be implemented as or defined as software code or instructions. Such content may be source code or differential code ("delta" or "patch" code) that may be executed directly ("object" or "executable" form). The software code or instructions may be stored in a computer-readable storage medium and, when executed, may cause a machine to perform the functions or operations described, and includes any mechanism for storing information in a form accessible by a machine (e.g., a computing device, an electronic system, etc.), such as recordable or non-recordable media (e.g., Read Only Memory (ROM), Random Access Memory (RAM), magnetic disk storage media, optical storage media, flash memory devices, etc.).
The exemplary methods described herein may be machine or computer implemented, at least in part. Some examples may include a non-transitory computer-readable medium or machine-readable medium encoded with instructions operable to configure an electronic device to perform a method as described in the examples above. An implementation of such a method may include software code, such as microcode, assembly language code, higher-level language code, or the like. Various programs or program modules may be created using various software programming techniques. For example, program segments or program modules may be designed using Java, Python, C + +, assembly language, or any known programming language. One or more of such software portions or modules may be integrated into a computer system and/or computer-readable medium. Such software code may include computer readable instructions for performing various methods. The software code may form part of a computer program product or a computer program module. Further, in one example, the software code can be tangibly stored on one or more volatile, non-transitory, or non-volatile tangible computer-readable media, such as during execution or at other times. Examples of such tangible computer-readable media may include, but are not limited to, hard disks, removable magnetic disks, removable optical disks (e.g., optical disks and digital video disks), magnetic cassettes, memory cards or sticks, Random Access Memories (RAMs), Read Only Memories (ROMs), and the like.
Moreover, although illustrative embodiments have been described herein, the scope includes any and all embodiments having equivalent elements, modifications, omissions, combinations (e.g., of aspects across various embodiments), adaptations or alterations based on the present disclosure. The elements in the claims are to be interpreted broadly based on the language employed in the claims and not limited to examples described in the specification or during the life of the application. Further, the steps of the disclosed methods may be modified in any manner, including by reordering steps or inserting or deleting steps. It is intended, therefore, that the description be regarded as examples only, with a true scope being indicated by the following claims and their full scope of equivalents.

Claims (16)

1. The utility model provides an entrance guard's safety control system which characterized in that, entrance guard's safety control system includes:
an entrance guard device provided at an entrance of the activity space to open or close the entrance;
a first wireless communication device disposed around an entrance and an exit of the activity space and configured to communicate with a second wireless communication device carried by a ward;
a local gateway and a remote server in communication with the local gateway and cooperating for anti-lost management, wherein
The remote server is configured to: acquiring managed data of a monitored person, wherein the managed data at least comprises the monitored person, a guardian corresponding to the monitored person and an allowable moving range of the monitored person; and transmitting the obtained hosted data to the local gateway;
the local gateway is configured to: acquiring the position of the ward person based on the communication condition of the first wireless communication device and the second wireless communication device; and determining whether the ward leaves or leaves the allowable moving range based on the position of the ward and the managed data of the ward, and controlling the entrance guard device to close the entrance in the case where the ward leaves or leaves the allowable moving range.
2. The access control security management system of claim 1, wherein the first wireless communication device functions as a monitoring device and is further configured to:
monitoring whether a person enters a preset monitoring range;
under the condition that a person enters a preset monitoring range, acquiring identity identification information of the person, wherein the identity identification information represents whether the person belongs to a person to be monitored;
and determining whether the person belongs to the monitored person or not based on the acquired identification information of the person, and if so, sending the identification information of the monitored person to the local gateway.
3. The access security management system according to claim 1 or 2, wherein the local gateway is further configured to: acquiring the identity identification information of the monitored person; and verifying whether the managed person locally has managed data corresponding to the managed person based on the identification information of the monitored person, if so, analyzing whether the monitored person leaves or leaves the allowable moving range, and controlling the entrance guard device to close the entrance and exit under the condition that the monitored person leaves or leaves the allowable moving range.
4. The access security management system of claim 3, wherein the local gateway is further configured to: requesting, from a remote server, hosted data of the ward, in case it is verified that there is no hosted data corresponding to the ward locally;
the remote server is further configured to: in response to the local gateway's request for the ward's managed data, confirming whether there is the ward's managed data, if so, transmitting the ward's managed data to the local gateway, if not, transmitting a notification that the ward does not have the managed data to the local gateway.
5. The access security management system of claim 3, wherein the local gateway is further configured to: requesting, from a remote server, hosted data of the ward, in case it is verified that there is no hosted data corresponding to the ward locally;
the remote server is further configured to: confirming whether the managed person's managed data is available in response to a request for the managed person's managed data by the local gateway; transmitting the managed data of the ward to the local gateway if having the managed data of the ward, and determining whether the ward is to leave or leave the allowable moving range based on the position of the ward and the managed data of the ward, and controlling the entrance guard device to close the entrance in case the ward is to leave or leave the allowable moving range.
6. The access security management system of claim 3, wherein the escrow data further comprises a timestamp, the local gateway further configured to: in the event that it is verified that there is locally hosted data corresponding to the ward, confirming whether a timestamp of the locally hosted data is advanced beyond a time threshold compared to a current time; sending an aging verification request of the managed data of the ward to a remote server under the condition that the time stamp of the local managed data is more than a time threshold value ahead of the current time, wherein the aging verification request comprises the identification information and the time stamp of the ward in the local managed data;
the remote server is further configured to: in response to the time-of-day verification request, confirming whether a timestamp of the managed data of the remote ward is later than a timestamp of the managed data of the local ward; if so, transmitting the hosted data of the remote ward to the local gateway, and if not, transmitting a notification to the local gateway that the local hosted data is up-to-date.
7. The access security management system of claim 4, wherein the remote server is further configured to: and if the managed data of the ward person is not available, recording the abnormal exit event, wherein the abnormal exit event comprises physiological identification information of the ward person, and occurrence time and place of the abnormal exit event.
8. The access security management system of claim 7, wherein the remote server is configured to:
determining the loss risk of the monitored person corresponding to each abnormal leaving event based on the record of each abnormal leaving event;
in the event that the risk of loss of a ward exceeds a preset threshold, prompting the third wireless communication device of a guardian of the ward for a follow-up handling option for the abnormal exit event, comprising at least one of: setting hosting data, intercepting the person to be monitored and starting voice and/or video call;
the walking risk of the monitored person is associated with the occurrence frequency of the abnormal leaving event of the monitored person and the physiological identification information, and the higher the occurrence frequency is, the higher the monitored level indicated by the physiological identification information is, the higher the walking risk is.
9. The access security management system of claim 5, wherein the local gateway is further configured to: and in the case of receiving any one of an approval leaving instruction, a call request instruction, a trapping instruction and a rejection cancelling instruction from the remote server, controlling the entrance guard device according to the received instruction, and updating local hosting data by using the hosting data of the ward received from the remote server.
10. The access security management system of claim 9, wherein the local gateway is further configured to: requesting, by the local gateway, location information from the third wireless communication device if an indication from the remote server has not been received within a preset time period; and controlling an acousto-optic electric device in a preset range of the positioning information to give an alarm according to the acquired positioning information of the third wireless communication device, wherein the acousto-optic electric device comprises a loudspeaker and/or an electronic billboard.
11. A method for security management of an access control, the method comprising:
an entrance guard device is arranged at an entrance of the activity space to open or close the entrance;
arranging a first wireless communication device at the periphery of an entrance and an exit of the activity space, wherein the first wireless communication device is communicated with a second wireless communication device carried by a ward;
arranging a local gateway and a remote server in communication with the local gateway and cooperating for anti-lost management, wherein
Acquiring managed data of a ward via the remote server, wherein the managed data at least comprises the ward, a guardian corresponding to the ward and an allowed activity range of the ward; and transmitting the obtained hosted data to the local gateway;
acquiring a location of the ward via the local gateway based on a communication status of the first wireless communication device and the second wireless communication device; and determining whether the ward leaves or leaves the allowable moving range based on the position of the ward and the managed data of the ward, and controlling the entrance guard device to close the entrance in the case where the ward leaves or leaves the allowable moving range.
12. The access security management method according to claim 11, wherein the first wireless communication device is used as a monitoring device, and the first wireless communication device is used to monitor whether a person enters a preset monitoring range;
under the condition that a person enters a preset monitoring range, acquiring identity identification information of the person, wherein the identity identification information represents whether the person belongs to a person to be monitored;
and determining whether the personnel belongs to the person to be monitored or not based on the acquired identification information of the personnel, and if so, sending the identification information of the person to be monitored to the local gateway.
13. The access security management method according to claim 11 or 12, wherein the identification information of the ward is acquired via the local gateway; and verifying whether the managed person locally has managed data corresponding to the managed person based on the identification information of the monitored person, if so, analyzing whether the monitored person leaves or leaves the allowable moving range, and controlling the entrance guard device to close the entrance and exit under the condition that the monitored person leaves or leaves the allowable moving range.
14. The access security management method of claim 13, wherein the local gateway requests the escrow data of the person under surveillance from a remote server in case of verifying that there is no escrow data corresponding to the person under surveillance locally;
and the remote server responds to the request of the local gateway for the managed data of the ward, confirms whether the managed data of the ward exists or not, if so, transmits the managed data of the ward to the local gateway, and if not, transmits a notice that the ward does not manage the data to the local gateway.
15. The access security management method of claim 13, wherein the local gateway requests the escrow data of the person under surveillance from a remote server in case of verifying that there is no escrow data corresponding to the person under surveillance locally;
the remote server responds to the request of the local gateway for the managed data of the ward, and confirms whether the managed data of the ward exists or not; transmitting the managed data of the ward to the local gateway if having the managed data of the ward, and determining whether the ward is to leave or leave the allowable moving range based on the position of the ward and the managed data of the ward, and controlling the entrance guard device to close the entrance in case the ward is to leave or leave the allowable moving range.
16. The access security management method according to claim 13, wherein the escrow data further includes a time stamp, and the local gateway confirms whether the time stamp of the local escrow data is earlier than a current time by more than a time threshold value in case of verifying that there is escrow data corresponding to the ward person locally; sending an aging verification request of the managed data of the ward to a remote server under the condition that the time stamp of the local managed data is more than a time threshold value ahead of the current time, wherein the aging verification request comprises the identification information and the time stamp of the ward in the local managed data;
the remote server responds to the time efficiency verification request and confirms whether the time stamp of the managed data of the remote ward is later than that of the managed data of the local ward; if so, transmitting the hosted data of the remote ward to the local gateway, and if not, transmitting a notification to the local gateway that the local hosted data is up-to-date.
CN202210333033.2A 2022-03-30 2022-03-30 Access control safety management system and method Pending CN114694288A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210333033.2A CN114694288A (en) 2022-03-30 2022-03-30 Access control safety management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210333033.2A CN114694288A (en) 2022-03-30 2022-03-30 Access control safety management system and method

Publications (1)

Publication Number Publication Date
CN114694288A true CN114694288A (en) 2022-07-01

Family

ID=82141470

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210333033.2A Pending CN114694288A (en) 2022-03-30 2022-03-30 Access control safety management system and method

Country Status (1)

Country Link
CN (1) CN114694288A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107894705A (en) * 2017-12-29 2018-04-10 郑州光之源电子科技有限公司 Children's telephone wrist-watch and based on Face recognition analysis children method in danger
CN109657549A (en) * 2018-11-14 2019-04-19 北京旷视科技有限公司 A kind of safety monitoring method, device, system and computer storage medium
CN210181769U (en) * 2019-05-24 2020-03-24 张建勇 Children prevent losing and prevent turning sell system
CN113223221A (en) * 2021-05-08 2021-08-06 江苏跨网智能科技有限公司 Laboratory personnel behavior identification method and system based on deep learning network
CN113554838A (en) * 2021-06-16 2021-10-26 核动力运行研究所 Nuclear power station high-risk operation area risk prompting system and method based on electronic fence

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107894705A (en) * 2017-12-29 2018-04-10 郑州光之源电子科技有限公司 Children's telephone wrist-watch and based on Face recognition analysis children method in danger
CN109657549A (en) * 2018-11-14 2019-04-19 北京旷视科技有限公司 A kind of safety monitoring method, device, system and computer storage medium
CN210181769U (en) * 2019-05-24 2020-03-24 张建勇 Children prevent losing and prevent turning sell system
CN113223221A (en) * 2021-05-08 2021-08-06 江苏跨网智能科技有限公司 Laboratory personnel behavior identification method and system based on deep learning network
CN113554838A (en) * 2021-06-16 2021-10-26 核动力运行研究所 Nuclear power station high-risk operation area risk prompting system and method based on electronic fence

Similar Documents

Publication Publication Date Title
US9892608B2 (en) Released offender geospatial location information trend analysis
JP6574449B2 (en) Personal emergency response system using predictive emergency dispatch risk assessment
US20200059776A1 (en) Systems & methods for intelligently managing multimedia for emergency response
US11727518B2 (en) Systems and methods for location fencing within a controlled environment
CN103919683B (en) A kind of old man's timing medication system for prompting
US10089809B1 (en) Cognitive intercom assistant
US20210192183A1 (en) Verification system and verification server
CA3034855A1 (en) Fall warning for a user
US20190197863A1 (en) WareAbouts: Proactive Care System through Enhanced Awareness
US20210383918A1 (en) Systems and methods for provisioning emergency profiles
US10346651B2 (en) Low cost, wide area RFID system
US11289200B1 (en) Authorized user modeling for decision support
US20230029238A1 (en) Offender Electronic Monitoring Program Compliance Assessment and Program Revision
CN110070155A (en) A kind of comprehensive Activity recognition method and system of the inmate based on wearable device
CN114694288A (en) Access control safety management system and method
CN110443931B (en) Hospital access control system and control method
US11720146B1 (en) Controlled-environment facility resident wearables and systems and methods for use
CN114697874A (en) Anti-lost security management system and method
CN114648857A (en) Anti-lost management system and method thereof
CN103389361B (en) Gas monitor, early warning and analysis system and gas monitor, early warning and analysis method
US10210719B1 (en) Automated geospatial security alarm routing
CN111341403A (en) Patient state monitoring method, device, equipment and computer-readable storage medium
Dolui et al. ReTiHA: Real time health advice and action using smart devices
CN105488945A (en) Method and device for monitoring
KR101938708B1 (en) Method and apparatus for managing emergency situation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination