CN115588252A - Security system and security control device - Google Patents

Security system and security control device Download PDF

Info

Publication number
CN115588252A
CN115588252A CN202211366679.7A CN202211366679A CN115588252A CN 115588252 A CN115588252 A CN 115588252A CN 202211366679 A CN202211366679 A CN 202211366679A CN 115588252 A CN115588252 A CN 115588252A
Authority
CN
China
Prior art keywords
visiting
visitor
information
equipment
security control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211366679.7A
Other languages
Chinese (zh)
Inventor
李玉艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Hiyiav Technology Co ltd
Original Assignee
Shenzhen Hiyiav Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Hiyiav Technology Co ltd filed Critical Shenzhen Hiyiav Technology Co ltd
Priority to CN202211366679.7A priority Critical patent/CN115588252A/en
Publication of CN115588252A publication Critical patent/CN115588252A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/20Movements or behaviour, e.g. gesture recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B31/00Predictive alarm systems characterised by extrapolation or other computation using updated historic data

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Emergency Management (AREA)
  • Computing Systems (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Health & Medical Sciences (AREA)
  • Psychiatry (AREA)
  • Social Psychology (AREA)
  • Alarm Systems (AREA)

Abstract

The application relates to a security system and security control equipment. The identity recognition device can be used for carrying out identity recognition on the visitor based on a pre-established registered user information base and a pre-established dangerous person information base after the visitor is detected, and feeding back an identity recognition result to the security control device. The security control equipment is used for controlling the visiting information registration device to display a visiting information registration table and prompting the visitor to register visiting information when the identity recognition result indicates that the visitor is not a registered user of the target building and does not belong to a dangerous person; comparing the visiting information with the visiting information pre-registered by the registered user, and generating an access permission instruction when the visiting information conforms to the visiting information pre-registered by the registered user; the visiting information comprises at least one of visiting room numbers, visiting users and visiting relations. And the security control equipment is also used for controlling the entrance guard equipment to be opened according to the access allowing instruction.

Description

Security system and security control device
Technical Field
The application relates to the technical field of safety protection, in particular to a security system and security control equipment.
Background
Most of the activities such as work, life, entertainment and the like are carried out in the building, so the safety protection work in the building is concerned about the safety of life and property of people.
At present, most buildings occupy larger areas and have more floors. Correspondingly, personnel are relatively dense, and potential safety hazards are easy to appear.
Based on the characteristics of large control area and more control personnel, the potential artificial danger is difficult to discover and prevent in time in the prior art. Remedial action is taken after the risk occurs, and the loss of the victim may not be recovered. The security protection efficiency is lower.
Disclosure of Invention
The application provides a BIM-based safety protection method, which is based on a Building Information Model (BIM), integrates Information of related equipment in a Building, analyzes behavior of suspicious personnel in the Building, predicts danger, and takes corresponding measures to perform early warning and danger elimination.
In a first aspect, the present application provides a security system for safeguarding a target building, the system comprising: the identity recognition equipment, the visiting information registration equipment, the access control equipment and the security control equipment are arranged at the entrance of the target building;
the identity recognition equipment is used for carrying out identity recognition on the visitor based on a pre-established registered user information base and a pre-established dangerous person information base after the visitor is detected, and feeding back an identity recognition result to the security control equipment;
the security control device is used for controlling the visiting information registration device to display a visiting information registration table and prompting the visitor to register visiting information when the identity recognition result indicates that the visitor is not a registered user of the target building and does not belong to a dangerous person; comparing the visiting information with the visiting information pre-registered by the registered user, and generating an access permission instruction when the visiting information conforms to the visiting information pre-registered by the registered user; the visiting information comprises at least one item of visiting room numbers, visiting users and visiting relations;
and the security control equipment controls the entrance guard equipment to be opened according to the access allowing instruction.
Optionally, the system further includes: indoor terminal equipment arranged in each independent room in the target building;
the security control equipment is further used for determining a visiting object according to the visiting information when the fact that the visitor does not accord with the visiting information pre-registered by the registered user is determined, and sending an identity recognition result and the visiting information to indoor terminal equipment corresponding to the visiting object;
the indoor terminal equipment is used for displaying the identity recognition result and the visiting information and prompting a user to verify the identity of the visitor; and after receiving an access permission instruction input by a user, forwarding the access permission instruction to the security control equipment.
Optionally, the system further includes: the monitoring equipment is arranged on each floor in the target building;
the monitoring equipment is used for acquiring image information of a corresponding position and sending the image information to the security control equipment;
the security control device is further used for determining the action track of the visitor according to the image information acquired by each monitoring device, and marking the action track of the visitor on the BIM model of the target building for display, so that security personnel can master the real-time dynamics of the visitor.
Optionally, the security control device is further configured to obtain operation information of each elevator from a BIM model of the target building; determining an available elevator which can reach the floor where the visiting room is located according to the operation information of each elevator; and releasing the authority of the button of the floor where the visiting room of the available elevator is located according to the access permission instruction so that the visitor can smoothly arrive at the visiting room.
Optionally, the system further includes: a monitoring device disposed in each elevator;
the security control device is further configured to perform image analysis on an image acquired by the monitoring device in the available elevator to detect whether the visitor successfully presses the key of the floor where the visiting room is located, and restore the authority of the key of the floor where the visiting room is located of the available elevator after determining that the visitor successfully presses the key of the floor where the visiting room is located.
Optionally, the security control device is further configured to:
when the fact that the visitor enters the available elevator is not detected or the fact that the visitor selects the button of the floor where the visiting room is located is not detected, prompt information is sent to prompt security personnel that the visitor may lie to report visiting information, and meanwhile the visitor is set as suspicious.
Optionally, the security control device is specifically configured to:
performing image analysis on an image acquired by monitoring equipment in the target building step to detect whether the visitor enters the step;
when the fact that the visitor enters the escalator is detected, and the floor where the visitor leaves the escalator is not the floor where the visiting room is located, sending prompt information to prompt security personnel that the visitor may lie to report visiting information, and meanwhile setting the visitor as suspicious personnel;
and determining the action track of the visitor according to the setting position of the monitoring equipment in the step and by combining the image acquired by the monitoring equipment in the step.
Optionally, the security control device is further configured to:
performing image analysis on images acquired by monitoring equipment in a floor where the suspicious people arrive, and determining whether the suspicious people have suspicious behaviors;
if the suspicious person is detected to have suspicious behaviors, sending a prompt message to indoor terminal equipment of the registered user of the corresponding floor to prompt the registered user to pay attention to precaution, and determining the suspicious person as a dangerous person;
and sending the image and the action track of the dangerous person to terminal equipment of security personnel to prompt the security personnel to take precautionary measures.
Optionally, the suspicious behavior includes:
the stay time outside at least one room exceeds the preset time length;
alternatively, the first and second liquid crystal display panels may be,
the action track shows the arrival of at least two floors.
In a second aspect, the present application provides a security control device, including:
the receiving module is used for receiving the identity recognition result of the visitor sent by the identity recognition equipment;
the control module is used for controlling the visiting information registration device to display a visiting information registration table and prompting the visitor to register visiting information when the identity recognition result indicates that the visitor is not a registered user of the target building and does not belong to a dangerous person;
the instruction generating module is used for comparing the visiting information with the visiting information pre-registered by the registered user, and generating an admission instruction when the visiting information accords with the visiting information pre-registered by the registered user; the visiting information comprises at least one item of visiting room numbers, visiting users and visiting relations;
the control module is also used for controlling the entrance guard equipment to be opened according to the access allowing instruction by the security control equipment.
The application provides a security system and security control equipment. The identity recognition device can be used for carrying out identity recognition on the visitor based on a pre-established registered user information base and a pre-established dangerous person information base after the visitor is detected, and feeding back an identity recognition result to the security control device. The security control equipment is used for controlling the visiting information registration device to display a visiting information registration table and prompting the visitor to register visiting information when the identity recognition result indicates that the visitor is not a registered user of the target building and does not belong to a dangerous person; comparing the visiting information with the visiting information pre-registered by the registered user, and generating an access permission instruction when the visiting information conforms to the visiting information pre-registered by the registered user; the visiting information comprises at least one of visiting room numbers, visiting users and visiting relations. And the security control equipment is also used for controlling the entrance guard equipment to be opened according to the access allowing instruction. For the registered user, the entrance guard can be released to enter the target building only through identity recognition. For hazardous persons, access to the target building is generally not permitted without releasing the door. Therefore, dangerous personnel can be isolated outside the target building, the dangerous personnel are prevented from entering the target building, the potential safety hazard caused by the dangerous personnel is avoided, and the life and property safety of the personnel in the target building is guaranteed. For visitors outside the two categories, whether to allow the access can be judged through information confirmation of the visitors and the visited registered users in two directions. By comparing the visiting information registered by the visitor with the visiting information registered by the registered user, whether the registered user knows the visitor or not can be confirmed. For the visiting informed by the registered user, the entrance guard can be released directly to allow the visitor to enter. Therefore, potential artificial dangers can be found and prevented in time, and the security efficiency is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a schematic structural diagram of a security system according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a security control device according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a security control device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In addition, the term "and/or" herein is only one kind of association relationship describing an associated object, and means that there may be three kinds of relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship, unless otherwise specified.
The embodiments of the present application will be described in further detail with reference to the drawings attached hereto.
Fig. 1 is a schematic structural diagram of a security system provided in an embodiment of the present application. The security system of this embodiment can be used to carry out safety protection to the target building. As shown in fig. 1, the system of the present embodiment includes: the system comprises an identity recognition device 101, a visiting information registration device 102, an entrance guard device 103 and a security control device 104 which are arranged at an entrance of a target building.
The setting position of the security control equipment is not limited in the application, and the security control equipment can be arranged in a control room of a target building.
Specifically, the identification device 104 may be configured to identify the identity of the visitor based on a pre-established registered user information base and a pre-established dangerous person information base after the visitor is detected, and feed back the identification result to the security control device. The security control device 104 is used for controlling the visiting information registration device to display a visiting information registration table and prompting the visitor to register visiting information when the identity recognition result indicates that the visitor is not a registered user of the target building and does not belong to a dangerous person; comparing the visiting information with the visiting information pre-registered by the registered user, and generating an access permission instruction when the fact that the visiting information accords with the visiting information pre-registered by the registered user is determined; the visiting information comprises at least one of visiting room number, visiting users and visiting relations. And the security control equipment 104 is also used for controlling the entrance guard equipment to be opened according to the access allowing instruction.
In the target building, there are some stable users who come in and go out frequently and have a clear and safe identity, such as residents, family relatives, managers of the target building, employees working in the target building, and the like. If the target building is a house, the corresponding registered user can be a resident, a relation person registered by the resident, a property person and the like; if the target building is an office building or a shopping mall, the corresponding registered user can be a merchant, a worker registered by the merchant, a property worker and the like; if the target building is a hotel, the corresponding registered user may be a check-in person, a worker, or the like.
These users may become registered users by registering. The relevant information of the registered user can be stored in a pre-established registered user information base during registration. The related information of the registered user can comprise input multi-angle face images, full-body images and the like, and the user ID, the face characteristics, the body shape characteristics, the gait characteristics and the like are bound in the information base.
For the registered user, the entrance guard can be released to enter the target building only through identity recognition. Correspondingly, after the identification device 104 detects the visitor, it identifies the visitor, matches the visitor with the information in the pre-established registered user information base, determines that the visitor is consistent with the information of a certain registered user, and feeds back the identification result to the security control device. And the security control device 104 generates an access permission instruction when the identity recognition result indicates that the visitor is the registered user of the target building, and controls the entrance guard device to be opened according to the access permission instruction. Therefore, the registered user can quickly and conveniently enter the target building through the entrance guard of the target building.
In addition, in order to prevent the occurrence of danger, the dangerous personnel also need to be prevented, and the entrance of the dangerous personnel into the target building is firmly prevented. Thus, a dangerous person information base can be established in advance. The dangerous person may include criminals involved in officially released wanted information, historically detected suspicious persons, etc. The dangerous person information base may contain relevant information of the dangerous persons, such as identity information (name, etc.), image information (face image, etc.), feature information (carrying dangerous goods, etc.).
For hazardous persons, access to the target building is generally not permitted without releasing the door. Correspondingly, after the identification device 104 detects the visitor, the identification device identifies the visitor, matches the visitor with information in a pre-established dangerous person information base, determines that the visitor is consistent with information of a certain dangerous person, and feeds back the identification result to the security control device. When the security control device 104 determines that the identification result indicates that the visitor is a dangerous person, an access permission instruction is not generated, and the access control device maintains a closed state.
In other implementation manners, when it is determined that the identification result indicates that the visitor is a dangerous person, the security control device 104 may also send warning information to the manager to remind the manager to perform corresponding processing. For example, if the identification result indicates that the visitor is wanted, the manager may be reminded to alarm; if the identification result indicates that the visitor is a suspicious person detected before, the manager can be reminded to pay more attention.
Therefore, dangerous personnel can be isolated outside the target building, the dangerous personnel are prevented from entering the target building, the potential safety hazard caused by the dangerous personnel is avoided, and the life and property safety of the personnel in the target building is guaranteed.
In addition to the two categories of people whose security properties are clear, as described above, there may be some visits by people whose security properties are not clear. For example, take-away personnel who take temporary deliveries, courier personnel who take temporary deliveries, customers who visit infrequently, suspicious people who are present for the first time and have not been confirmed, etc. Such persons are characterized by an ambiguous identity, a low frequency of visits, and an inability to form a stable association with a registered user. Therefore, the user cannot become a registered user or directly determine as a dangerous person.
For such visitors, whether to allow access may be determined by information confirmation from both the visitor and the visited registered user. In particular, the registered user may register the access information upon determining that such a visitor is about to be accessed. The security control device 104, when determining that the identification result indicates that the visitor is not a registered user of the target building and does not belong to a dangerous person, automatically determines such a visitor, and controls the visiting information registration apparatus to display the visiting information registration table and prompt the visitor to register visiting information. By comparing the visiting information registered by the visitor with the visiting information registered by the registered user, whether the registered user knows the visitor or not can be confirmed. For the visitors informed by the registered user, the entrance guard can be released directly to allow the visitors to enter.
The mode for prompting the visitor to register the visiting information comprises the step of prompting the visitor to register at the visiting information registration device by playing related voice and/or displaying related characters.
In a particular scenario, for example, a resident (registered user) in the target building booked a takeout at 11 am, the takeout platform displays that delivery is expected around 11 o' clock 45. At this time, the registered user can register the visiting information: visit time is 11. This visit information will be stored as one of the upcoming visits today. When the takeout person arrives at the entrance of the target building at the point 11, after the identity recognition device detects the takeout person, the identity recognition device performs identity recognition on the visitor based on a pre-established registered user information base and a pre-established dangerous person information base, and finds that the takeout person is not a registered user of the target building and does not belong to a dangerous person; the security control device 104 controls the visiting information registration device to display a visiting information registration table according to the identification result, and prompts the takeout person to register visiting information; and then, calling the visiting information registered by the registered user about to visit today, comparing and determining that the visiting information is matched with the registered visiting information, controlling the access control equipment to be opened, and enabling the takeout person to enter the target building.
In other embodiments, the security system may further include: and the indoor terminal equipment is arranged in each independent room in the target building. The independent room refers to a room having a corresponding room number, which is not connected to other rooms. Such as one household in a residence, one room in a hotel, etc.
The security control equipment is also used for determining a visiting object according to the visiting information when the fact that the visitor does not accord with the visiting information pre-registered by the registered user is determined, and sending the identity recognition result and the visiting information to the indoor terminal equipment corresponding to the visiting object; the indoor terminal equipment is used for displaying the identity recognition result and the visiting information and prompting the user to verify the identity of the visitor; and after receiving an access permission instruction input by a user, forwarding the access permission instruction to the security control equipment.
When the registered user forgets to register the visiting information in advance, or the visiting information is wrongly registered, or the registered user does not know in advance about the visiting, the security device cannot find the information corresponding to the visiting information registered by the visitor in the visiting information registered in advance by the registered user, and at the moment, the fact that the visitor does not conform to the visiting information registered in advance by the registered user is judged, but the visitor is not refused to enter the visitor. At this time, the relevant information of the visitor can be sent to the indoor terminal device corresponding to the visiting object, and the indoor terminal device can display the identity recognition result and the visiting information and prompt the user to verify the identity of the visitor. If the user verifies and determines that the visitor is allowed to enter, an access allowing instruction can be input into the indoor terminal equipment, and the indoor terminal equipment forwards the instruction to the security control equipment so as to open the access control equipment and allow the visitor to enter.
In a particular scenario, for example, where a resident (registered user) in a target building subscribes to a take-out at 11 am, the take-out platform displays a forecast delivery around 11 am 45. But the registered user is busy and does not register the visiting information. When a takeout person arrives at the entrance of a target building at the point 11 40, after the identity recognition device detects the takeout person, the identity recognition device carries out identity recognition on a visitor based on a pre-established registered user information base and a pre-established dangerous person information base, and finds that the takeout person is not a registered user of the target building and does not belong to a dangerous person; the security control device 104 controls the visiting information registration apparatus to display the visiting information registration table according to this recognition result, and prompts the takeout to register the visiting information (visiting time is 11; and then, calling the visiting information which is registered by the registered user and is about to visit today, and determining that no visiting information matched with the visiting information exists after comparison. In order to ensure that the normal progress of the visiting event is not delayed, the identification result of the takeaway and the registered visiting information are transmitted to the indoor terminal device in the room 1104 according to the visiting information registered by the takeaway. The indoor terminal device displays the identity recognition result of the takeout person and the registered visiting information, the takeout person can be determined to be the own takeout after looking up one person, the access control device can be controlled to be opened through the indoor terminal device, and the takeout person enters the target building.
In this embodiment, terminal devices in each independent room in the target building are added to the security system, and the right for checking visitor information to control the access control is provided for the registered user. The accuracy of safety protection is further improved, and the safe visitor is prevented from being blocked.
In some embodiments, the system described above may further comprise: and the monitoring equipment is arranged on each floor in the target building. The monitoring equipment is used for acquiring image information of the corresponding position and sending the image information to the security control equipment; the security control equipment is also used for determining the action track of the visitor according to the image information acquired by each monitoring equipment, and marking the action track of the visitor on the BIM model of the target building for display so that security personnel can master the real-time dynamics of the visitor.
The monitoring equipment of each floor can carry out image acquisition to corresponding position, and through analyzing these image information, security protection controlgear can confirm visitor's actual action orbit. The BIM model of the target building can be constructed in advance, and the detected track is marked on the BIM model and visually presented to security personnel.
The monitoring equipment installed on each floor in the target building can be used for detecting the track of the visitor in the building and detecting the actual behavior of the visitor so as to timely cope with danger.
In some scenes, the elevator in the target building has the use permission, the permission is removed by swiping the card, and only registered users on the corresponding floor can select the keys on the corresponding floor. Visitors probably cannot use the elevator directly. To this kind of condition, can also be through security protection controlgear control elevator to visitor can normally take the elevator. Specifically, the security control device is further configured to obtain operation information of each elevator from a BIM model of the target building; determining an available elevator which can reach the floor where the visiting room is located according to the operation information of each elevator; and releasing the authority of the button of the floor where the visiting room of the available elevator is located according to the access permission instruction so that the visitor can smoothly arrive at the visiting room.
From the BIM model it is possible to determine the operating information of each elevator, from which it is possible to determine which elevator to take to reach the floor of the visiting room of the visitor, these elevators being referred to as "available elevators". The visitor must enter an available elevator. The access control can be released according to the access permission instruction, and meanwhile, the permission of the key of the corresponding floor of the visiting room in the available elevator can be released, so that a visitor can directly take the elevator to reach the corresponding floor without the visiting user. The convenience is greatly improved.
After determining that the visitor can successfully arrive at the visiting floor, the authority of the corresponding key is required to be restored. Specifically, the security system may further include: a monitoring device disposed in each elevator. The monitoring equipment in the elevator can acquire images of scenes in the elevator. The security control device is also used for carrying out image analysis on the image acquired by the monitoring device in the available elevator so as to detect whether the visitor successfully presses the key of the floor where the visiting room is located, and restoring the authority of the key of the floor where the visiting room is located of the available elevator after determining that the visitor successfully presses the key of the floor where the visiting room is located.
The security control equipment can determine which elevator the visitor enters by analyzing the image collected by the monitoring equipment in the available elevator, and further continuously analyzes the subsequent image of the elevator to determine whether the visitor successfully selects the key of the floor where the visiting room is located. If the visitor has successfully pressed the button on the floor where the visiting room is located, it is presumed that the visitor can smoothly arrive at the floor where the visiting room is located without using the button again. At this time, in order to prevent others from using the opportunity, the key authority is quickly restored.
In some scenarios, the security control device is further configured to: when the fact that the visitor enters the available elevator is not detected or the fact that the visitor selects the button of the floor where the visiting room is located is not detected, prompt information is sent to prompt security personnel that the visitor may lie to report the visiting information, and meanwhile the visitor is set as suspicious.
If the security control device does not find the visitor to enter after analyzing the monitoring video images in the available elevator, or the security control device does not select the button on the floor where the visiting room is located even if the visitor is detected to enter the available elevator, the security control device is regarded as an abnormal phenomenon. The visitor may walk the stairway or go to another floor. Presume the visitor is probably misrepresenting the visiting information, set it as suspicious personnel, monitor their movement trajectory, and timely find out and eliminate danger.
To prevent the problem in the above scenario, the security control device may determine the visitor's action trajectory in the following manner. Specifically, image analysis is carried out on images collected by monitoring equipment in the target building step so as to detect whether a visitor enters the step; when detecting that a visitor enters the escalator and the floor where the visitor leaves the escalator is not the floor where the visiting room is, sending prompt information to prompt security personnel that the visitor may lie to report the visiting information, and setting the visitor as suspicious; and determining the action track of the visitor according to the setting position of the monitoring equipment in the step and by combining the image acquired by the monitoring equipment in the step.
The visitor's action track is determined in conjunction with a monitoring device disposed within the stairway. If the visitor enters the stairway and leaves the stairway at the visiting floor, it can be presumed that the visitor selects the manner of the stairway, and the danger can be basically eliminated. If the visitor enters the stairway and leaves the stairway on other floors, it can be basically determined that the visitor has misrepresented the visiting information, possibly bringing about a potential danger, and is determined as suspicious. And tracks the track of the device for close monitoring.
In some embodiments, the security control device is further configured to: carrying out image analysis on images collected by monitoring equipment in a floor where a suspicious person arrives, and determining whether the suspicious person has suspicious behaviors; if suspicious people are detected to have suspicious behaviors, sending a prompt message to indoor terminal equipment of the registered user of the corresponding floor to prompt the registered user to pay attention to precaution, and determining the suspicious people as dangerous people; and sending the images and the action tracks of the dangerous personnel to terminal equipment of security personnel to prompt the security personnel to take preventive measures.
And (4) calling the images collected by the monitoring equipment of the floor where the suspicious people arrive for the determined suspicious people, carrying out image analysis, and checking whether the suspicious people can act. And if the suspicious behavior is determined to exist, in order to avoid the influence on the registered users on the floor, sending a prompt message to the indoor terminal equipment of the registered users on the corresponding floor to prompt the registered users to pay attention to precaution. At the same time, the suspect is determined to be a dangerous person. And sending the image and the action track of the dangerous person to terminal equipment of security personnel to prompt the security personnel to take precautionary measures.
In some embodiments, the suspicious behavior described above includes: the stay time outside at least one room exceeds the preset time length; alternatively, the trajectory shows the arrival of at least two floors. Alternatively, it is detected that the visitor is carrying a dangerous item, such as a knife, stick, or the like.
In a specific embodiment, monitoring can be set at the entrance of a target building, face recognition is performed, and whether a visitor is a registered user (resident, business, enterprise employee, operation and maintenance personnel) is judged; if the visitor is not the registered user, prompting the visitor to a specified position for registration by voice and/or characters; registering a relationship, visiting a room or visiting a user; meanwhile, inquiring and matching, judging whether the visitor is a dangerous person (wanted and suspicious people detected by the history issued by the police) or not, and eliminating the danger. If the negative information is found, sending a prompt to security personnel for future check; after the negative information is not found, the registered visiting user is contacted to determine whether the appointed visiting user has a visit; after the visiting user is granted or the visiting user can not be contacted for a long time, after the visiting user is registered, the visiting room is bound to visitor information, a channel authority (a unit lock and an elevator lock) is opened for the visitor, and the visitor is allowed to enter (after the registration is finished, the channel of a registration position is controlled to be opened to allow the visitor to enter the building); or wait for the visiting user to pick up the entry.
If the visitor enters the elevator individually, determining the running states of all elevators capable of reaching the visiting floor from the BIM model, predicting a plurality of elevators which arrive at the 1 st floor first and taking the elevators as the elevators which the visitor may take; and controlling the monitoring in the elevator which is probably carried to start a target detection function, detecting that the floor number selected by the visitor corresponds to the visiting room, and if not, canceling the selected floor.
If all elevators do not detect the visitors, the situation that the elevators may walk on stairs is indicated, and the elevator belongs to suspicious behaviors (particularly under the condition that the visiting floors are higher), staircases and all floors are controlled to monitor and enter a target detection state, and the visitors are detected and reported in real time.
According to the visitor information reported by monitoring, the action track of the visitor is displayed on the BIM in a dynamic form, so that security personnel can conveniently monitor and master the real-time dynamics of the visitor; the monitoring picture related to the visitor can be displayed on the interactive interface in real time, so that security personnel can conveniently judge whether the visitor is a suspicious person according to behavior;
if the visitor is detected only in the monitoring range of the visiting floor visiting room, no problem is shown; if the visitor is detected on other floors and suspicious people are judged (frequently stay outside some rooms, and the action track reaches two or more floors), a prompt message is sent to the registered user on the corresponding floor to prompt strangers, pay attention to closing doors and windows, and take precautions. And after leaving the floor, sending a prompt message again to prompt that a stranger leaves.
Fig. 2 is a schematic structural diagram of a security control device provided in an embodiment of the present application, and as shown in fig. 2, the security control device 200 of this embodiment includes: the device comprises a receiving module 201, a control module 202 and an instruction generating module 203.
A receiving module 201, configured to receive an identity recognition result of a visitor sent by an identity recognition device;
the control module 202 is used for controlling the visiting information registration device to display a visiting information registration table and prompting the visitor to register visiting information when the identity recognition result indicates that the visitor is not a registered user of the target building and does not belong to a dangerous person;
the instruction generating module 203 is used for comparing the visiting information with the visiting information pre-registered by the registered user, and generating an access permission instruction when the visiting information conforms to the visiting information pre-registered by the registered user; the visiting information comprises at least one item of visiting room number, visiting users and visiting relations;
the control module 202 is further configured to control the access control device to open according to the access allowing instruction by the security control device.
The security control device of this embodiment may be configured to execute the method executed by the security control device in any one of the above embodiments, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 3 is a schematic structural diagram of a security control device provided in an embodiment of the present application, and as shown in fig. 3, the security control device 300 of this embodiment may include: a memory 301 and a processor 302.
The memory 301 stores thereon a computer program that can be loaded and executed by the processor 302 to implement the functions of the security control device in the above-described embodiments.
Wherein the processor 302 is coupled to the memory 301, such as via a bus.
Optionally, the security control device 300 may also include a transceiver. It should be noted that, in practical applications, the number of the transceivers is not limited to one, and the structure of the security control device 300 does not constitute a limitation to the embodiment of the present application.
The Processor 302 may be a CPU (Central Processing Unit), a general purpose Processor, a DSP (Digital Signal Processor), an ASIC (Application Specific Integrated Circuit), an FPGA (Field Programmable Gate Array) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 302 may also be a combination of computing functions, e.g., comprising one or more microprocessors, a combination of a DSP and a microprocessor, or the like.
A bus may include a path that carries information between the components. The bus may be a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The Memory 301 may be a ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, a RAM (Random Access Memory) or other type of dynamic storage device that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory), a CD-ROM (Compact Disc Read Only Memory) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic Disc storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these.
The memory 301 is used for storing application program codes for executing the scheme of the application, and the processor 302 is used for controlling the execution. The processor 302 is configured to execute application program code stored in the memory 301 to implement the content shown in the foregoing method embodiments.
Wherein, security protection controlgear includes but not limited to: mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., car navigation terminals), and the like, and fixed terminals such as digital TVs, desktop computers, and the like. But also a server, etc. The security control device shown in fig. 3 is only an example, and should not bring any limitation to the functions and the use range of the embodiment of the present application.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.

Claims (10)

1. A security system for securing a target structure, the system comprising: the identity recognition equipment, the visiting information registration equipment, the access control equipment and the security control equipment are arranged at the entrance of the target building;
the identity recognition equipment is used for carrying out identity recognition on the visitor based on a pre-established registered user information base and a pre-established dangerous person information base after the visitor is detected, and feeding back an identity recognition result to the security control equipment;
the security control device is used for controlling the visiting information registration device to display a visiting information registration table and prompting the visitor to register visiting information when the identity recognition result indicates that the visitor is not a registered user of the target building and does not belong to a dangerous person; comparing the visiting information with the visiting information pre-registered by the registered user, and generating an admission instruction when the visiting information accords with the visiting information pre-registered by the registered user; the visiting information comprises at least one item of visiting room numbers, visiting users and visiting relations;
and the security control equipment controls the entrance guard equipment to be opened according to the access allowing instruction.
2. The system of claim 1, further comprising: indoor terminal equipment arranged in each independent room in the target building;
the security control equipment is further used for determining a visiting object according to the visiting information when the fact that the visitor does not accord with the visiting information pre-registered by the registered user is determined, and sending an identity recognition result and the visiting information to indoor terminal equipment corresponding to the visiting object;
the indoor terminal equipment is used for displaying the identity recognition result and the visiting information and prompting a user to verify the identity of the visitor; and after receiving an access permission instruction input by a user, forwarding the access permission instruction to the security control equipment.
3. The system of claim 2, further comprising: the monitoring equipment is arranged on each floor in the target building;
the monitoring equipment is used for acquiring image information of a corresponding position and sending the image information to the security control equipment;
the security control device is further used for determining the action track of the visitor according to the image information acquired by each monitoring device, and marking the action track of the visitor on the BIM model of the target building for display, so that security personnel can master the real-time dynamics of the visitor.
4. The system according to any one of claims 1 to 3,
the security control equipment is also used for acquiring the running information of each elevator from the BIM model of the target building; determining an available elevator which can reach the floor where the visiting room is located according to the operation information of each elevator; and releasing the authority of the key of the floor of the visiting room of the available elevator according to the access permission instruction so that the visitor can smoothly arrive at the visiting room.
5. The system of claim 4, further comprising: a monitoring device disposed in each elevator;
the security control device is further configured to perform image analysis on an image acquired by the monitoring device in the available elevator to detect whether the visitor successfully presses the key of the floor where the visiting room is located, and restore the authority of the key of the floor where the visiting room is located of the available elevator after determining that the visitor successfully presses the key of the floor where the visiting room is located.
6. The system of claim 5, wherein the security control device is further configured to:
and sending prompt information to prompt security personnel that the visitor misrepresents the visiting information and sets the visitor as suspicious personnel when the visitor is not detected to enter the available elevator or the visitor is not detected to select the button of the floor where the visiting room is located.
7. The system of claim 3, wherein the security control device is specifically configured to:
performing image analysis on images acquired by monitoring equipment in the target building step to detect whether the visitor enters the step;
when the fact that the visitor enters the escalator is detected, and the floor where the visitor leaves the escalator is not the floor where the visiting room is located, sending prompt information to prompt security personnel that the visitor misreads visiting information, and meanwhile setting the visitor as suspicious personnel;
and determining the action track of the visitor according to the setting position of the monitoring equipment in the step and by combining the image acquired by the monitoring equipment in the step.
8. The system of claim 6 or 7, wherein the security control device is further configured to:
carrying out image analysis on images collected by monitoring equipment in a floor where the suspicious people arrive, and determining whether the suspicious people have suspicious behaviors;
if the suspicious person is detected to have suspicious behaviors, sending a prompt message to indoor terminal equipment of the registered user of the corresponding floor to prompt the registered user to pay attention to precaution, and determining the suspicious person as a dangerous person;
and sending the image and the action track of the dangerous person to terminal equipment of security personnel to prompt the security personnel to take precautionary measures.
9. The system of claim 8, wherein the suspicious behavior comprises:
the stay time outside at least one room exceeds the preset time length;
alternatively, the first and second liquid crystal display panels may be,
the action track shows the arrival of at least two floors.
10. A security control apparatus, comprising:
the receiving module is used for receiving the identity recognition result of the visitor sent by the identity recognition equipment;
the control module is used for controlling the visiting information registration device to display a visiting information registration table and prompting the visitor to register visiting information when the identity recognition result indicates that the visitor is not a registered user of the target building and does not belong to a dangerous person;
the instruction generating module is used for comparing the visiting information with the visiting information pre-registered by the registered user, and generating an access allowing instruction when the visiting information conforms to the visiting information pre-registered by the registered user; the visiting information comprises at least one item of visiting room numbers, visiting users and visiting relations;
the control module is also used for controlling the entrance guard equipment to be opened according to the access allowing instruction by the security control equipment.
CN202211366679.7A 2022-11-01 2022-11-01 Security system and security control device Pending CN115588252A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211366679.7A CN115588252A (en) 2022-11-01 2022-11-01 Security system and security control device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211366679.7A CN115588252A (en) 2022-11-01 2022-11-01 Security system and security control device

Publications (1)

Publication Number Publication Date
CN115588252A true CN115588252A (en) 2023-01-10

Family

ID=84782133

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211366679.7A Pending CN115588252A (en) 2022-11-01 2022-11-01 Security system and security control device

Country Status (1)

Country Link
CN (1) CN115588252A (en)

Similar Documents

Publication Publication Date Title
CN101600640B (en) Elevator security system
US9799208B2 (en) Physical and logical threat analysis in access control systems using BIM
JP2009509887A (en) Elevator equipment for transporting elevator users in the building area
JP2011048547A (en) Abnormal-behavior detecting device, monitoring system, and abnormal-behavior detecting method
CN111599060A (en) Online service management method, device and system
CN111373452A (en) Portal monitoring system with radio identity authentication mechanism and password detection mechanism
JP2003109129A (en) Device, system and method for managing passage
JP2010191800A (en) Security management system
EP3109837A1 (en) System and method of smart incident analysis in control system using floor maps
CN115588252A (en) Security system and security control device
CN108665591B (en) Security system based on identity recognition
US11887445B2 (en) Information processing apparatus, information processing system, information processing method, and program
US20230095529A1 (en) Visit assistance apparatus, visit assistance method, and non-transitory computerreadable medium storing program
JP4705346B2 (en) Resident management system, occupant management server, and occupant management program
JP5524250B2 (en) Abnormal behavior detection device, monitoring system, abnormal behavior detection method and program
JP2005263363A (en) Security system of elevator
CN112233306A (en) Access control response processing method, access control terminal and control platform
KR102580367B1 (en) Control method for the access control system for visitors to apartment house
JP5958586B2 (en) Entrance / exit device, entrance / exit system, control method, and program
CN112249825B (en) Elevator control system, method, electronic equipment and storage medium
JP2003132469A (en) Authentication management system and its program
JP7127703B2 (en) Information processing device, information processing method and program
CN113112619B (en) Ticket checking method, ticket checking equipment, system and storage medium for online ticket card
US20230316840A1 (en) History management apparatus, history management system, history management method, and non-transitory computer-readable medium
EP4231620A1 (en) Complex facility monitoring system, complex facility monitoring method, and complex facility monitoring program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination