CN117423179A - Security system, method and device - Google Patents
Security system, method and device Download PDFInfo
- Publication number
- CN117423179A CN117423179A CN202311584961.7A CN202311584961A CN117423179A CN 117423179 A CN117423179 A CN 117423179A CN 202311584961 A CN202311584961 A CN 202311584961A CN 117423179 A CN117423179 A CN 117423179A
- Authority
- CN
- China
- Prior art keywords
- visitor
- information
- target area
- security
- destination
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000004891 communication Methods 0.000 claims description 13
- 238000007781 pre-processing Methods 0.000 claims description 5
- 230000000694 effects Effects 0.000 abstract description 9
- 238000012544 monitoring process Methods 0.000 description 12
- 230000006399 behavior Effects 0.000 description 9
- 230000001815 facial effect Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 6
- 238000013475 authorization Methods 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 5
- 206010000117 Abnormal behaviour Diseases 0.000 description 4
- 238000004590 computer program Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 2
- 230000010365 information processing Effects 0.000 description 2
- 206010063385 Intellectualisation Diseases 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000004140 cleaning Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Alarm Systems (AREA)
Abstract
The application relates to the technical field of safety protection, and discloses a safety protection system, a safety protection method and a safety protection device, wherein the safety protection system is used for carrying out safety protection on a target area and comprises the following steps: the identity recognition subsystem and the security control subsystem; the identity recognition subsystem is used for acquiring identity information of the visitor, generating and sending identity recognition to the security control subsystem; the security control subsystem is used for generating a notification message according to the identification result and sending the notification message to the terminal equipment, so that security personnel can start access control equipment of a target area according to the notification message, and the destination information of a visitor can be input to the terminal equipment; the security control subsystem is also used for acquiring destination information of the visitor and generating a target moving route; the security control subsystem is also used for acquiring the real-time position of the visitor in the target area, and generating alarm information and sending the alarm information to the terminal equipment if the position of the visitor in the target area exceeds the preset distance of the target moving route. Through the mode, the security effect of the lifting target area is achieved.
Description
Technical Field
The embodiment of the application relates to the technical field of safety protection, in particular to a safety protection system, a safety protection method and a safety protection device.
Background
With the acceleration of the urban process, the district construction is developed to intellectualization and modernization, and the market prospect of the district security system is quite broad. For the foreign personnel in the cell, the security personnel usually guide the foreign personnel to register personal information at the entrance of the cell, and the foreign personnel can enter the cell after registering the personal information. However, after an external person enters the cell, the security personnel cannot acquire the moving track of the security personnel in the public area of the cell in real time, so that certain potential safety hazards are brought to the cell. Therefore, a security system with a good security effect is lacking at present.
Disclosure of Invention
In view of the above problems, embodiments of the present application provide a security system, a method, and an apparatus, which are used to solve the problem in the prior art that the security effect of the security system is not good.
According to an aspect of the embodiments of the present application, there is provided a security system for performing security protection on a target area, the system including: the identity recognition subsystem and the security control subsystem are arranged at the entrance of the target area; the identity recognition subsystem is used for acquiring identity information of the visitor, confirming whether a pre-established information base comprises the identity information of the visitor to generate an identity recognition result, and sending the identity recognition result to the security control subsystem, wherein if the information base comprises the identity information of the visitor, the identity recognition result is that the visitor belongs to an authentication person; the security control subsystem is used for receiving the identity recognition result, generating a notification message according to the identity recognition result and sending the notification message to a terminal device in communication connection with the security control subsystem, wherein if the identity recognition result is that the visitor belongs to an authentication person, the notification message comprises opening access control information and information for requesting to enter destination position information of the visitor, so that the security person opens access control equipment of the target area according to the opening access control information, and enters the destination position information of the visitor to the terminal device according to the information for requesting to enter the destination position information of the visitor; the security control subsystem is further used for acquiring destination position information of the visitor, which is input by security personnel through the terminal equipment, and generating a target moving route according to the destination position information of the visitor, wherein the destination of the visitor is positioned in the target area, and the target moving route is a moving route from the destination of the visitor to the destination of the visitor and from the destination of the visitor to the exit of the target area; the security control subsystem is further used for acquiring real-time position information of the visitor in the target area, generating alarm information if the position of the visitor in the target area exceeds the preset distance of the target moving route, and sending the alarm information to the terminal equipment.
In an optional manner, the security control subsystem obtains real-time location information of the visitor in the target area by obtaining real-time location information of a locator card carried by the visitor or real-time location information of a mobile device loaded with a locating application program.
In an optional manner, a plurality of bluetooth beacons are arranged in the target area, wherein the plurality of bluetooth beacons are respectively used for transmitting bluetooth signals, so that the positioning card or the mobile device receives the bluetooth signals transmitted by the plurality of bluetooth beacons; the security control subsystem obtains the real-time position information of the visitor in the target area by obtaining the real-time position information of the positioning card carried by the visitor or the real-time position information of the mobile device loaded with the positioning application program, and the security control subsystem comprises the following steps: the security control subsystem is used for acquiring the position information of a preset number of Bluetooth beacons in the plurality of Bluetooth beacons according to the signal intensity information of the Bluetooth signals received by the positioning card or the mobile device, and determining the real-time position information of the visitor in the target area according to the signal intensity information of the Bluetooth signals and the acquired position information of the Bluetooth beacons.
In an optional manner, a plurality of bluetooth beacons are arranged in the target area, wherein the bluetooth beacons are respectively used for transmitting bluetooth signals, so that the positioning card or the mobile device receives the bluetooth signals transmitted by the bluetooth beacons, performs data preprocessing on signal intensity data of the received bluetooth signals, and transmits the data to the security control subsystem; the security control subsystem obtains the real-time position information of the visitor in the target area by obtaining the real-time position information of the positioning card carried by the visitor or the real-time position information of the mobile device loaded with the positioning application program, and the security control subsystem comprises the following steps: the security control subsystem is used for receiving the signal intensity data of the Bluetooth signal sent by the positioning card or the mobile device, and determining the real-time position information of the visitor in the target area according to the received signal intensity data and the position information of the Bluetooth beacon.
In an alternative manner, the identity recognition subsystem obtains the identity information of the visitor through face recognition, fingerprint recognition and/or iris recognition.
In an optional manner, the security control subsystem is further configured to send the target movement route to a mobile device carried by the visitor, so that the mobile device displays the target movement route to the visitor, where the security control subsystem is in communication connection with the mobile device.
In an optional manner, if the information base does not include the identity information of the visitor, the identity recognition result is that the visitor belongs to a non-authentication person; the security control subsystem is further configured to generate visitor information according to the received identification result, and send the visitor information to the terminal device, where if the identification result indicates that the visitor belongs to a non-authenticated person, the visitor information includes information that the visitor belongs to the non-authenticated person; if the identity recognition result is that the visitor belongs to an authentication person, the visitor information comprises the identity information, the access times and the historical access time information of the visitor stored in the information base.
In an optional manner, if the information base does not include the identity information of the visitor, the identity recognition result is that the visitor belongs to a non-authentication person; if the identity recognition result shows that the visitor belongs to a non-authentication person, the notification message comprises information for requesting to input the identity information of the visitor, so that the security personnel can input the identity information of the visitor to the terminal equipment according to the information for requesting to input the identity information of the visitor; the security control subsystem is also used for acquiring the identity information of the visitor, which is input by security personnel through the terminal equipment, and storing the acquired identity information of the visitor into the information base.
According to another aspect of the embodiments of the present application, there is provided a security method for performing security protection on a target area, where the method includes: acquiring identity information of a visitor, and carrying out identity recognition on the visitor according to a pre-established information base, wherein the identity recognition result is whether the visitor belongs to an authentication person or not; if the identity recognition result of the visitor is that the visitor belongs to an authentication person, destination position information of the visitor is obtained, wherein the destination is located in the target area; determining a target moving route according to the destination position information of the visitor, wherein the target moving route is a moving route from the destination of the visitor to the destination of the visitor and from the destination of the visitor to the exit of the target area; acquiring the real-time position of the visitor in the target area; and if the position of the visitor in the target area exceeds the preset distance of the target moving route, generating alarm information.
According to another aspect of the embodiments of the present application, there is provided a security device for performing security protection on a target area, the device including: the first acquisition module is used for acquiring identity information of the visitor and carrying out identity recognition on the visitor according to a pre-established information base, wherein the identity recognition result is whether the visitor belongs to an authentication person or not; the second acquisition module is used for acquiring destination position information of the visitor if the identity recognition result of the visitor is that the visitor belongs to an authenticator, wherein the destination of the visitor is located in the target area; a determining module, configured to determine a target movement route according to destination location information of the visitor, where the target movement route is a movement route from the destination of the visitor to the destination of the visitor and from the destination of the visitor to the exit of the target area; the third acquisition module is used for acquiring the real-time position of the visitor in the target area; and the alarm module is used for generating alarm information if the position of the visitor exceeds the preset distance of the target moving route.
According to still another aspect of the embodiments of the present application, there is provided a computer-readable storage medium having stored therein executable instructions for causing a security device to perform operations corresponding to the security method described above.
In the embodiment of the application, identity information of the visitor is identified through the identity identification subsystem, whether the visitor belongs to an authentication person is confirmed, if the visitor belongs to the authentication person, a target moving route is generated through the security control subsystem, the real-time position of the visitor in a public area of a target area is obtained, and if the position of the visitor in the public area of the target area exceeds a preset distance of the target moving route, the security control subsystem timely generates and sends alarm information to terminal equipment, so that the security personnel pay attention to the behavior of the visitor in the public area of the target area, and the security of the target area is ensured. Because the security system acquires the position of the visitor in the public area of the target area in real time, when the position of the visitor deviates from the target moving route, alarm information is timely generated, and compared with the way that a plurality of cameras are deployed in the public area of the target area, security personnel can acquire the walking route and the behavior of the visitor in the public area of the target area through the monitoring cameras, the situation that the security personnel cannot timely learn the abnormal behavior of the visitor due to the fact that the security personnel neglect the monitoring cameras is avoided, and therefore the security effect is improved; and the number of security personnel of the monitoring camera can be reduced, so that the security cost is reduced.
The foregoing description is only an overview of the technical solutions of the embodiments of the present application, and may be implemented according to the content of the specification, so that the technical means of the embodiments of the present application can be more clearly understood, and the following detailed description of the present application will be presented in order to make the foregoing and other objects, features and advantages of the embodiments of the present application more understandable.
Drawings
The drawings are only for purposes of illustrating embodiments and are not to be construed as limiting the application. Also, like reference numerals are used to designate like parts throughout the figures. In the drawings:
fig. 1 shows a schematic structural diagram of a security system provided in an embodiment of the present application;
fig. 2 shows a schematic flow chart of a security method provided in an embodiment of the present application;
fig. 3 shows a schematic structural diagram of a security device provided in an embodiment of the present application;
fig. 4 shows a schematic structural diagram of a security device provided in an embodiment of the present application.
Detailed Description
Exemplary embodiments of the present application will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present application are shown in the drawings, it should be understood that the present application may be embodied in various forms and should not be limited to the embodiments set forth herein.
In the security system of the current cell, a plurality of cameras are usually deployed in a public area of the cell, security personnel monitor whether the public area of the cell is abnormal or not through monitoring the cameras, or if external personnel exist in the cell, the security personnel monitor the moving track of the external personnel in the public area of the cell through monitoring the cameras so as to ensure the safety of the cell. However, the security system has a monitoring blind area, security personnel are required to monitor cameras in real time, if the number of the cameras is large, the situation that the security personnel cannot monitor all the cameras simultaneously and effectively can occur, the security effect is poor, the security personnel are required to monitor the cameras, and the security cost is high.
Based on the above consideration, in order to improve the security effect of a community and reduce security cost, the application provides a security system for performing security protection on a target area, wherein the security system comprises an identity recognition subsystem and a security control subsystem, which are arranged at an entrance of the target area, the identity recognition subsystem is used for recognizing identity information of a visitor, the security control subsystem is used for generating a target moving route according to a destination position of the visitor and acquiring a real-time position of the visitor in the target area, and if the position of the visitor in the target area exceeds a preset distance of the target moving route, alarm information is generated and sent, wherein the destination of the visitor is in the target area, and the target moving route is a moving route from the entrance of the target area to the destination of the visitor and from the destination of the visitor to an exit of the target area. The moving path of the visitor in the public area of the target area is monitored in real time, so that the safety of the target area is ensured.
The security system provided by the embodiment of the application can be applied to but not limited to areas needing security protection such as communities, office buildings, hotels, villages, schools and the like.
Fig. 1 shows a schematic structural diagram of a security system provided in an embodiment of the present application, where the security system is used for performing security protection on a target area. As shown in fig. 1, the security system 100 includes an identification subsystem 101 and a security control subsystem 102.
The identity recognition subsystem 101 is configured to obtain identity information of a visitor, confirm whether a pre-established information base includes the identity information of the visitor to generate an identity recognition result, and send the identity recognition result to the security control subsystem 102, where if the information base includes the identity information of the visitor, the identity recognition result is that the visitor belongs to an authenticator;
the security control subsystem 102 is configured to receive an identification result, generate a notification message according to the identification result, and send the notification message to a terminal device communicatively connected to the security control subsystem 102, where if the identification result indicates that the visitor belongs to an authenticator, the notification message includes information of opening access control information and information of requesting to enter destination location information of the visitor, so that the security personnel opens access control equipment of a target area according to the opening access control information, and enters destination location information of the visitor to the terminal device according to the information of requesting to enter destination location information of the visitor;
The security control subsystem 102 is further configured to obtain destination location information of the visitor entered by the security personnel through the terminal device, and generate a target moving route according to the destination location information of the visitor, where the destination of the visitor is located in the target area, and the target moving route is a moving route from an entrance of the target area to the destination of the visitor and from the destination of the visitor to an exit of the target area;
the security control subsystem 102 is further configured to obtain real-time location information of the visitor in the target area, generate alarm information if the location of the visitor in the target area exceeds a preset distance of the target moving route, and send the alarm information to the terminal device.
The target area refers to an area needing to be safeguarded, such as a cell, an office building and the like. The identity recognition subsystem 101 is a system that can acquire identity information of a visitor and perform recognition, for example, an electronic device with a shooting function, after obtaining authorization of the visitor, acquires face information of the visitor by shooting the face of the visitor, and further can search whether the information base includes the face information of the visitor according to the acquired face information of the visitor in a pre-established information base. The identity recognition subsystem 101 may also be an electronic device with a function of reading fingerprint information of a user, and after obtaining authorization of a visitor, reads fingerprint information of the visitor, and further may search a pre-established information base for whether the information base includes the fingerprint information of the visitor according to the obtained fingerprint information of the visitor. The identity information included in the database refers to the identity information which is provided by the user after the user is authorized and is stored in the database after the personal information is confirmed by security personnel, the identity information can be face information, fingerprint information, identity code information or other identity information which can be used for representing the identity of the user, and it can be understood that the identity information of different users is different.
It should be noted that, the database may be stored in the identity recognition subsystem 101, so that the identity recognition subsystem 101 may generate the identity recognition result in time; the database may also be stored in a server communicatively connected to the identity recognition subsystem 101, after the identity recognition subsystem 101 obtains the identity information of the visitor, the obtained identity information is sent to the server, so that the server confirms whether the identity information of the visitor is included in the database, and returns the confirmation result to the identity recognition subsystem 101, and the identity recognition subsystem 101 generates the identity recognition result according to the confirmation result returned by the server, thereby reducing the requirement on the storage capacity of the identity recognition subsystem 101.
If the database comprises the identity information of the visitor, the identity recognition result is that the visitor belongs to an authentication person; if the identity information of the visitor is not included in the database, the identity recognition result is that the visitor belongs to a non-authentication person. The security control subsystem 102 is configured to receive the identification result, generate and send a notification message to a terminal device communicatively connected to the security control subsystem 102, where the terminal device is an electronic device used by a security personnel. If the identification result shows that the visitor belongs to an authentication person, the notification message comprises entrance guard opening information and information for requesting to enter destination position information of the visitor, and after receiving the entrance guard opening information, security personnel open entrance guard equipment of a target area for the visitor so as to release the visitor into the target area; and after the security personnel receives the information of the destination position information of the visitor, acquiring and inputting the destination position information of the visitor to the terminal equipment, wherein the destination position information of the visitor refers to a specific position of a destination to be reached by the visitor, for example, if a target area is a cell, the destination position information refers to information of a number of a building, a number of a unit, a number of a room and the like of the cell, of the destination to be reached by the visitor.
Because the security control subsystem 102 is in communication connection with the terminal device, after the security personnel inputs the destination location information of the visitor to the terminal device, the security control subsystem 102 can acquire the destination location information of the visitor, which is input by the security personnel through the terminal device, and then the security control subsystem 102 generates a target moving route according to the destination location information of the visitor, wherein the target moving route is a moving route from the entrance of the target area to the destination of the visitor and from the destination of the visitor to the exit of the target area.
The security control subsystem 102 obtains real-time position information of the visitor in the target area, if the position of the visitor in the target area exceeds a preset distance of a target moving route, the security control subsystem 102 generates and sends alarm information to the terminal equipment, so that security personnel pay attention to the behavior of the visitor in a public area of the target area, the behavior of the visitor in the target area, which is harmful to the safety of other people, is avoided, and accordingly the safety of the target area is ensured. The preset distance may be set as required, for example, may be set to 5 meters, 6 meters, or the like.
In this embodiment of the present application, identity information of a visitor is identified by the identity identification subsystem 101, whether the visitor belongs to an authenticator is determined, if the visitor belongs to the authenticator, a target movement route is generated by the security control subsystem 102, and a real-time position of the visitor in a public area of a target area is obtained, if the position of the visitor in the public area of the target area exceeds a preset distance of the target movement route, the security control subsystem 102 timely generates and sends alert information to a terminal device, so that the security personnel pay attention to the behavior of the visitor in the public area of the target area, so as to ensure the security of the target area. Because the security system 100 acquires the position of the visitor in the public area of the target area in real time, when the position of the visitor deviates from the target moving route, alarm information is generated in time, and compared with the way that a plurality of cameras are deployed in the public area of the target area, the security personnel can acquire the walking route and the behavior of the visitor in the public area of the target area through the monitoring cameras, the situation that the security personnel cannot learn the abnormal behavior of the visitor in time due to neglecting the monitoring cameras can not occur, so that the security effect is improved; and the number of security personnel of the monitoring camera can be reduced, so that the security cost is reduced.
It is worth to say that the security system provided by the embodiment of the application can work by using the local area network in the target area without depending on an external network, so that the security of the security system is ensured.
In order to timely acquire the real-time position of the visitor in the target area, in the embodiment of the present application, the security control subsystem 102 acquires the real-time position information of the visitor in the target area by acquiring the real-time position information of the positioning card carried by the visitor or acquiring the real-time position information of the mobile device loaded with the positioning application program.
The positioning card is a card with a positioning function chip, and is small in size and convenient to carry. If the visitor belongs to the authentication personnel, after the security personnel opens the access control equipment of the target area for the visitor, a positioning card is provided for the visitor, so that the real-time position of the visitor in the public area of the target area can be obtained in real time after the visitor enters the target area. The positioning application refers to an application that can acquire position information. The mobile device refers to a smart phone or a smart watch of a visitor person, or the like, or a mobile device for positioning provided to the visitor by a security personnel. After the visitor authorization is obtained, the security control subsystem 102 is in communication connection with the mobile device carried by the visitor, so that the security control subsystem 102 can acquire the position information of the mobile device carried by the visitor, and the real-time position of the visitor in the public area of the target area can be acquired in real time.
Because the visitor enters the target area and then carries the positioning card or the mobile device loaded with the positioning application program with him, in this embodiment of the present application, the security control subsystem 102 obtains the real-time position information of the positioning card or the mobile device in communication connection with the visitor, so as to obtain the real-time position information of the visitor in the target area, and further determine in real time whether the position of the visitor in the target area exceeds the preset distance of the target moving route, thereby playing a security role.
In order to accurately acquire real-time position information of a visitor in a public area of a target area, in the embodiment of the application, a plurality of Bluetooth beacons are arranged in the target area, wherein the plurality of Bluetooth beacons are respectively used for transmitting Bluetooth signals so that a positioning card or mobile equipment receives the Bluetooth signals transmitted by the plurality of Bluetooth beacons;
the security control subsystem 102 obtains real-time location information of the visitor in the target area by obtaining real-time location information of a locator card carried by the visitor or real-time location information of a mobile device loaded with a locating application program, including:
the security control subsystem 102 is configured to obtain, according to signal strength information of bluetooth signals received by the locator card or the mobile device, location information of a preset number of bluetooth beacons in the plurality of bluetooth beacons, and determine real-time location information of the visitor in the target area according to the signal strength information of the bluetooth signals and the obtained location information of the bluetooth beacons.
The bluetooth beacons can be deployed at intervals in the corridor, indoor, wall and other positions of the public area of the target area, and the bluetooth beacons are respectively used for sending bluetooth signals to the positioning card or the mobile device. It will be appreciated that the signal strength of the bluetooth signal transmitted by a bluetooth beacon received by a locator card or mobile device is related to its distance from the bluetooth beacon, the closer the locator card or mobile device is to a bluetooth beacon, the stronger the signal strength of the bluetooth signal transmitted by the bluetooth beacon it receives. Therefore, the location information of the visitor can be determined according to the signal strength information of the bluetooth signal received by the locator card or the mobile device.
Specifically, the security control subsystem 102 selects a preset number of groups of bluetooth signals with stronger signal strength according to the sequence from strong to weak of the bluetooth signals according to the data such as the universal unique identification code (Universally Unique Identifier, UUID) of the bluetooth beacon and the signal strength of the received signal strength indicator (Received Signal Strength Indicator, RSSI), preferably selects three groups of bluetooth signals with stronger signal strength of the bluetooth signals arranged in the first three groups, performs edge calculation (trilateral calculation) based on the RSSI strength data of the bluetooth signals, and then can calculate the current position of the positioning card or the mobile device according to the physical position of the bluetooth beacon sending out the three groups of bluetooth signals. Or, the positioning card or the mobile device performs edge calculation (trilateral calculation) according to the received signal intensity data of the Bluetooth signal and based on the RSSI intensity data of the Bluetooth signal, and then uploads the data to the server, wherein the server provides time sequence storage and message queue subscription service, the resolving service obtains a large amount of scanning data through subscribing the message queue to do resolving, analyzes and stores the time sequence database, performs positioning algorithm fusion calculation to obtain corresponding x coordinate and y coordinate of the positioning card or the mobile device, namely the current position of the visitor, and then sends the data to the security control subsystem 102 through the message queue, or stores the movement track of the visitor.
In the embodiment of the application, the real-time position information of the visitor can be accurately calculated by selecting the preset number of Bluetooth signals with stronger signal strength and the positions of the Bluetooth beacons sending out the Bluetooth signals.
In order to improve the efficiency of acquiring the real-time position of the visitor, in the embodiment of the present application, a plurality of bluetooth beacons are disposed in the target area, where the plurality of bluetooth beacons are respectively used to transmit bluetooth signals, so that the positioning card or the mobile device receives the bluetooth signals transmitted by the plurality of bluetooth beacons, performs data preprocessing on signal intensity data of the received bluetooth signals, and transmits the data to the security control subsystem 102;
the security control subsystem obtains the real-time position information of the visitor in the target area by obtaining the real-time position information of the positioning card carried by the visitor or the real-time position information of the mobile device loaded with the positioning application program, and comprises the following steps:
the security control subsystem 102 is configured to receive signal strength data of a bluetooth signal sent by a locator card or a mobile device, and determine real-time location information of a visitor in a target area according to the received signal strength data and location information of a bluetooth beacon.
The signal strength data is data representing the strength of bluetooth signals. The method comprises the steps that the positioning card or the mobile equipment performs data preprocessing on signal intensity data of received Bluetooth signals, namely performs data cleaning processing on the received data, selects a preset number of groups of Bluetooth signals with stronger signal intensity, and preferentially selects three groups of Bluetooth signals with the signal intensity of the Bluetooth signals being ranked in the first three groups. The method for calculating and acquiring the real-time location information of the visitor can be performed according to the method for acquiring the real-time location information of the visitor according to the signal intensity data of the bluetooth signal and the location information of the bluetooth beacon, which is described above, and will not be described herein.
In the embodiment of the application, the signal intensity data of the received bluetooth signal is subjected to data preprocessing by the positioning card or the mobile device and then sent to the security control subsystem 102, so that the sent data volume is reduced, the data transmission efficiency is improved, and the efficiency of calculating the real-time position of the visitor is improved.
In some embodiments, the identity recognition subsystem 101 obtains the identity information of the visitor through face recognition, fingerprint recognition, and/or iris recognition. Since the face information, fingerprint information, and iris information of each person do not easily change and the information of each person is different, each visitor can be accurately identified based on the information.
In some embodiments, the identification subsystem 101 includes a face shooting device, and after obtaining authorization of the visitor, the identification subsystem 101 shoots a face photo of the visitor through the face shooting device, thereby obtaining identity information of the visitor. The identification subsystem 101 extracts a picture including facial features through a software development kit (Software Development Kit, SDK) of a device provided by a facial shooting device manufacturer, and uploads the shot picture to a security system and stores the shot picture. The device SDK may acquire the photographed camera IP, then combine the uploaded facial photo paths, upload the facial information to the facial information processing server, and perform facial feature value analysis, facial photo quality score, etc. of the facial photo in the facial information processing server, and then store these information in the database. And simultaneously, sending the information to a message middleware, comparing the face photos, and storing the face photos in an information base.
The photo comparison service is a cluster mode, the cluster subscribes to face shooting information from the message middleware, and obtains information (including face feature values, IP, photo paths, areas and the like) in all information bases under the area according to area information of the face information obtained through shooting; and comparing the characteristic values of the face information obtained by shooting with all the face information under the area in the information base, and taking the matched face information larger than a preset threshold value. If the information base does not have the matched face information, adding a new piece of face information into the face photo information obtained by shooting; and if the matched face information exists, the face information with the maximum similarity is taken, and quality score matching is carried out. If the quality score is greater than the information base quality score, replacing the information base, and sending a callback message to the terminal equipment; if the quality score is smaller than the quality score of the information base, the information base is not replaced, the alarm threshold is met, and callback information is sent to the terminal equipment. Meanwhile, the face information obtained by shooting is associated with an information base, and one piece of face photo information corresponds to a plurality of pieces of shooting face information.
In some embodiments, the security control subsystem 102 is further configured to send the target movement route to a mobile device carried by the visitor, so that the mobile device presents the target movement route to the visitor, where the security control subsystem 101 is communicatively connected to the mobile device. If the target area is large, after the security control subsystem 102 generates the target moving route, the target moving route is sent to the mobile device carried by the visitor, so that the visitor can move to the destination according to the target moving route, and user experience is improved.
In some embodiments, if the information base does not include identity information of the visitor, the identity recognition result is that the visitor belongs to a non-authentication person;
the security control subsystem 102 is further configured to generate visitor information according to the received identification result, and send the visitor information to the terminal device, where if the identification result indicates that the visitor belongs to a non-authenticated person, the visitor information includes information that the visitor belongs to the non-authenticated person; if the identification result is that the visitor belongs to the authentication personnel, the visitor information comprises the visitor identification information, the visit times and the historical visit time information stored in the information base.
If the visitor belongs to a non-authentication person, the security personnel can refuse to let the visitor enter the target area after receiving the visitor information including the visitor belongs to the non-authentication person, so as to ensure the security of the target area. After each time a visitor enters a target area, security personnel can store the access time of the visitor into an information base.
In this embodiment, for the authentication personnel, since the visitor information includes the access times and the historical access time of the visitor, the visitor information is sent to the terminal device through the security control subsystem 102, so that the security personnel can know more information of the visitor, and then the security personnel can judge whether the behavior of the visitor belongs to abnormal behavior according to the access times and the access time of the visitor, thereby further ensuring the security of the target area.
In some embodiments, if the information base does not include identity information of the visitor, the identity recognition result is that the visitor belongs to a non-authenticated person;
if the identity recognition result is that the visitor belongs to a non-authentication person, the notification message comprises information for requesting to input the identity information of the visitor, so that the security personnel can input the identity information of the visitor to the terminal equipment according to the information for requesting to input the identity information of the visitor;
the security control subsystem 102 is further configured to obtain identity information of a visitor entered by a security personnel through a terminal device, and store the obtained identity information of the visitor to an information base.
If the visitor accesses the target area for the first time, the information base may not store the identity information of the visitor. Therefore, in the embodiment of the present application, if the identity recognition result is that the visitor belongs to a non-authentication person, the notification message includes information requesting to enter the identity information of the visitor, so that after the security personnel obtains the authorization of the visitor, the identity information of the visitor is entered into the terminal device, and then the security control subsystem 102 obtains and stores the identity information of the visitor entered by the security personnel into the information base, so that when the identity recognition subsystem 101 obtains the identity information of the visitor again and generates the identity recognition result, the identity recognition result of the visitor is that the visitor belongs to the authentication personnel, and the visitor can enter the target area.
Fig. 2 is a flow chart illustrating a security method according to an embodiment of the present application, where the security method is used to secure a target area, and the method is performed by a computing device, where the computing device may be a computing device including one or more processors, which may be a central processing unit CPU, or a specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits configured to implement an embodiment of the present invention, which is not limited herein. The one or more processors included by the computing device may be the same type of processor, such as one or more CPUs; but may be different types of processors such as, without limitation, one or more CPUs and one or more ASICs. As shown in fig. 2, the method comprises the steps of:
step 110: and acquiring the identity information of the visitor, and carrying out identity recognition on the visitor according to a pre-established information base, wherein the identity recognition result is whether the visitor belongs to an authentication person or not.
Step 120: judging whether the identity recognition result of the visitor belongs to an authentication person, if so, installing the step 130; if not, ending.
Step 130: and obtaining destination position information of the visitor, wherein the destination is positioned in the target area.
Step 140: and determining a target moving route according to the destination position information of the visitor, wherein the target moving route is a moving route from the destination of the visitor to the destination of the visitor and from the destination of the visitor to the exit of the target area.
Step 150: and acquiring the real-time position of the visitor in the target area.
Step 160: judging whether the position of the visitor in the target area exceeds the preset distance of the target moving route, if so, turning to step 170; if not, ending.
Step 170: and generating alarm information.
In the embodiment of the application, whether the visitor belongs to an authentication person is confirmed by identifying the identity information of the visitor, if the visitor belongs to the authentication person, a target moving route is generated, the real-time position of the visitor in the public area of the target area is obtained, and if the position of the visitor in the public area of the target area exceeds the preset distance of the target moving route, alarm information is timely generated, so that security personnel pay attention to the behavior of the visitor in the public area of the target area, and the security of the target area is ensured. Because the security method is to acquire the position of the visitor in the public area of the target area in real time, when the position of the visitor deviates from the target moving route, alarm information is generated in time, compared with the way of deploying a plurality of cameras in the public area of the target area, security personnel can acquire the walking route and the behavior of the visitor in the public area of the target area through the monitoring cameras, the situation that the security personnel cannot learn the abnormal behavior of the visitor in time due to neglecting the monitoring cameras can not occur, and therefore the security effect is improved; and the number of security personnel of the monitoring camera can be reduced, so that the security cost is reduced.
Fig. 3 shows a schematic structural diagram of a security device provided in an embodiment of the present application. As shown in fig. 3, the apparatus 200 includes: a first acquisition module 201, a second acquisition module 202, a determination module 203, a third acquisition module 204, and an alarm module 205.
The first obtaining module 201 is configured to obtain identity information of a visitor, and identify the visitor according to a pre-established information base, where the result of the identification is whether the visitor belongs to an authenticator.
The second obtaining module 202 is configured to obtain destination location information of the visitor if the identification result of the visitor is that the visitor belongs to an authenticator, where the destination of the visitor is located in the target area.
The determining module 203 is configured to determine a target moving route according to destination location information of a visitor, where the target moving route is a moving route from a destination of the visitor to a destination of the visitor and from the destination of the visitor to an exit of the target area.
The third obtaining module 204 is configured to obtain a real-time location of the visitor in the target area.
The alarm module 205 is configured to generate alarm information if the visitor's location exceeds the target moving route by a preset distance.
The security device provided in this embodiment is configured to execute the technical scheme of the security method in the foregoing method embodiment, and its implementation principle and technical effect are similar and are not described herein again.
Fig. 4 shows a schematic structural diagram of a security device provided in an embodiment of the present application, which is not limited to a specific implementation of the security device.
As shown in fig. 4, the security device may include: a processor (processor) 302, a communication interface (Communications Interface) 304, a memory (memory) 306, and a communication bus 308.
Wherein: processor 302, communication interface 304, and memory 306 perform communication with each other via communication bus 308. A communication interface 304 for communicating with network elements of other devices, such as clients or other servers. The processor 302 is configured to execute the program 310, and may specifically perform the relevant steps in the embodiment of the security method described above.
In particular, program 310 may include program code comprising computer-executable instructions.
The processor 302 may be a central processing unit CPU, or a specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits configured to implement embodiments of the present application. The one or more processors included in the security device may be the same type of processor, such as one or more CPUs; but may also be different types of processors such as one or more CPUs and one or more ASICs.
Memory 306 for storing program 310. Memory 306 may comprise high-speed RAM memory or may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The embodiment of the application provides a computer readable storage medium, which stores executable instructions, wherein the executable instructions enable security equipment to execute the security method in any of the method embodiments when the executable instructions run on the security equipment.
The embodiment of the application provides a computer program which can be called by a processor to enable security equipment to execute the security method in any of the method embodiments.
Embodiments of the present application provide a computer program product comprising a computer program stored on a computer readable storage medium, the computer program comprising program instructions which, when run on a computer, cause the computer to perform the security method of any of the method embodiments described above.
Claims (10)
1. A security system for securing a target area, the system comprising: the identity recognition subsystem and the security control subsystem are arranged at the entrance of the target area;
The identity recognition subsystem is used for acquiring identity information of the visitor, confirming whether a pre-established information base comprises the identity information of the visitor to generate an identity recognition result, and sending the identity recognition result to the security control subsystem, wherein if the information base comprises the identity information of the visitor, the identity recognition result is that the visitor belongs to an authentication person;
the security control subsystem is used for receiving the identity recognition result, generating a notification message according to the identity recognition result and sending the notification message to a terminal device in communication connection with the security control subsystem, wherein if the identity recognition result is that the visitor belongs to an authentication person, the notification message comprises opening access control information and information for requesting to enter destination position information of the visitor, so that the security person opens access control equipment of the target area according to the opening access control information, and enters the destination position information of the visitor to the terminal device according to the information for requesting to enter the destination position information of the visitor;
the security control subsystem is further used for acquiring destination position information of the visitor, which is input by security personnel through the terminal equipment, and generating a target moving route according to the destination position information of the visitor, wherein the destination of the visitor is positioned in the target area, and the target moving route is a moving route from the destination of the visitor to the destination of the visitor and from the destination of the visitor to the exit of the target area;
The security control subsystem is further used for acquiring real-time position information of the visitor in the target area, generating alarm information if the position of the visitor in the target area exceeds the preset distance of the target moving route, and sending the alarm information to the terminal equipment.
2. The system of claim 1, wherein the security control subsystem obtains real-time location information of the visitor within the target area by obtaining real-time location information of a locator card carried by the visitor or real-time location information of a mobile device loaded with a location application.
3. The system according to claim 2, wherein a plurality of bluetooth beacons are disposed in the target area, wherein the plurality of bluetooth beacons are respectively configured to transmit bluetooth signals, such that the locator card or the mobile device receives the bluetooth signals transmitted by the plurality of bluetooth beacons;
the security control subsystem obtains the real-time position information of the visitor in the target area by obtaining the real-time position information of the positioning card carried by the visitor or the real-time position information of the mobile device loaded with the positioning application program, and the security control subsystem comprises the following steps:
The security control subsystem is used for acquiring the position information of a preset number of Bluetooth beacons in the plurality of Bluetooth beacons according to the signal intensity information of the Bluetooth signals received by the positioning card or the mobile device, and determining the real-time position information of the visitor in the target area according to the signal intensity information of the Bluetooth signals and the acquired position information of the Bluetooth beacons.
4. The system according to claim 2, wherein a plurality of bluetooth beacons are disposed in the target area, and the plurality of bluetooth beacons are respectively used for transmitting bluetooth signals, so that the locator card or the mobile device receives the bluetooth signals transmitted by the plurality of bluetooth beacons, performs data preprocessing on signal intensity data of the received bluetooth signals, and transmits the data to the security control subsystem;
the security control subsystem obtains the real-time position information of the visitor in the target area by obtaining the real-time position information of the positioning card carried by the visitor or the real-time position information of the mobile device loaded with the positioning application program, and the security control subsystem comprises the following steps:
the security control subsystem is used for receiving the signal intensity data of the Bluetooth signal sent by the positioning card or the mobile device, and determining the real-time position information of the visitor in the target area according to the received signal intensity data and the position information of the Bluetooth beacon.
5. The system of claim 1, wherein the identification subsystem obtains the identity information of the visitor by face recognition, fingerprint recognition, and/or iris recognition.
6. The system of claim 1, wherein the security control subsystem is further configured to send the target movement route to a mobile device carried by the visitor to cause the mobile device to present the target movement route to the visitor, wherein the security control subsystem is communicatively coupled to the mobile device.
7. The system of claim 1, wherein if the information base does not include identity information of the visitor, the identity recognition result is that the visitor belongs to a non-authenticated person;
the security control subsystem is further configured to generate visitor information according to the received identification result, and send the visitor information to the terminal device, where if the identification result indicates that the visitor belongs to a non-authenticated person, the visitor information includes information that the visitor belongs to the non-authenticated person; if the identity recognition result is that the visitor belongs to an authentication person, the visitor information comprises the identity information, the access times and the historical access time information of the visitor stored in the information base.
8. The system of claim 1, wherein if the information base does not include identity information of the visitor, the identity recognition result is that the visitor belongs to a non-authenticated person;
if the identity recognition result shows that the visitor belongs to a non-authentication person, the notification message comprises information for requesting to input the identity information of the visitor, so that the security personnel can input the identity information of the visitor to the terminal equipment according to the information for requesting to input the identity information of the visitor;
the security control subsystem is also used for acquiring the identity information of the visitor, which is input by security personnel through the terminal equipment, and storing the acquired identity information of the visitor into the information base.
9. A security method for performing security protection on a target area, the method comprising:
acquiring identity information of a visitor, and carrying out identity recognition on the visitor according to a pre-established information base, wherein the identity recognition result is whether the visitor belongs to an authentication person or not;
if the identity recognition result of the visitor is that the visitor belongs to an authentication person, destination position information of the visitor is obtained, wherein the destination is located in the target area;
Determining a target moving route according to the destination position information of the visitor, wherein the target moving route is a moving route from the destination of the visitor to the destination of the visitor and from the destination of the visitor to the exit of the target area;
acquiring the real-time position of the visitor in the target area;
and if the position of the visitor in the target area exceeds the preset distance of the target moving route, generating alarm information.
10. A security device for securing a target area, the device comprising:
the first acquisition module is used for acquiring identity information of the visitor and carrying out identity recognition on the visitor according to a pre-established information base, wherein the identity recognition result is whether the visitor belongs to an authentication person or not;
the second acquisition module is used for acquiring destination position information of the visitor if the identity recognition result of the visitor is that the visitor belongs to an authenticator, wherein the destination of the visitor is located in the target area;
a determining module, configured to determine a target movement route according to destination location information of the visitor, where the target movement route is a movement route from the destination of the visitor to the destination of the visitor and from the destination of the visitor to the exit of the target area;
The third acquisition module is used for acquiring the real-time position of the visitor in the target area;
and the alarm module is used for generating alarm information if the position of the visitor exceeds the preset distance of the target moving route.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311584961.7A CN117423179A (en) | 2023-11-24 | 2023-11-24 | Security system, method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311584961.7A CN117423179A (en) | 2023-11-24 | 2023-11-24 | Security system, method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117423179A true CN117423179A (en) | 2024-01-19 |
Family
ID=89523180
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311584961.7A Pending CN117423179A (en) | 2023-11-24 | 2023-11-24 | Security system, method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117423179A (en) |
-
2023
- 2023-11-24 CN CN202311584961.7A patent/CN117423179A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107590439B (en) | Target person identification and tracking method and device based on monitoring video | |
CN109389712B (en) | Unlocking method of intelligent lock, mobile terminal, server and readable storage medium | |
CN107862774B (en) | Access control calling method, system and client | |
US10915777B2 (en) | Communication terminal, communication system, and image processing method | |
AU2019101846A4 (en) | Identity recognition method and apparatus based on dynamic rasterization management, and server | |
KR20180042802A (en) | Method and system for tracking an object in a defined area | |
CN105184881A (en) | Method, apparatus, server and system for identifying user identity | |
CN108680896B (en) | Positioning information correction method, device, storage medium and equipment | |
US11245707B2 (en) | Communication terminal, communication system, communication control method, and recording medium | |
CN112135242B (en) | Building visitor navigation method based on 5G and face recognition | |
CN108810806B (en) | Positioning information correction method, client, storage medium and equipment | |
CN107888715B (en) | Method, device and equipment for binding MAC address and human face features | |
CN112036345A (en) | Method for detecting number of people in target place, recommendation method, detection system and medium | |
CN106710019A (en) | Data processing method and device and electronic equipment | |
CN111291671A (en) | Gesture control method and related equipment | |
KR20220056279A (en) | Ai based vision monitoring system | |
US11017544B2 (en) | Communication terminal, communication system, communication control method, and recording medium | |
US11503468B2 (en) | System and method for continuously validating and authenticating a host and sensor pair | |
CN117423179A (en) | Security system, method and device | |
CN110991253A (en) | Block chain-based face digital identity recognition method and device | |
CN112233299A (en) | Portrait dynamic authority authentication method and system | |
CN115953815A (en) | Monitoring method and device for infrastructure site | |
CN113112619B (en) | Ticket checking method, ticket checking equipment, system and storage medium for online ticket card | |
Sabr et al. | Identifying and tracking individuals in a smart indoor environment | |
CN111263313A (en) | Checking method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |