CN115019428A - Passage management method and device based on place codes - Google Patents

Passage management method and device based on place codes Download PDF

Info

Publication number
CN115019428A
CN115019428A CN202210725613.6A CN202210725613A CN115019428A CN 115019428 A CN115019428 A CN 115019428A CN 202210725613 A CN202210725613 A CN 202210725613A CN 115019428 A CN115019428 A CN 115019428A
Authority
CN
China
Prior art keywords
person
information
identification device
identification
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210725613.6A
Other languages
Chinese (zh)
Inventor
钱金柱
程建
梁斌
陈俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN202210725613.6A priority Critical patent/CN115019428A/en
Publication of CN115019428A publication Critical patent/CN115019428A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/215Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Alarm Systems (AREA)

Abstract

The application provides a passage management method and device based on a place code, relates to the technical field of data processing, and can improve the efficiency of passage management. The method is applied to an identification device, which is associated with a venue code of a target venue and which is deployed at an access portal of the target venue. The method specifically comprises the following steps: firstly, information to be identified of a first person is obtained, the first person is a person entering an identifiable area of an identification device, and then according to the obtained information to be identified, the infectious disease infection risk level of the first person is determined; when the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target place, the indication information allowing the first person to normally pass is output.

Description

Passage management method and device based on place codes
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a method and an apparatus for traffic management based on a location code.
Background
For epidemic situations with infectivity, people who have contacted with a diagnosed object need to be medically observed in time according to the infectious disease principle, so that the spreading speed and the spreading range of the epidemic situation are reduced. The recent journey tracking of the confirmed object is particularly needed to confirm the object needing medical observation, so that the confirmed epidemic and the treatment of the epidemic can be carried out in time.
Currently, a site code set in a person-intensive place such as an airport, a station, a hospital, a business trip, an office building, or the like is a special two-dimensional code generated based on each place, and can be used for identifying information such as a place position, a place name, and the like. When a person enters the place, the place code of the place needs to be scanned to generate a passing record of the person entering and exiting the place. In addition, after the location code of the location is scanned, the mobile phone of the person can skip to display the health code, so that the staff can check the health code. When an epidemic situation occurs at a certain place or near the place, people coming in and going out of each place can be determined according to the code scanning record of the place code of each place around the epidemic situation occurrence place, and therefore the people needing medical observation can be determined.
When a person enters the place, the person is required to scan the place code of the place by himself, so that in the place with large pedestrian volume, a large amount of codes are collected at the same place code, and the phenomenon of code scanning is caused, which may cause road congestion and crowd collection, and increase infection risk.
Disclosure of Invention
The application provides a place code-based traffic management method and device, which can improve the traffic management efficiency.
In a first aspect, the embodiment of the present application provides a traffic management method based on a location code, where the method is applied to an identification device, the identification device is associated with the location code of a target location, and the identification device is deployed at an intersection of a target location. The method specifically comprises the following steps: firstly, information to be identified of a first person is obtained, the first person is a person entering an identifiable area of an identification device, and then according to the obtained information to be identified, the infectious disease infection risk level of the first person is determined; when the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target place, the indication information allowing the first person to normally pass is output.
The technical scheme provided based on the application can at least produce the following beneficial effects: the identification device is deployed at an entrance of the target place, and the identification device can acquire the information to be identified of the first person to enter the target place in the identifiable area of the identification device. Furthermore, the acquired information to be identified is identified, so that the infectious disease infection risk of the first person can be judged. Therefore, when the infectious disease infection risk of the first person meets the current epidemic prevention requirement of the target site, the indication information for indicating the normal passing of the first person is output. Compared with the mode that a first person autonomously scans codes to enter a target place, in the technical scheme of the application, a manager of the target place can use the identification equipment to sequentially determine the infectious disease infection risk of each person waiting to enter the target place, so that a peak period can be avoided, a plurality of persons waiting to enter the target place can scan the codes together, and the manager of the target place does not need to sequentially judge whether each person scans the place codes before entering, so that the efficiency of traffic management is improved.
In a possible implementation manner, the registration information of the location code includes identity information of at least one preset person, and the identification device is further associated with the identity information of one person of the at least one preset person.
It can be understood that the identification device is also associated with the identity information of the preset person, so that if the identification result of the identification device is wrong or the identification result is that the first person has a high risk of infection of infectious diseases, the method can quickly trace back to the preset person based on the identification device.
In another possible implementation manner, after the device is powered on, the method further includes: acquiring identity information of a first operator currently operating the identification equipment at a first period; acquiring identity information of at least one preset person according to the site code of the target site; when the at least one preset person comprises a first operator, associating the identification equipment with identity information of the first operator; and when the at least one preset person does not comprise the first operator, stopping the operation of the identification equipment.
It is to be understood that, in this implementation, if the first operator currently operating the identification device does not belong to at least one preset person included in the registration information of the location code, the identification device stops working. Thus, misoperation of other personnel can be prevented.
In another possible implementation manner, after the identification device is powered on, the method further includes: acquiring the current position of the identification equipment in a second period; when the current position of the identification device is not within the area included in the target site, the identification device stops operating.
It can be understood that the implementation manner can prevent the place code of the target place from being misused by other identification devices, thereby affecting the accuracy of the uploaded first-person pass record or alarm information.
In yet another possible implementation, the identification device communicates with a server, and the method further includes: generating a passing record of a first person entering a target place; the passing record comprises an identification of the identification equipment, an identification of the first person and acquisition time for acquiring information to be identified; and sending the pass record to a server.
It can be understood that, in the case that the infectious disease infection risk of the first person meets the epidemic situation prevention and control requirement, the identification device can upload the passage record of the first person entering the target place to the server, so that when a person with the infectious disease infection risk appears near the target place, the server can quickly locate the first person according to the passage record.
In yet another possible implementation manner, the pass record further includes identity information of an operator who operates the identification device when the information to be identified is acquired.
It will be appreciated that in the event of an abnormal situation, it is convenient to trace back to the operator operating the identification device based on the traffic record.
In another possible implementation manner, the identification device is connected to an access control device of the target site, and the method further includes: and when the infectious disease infection risk level of the first person meets the epidemic prevention and control requirement of the target place, controlling the entrance guard equipment to be opened.
It can be understood that, for the target place provided with the access control equipment, the identification equipment can also be connected with the access control equipment of the target place, so that the access control equipment can be controlled to be automatically opened or closed according to the identification result. For example, the epidemic situation prevention and control requirements of a target place are met at the infectious disease infection risk level of a first person, and the entrance guard equipment is controlled to be opened, so that the use of human resources is reduced, and the traffic management is more intelligent.
In another possible implementation manner, when the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target place, and the first person has the right to enter the target place, the access control device is controlled to be opened.
In another possible implementation manner, the method further includes: when the infectious disease infection risk level of the first person does not meet the epidemic situation prevention and control requirement of the target place, alarm information is output, the alarm information comprises an identification of the identification device, an identification of the first person and acquisition time for acquiring information to be identified, the alarm information is used for indicating that the first person has the risk of infecting infectious diseases and determining risk persons having time and space intersection with the first person in a tracing period, and the tracing period is a time period which is obtained by stopping the acquisition time and has preset duration.
Based on the alarm information, managers in target places can report related epidemic prevention departments quickly according to epidemic prevention regulations. In addition, the tracing time period can be quickly determined according to the time of the alarm information based on the alarm information, the action track of the first person in the tracing time period is determined, and then the searching area is determined based on the action track, so that the passing record entering each place in the searching area is called, and the risk personnel needing medical observation can be quickly determined.
In another possible implementation manner, the identification device is connected to an access control device of a target location, and the method further includes: and when the infectious disease infection risk grade of the first person does not meet the epidemic prevention and control requirement of the target place, keeping the access control equipment closed.
In yet another possible implementation, the information to be identified includes an identification code indicating a health condition of the first person and/or identity information of the first person, wherein the identity information of the first person includes one or more of identity document information of the first person, face information of the first person, fingerprint information of the first person, or iris information of the first person.
It will be appreciated that the identification device may identify an identification code indicative of the health of the first person, such as a health code, and quickly determine the health of the first person. Or the identification device can also find out the health data of the first person on the server according to the identity information of the first person, so that the electronic device which does not carry the health code can be conveniently used for the person to go out to the target place.
In a second aspect, the present application provides a traffic management device based on a location code, where the device is applied to an identification device, the identification device is associated with the location code of a target location, and the identification device is deployed at an entrance of the target location, and the device includes: the identification device comprises an acquisition module, a recognition module and a processing module, wherein the acquisition module is used for acquiring information to be identified of a first person, and the first person is a person entering an identifiable area of the recognition device; the processing module is used for determining the infectious disease infection risk level of the first person according to the information to be identified; and the output module is used for outputting the indication information allowing the first person to normally pass when the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target place.
In a possible implementation manner, the registration information of the location code includes identity information of at least one preset person, and the identification device is further associated with the identity information of one person of the at least one preset person.
In another possible implementation manner, the registration information of the location code includes identity information of at least one preset person, and the processing module is further configured to obtain, in a first cycle, identity information of a first operator currently operating the identification device after the identification device is powered on; the acquisition module is also used for acquiring the identity information of at least one preset person according to the site code of the target site; the processing module is further used for associating the identification equipment with identity information of a first operator when at least one preset person comprises the first operator; and when the at least one preset person does not comprise the first operator, controlling the identification equipment to stop working.
In another possible implementation manner, after the identification device is powered on, the processing module is further configured to obtain the current position of the identification device in a second period; and controlling the recognition device to stop working when the current position of the recognition device is not in the area included by the target place.
In yet another possible implementation manner, the identification device is in communication with a server, and the processing module is further configured to generate a passage record of the first person entering the target place; the passing record comprises an identification of the identification equipment, an identification of the first person and acquisition time for acquiring information to be identified; and the output module is also used for sending the pass record to the server.
In yet another possible implementation manner, the traffic record further includes identity information of an operator who operates the identification device when the information to be identified is obtained.
In another possible implementation manner, the identification device is connected to an access control device of the target site, and the processing module is further configured to control the access control device to open when the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target site.
In another possible implementation manner, the processing module is further configured to control the access control device to open when the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target site, and the first person has the right to enter the target site.
In yet another possible implementation manner, the output module is further configured to output alarm information when the infectious disease infection risk level of the first person does not meet the epidemic situation prevention and control requirement of the target site, where the alarm information includes an identifier of the identification device, an identifier of the first person, and an acquisition time for acquiring information to be identified, the alarm information is used to indicate that the first person has a risk of infecting infectious diseases, and is used to determine a risk person having a time and a space intersection with the first person in a tracing period, and the tracing period is a period that is obtained by the acquisition time and has a preset duration.
In yet another possible implementation manner, the processing module is further configured to keep the access control device closed when the infectious disease infection risk level of the first person does not meet the epidemic prevention and control requirement of the target site.
In yet another possible implementation, the information to be identified includes an identification code indicating a health condition of the first person and/or identity information of the first person, wherein the identity information of the first person includes one or more of identity document information of the first person, face information of the first person, fingerprint information of the first person, or iris information of the first person.
In a third aspect, the present application provides an electronic device comprising a memory and a processor. The memory is coupled to the processor. The memory is for storing computer program code comprising computer instructions. The computer instructions, when executed by the processor, cause the electronic device to perform the method for location code based traffic management as set forth in the first aspect and any one of its possible designs.
In a fourth aspect, the present application provides a chip system, where the chip system is applied to a traffic management device; the chip system includes one or more interface circuits, and one or more processors. The interface circuit and the processor are interconnected through a line; the interface circuit is configured to receive signals from the memory of the traffic management device and send signals to the processor, the signals including computer instructions stored in the memory. The processor, when executing the computer instructions, causes the electronic device to perform the method for location code based traffic management as described in the first aspect and any one of its possible designs.
In a fifth aspect, the present application provides a computer-readable storage medium storing computer instructions, which, when executed on an electronic device, cause the electronic device to perform the method for location code-based traffic management as described in the first aspect and any one of its possible designs.
In a sixth aspect, the present application provides a computer program product, which includes computer instructions, when the computer instructions are executed on an electronic device, cause the electronic device to execute the method for location code-based traffic management according to the first aspect and any one of the possible design manners thereof.
Reference may be made in detail to the second to sixth aspects and various implementations of the first aspect in this application; moreover, for the beneficial effects of the second aspect to the sixth aspect and various implementation manners thereof, reference may be made to beneficial effect analysis in the first aspect and various implementation manners thereof, and details are not described here.
Drawings
Fig. 1 is a schematic view of a traffic management system according to an embodiment of the present application;
fig. 2 is a schematic view of an installation scenario of an identification device according to an embodiment of the present application;
fig. 3 is a schematic hardware structure diagram of a passage management device based on a location code according to an embodiment of the present application;
fig. 4 is a flowchart of a location code-based traffic management method according to an embodiment of the present application;
fig. 5 is a flowchart of another method for location code-based traffic management according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a passage management device based on a location code according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the description of this application, "/" means "or" unless otherwise stated, for example, A/B may mean A or B. "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. Further, "at least one" means one or more, "a plurality" means two or more. The terms "first", "second", and the like do not necessarily limit the number and execution order, and the terms "first", "second", and the like do not necessarily limit the difference.
It is noted that, in the present application, words such as "exemplary" or "for example" are used to mean exemplary, illustrative, or descriptive. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
As described in the background art, in the use process of the existing location code, when a person to be communicated needs to enter a target location, the person to be communicated needs to scan the location code of the target location by using their own electronic devices. Thus, when a plurality of persons to be passed need to pass, a plurality of persons scan the codes, which may make the persons dense. In addition, since the person who needs to enter the above-mentioned place scans the place code by himself, a lot of time is wasted because the person may be unskilled in the operation procedure of the code scanning operation, thereby affecting the efficiency of traffic management. In addition, for the action of scanning the location code, the supervision difficulty is high, and the staff may only check the health code which is not associated with the location information, so that the condition of missing detection is easy to occur.
Based on the situation, the application provides a passage management method based on the place code, which is applied to an identification device, wherein the identification device is associated with the place code of the target place, and the identification device is deployed at an access port of the target place. It should be noted that the access port may include an entrance and an exit, and the identification device may be disposed only at the entrance of the access, only at the exit of the access, or both at the exit and the entrance of the access. The location code may be a two-dimensional code having geographical location information of the location, or the location code may be a bar code having location information of the location, or the location code may be identification information for determining a physical space of the location. A location shall mean an area with certain boundaries. The method specifically comprises the following steps: firstly, information to be identified of a first person is obtained, the first person is a person entering an identifiable area of an identification device, and then according to the obtained information to be identified, the infectious disease infection risk level of the first person is determined; when the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target place, the indication information allowing the first person to normally pass is output. So, need not each personnel that get into the target place and scan the place code by oneself, the managers in target place can use identification equipment to discern each infectious disease infection risk of waiting to get into the personnel in target place in proper order, can avoid going out the peak period, thereby a plurality of personnel that wait to get into the target place sweep the condition of sign indicating number gathering together, also can promote the efficiency of the management of passing.
As shown in fig. 1, an embodiment of the present application provides a traffic management system. The traffic management system 100 includes an identification device 10 and a server 20. The identification device 10 may communicate with a server 20.
The identification device 10 is used to identify information to be identified of a person who is to enter a target site. The target places are key areas such as various traffic control stations (points), various residential districts, schools, medical and health institutions and the like, key industries such as various public transportation operation vehicles (buses, taxis, net appointment vehicles, intercity regular buses and the like), cold chain food, tourist attractions, transportation, bank outlets, logistics express and the like, key field places, business places such as hotels, restaurants, markets, supermarkets, farm trade markets, drug stores, shops, business halls and the like, enterprises and public places with intensive passage of staff.
The information to be identified includes an identification code for indicating the health condition of the first person or identity information of the first person, and the identity information of the first person may include one or more of identity document information of the first person, face information of the first person, fingerprint information of the first person, or iris information of the first person. The first person is a person to enter the target site.
Thus, the identification device 10 may include a code scanning module for identifying a health code, a travel code, or the like, of the person. Optionally, the recognition device 10 may further include a photographing module for recognizing the face information of the person. The identification device 10 may further include an identification document information reading module for identifying the personal identification document (e.g., a resident identification card). The identification device 10 may further include an iris recognition module for recognizing iris information of the person. The identification device 10 may further include a fingerprint recognition module for recognizing fingerprint information of the person, which may be, for example, a temperature difference induction type fingerprint sensor, a semiconductor fingerprint sensor, an ultrasonic fingerprint scanner, or the like.
Optionally, the identification device 10 may further include a positioning module for obtaining a positioning location of the identification device 10. For example, the positioning module may be a module of a possible positioning and navigation system based on a Global Positioning System (GPS), a "beidou" satellite navigation system, a GLONASS satellite navigation system, or a "galileo" satellite navigation system.
Optionally, the identification device 10 may further include a non-contact body temperature detection module, configured to detect a current body temperature of the first person, and further determine a health condition of the first person based on the body temperature.
In a possible implementation manner, the staff at the target site can manually operate the identification device 10, and then use the identification device 10 to execute the traffic management method provided by the embodiment of the application.
In another possible implementation manner, as shown in fig. 2, the identification device 10 may be disposed on the access control device 30 in the target location, and the identification device 10 may control the access control device 30 to be in an open state or a closed state according to the identification result of the information to be identified of the first person. For example, when the identification device 10 determines that the health condition of the first person is normal according to the information to be identified of the first person, the access control device 30 may be controlled to adjust the state from the closed state to the open state, so as to allow the first person to pass through to enter the target place.
Alternatively, the door guard device 30 may be an access blocking device, such as a gate or the like. Alternatively, the door guard device 30 may be a lock, such as an electromagnetic lock, provided on a door of an entrance to the target site.
The server 20 may be a management server of the epidemic situation prevention and control platform. The server 20 is used for managing information required for epidemic prevention and control, such as identity information, health conditions (health codes), and traffic records of residents. The server 20 is also used to manage information including a location code, a location of the location, a type of the location, a location manager (a manager operating the recognition device 10 at a target location), and the like, for each location, and can associate the passage information of the resident to a specific location.
Optionally, the server 20 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as cloud service, a cloud database, cloud computing, cloud storage, network service, cloud communication, middleware service, domain name service, security service, content distribution network, and big data server.
The embodiment of the present application further provides a location code-based traffic management device (hereinafter referred to as a traffic management device), which is an execution main body of the location code-based traffic management method. The traffic management device is an electronic device having data processing capability. For example, the traffic management device may be the identification device 10 in the traffic management system 100, or the traffic management device may be a functional module in the identification device 10, or the traffic management device may be any computing device connected to the identification device 10, and so on. The embodiments of the present application do not limit this.
A hardware configuration of the identification device 200 will be described with reference to fig. 3, taking the traffic management apparatus as the identification device as an example.
As shown in fig. 3, the identification device 200 includes a processor 210, a communication link 220, and a communication interface 230.
Optionally, the identification device 200 may further include a memory 240. The processor 210, the memory 240 and the communication interface 230 may be connected via a communication line 220.
The processor 210 may be a Central Processing Unit (CPU), a general purpose processor Network (NP), a Digital Signal Processor (DSP), a microprocessor, a microcontroller, a Programmable Logic Device (PLD), or any combination thereof. The processor 210 may also be any other device with processing function, such as a circuit, a device, or a software module, without limitation.
In one example, processor 210 may include one or more CPUs, such as CPU0 and CPU1 in fig. 3.
As an alternative implementation, the identification device 200 comprises a plurality of processors, for example, the processor 270 may be included in addition to the processor 210. A communication line 220 for transmitting information between the respective components included in the identification apparatus 200.
A communication interface 230 for communicating with other devices or other communication networks. The other communication network may be an ethernet, a Radio Access Network (RAN), a Wireless Local Area Network (WLAN), or the like. Communication interface 230 may be a module, circuit, transceiver, or any device capable of enabling communication.
A memory 240 for storing instructions. Wherein the instructions may be a computer program.
The memory 240 may be a read-only memory (ROM) or another type of static storage device that can store static information and/or instructions, an access memory (RAM) or another type of dynamic storage device that can store information and/or instructions, an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or another optical disc storage, an optical disc storage (including a compact disc, a laser disc, an optical disc, a digital versatile disc, a blu-ray disc, etc.), a magnetic disc storage medium or another magnetic storage device, and the like, without limitation.
It should be noted that the memory 240 may exist independently from the processor 210 or may be integrated with the processor 210. The memory 240 may be used for storing instructions or program code or some data or the like. The memory 240 may be located inside the identification device 200 or outside the identification device 200, without limitation.
The processor 210 is configured to execute the instructions stored in the memory 240 to implement the communication method provided by the following embodiments of the present application. For example, when the identification device 200 is a terminal or a chip or a system on a chip in a terminal, the processor 210 may execute instructions stored in the memory 240 to implement the traffic management method provided herein.
As an alternative implementation, the identification device 200 further comprises an output device 250 and an input device 260. The output device 250 may be a display screen, a speaker, or the like capable of outputting data of the recognition apparatus 200 to a user. For example, the output device 250 may output alarm information in a case where the health condition of the first person is abnormal.
The input device 260 may be a keyboard, a mouse, a microphone, a joystick, or the like capable of inputting data to the recognition apparatus 200. For example, the input device 260 may be a two-dimensional code scanning gun, a camera, an identity document information reader, an iris collector, etc. for recognizing the health code, facial information, identity document, iris waiting identification information of the first person.
It should be noted that the configuration shown in fig. 3 does not constitute a limitation of the computing device, which may include more or less components than those shown in fig. 3, or some components may be combined, or a different arrangement of components than those shown in fig. 3.
The embodiments provided in the present application will be described in detail below with reference to the accompanying drawings.
As shown in fig. 4, the present embodiment provides a method for traffic management based on a location code, which is optionally performed by the identification device 200 shown in fig. 3, and includes the following steps:
s101, the identification equipment acquires information to be identified of a first person.
Wherein the first person is a person entering an identifiable region of the identification device. Furthermore, the identification device is provided at an entrance to the target site, so that the identifiable region of the identification device is near the entrance to the target site, and the person who enters the identifiable region of the identification device, i.e., the person who is to enter the target site.
The target places are key areas such as various traffic control stations (points), various residential districts, schools, medical and health institutions, various public transportation operation vehicles (buses, taxis, net appointment vehicles, intercity buses and the like), cold chain food, tourist attractions, transportation, key industries such as bank outlets and logistics express delivery, key field places, business places such as hotels, restaurants, markets, supermarkets, farmer markets, drug stores, shops, business halls and the like, enterprises and public places with dense passage of other personnel.
It should be noted that, for the need of prevention and control of infectious diseases, the traffic management method provided by the present application can be used to perform important management on public places where people have intensive traffic, i.e. the target places, so as to prevent infectious disease cases or suspected cases from entering such places, and on the other hand, to be able to quickly determine related people needing medical observation when finding infectious disease cases or suspected cases.
In some embodiments, the identification device is associated with a venue code of the target venue.
Wherein, the place code has uniqueness and is used for indicating the target place. In addition, in case of infectious disease prevention and control, a manager in the target site can register and register for the target site on the epidemic prevention and control platform to obtain a site code corresponding to the target site.
Alternatively, the registration information for registering the location code of the target-side location may include information such as a location, a location name, and a location type of the target location. The place location is the actual positioning information of the target place on the map, the place name may be "XX restaurant", "XX supermarket" or the like, and the place type is a possible type such as the above-mentioned scenic spot, pharmacy, hotel or the like. In addition, if the identification device is an identification device installed in a target location, the registration information may further include a unique identification code or an Identity Document (ID) of the identification device, and the unique identification code or the identity document is used to indicate the identification device.
Optionally, the registration information for registering the location code may also operate identity information of one or more preset persons of the identification device. The identity information of the preset personnel can comprise one or more items of identity document number information, face information, fingerprint information or iris information of the manager.
In the actual application process, when the identification device is used for the first time, the operator may send a registration application of the target location to the server 20 through the identification device or other electronic devices communicating with the server 20, so as to register on the infectious disease epidemic prevention and control platform and obtain the location code of the target location issued by the server 20. Optionally, in the process of the registration application, the server 20 may obtain and store the location position, the location name, the device identification information of the identification device, the identity information of the staff member, and other information of the target location, which are not listed one by one.
In some embodiments, during use of the identification device, the identification device may verify location information of the device and/or identity information of an operator operating the device.
Optionally, the verification process has at least the following possible implementation manners:
in the first implementation manner, when the identification device is started, the identification device may verify whether the identity information of a first operator operating the identification device matches the identity information of a preset person in the registration information of the location code of the target location. Thus, the identification device can be prevented from being misused by other persons.
The matching means that the acquired identity information of the first operator is the same as the identity information of one of the preset people in the target place registration information. Or the similarity degree between the acquired identity information of the first operator and the identity information of one of the preset people in the target place registration information is higher than a preset similarity degree threshold value.
Furthermore, when the at least one preset person of the registration information includes the first operator, that is, the identity information of the first operator who operates the identification device is matched with the identity information of one preset person in the registration information of the location code of the target location, the identification device may be associated with the identity information of the first operator.
Or, when the at least one preset person does not include the first operator, that is, the identity information of the first operator who operates the identification device matches the identity information of all the preset persons in the registration information of the location code of the target location, the identification device may stop working.
Optionally, in a case that the at least one preset person does not include the first operator, the staff of the target location may also send a request for modifying the registration information of the target location to the server 20, so as to add the identity information of the first operator to the registration information of the location code of the target location. At this time, the first operator is the preset operator.
In some embodiments, after the identification device is powered on, the identification device may acquire identity information of a first operator currently operating the identification device at a first period to verify the identity information of the first operator.
The duration of the first period can be possibly half an hour, 1 hour, three hours and the like. Therefore, the condition that the device is misused by other personnel in the using process of the device can be avoided.
For the verification process, reference may be specifically made to the above related description, which is not described herein again.
In the second implementation manner, when the identification device is started, the identification device can acquire the self-positioning position of the current device and detect whether the positioning position is in the preset area of the target place.
In order to prevent the location code of the target location from being misused by other identification devices other than the target location, the location position of the identification device may be verified during the operation of the identification device.
The preset area of the target place can be an entrance of the target place, and the area where the identification device can be arranged. Therefore, when the positioning position of the identification device is in the usable area, the identification device is used for detecting the information to be identified of the first person, and the first person is about to enter the target place.
Furthermore, if the positioning position of the identification device is within the preset area, the identification device can be associated with the location code of the target location, and the identification function is normally used to identify the information to be identified of the first person. Or, if the positioning position of the identification device is not within the preset area, the identification device cannot be associated with the location code of the target location, and at this time, the identification device stops working.
Optionally, if the location position of the identification device is not in the usable area, the identification device may further send a reminding message, where the reminding message is used to remind a manager that the device is beyond the usable area and cannot be used normally.
The identification function of the identification device is a function of completing the traffic management method provided by the embodiment of the application, that is, the identification device acquires information to be identified of a first person and determines the infectious disease infection risk of the first person according to the information to be identified.
Optionally, after the identification device is powered on, the identification device may obtain the location position of the current device itself in a second period, and detect whether the location position is within the preset area of the target location.
The duration of the second period may be half an hour, 1 hour, three hours, and other possible durations. The duration of the second period may be the same as or different from the duration of the first period. Therefore, the situation that in the operation process of the identification device, an operator moves the identification device out of the preset area of the target place can be avoided.
For detecting whether the positioning location of the identification device is within the preset area of the identification device, the above description may be referred to specifically, and details are not repeated here.
In a third implementation manner, when the identification device is started, the identification device may obtain a location position of the current device and identity information of a first operator currently operating the identification device, and verify the location position of the current identification device and the identity information of the first operator.
It should be noted that, by verifying the location position of the current device and the identity information of the operator, the location code of the target location is prevented from being misused by other identification devices in non-target locations, and meanwhile, the identification device can be prevented from being misused by other people, and the location information in the reported passing information of the people is prevented from being mistaken due to a matching error of the location code.
Furthermore, if the positioning position of the identification device is within the usable area and the acquired identity information of the operator matches the identity information of the preset personnel, the identification device may be associated with the location code of the target location and the identity information of the manager. So that the identification device can be normally used to identify the identification information of the first person.
Or, if the positioning position of the identification device is not in the usable area, and/or the acquired identity information of the first operator is not matched with the identity information of the preset person. At this time, the identification device stops operating.
Optionally, the identification device may further send a warning message, where the warning message is used to warn the manager that the device is out of the usable area, and/or the identity information of the manager does not match.
Optionally, in the operation process of the identification device, the identification device may further periodically obtain the location position of the current device and the identity information of the first operator, and verify the location position of the current device and the identity information of the first operator.
The process of verifying the current location of the device and the identity information of the operator may specifically refer to the above description, and is not described here again.
In some embodiments, during use of the identification device, a server in communication with the identification device may verify location information of the identification device and/or identity information of an operator operating the device. For example, taking the server as an example to verify the location information of the identification device, when the identification device starts operating, the server may obtain the location position of the identification device, and detect whether the location position is within a preset area of the target location.
Specifically, the server may search a location position associated with the device when the device is registered (i.e., a location position of the target location) according to the identification information (unique identification code, ID, or the like) of the identification device, and then determine the preset area of the target location according to the location position.
Furthermore, if the location position of the identification device is within the preset area, the server may issue a location code of a target location to the identification device, so that the identification device is associated with the location code of the target location, and the passing identification device may be normally used in the target location. Alternatively, if the location position of the identification device is not within the preset area, the server 20 sends a disable instruction to the identification device, so that the identification device stops operating.
Optionally, in the operation process of the identification device, the server may also periodically obtain the location position of the identification device, and detect whether the location position is within the preset area of the target location.
In addition, the information to be identified comprises an identification code for indicating the health condition of the first person or identity information of the first person, wherein one or more of the identity document information of the first person, the face information of the first person, the fingerprint information of the first person or the iris information of the first person.
S102, the identification device determines the infectious disease infection risk level of the first person according to the acquired information to be identified.
The infectious disease infection risk level may include primary, secondary, or tertiary, among others. Alternatively, the infectious disease infection risk level may be low risk, medium risk, or high risk. Still alternatively, the infectious disease infection risk level may be green, yellow, or red, where green indicates lower risk and red indicates higher risk. It is to be understood that the risk of infection with an infectious disease may also be expressed in other possible forms, and will not be described in further detail herein.
Optionally, the specific process of determining the infectious disease infection risk level of the first person by the identification device according to the acquired information to be identified at least has the following possible implementation manners:
in one possible implementation manner, the identification device identifies the acquired information to be identified, and determines the infectious disease infection risk level of the first person.
When the information to be identified is an identification code for indicating the health condition of the first person, for example, a health code, a travel code, etc. of the first person. The identification device can directly identify the identification code, and then the infectious disease infection risk level of the first person is determined.
In one example, the infectious disease infection risk rating includes low risk, medium risk, or high risk. The identification device may determine the infectious disease infection risk level of the first person by the color (red, yellow, green) of the identification code (e.g. health code), wherein red indicates that the holder of the identification code is from an area with a high risk of infectious disease, and the infectious disease infection risk level is high if the person has a high risk of infectious disease. Yellow indicates that the holder of the identification code is from an area at risk of infection, and the person is at a higher risk of infection, but the risk level of infection is intermediate when the person is lower than the holder of the red identification code. Green indicates that the holder of the health code is from an area with low risk of infection, and that the person has a low risk of infection, the infection risk rating is low.
In another example, the level of risk of infection for an infectious disease includes low risk, medium risk, or high risk, as well. The identification device may identify an identification code (e.g., a travel code) of the first person, obtain a traffic record of the first person recorded in the identification code, and further determine whether the travel information includes a high risk area in the infectious disease. If not, the identification device may determine that the first person has a low risk level of infectious disease infection. If the travel information includes a risk area for an infectious disease, the identification device may determine that the first person has an infectious disease infection risk rating of medium risk. If the travel information includes an area with a high risk of infectious disease, the identification device may determine that the infectious disease infection risk level of the first person is high risk in another possible implementation manner, and when the information to be identified is the identity information of the first person, the identification device may search the infectious disease infection risk level of the first person on the infectious disease epidemic situation prevention and control platform based on the acquired identity information. The identity information of the first person may be identity document information of the first person, face information of the first person, fingerprint information of the first person, iris information of the first person, or the like.
Illustratively, the server 20 may store therein identity information of the first person and information such as a health code, a travel code, etc. of the first person. The identification device may obtain information such as a health code and a travel code of the first person from the server 20 based on the obtained identity information of the first person, and further determine an infectious disease infection risk level of the first person. For a specific identification process, reference may be made to the related description of another possible implementation manner, which is not described herein again.
S103, when the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target place, the identification device outputs indication information allowing the first person to normally pass.
Alternatively, the requirement for controlling the epidemic situation of the target site may be to allow normal passage of people with a low risk level of infectious disease infection, for example, the risk level of infectious disease infection includes low risk, medium risk, or high risk. Thus, when the identification device determines that the infectious disease infection risk level of the first person is low risk, the first person meets the epidemic prevention and control requirements of the target site. When the identification device determines that the infectious disease infection risk level of the first person is medium risk or high risk, the first person does not meet the epidemic prevention and control requirements of the target site.
Optionally, under the condition that the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target site, the traffic control device may display, through a display connected to the traffic control device, the indication information for indicating that the first person normally passes, and/or the traffic control device may play, through a voice playing device connected to the traffic control device, the indication information for indicating that the first person normally passes.
Further, the identification device may generate a pass message for the first person to enter the target location. Optionally, the traffic information may include an identification time of the identification device, identity information of the first person, and a location code associated with the identification device. The location code is used to record information such as location position and location name of the target location, and is not listed.
In some embodiments, the identification device may also send to the server the first person's transit information for entering the target location. Wherein the server is in communication with the identification device. The server can be a background management server of an infectious disease epidemic situation prevention and control platform. It should be understood that the server may have stored therein the traffic information for each person identified by the identification device to enter the target location. Therefore, when an epidemic situation occurs, the manager can acquire the passing information of each person uploaded by the identification equipment of the relevant place based on the position of each place, and determine the person with the risk of infecting the infectious disease. Furthermore, relevant epidemic prevention measures can be taken in time to control epidemic spread.
Optionally, after the identification device sends the traffic information of the first person entering the target location to the server, the identification device may not store the traffic information, so that, on one hand, the data storage pressure of the identification device may be reduced, and the hardware cost required by the identification device may be reduced. In another aspect, the process may also reduce the likelihood of the first person identity information being compromised to protect the information security of the first person.
And S104, when the infectious disease infection risk level of the first person does not meet the epidemic situation prevention and control requirement of the target place, the identification equipment outputs alarm information.
Wherein the alarm information is used for indicating that the first person has the risk of infecting an infectious disease. In addition, the alarm information includes identity information of the first person, location information of the target place, and acquisition time for acquiring the information to be identified. Therefore, the alarm information can be used for determining risk personnel having time and space intersection with the first person in a tracing period, wherein the tracing period is a time period with preset duration and is obtained by stopping the obtaining time.
The preset time period may be 7 days, 14 days, or other reasonable time periods.
Optionally, the traffic control device may display the alarm information through a display connected to the traffic control device and/or send the alarm information through a voice playing device connected to the traffic control device.
Furthermore, through the alarm information, the manager of the traffic control device can contact the management department related to epidemic situation prevention and control so as to quickly take corresponding epidemic prevention measures and control the spread of the epidemic situation. Optionally, this pass management device can directly send alarm information to the relevant administrative department of epidemic situation prevention and control, so, can send alarm information more fast.
In some embodiments, the identification device may send alert information to a server.
Further, the server may acquire an acquisition time and a location of the target site that identify the health condition of the first person based on the alarm information. Based on the obtaining time and the preset time length, the server can determine the tracing time period and call the passing record of the first person entering each place in the tracing time period, so that the action track of the first person is determined.
Thus, the server can determine a plurality of places related to the action track of the first person based on the action track, and call up a passage record which is determined to have time and space intersection with the first person in the tracing period. Therefore, based on the passing record, management departments related to epidemic situation prevention and control can conveniently and quickly find out the personnel corresponding to the passing record, namely the personnel needing medical observation.
The technical scheme provided based on the application can at least produce the following beneficial effects: the identification device is deployed at an entrance of the target place, and the identification device can acquire the information to be identified of the first person to enter the target place in the identifiable area of the identification device. Furthermore, the acquired information to be identified is identified, so that the infectious disease infection risk of the first person can be judged. Therefore, when the infectious disease infection risk of the first person meets the current epidemic prevention requirement of the target site, the indication information for indicating the normal passing of the first person is output. Compared with the mode that a first person autonomously scans codes to enter a target place, in the technical scheme of the application, a manager of the target place can use the identification equipment to sequentially determine the infectious disease infection risk of each person waiting to enter the target place, so that a peak period can be avoided, a plurality of persons waiting to enter the target place can scan the codes together, and the manager of the target place does not need to sequentially judge whether each person scans the place codes before entering, so that the efficiency of traffic management is improved.
In some embodiments, the identification device may be connected to an access control device of a target location, and based on the location code-based traffic management method shown in fig. 4, as shown in fig. 5, the method may further include the following steps:
and S105, when the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target place, the identification equipment controls the entrance guard equipment to be opened.
Illustratively, as shown in fig. 2, the identification device 10 is disposed on the access device 30 of the target site, and the identification device 10 is connected to the access device 30 of the target site, so that the identification device 10 controls the access device 30 to be opened or kept closed.
In some embodiments, the identification device may also determine whether the first person has permission to enter the target site. When the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target place and the first person has the right to enter the target place, the identification device controls the entrance guard device to be opened.
Optionally, the identification device may have stored therein identity information of persons permitted to gain access to the target location. Wherein the identity information may include one or more of identity document information, facial information, fingerprint information, or iris information of the person.
Therefore, the identification device can acquire the identity document information, the face information, the fingerprint information or the iris information of the first person, compare the identity document information, the face information, the fingerprint information or the iris information with the identity information of each person stored in the identification device, and determine that the first person has the authority to enter the target place if the identity information of the first person is matched with the identity information of one person stored in the identification device.
Optionally, the identification device or the staff member at the target location may also identify a pass in the first person's possession to enter the target location. If the identification is successful, it may be determined that the first person has permission to enter the target location.
And S106, when the infectious disease infection risk level of the first person does not meet the epidemic prevention and control requirement of the target place, the identification equipment controls the access control equipment to be kept closed.
In some embodiments, the identification device may also determine whether the first person has permission to enter the target site. When the infectious disease infection risk level of the first person does not meet the epidemic prevention and control requirement of the target place and/or the first person has the right to enter the target place, the identification device controls the entrance guard device to be kept closed.
Optionally, the identification device may obtain identity document information, facial information, fingerprint information, or iris information of the first person, compare the identity document information with identity information of each person stored in the identification device, and determine that the first person has no permission to enter the target location if the identity information of the first person is not matched with all the identity information stored in the identification device.
Optionally, the identification device or the staff member at the target location may also identify a pass in the first person's possession to enter the target location. If the identification fails, it may be determined that the first person does not have permission to enter the target location.
In some embodiments of the access control system, for example, in a scenario of a campus, the identification devices are multiple face identification devices located at entrances and exits of the campus, the information to be identified by the multiple identification devices is a health code and/or a travel code, and/or an accounting detection report, and/or a human body temperature, and a right of passage of a person, and the multiple face identification devices have the same location code association. So can be with the association back of garden entrance guard and place sign indicating number, reduce the artifical check in garden gate to reduce the problem of makeing mistakes because of artifical check brings. It can be understood that, for the target place provided with the access control equipment, the identification equipment can also be connected with the access control equipment of the target place, so that the access control equipment can be controlled to be automatically opened or closed according to the identification result. For example, the epidemic situation prevention and control requirements of a target place are met at the infectious disease infection risk level of a first person, and the entrance guard equipment is controlled to be opened, so that the use of human resources is reduced, and the traffic management is more intelligent. The scheme provided by the embodiment of the application is mainly introduced from the perspective of a method. To implement the above functions, it includes hardware structures and/or software modules for performing the respective functions. Those of skill in the art will readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
As shown in fig. 6, a schematic structural diagram of a passage management device 300 based on a location code according to an embodiment of the present application is further provided. The apparatus 300 may include: an acquisition module 301, a processing module 302, and an output module 303.
The obtaining module 301 is configured to obtain information to be identified of a first person, where the first person is a person entering an identifiable area of the identification device.
The processing module 302 is configured to determine an infection risk level of an infectious disease of the first person according to the information to be identified.
And the output module 303 is configured to output instruction information for allowing the first person to normally pass when the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target site.
In a possible implementation manner, the registration information of the location code includes identity information of at least one preset person, and the identification device is further associated with the identity information of one person of the at least one preset person.
In another possible implementation manner, the registration information of the location code includes identity information of at least one preset person, and after the identification device is powered on, the processing module 302 is further configured to obtain, in a first cycle, identity information of a first operator currently operating the identification device; the obtaining module 301 is further configured to obtain identity information of at least one preset person according to the location code of the target location; the processing module 302 is further configured to, when the at least one preset person includes a first operator, associate the identification device with identity information of the first operator; and when the at least one preset person does not comprise the first operator, controlling the identification equipment to stop working.
In another possible implementation manner, after the identification device is powered on, the processing module 302 is further configured to obtain the current location of the identification device in a second period; and controlling the recognition device to stop working when the current position of the recognition device is not in the area included by the target place.
In yet another possible implementation manner, the identification device is in communication with the server, and the processing module 302 is further configured to generate a passage record of the first person entering the target place; the passing record comprises an identification of the identification equipment, an identification of the first person and acquisition time for acquiring information to be identified; the output module 303 is further configured to send the pass record to the server.
In yet another possible implementation manner, the pass record further includes identity information of an operator who operates the identification device when the information to be identified is acquired.
In another possible implementation manner, the identification device is connected to an access control device of the target location, and the processing module 302 is further configured to control the access control device to open when the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target location.
In yet another possible implementation manner, the processing module 302 is further configured to control the access control device to open when the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target site, and the first person has the right to enter the target site.
In yet another possible implementation manner, the output module 303 is further configured to output alarm information when the infectious disease infection risk level of the first person does not meet the epidemic situation prevention and control requirement of the target site, where the alarm information includes an identifier of the identification device, an identifier of the first person, and an acquisition time for acquiring information to be identified, the alarm information is used to indicate that the first person has a risk of infecting infectious diseases, and is used to determine a risk person having a time and a space intersection with the first person in a tracing period, and the tracing period is a time period that ends the acquisition time and has a preset duration.
In yet another possible implementation manner, the processing module 302 is further configured to keep the access control device closed when the infectious disease infection risk level of the first person does not satisfy the epidemic prevention and control requirement of the target site.
In yet another possible implementation, the information to be identified includes an identification code indicating a health condition of the first person and/or identity information of the first person, wherein the identity information of the first person includes one or more of identity document information of the first person, face information of the first person, fingerprint information of the first person, or iris information of the first person.
For the detailed description of the above alternative modes, reference may be made to the foregoing method embodiments, which are not described herein again. In addition, for the explanation and the description of the beneficial effects of any one of the traffic management devices 300 based on the location code, reference may be made to the corresponding method embodiments, and details are not repeated.
As an example, in conjunction with fig. 3, the functions implemented by the processing module 302 of the location code-based traffic management device may be implemented by the processor 210 or the processor 270 of fig. 3 executing the program code in the memory 240 of fig. 3. The functions implemented by the obtaining module 301 may be implemented by the communication line 220 in fig. 3, but are not limited thereto.
Those of skill in the art would readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It should be noted that the division of the modules in fig. 6 is schematic, and is only one logical function division, and there may be another division manner in actual implementation. For example, two or more functions may also be integrated in one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The embodiment of the present application further provides a computer-readable storage medium, which includes computer-executable instructions, and when the computer-readable storage medium is run on a computer, the computer is caused to execute any one of the methods provided by the above embodiments. For example, one or more features of S101-S104 of FIG. 4 may be undertaken by one or more computer-executable instructions stored in the computer-readable storage medium.
The embodiments of the present application also provide a computer program product containing instructions for executing a computer, which when executed on a computer, causes the computer to perform any one of the methods provided by the above embodiments.
An embodiment of the present application further provides a chip, including: a processor coupled to the memory through the interface, and an interface, when the processor executes the computer program or the computer execution instructions in the memory, the processor causes any one of the methods provided by the above embodiments to be performed.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented using a software program, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The processes or functions according to the embodiments of the present application are generated in whole or in part when the computer-executable instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). Computer-readable storage media can be any available media that can be accessed by a computer or can comprise one or more data storage devices, such as servers, data centers, and the like, that can be integrated with the media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
Although the present application has been described in conjunction with specific features and embodiments thereof, it will be evident that various modifications and combinations can be made thereto without departing from the spirit and scope of the application. Accordingly, the specification and figures are merely exemplary of the present application as defined in the appended claims and are intended to cover any and all modifications, variations, combinations, or equivalents within the scope of the present application. It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
The above description is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (13)

1. The traffic management method based on the place code is characterized in that the method is applied to an identification device, the identification device is associated with the place code of a target place, and the identification device is deployed at an entrance of the target place; the method comprises the following steps:
acquiring information to be identified of a first person, wherein the first person is a person entering an identifiable area of the identification device;
determining the infectious disease infection risk level of the first person according to the information to be identified;
and when the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target place, outputting indication information allowing the first person to normally pass.
2. The method of claim 1, wherein the registration information of the location code comprises identity information of at least one preset person, and the identification device is further associated with identity information of one of the at least one preset person.
3. The method of claim 2, wherein after the identification device is powered on, the method further comprises:
acquiring identity information of a first operator currently operating the identification device at a first period;
acquiring identity information of the at least one preset person according to the site code of the target site;
when the at least one preset person comprises the first operator, associating the identification device with identity information of the first operator;
and when the at least one preset person does not comprise the first operator, the identification equipment stops working.
4. The method of claim 1, wherein after the identification device is powered on, the method further comprises:
acquiring the current position of the identification equipment at a second period;
and when the current position of the identification equipment is not in the area included by the target place, the identification equipment stops working.
5. The method of any of claims 1-4, wherein the identification device is in communication with a server, the method further comprising:
generating a traffic record of the first person entering the target site; the passing record comprises an identification of the identification equipment, an identification of the first person and acquisition time for acquiring the information to be identified;
and sending the pass record to the server.
6. The method of claim 5, wherein the pass record further includes identity information of an operator operating the identification device when the information to be identified is obtained.
7. The method of any one of claims 1 to 4, wherein the identification device is connected to an access device of the target site, the method further comprising:
and when the infectious disease infection risk level of the first person meets the epidemic prevention and control requirement of the target place, controlling the opening of the access control equipment.
8. The method according to claim 7, wherein the information to be identified is a health code and/or a travel code, and/or an accounting detection report, and/or a human body temperature, and a passage authority of a person, the identification devices are gate face identification devices, the target site is a campus, the gate face identification devices are arranged at an entrance and an exit of the campus, and the face identification devices are associated with the same site code.
9. The method according to any one of claims 1-4, further comprising:
when the infectious disease infection risk level of the first person does not meet the epidemic situation prevention and control requirement of the target place, outputting alarm information, wherein the alarm information comprises an identification of the identification device, an identification of the first person and acquisition time for acquiring the information to be identified, the alarm information is used for indicating that the first person has the risk of infecting infectious diseases and determining risk persons having time and space intersection with the first person in a tracing time period, and the tracing time period is a time period which is cut off from the acquisition time and has preset duration;
the identification equipment with the entrance guard's equipment of target place is connected, works as first personnel's infectious disease infects risk level and does not satisfy the epidemic situation prevention and control requirement of target place keeps entrance guard's equipment closes.
10. The method according to any one of claims 1-4 or 6, wherein the information to be identified comprises an identification code indicating a health condition of the first person and/or identity information of the first person, wherein the identity information of the first person comprises one or more of identity document information of the first person, face information of the first person, fingerprint information of the first person, or iris information of the first person.
11. A passage management device based on a place code, which is applied to an identification device, wherein the identification device is associated with the place code of a target place, and the identification device is deployed at an entrance of the target place, the device comprising:
the identification device comprises an acquisition module, a recognition module and a processing module, wherein the acquisition module is used for acquiring information to be identified of a first person, and the first person is a person entering an identifiable area of the recognition device;
the processing module is used for determining the infectious disease infection risk level of the first person according to the information to be identified;
and the output module is used for outputting indication information for allowing the first person to normally pass when the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target place.
12. The apparatus according to claim 11, wherein the registration information of the location code includes identity information of at least one preset person, and after the identification device is powered on, the processing module is further configured to obtain identity information of a first operator currently operating the identification device in a first cycle;
the acquisition module is further used for acquiring the identity information of the at least one preset person according to the site code of the target site;
the processing module is further configured to associate the identification device with identity information of the first operator when the at least one preset person includes the first operator; when the at least one preset person does not comprise the first operator, controlling the identification equipment to stop working;
after the identification device is started, the processing module is further configured to obtain the current position of the identification device in a second period; when the current position of the identification equipment is not in the area included by the target place, controlling the identification equipment to stop working;
the identification device is communicated with a server, and the processing module is further used for generating a passing record of the first person entering the target place; the passing record comprises an identification of the identification equipment, an identification of the first person and acquisition time for acquiring the information to be identified;
the output module is further used for sending the passage record to the server;
the identification device is connected with the access control device of the target place, and the processing module is further used for controlling the access control device to be opened when the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target place;
the processing module is further used for controlling the entrance guard equipment to be opened when the infectious disease infection risk level of the first person meets the epidemic situation prevention and control requirement of the target place and the first person has the right to enter the target place;
the output module is further configured to output alarm information when the infectious disease infection risk level of the first person does not meet the epidemic situation prevention and control requirement of the target site, where the alarm information includes an identifier of the identification device, an identifier of the first person, and acquisition time for acquiring the information to be identified, the alarm information is used to indicate that the first person has a risk of infecting infectious diseases, and is used to determine a risk person having a time and space intersection with the first person within a tracing time period, and the tracing time period is a time period that is a preset time period after the acquisition time;
the processing module is further used for keeping the access control equipment closed when the infectious disease infection risk level of the first person does not meet epidemic prevention and control requirements of the target place.
13. An electronic device, comprising a memory and a processor; the memory and the processor are coupled; the memory for storing computer program code, the computer program code comprising computer instructions;
wherein the computer instructions, when executed by the processor, cause the electronic device to perform the location code based traffic management method of any of claims 1-12.
CN202210725613.6A 2022-06-24 2022-06-24 Passage management method and device based on place codes Pending CN115019428A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210725613.6A CN115019428A (en) 2022-06-24 2022-06-24 Passage management method and device based on place codes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210725613.6A CN115019428A (en) 2022-06-24 2022-06-24 Passage management method and device based on place codes

Publications (1)

Publication Number Publication Date
CN115019428A true CN115019428A (en) 2022-09-06

Family

ID=83077173

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210725613.6A Pending CN115019428A (en) 2022-06-24 2022-06-24 Passage management method and device based on place codes

Country Status (1)

Country Link
CN (1) CN115019428A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115188113A (en) * 2022-09-14 2022-10-14 苏州智数信息科技有限公司 Digital access certificate, access verification method, electronic device and storage medium
CN115828001A (en) * 2023-02-21 2023-03-21 山东浪潮科学研究院有限公司 Track coincidence analysis method, device, equipment and medium based on privacy intersection
WO2024060872A1 (en) * 2022-09-20 2024-03-28 京东方科技集团股份有限公司 Access control management method, verification server, access control system and readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111402476A (en) * 2020-06-05 2020-07-10 深圳市脉联电子有限公司 Community epidemic prevention safety method based on machine learning
CN111862428A (en) * 2019-06-04 2020-10-30 维珍(深圳)数据技术有限公司 Access control method and device
CN112565304A (en) * 2021-02-18 2021-03-26 北京声智科技有限公司 Equipment management method and device and electronic equipment
CN113033293A (en) * 2021-02-03 2021-06-25 北京睿家科技有限公司 Access & exit management equipment, system and method
CN113055473A (en) * 2021-03-11 2021-06-29 北京德风新征程科技有限公司 Regional security prevention and control method and system based on Internet of things and security cloud
CN113723276A (en) * 2021-08-27 2021-11-30 深兰盛视科技(苏州)有限公司 Health code management method based on vein recognition and related device
CN114120510A (en) * 2021-10-28 2022-03-01 深圳云天励飞技术股份有限公司 Infectious disease prevention and control method, device, platform and computer readable storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111862428A (en) * 2019-06-04 2020-10-30 维珍(深圳)数据技术有限公司 Access control method and device
CN111402476A (en) * 2020-06-05 2020-07-10 深圳市脉联电子有限公司 Community epidemic prevention safety method based on machine learning
CN113033293A (en) * 2021-02-03 2021-06-25 北京睿家科技有限公司 Access & exit management equipment, system and method
CN112565304A (en) * 2021-02-18 2021-03-26 北京声智科技有限公司 Equipment management method and device and electronic equipment
CN113055473A (en) * 2021-03-11 2021-06-29 北京德风新征程科技有限公司 Regional security prevention and control method and system based on Internet of things and security cloud
CN113723276A (en) * 2021-08-27 2021-11-30 深兰盛视科技(苏州)有限公司 Health code management method based on vein recognition and related device
CN114120510A (en) * 2021-10-28 2022-03-01 深圳云天励飞技术股份有限公司 Infectious disease prevention and control method, device, platform and computer readable storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115188113A (en) * 2022-09-14 2022-10-14 苏州智数信息科技有限公司 Digital access certificate, access verification method, electronic device and storage medium
WO2024060872A1 (en) * 2022-09-20 2024-03-28 京东方科技集团股份有限公司 Access control management method, verification server, access control system and readable storage medium
CN115828001A (en) * 2023-02-21 2023-03-21 山东浪潮科学研究院有限公司 Track coincidence analysis method, device, equipment and medium based on privacy intersection

Similar Documents

Publication Publication Date Title
CN115019428A (en) Passage management method and device based on place codes
JP6980928B2 (en) Tracking methods, equipment and systems for potentially infected persons in public places during the plague
US9411997B1 (en) Systems and methods for tracking subjects
US7932832B2 (en) Movement managing system
US10171646B2 (en) Systems and methods for providing geolocation services
US20170343641A1 (en) System and method for multi-level border control within sites
US10715653B2 (en) Systems and methods for providing geolocation services
US8825383B1 (en) Extracting patterns from location history
CN101496074A (en) Device and method for detecting suspicious activity, program, and recording medium
US11321982B2 (en) Livestock biosecurity system and method of use
US20130275160A1 (en) System and method for analyzing and controlling epidemics
ES2893808T3 (en) Method of controlling access rights using an access control system
CN114153343B (en) Health code display method and electronic equipment
CN111354473A (en) Application system for searching new coronary pneumonia infected person based on navigation map and mobile phone positioning
US11650310B2 (en) Method of customized sorting with wayfinding capability
CN112135242A (en) Building visitor navigation method based on 5G and face recognition
CN113240846A (en) Visitor service management method and device, electronic equipment and storage medium
CN113330491B (en) Electronic gate opening method and device and server
US20220285036A1 (en) Systems and methods for intelligent and privacy-centric contact tracing
US20230154263A1 (en) System and method for building entry management system
CN109887134A (en) A kind of cell legal power safety control system
KR102232485B1 (en) Distributed tracing-apparatus of traffic line, and method using the same
CN103501483A (en) A mobile device locking system and computer implementation method for locking mobile device
US20200380833A1 (en) Person monitoring system and person monitoring method
US20220381941A1 (en) Causal relationship security screening based on distributed sensing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination