WO2019028852A1 - Method and device for inspecting object under security inspection, and electronic device - Google Patents

Method and device for inspecting object under security inspection, and electronic device Download PDF

Info

Publication number
WO2019028852A1
WO2019028852A1 PCT/CN2017/097152 CN2017097152W WO2019028852A1 WO 2019028852 A1 WO2019028852 A1 WO 2019028852A1 CN 2017097152 W CN2017097152 W CN 2017097152W WO 2019028852 A1 WO2019028852 A1 WO 2019028852A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
item
processing
preset
environment
Prior art date
Application number
PCT/CN2017/097152
Other languages
French (fr)
Chinese (zh)
Inventor
骆磊
Original Assignee
深圳前海达闼云端智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳前海达闼云端智能科技有限公司 filed Critical 深圳前海达闼云端智能科技有限公司
Priority to PCT/CN2017/097152 priority Critical patent/WO2019028852A1/en
Priority to CN201780002592.2A priority patent/CN108064394B/en
Publication of WO2019028852A1 publication Critical patent/WO2019028852A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N21/00Investigating or analysing materials by the use of optical means, i.e. using sub-millimetre waves, infrared, visible or ultraviolet light
    • G01N21/62Systems in which the material investigated is excited whereby it emits light or causes a change in wavelength of the incident light
    • G01N21/63Systems in which the material investigated is excited whereby it emits light or causes a change in wavelength of the incident light optically excited
    • G01N21/65Raman scattering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/0002Inspection of images, e.g. flaw detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/70Determining position or orientation of objects or cameras

Definitions

  • the present application relates to the field of security inspection technology, and in particular, to a method, device and electronic device for detecting security articles.
  • safety testing equipment In addition to setting up safety testing equipment in high-risk areas (such as airports, railway stations, subways, etc.), safety testing equipment has also been set up in some tourist attractions, museums and other places.
  • safety inspection the passenger or the passenger's baggage, as well as the passenger or the visitor itself, are usually detected by electromagnetic wave detection, infrared detection or Raman detection to detect dangerous goods.
  • the related art has the following problems: the detection result of detecting a dangerous article according to the related art is not accurate enough, and there may be a case where a certain item is a dangerous item or an item is not a dangerous item.
  • the embodiment of the present application is mainly used to solve the problem of how to improve the accuracy of the inspection result of the security inspection article.
  • a technical solution adopted by the embodiment of the present application is to provide a method for detecting a security article, comprising: acquiring item identification information of the security item, and location information of the security item; The item identification information and the location information determine the danger information of the security item.
  • a device for detecting a security article comprising: a first acquiring module, configured to acquire item identification information of the security article, and the security check The location information of the item; the detecting module, configured to determine the danger information of the security item according to the item identification information and the location information.
  • an electronic device including: at least one processor; and a memory communicably connected to the at least one processor; wherein the memory An instruction program executable by the at least one processor is stored, the instruction program being executed by the at least one processor to cause the at least one processor to perform the method as described above.
  • another technical solution adopted by the embodiment of the present application is to provide a computer program product, the computer program product comprising: a non-volatile computer readable storage medium and embedded in the nonvolatile Computer program instructions of a computer readable storage medium; the computer program instructions comprising instructions to cause a processor to perform the method as described above.
  • Another technical solution adopted by the embodiment of the present application is to provide a A non-transitory computer readable storage medium storing computer executable instructions for causing a computer to perform the method as described above.
  • the method and device for detecting the security article detect whether the security article is a dangerous article according to the obtained article identification information of the security article and the location information of the security article.
  • the current location information is combined, thereby improving the accuracy of the security article detection result.
  • FIG. 1 is a schematic diagram of an operating environment provided by an embodiment of the present application.
  • FIG. 2 is a schematic flow chart of a method for detecting a security article according to an embodiment of the present application
  • FIG. 3 is a schematic flow chart of a method for detecting a security article according to another embodiment of the present application.
  • FIG. 4 is a schematic flow chart of a method for determining whether a predetermined condition for processing an security article is satisfied in a method for detecting a security article according to another embodiment of the present application;
  • FIG. 5 is a schematic flowchart of a method for determining whether an environment of the security inspection item matches a preset security processing environment in a method for detecting a security article according to another embodiment of the present application;
  • FIG. 6 is a schematic flowchart of another method for determining whether an environment of the security inspection item matches a preset security processing environment in a method for detecting a security article according to another embodiment of the present application;
  • FIG. 7 is a schematic flow chart of another method for determining whether a predetermined condition for processing an security item is satisfied in a method for detecting a security article according to another embodiment of the present application;
  • FIG. 8 is a schematic flow chart of a method for detecting a security article according to another embodiment of the present application.
  • FIG. 9 is a schematic flow chart of a method for detecting a security article according to still another embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a device for detecting an inspection article according to an embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of a device for detecting an inspection article according to another embodiment of the present application.
  • FIG. 12 is a schematic structural diagram of a device for detecting an inspection article according to another embodiment of the present application.
  • FIG. 13 is a schematic structural diagram of a device for detecting an inspection article according to still another embodiment of the present application.
  • FIG. 14 is a schematic structural diagram of hardware of an electronic device according to an embodiment of the present application.
  • FIG. 1 is a schematic diagram of an operating environment of an embodiment of the present application, where the operating environment includes The terminal 10, the cloud server 20, and the security terminal 30 are detected. The three are connected to each other via a wireless network or a wired network.
  • the detecting terminal 10 may be a safety detecting robot, and the robot performs all safety inspection work.
  • the detecting terminal 10 can also be a terminal device such as a security X-ray machine, a metal detector, and a security door, and the security inspection work is completed under the cooperation of a person.
  • the detecting terminal 10 can perform security check on the baggage of the passenger or the visitor based on electromagnetic wave detecting technology or infrared detecting technology or Raman detecting technology. In the process of the security check, the detecting terminal 10 can detect the current location information of the security object in addition to the biometric information of the detection object.
  • the detecting terminal is further configured to send the detection result to the cloud server 20.
  • the cloud server 20 can provide corresponding service or logical computing capabilities, and constitute any suitable electronic computing platform for performing security inspection of security articles and security processing of security articles.
  • the cloud server 20 can also be connected to one or more Database, calling related data or program instructions.
  • the cloud server 20 in the embodiment of the present application is mainly used to detect whether a security object needs security processing and when to perform security processing.
  • a central control module for the docking and control detection terminal 10 and the security terminal 30. After receiving the detection result information sent by the detection terminal 10, the central control module acquires the identification information of the detection object by calling the substance database, and calls the danger determination module to identify the identification information.
  • the central control module Performing analysis to determine the danger level, the central control module sends the determination result to the detection terminal 10 and the early warning module, and the early warning module determines whether the detection object satisfies the preset processing condition, and returns the determination result to the central control module, and the central control module
  • the corresponding instruction is sent to the early warning module according to the returned result, so that the early warning module performs a corresponding security processing operation according to the instruction, wherein the early warning module is connected to all the security terminals 30.
  • the foregoing warning module may also exist completely independently of another server without being present in the cloud server 20.
  • the security terminal 30 may be a security robot or a smart terminal device carried by the security personnel for receiving processing instructions.
  • the detection terminal 10 and the security terminal 30 can be integrated onto a smart terminal, such as a robot, which performs all of the inspection work and security work.
  • the operating environment provided by the embodiment of the present application is not limited to the operating environment shown in FIG. Although only one detection terminal 10 and two security terminals 30 are shown in FIG. However, those skilled in the art can understand that the operating environment may further include more detecting terminals and security terminals in the actual application process.
  • FIG. 2 is a schematic flowchart of a method for detecting a security article according to an embodiment of the present application. The method includes:
  • Step 11 Obtain item identification information of the security inspection item, and location information of the security inspection item;
  • the security item refers to all objects that need to be inspected during the security inspection work, such as the luggage of the passenger or the visitor, the passenger or the visitor itself.
  • the item identification information refers to characteristic information of the security item, such as an item name, an item image, etc., by which the machine can identify the specificity of the security item.
  • the specificity of the security inspection item can be identified by techniques such as electromagnetic wave detection, infrared detection or Raman detection.
  • the Raman detection terminal may be used to detect the security inspection item, and then the Raman spectrum data uploaded by the Raman detection terminal may be received by the cloud server, and the Raman spectrum data is analyzed and processed.
  • Spectral data to obtain item identification information of the security item.
  • the security item is the passenger or the visitor itself to be detected, the identity of the passenger or the visitor can be identified by techniques such as face recognition, iris detection or fingerprint recognition.
  • the image of the security article can be collected by the camera, the location information of the security article can be obtained after analyzing the image, and the location information of the security article can be obtained by other methods.
  • the location information of the security items is mainly used to reflect the scene when the security items are detected.
  • Step 12 Determine danger information of the security inspection item according to the item identification information and the location information.
  • the danger information of the security inspection item is determined, that is, whether the security inspection item is a dangerous security inspection item. Understandably, some security inspection items are not exactly the same in different inspection scenarios, and whether they are dangerous security inspection items. For example, 200 ml bottled water can be taken on the train at the railway station security check, but it is taken at the airport security check. It is considered a dangerous security item and is not allowed to be taken on board.
  • the article identification information and the location information of the security article are combined to determine whether the security article is a dangerous article.
  • the cloud server may invoke a preset comparison algorithm to compare the item identification information and the location information of the security item with a pre-established substance database. If the information comparison result is consistent, the security item is It is a dangerous item.
  • the location information may be searched first, and after the same location information is found, the item identification information (such as the item name) of the security item may be found in the dangerous goods directory corresponding to the location information, if If it exists, it means that the security item is a dangerous item in the geographical location, otherwise it is not a dangerous item.
  • the dangerous level of the security item and the commonly used disposal method and the like may also be obtained through the pre-established substance database. This makes it easy for the staff to handle the dangerous security items.
  • the embodiment of the present application provides a method for detecting a security article, which is used to detect whether the security article is a dangerous article according to the obtained article identification information of the security article and the location information of the security article.
  • the embodiment can accurately determine whether the security article has a danger in combination with the current detection scenario, and improve the accuracy of the security inspection result.
  • FIG. 3 is a schematic flowchart of a method for detecting a security article according to another embodiment of the present application. The main difference between FIG. 3 and FIG. 2 is that the method further includes:
  • Step 13 If the security item is a dangerous item, determine whether the preset condition for processing the security item is met;
  • determining whether the preset condition for processing the dangerous security article is met includes:
  • Step 131 Obtain environmental information of an environment where the security article is located
  • Step 132 Determine, according to the environmental information, whether the environment in which the security item is located matches a preset security processing environment
  • Step 133 If the preset security processing environment is matched, determine that the preset condition for processing the security item is met;
  • Step 134 If the preset security processing environment is not matched, determining that the preset condition for processing the security item is not satisfied.
  • the security article it is determined whether the security article can be currently processed according to the environmental information of the specific application scenario when the security article is detected.
  • the environment information may be the traffic information of the current environment. Therefore, as shown in FIG. 5, the foregoing step 132 specifically includes:
  • Step 1321 Determine whether the traffic of the environment in which the security object is located is greater than a preset threshold
  • Step 1322 If it is greater than the preset threshold, determine that the environment where the security item is located does not match the preset security processing environment;
  • Step 1323 If it is not greater than the preset threshold, determine that the environment where the security item is located matches the preset security processing environment.
  • the current traffic of the current environment is detected and compared with a preset threshold, and it is determined according to the comparison result whether the current environment is suitable for processing the dangerous security article.
  • the preset threshold may be customized according to the experience of the person, or may be set according to the number of current security personnel. When the security personnel are relatively long, the preset threshold may be set larger, and when the security personnel are relatively small, the preset threshold may be set. smaller.
  • the environment information may also be information about whether there is a person in the preset range of the security item. Therefore, as shown in FIG. 6, the foregoing step 132 specifically includes:
  • Step 1324 Determine whether there is a person within a preset range of the environment in which the security item is located;
  • Step 1325 If there is a person in the preset range, determine that the environment where the security item is located does not match the preset security processing environment;
  • Step 1326 If there is no one in the preset range, determine that the environment where the security item is located matches the preset security processing environment.
  • the size of the preset range may be determined according to the dangerous level of the security item. For example, the preset range corresponding to the security item with high dangerous level is greater than the preset range corresponding to the security item with low dangerous level. Other methods can also be used to confirm the above preset range. By determining whether someone in the preset range determines whether the security item is currently being processed, other dangerous situations such as kidnapping hostages can be avoided.
  • the determining whether the predetermined condition for processing the security item is met includes:
  • Step 135 Obtain a risk level of the security inspection item, and process attribute information of the security object that processes the security inspection item;
  • Step 136 Determine whether the dangerous level of the security item matches the attribute information of the security object
  • Step 137 If yes, determining that a preset condition for processing the security item is met;
  • Step 138 If there is no match, it is determined that the preset condition for processing the security item is not satisfied.
  • the acquisition of the dangerous level of the security item may be performed by identifying the dangerous level in the preset substance database according to the item identification information after identifying the item identification information of the security item, or finding the dangerous level by connecting to the network, or directly from the pre-requisite It is assumed that the substance database obtains its danger level based on the recorded information of the security item.
  • the attribute information of the security object includes the number of security objects and the experience value of the security object.
  • a correspondence table between the dangerous level of the security item and the attribute configuration information of the security object may be established in advance, for example, as shown in Table 1 below.
  • the security objects include: natural persons, robots, and the like.
  • Step 14 If the preset condition for processing the security item is met, send a processing instruction for processing the security item, and the processing instruction includes a processing method for processing the security item.
  • a processing instruction is sent to the security object that performs the processing, and a processing method of processing the security article is simultaneously transmitted.
  • the processing method may be specifically determined according to the identification information of the security inspection item, and after the security inspection item is identified, different processing methods are adopted for different security inspection items, for example, how should the flammable and explosive security inspection item be handled, and how should the weapon be carried? Processing, etc.
  • the embodiment of the present application provides a method for detecting a security article.
  • the method determines whether the security article has a danger by acquiring the article identification information of the security article and the location information of the security article. If there is a danger, it is determined whether the security check is satisfied.
  • the preset condition of the item is processed when the predetermined condition for processing the security item is met.
  • the embodiment not only can accurately detect dangerous security articles, but also defines preset conditions when handling dangerous security articles, ensuring handling of dangerous security articles in more suitable scenarios, thereby improving the handling of dangerous security articles. Time safety and effectiveness.
  • FIG. 8 is a schematic flowchart of a method for detecting a security article according to another embodiment of the present disclosure. The main difference between FIG. 8 and FIG. 3 is that the method further includes:
  • Step 15 If the preset condition for processing the security item is not met, obtaining a potential movement track of the security item according to the location information of the security item;
  • Step 16 Establish a working group, where the working group includes at least two security objects;
  • Step 17 sending a tracking instruction to the working group, and controlling the working group to track the security inspection item according to the potential movement trajectory of the security inspection item, and controlling the working group to detect that the processing of the security inspection item is satisfied When the condition is set, the security inspection is performed on the security inspection item;
  • the tracking instruction includes identification information of the security inspection item, and biometric information of a person carrying the security inspection item.
  • This embodiment describes the case where the preset condition for processing the security item is not currently satisfied.
  • the security item to be processed can be tracked, and in the tracking process, whether the current processing of the security item is satisfied is detected in real time. Set the condition and, if satisfied, handle the security item.
  • a tracking group can be established to track the security items in the form of a working group.
  • the security personnel and inspectors involved in the tracking constitute a capture and disposal working group, or the security robot and the detection robot involved in the tracking constitute a capture and disposal working group, and the inspector or the detection robot can be used only to provide the direction information of the carrier's initial departure.
  • the inspector or the detection robot can be used only to provide the direction information of the carrier's initial departure.
  • it is tracked by security personnel or security robots.
  • the embodiment of the present application provides a method for detecting a security article, which is configured to detect whether the security article has a danger by acquiring the article identification information of the security article and the location information of the security article, and if it is dangerous, determine whether the security article is processed.
  • Pre-set conditions in the pre-satisfaction of handling security items When the condition is set, the security article is processed; if the preset condition for processing the security article is not met, the carrier of the security article is tracked to handle the dangerous security article if the preset condition is met.
  • the embodiment can accurately detect dangerous security articles and ensure that dangerous security articles are handled in a suitable scenario, thereby improving the safety and effectiveness of handling dangerous security articles.
  • FIG. 9 is a schematic flowchart of a method for detecting a security article according to still another embodiment of the present application.
  • the main difference between FIG. 9 and FIG. 3 is that the method further includes:
  • Step 18 If the preset condition for processing the security item is not met, sending a security item pending processing instruction to the other security object, and sending a delay instruction to the security object currently processing the security item, so that the security object performs The default delay method.
  • the preset delay mechanism is used to control the security item, so that time is obtained for satisfying the preset condition, so that the security condition is processed after the preset condition is satisfied. article.
  • the security inspection item pending processing instruction includes the item identification information of the security inspection item and the current position information, and the other security object may be notified that the dangerous situation occurs by sending the security inspection item pending processing instruction to other security objects, and needs to be supported.
  • the preset delay method performed may be determined according to the specific situation in which the preset condition is not currently met. For example, because the current number of security personnel is too small, the processing conditions are not met. At this time, the security check port can be temporarily closed for the reason of “current limiting”, so as to obtain time for dispatching other security personnel.
  • the embodiment of the present application provides a method for detecting a security article, which is configured to detect whether the security article has a danger by acquiring the article identification information of the security article and the location information of the security article, and if there is a danger, determine whether the security article is processed.
  • the preset condition is to process the security item when the predetermined condition for processing the security item is met; if the preset condition for processing the security item is not met, a delay mechanism is adopted to handle the danger if the preset condition is met Security items.
  • the embodiment can accurately detect dangerous security articles and ensure that dangerous security articles are handled in a suitable scenario, thereby improving the safety and effectiveness of handling dangerous security articles.
  • FIG. 10 is a schematic structural diagram of a device for detecting an inspection article according to an embodiment of the present invention.
  • the device 40 includes a first acquisition module 41 and a detection module 42.
  • the first obtaining module 41 is configured to acquire the item identification information of the security inspection item and the location information of the security inspection item, and the detecting module 42 is configured to determine the security inspection item according to the item identification information and the location information. Danger information.
  • the first obtaining module 41 is specifically configured to receive Raman spectral data uploaded by the Raman detecting terminal, analyze the Raman spectral data, thereby acquiring the item identification information of the security inspection item, and the location of the security inspection item. information.
  • the apparatus 40 further includes a determination module 43 and a first processing module 44.
  • the determining module 43 is configured to determine, if the security item is a dangerous item, whether a predetermined condition for processing the security item is met;
  • the first processing module 44 is configured to: if the preset bar for processing the security item is met And processing a processing instruction for processing the security item, the processing instruction including a processing method of processing the security item.
  • the determining module 43 includes: a first acquiring unit 431, a first determining unit 432, a first determining unit 433, and a second determining unit 434.
  • the first obtaining unit 431 is configured to obtain the environment information of the environment in which the security object is located;
  • the first determining unit 432 is configured to determine, according to the environmental information, whether the environment of the security inspection item matches a preset security processing environment;
  • the determining unit 433 is configured to determine that the preset condition for processing the security item is met if the preset security processing environment is matched; and the second determining unit 434 is configured to determine that the processing center is not satisfied if the preset security processing environment is not matched. Pre-set conditions for security items.
  • the first determining unit 432 is specifically configured to: determine whether the traffic of the environment in which the security object is located is greater than a preset threshold; if greater than the preset threshold, determine that the environment in which the security object is located does not match the preset security Processing the environment; if not greater than the preset threshold, determining that the environment in which the security item is located matches the preset security processing environment.
  • the first determining unit 432 is further configured to: determine whether there is a person within a preset range of the environment in which the security item is located; and if there is a person in the preset range, determine that the environment of the security item does not match And the preset security processing environment; if there is no one in the preset range, determining that the environment of the security item matches the preset security processing environment.
  • the determining module 43 includes: a second obtaining unit 435, a second determining unit 436, a third determining unit 437, and a fourth determining unit 438.
  • a second obtaining unit 435 configured to acquire a risk level of the security item, and attribute information of a security object that processes the security item
  • a second determining unit 436 configured to determine a danger level of the security item and the security Whether the attribute information of the object matches
  • the third determining unit 437 is configured to determine, if the matching, the preset condition that the security inspection item is processed
  • the fourth determining unit 438 is configured to determine that the processing is not satisfied if the matching is not satisfied. Pre-set conditions for security items.
  • the embodiment of the present application provides a device for detecting an inspection article, which detects whether the security article has a danger by acquiring the article identification information of the security article and the location information of the security article, and if it is dangerous, determining whether the security inspection is satisfied.
  • the preset condition of the item is processed when the predetermined condition for processing the security item is met.
  • the embodiment not only can accurately detect dangerous security articles, but also defines preset conditions when handling dangerous security articles, ensuring handling of dangerous security articles in more suitable scenarios, thereby improving the handling of dangerous security articles. Time safety and effectiveness.
  • FIG. 12 is a schematic structural diagram of a device for detecting an inspection article according to another embodiment of the present application.
  • the device 40 further includes: a second acquisition module 45, Module 46 and second processing module 47.
  • a second obtaining module 45 configured to acquire a potential movement track of the security item according to the location information of the security item if the preset condition for processing the security item is not met; and the establishing module 46 is configured to establish a working group
  • the working group includes at least two security objects; the second processing module 47 is configured to send a tracking instruction to the working group, and control the working group to track the security inspection item according to a potential movement trajectory of the security inspection item, And controlling the working group to perform security processing on the security inspection item when detecting that the predetermined condition for processing the security inspection item is met; wherein the tracking instruction includes identification information of the security inspection item, and carrying the security inspection Biometric information of the person of the item.
  • the embodiment of the present application provides a device for detecting an inspection article, which detects whether the security article has a danger by acquiring the article identification information of the security article and the location information of the security article, and if it is dangerous, determining whether the security inspection is satisfied.
  • the preset condition of the item is processed when the predetermined condition for processing the security item is met; if the preset condition for processing the security item is not met, the carrier of the security item is tracked so as to Handle the dangerous security item if the preset conditions are met.
  • the embodiment can accurately detect dangerous security articles, and ensure that dangerous security articles are handled in a suitable scenario, thereby improving the safety and effectiveness of handling dangerous security articles.
  • FIG. 13 is a schematic structural diagram of a device for detecting an inspection article according to still another embodiment of the present application.
  • the main difference between FIG. 13 and FIG. 10 is that the device 40 further includes: a third processing module 48 .
  • the third processing module 48 is configured to: if the preset condition for processing the security item is not met, send a security item pending processing instruction to the other security object, and send a delay instruction to the security object currently processing the security item, so that The security object performs a preset stalling method.
  • the embodiment of the present application provides a security article processing device, which detects whether the security article has a danger by acquiring the article identification information of the security article and the location information of the security article, and if there is a danger, determining whether the security article is processed.
  • the preset condition is: when the preset condition for processing the security item is met, the security inspection item is processed; if the preset condition for processing the security inspection item is not met, the delay mechanism is adopted, so that the preset condition is met Dispose of the dangerous security items.
  • the embodiment can accurately detect dangerous security articles, and ensure that dangerous security articles are handled in a suitable scenario, thereby improving the safety and effectiveness of handling dangerous security articles.
  • FIG. 14 is a schematic structural diagram of hardware of an electronic device according to an embodiment of the present disclosure.
  • the electronic device 50 is capable of executing the detection method of the security article as described above.
  • the electronic device 50 can be a cloud server.
  • the electronic device 50 includes one or more processors 51 and a memory 52.
  • One processor 51 is exemplified in FIG. 14
  • the processor 51 and the memory 52 may be connected by a bus or other means, and the bus connection is taken as an example in FIG.
  • the memory 51 is a non-volatile computer readable storage medium, and can be used for storing a non-volatile software program, a non-volatile computer-executable program, and a module, as in the method for detecting a security article in the embodiment of the present application.
  • Program instructions/modules for example, the first acquisition module 41, the detection module 42, the determination module 43, and the first processing module 44 shown in FIG. 10).
  • the processor 51 executes various functional applications and data processing of the server by executing non-volatile software programs, instructions, and modules stored in the memory 52, that is, the method for detecting security items of the above method embodiments.
  • the memory 52 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function; the storage data area may store data created according to use of the detection means of the security inspection item, and the like.
  • memory 52 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device.
  • memory 52 may include memory remotely located relative to processor 51, which may be connected to the detection device for security items via a network. Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • the one or more modules are stored in the memory 52, and when executed by the one or more processors 51, the method of detecting security items in any of the above method embodiments is performed.
  • the embodiment of the present application further provides a non-transitory computer readable storage medium storing computer executable instructions executed by an electronic device by any of the above methods.
  • the method for detecting the security article in the example for example, performs the method steps 11 to 12 in FIG. 2 described above, the method steps 11 to 14 in FIG. 3, and the method steps 131 to 134 in FIG. 4, FIG. Method step 1321 to step 1323, method step 1324 to step 1326 in FIG. 6, method step 135 to step 138 in FIG. 7, method step 11 to step 17 in FIG. 8, method step 11 in FIG. Steps 14 and 18, implementing modules 41-44, 431-434 in FIG. 10, modules 41-44, 435-438 in FIG. 11, modules 41-47 and 431-434 in FIG. 12, The functions of modules 41-48 and units 431-434 in 13.
  • the embodiment of the present application further provides a computer program product, including stored in a non-volatile computer.
  • a computer program on a readable storage medium the computer program comprising program instructions, when executed by a computer, causing the computer to perform a security article processing method in any of the above method embodiments, eg, performing the above described Method step 11 to step 12 in FIG. 2, method step 11 to step 14 in FIG. 3, method step 131 to step 134 in FIG. 4, method step 1321 to step 1323 in FIG. 5, method step in FIG. 1324 to step 1326, method step 135 to step 138 in FIG. 7, method step 11 to step 17 in FIG. 8, method step 11 to step 14 and step 18 in FIG. 9, implementing module 41-44 in FIG.
  • the device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, ie may be located A place, or it can be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Tourism & Hospitality (AREA)
  • Nuclear Medicine, Radiotherapy & Molecular Imaging (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Analytical Chemistry (AREA)
  • Immunology (AREA)
  • Pathology (AREA)
  • Computer Security & Cryptography (AREA)
  • Chemical & Material Sciences (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Biochemistry (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Quality & Reliability (AREA)
  • Alarm Systems (AREA)

Abstract

A method and device for inspecting an object under security inspection, and an electronic device. The method comprises: acquiring object identification information of an object under security inspection, and position information of the object under security inspection (11); and determining danger information of the object under security inspection according to the object identification information and the position information (12). The present invention incorporates object identification information and current position information of an object to determine whether the object is a dangerous object when performing security inspection thereon, and thereby the accuracy of an inspection result of an object under security inspection is increased.

Description

一种安检物品的检测方法、装置及电子设备Method, device and electronic device for detecting security articles 技术领域Technical field
本申请涉及安全检查技术领域,特别是涉及一种安检物品的检测方法、装置及电子设备。The present application relates to the field of security inspection technology, and in particular, to a method, device and electronic device for detecting security articles.
背景技术Background technique
目前,对反恐和维稳的需求一直居高不下,除了在高风险地区(比如机场、火车站、地铁等)设置安全检测设备外,还在一些旅游景点、博物馆等地都设置了安全检测设备。在安全检测时,通常是通过电磁波检测、红外检测或者拉曼检测等技术对旅客或者游客的行李,以及旅客或者游客本身进行检测,从而检测出危险物品。At present, the demand for anti-terrorism and stability has been high. In addition to setting up safety testing equipment in high-risk areas (such as airports, railway stations, subways, etc.), safety testing equipment has also been set up in some tourist attractions, museums and other places. In the case of safety inspection, the passenger or the passenger's baggage, as well as the passenger or the visitor itself, are usually detected by electromagnetic wave detection, infrared detection or Raman detection to detect dangerous goods.
发明人在实现本申请的过程中,发现相关技术存在以下问题:根据相关技术检测危险物品的检测结果不够准确,可能存在误判某物品是危险物品或者某物品不是危险物品的情况。In the process of implementing the present application, the inventors have found that the related art has the following problems: the detection result of detecting a dangerous article according to the related art is not accurate enough, and there may be a case where a certain item is a dangerous item or an item is not a dangerous item.
发明内容Summary of the invention
本申请实施例主要用于解决如何提高安检物品检测结果的准确性的问题。The embodiment of the present application is mainly used to solve the problem of how to improve the accuracy of the inspection result of the security inspection article.
为解决上述技术问题,本申请实施例采用的一个技术方案是:提供一种安检物品的检测方法,包括:获取所述安检物品的物品识别信息,以及所述安检物品的位置信息;根据所述物品识别信息和位置信息,确定所述安检物品的危险信息。In order to solve the above technical problem, a technical solution adopted by the embodiment of the present application is to provide a method for detecting a security article, comprising: acquiring item identification information of the security item, and location information of the security item; The item identification information and the location information determine the danger information of the security item.
为解决上述技术问题,本申请实施例采用的另一个技术方案是:提供一种安检物品的检测装置,包括:第一获取模块,用于获取所述安检物品的物品识别信息,以及所述安检物品的位置信息;检测模块,用于根据所述物品识别信息和位置信息,确定所述安检物品的危险信息。In order to solve the above technical problem, another technical solution adopted by the embodiment of the present application is to provide a device for detecting a security article, comprising: a first acquiring module, configured to acquire item identification information of the security article, and the security check The location information of the item; the detecting module, configured to determine the danger information of the security item according to the item identification information and the location information.
为解决上述技术问题,本申请实施例采用的又一个技术方案是:提供一种电子设备,包括:至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令程序,所述指令程序被所述至少一个处理器执行,以使所述至少一个处理器执行如上所述的方法。In order to solve the above technical problem, another technical solution adopted by the embodiment of the present application is to provide an electronic device, including: at least one processor; and a memory communicably connected to the at least one processor; wherein the memory An instruction program executable by the at least one processor is stored, the instruction program being executed by the at least one processor to cause the at least one processor to perform the method as described above.
为解决上述技术问题,本申请实施例采用的再一个技术方案是:提供一种计算机程序产品,所述计算机程序产品包括:非易失性计算机可读存储介质以及内嵌于所述非易失性计算机可读存储介质的计算机程序指令;所述计算机程序指令包括用以使处理器执行如上所述的方法的指令。In order to solve the above technical problem, another technical solution adopted by the embodiment of the present application is to provide a computer program product, the computer program product comprising: a non-volatile computer readable storage medium and embedded in the nonvolatile Computer program instructions of a computer readable storage medium; the computer program instructions comprising instructions to cause a processor to perform the method as described above.
为解决上述技术问题,本申请实施例采用的还一个技术方案是:提供一种 非易失性计算机可读存储介质,所述计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于使计算机执行如上所述的方法。In order to solve the above technical problem, another technical solution adopted by the embodiment of the present application is to provide a A non-transitory computer readable storage medium storing computer executable instructions for causing a computer to perform the method as described above.
本申请实施例的有益效果是:本申请实施例提供的安检物品的检测方法及装置,根据获取到的安检物品的物品识别信息和安检物品的位置信息,来检测该安检物品是否是危险物品。该实施方式在判断安检物品是否是危险安检物品时除了考虑其本身物品识别信息之外还结合了其当前的位置信息,从而提高了安检物品检测结果的准确性。The method and device for detecting the security article provided by the embodiment of the present application detect whether the security article is a dangerous article according to the obtained article identification information of the security article and the location information of the security article. In the embodiment, when determining whether the security article is a dangerous security article, in addition to considering its own article identification information, the current location information is combined, thereby improving the accuracy of the security article detection result.
附图说明DRAWINGS
一个或多个实施例通过与之对应的附图中的图片进行示例性说明,这些示例性说明并不构成对实施例的限定,附图中具有相同参考数字标号的元件表示为类似的元件,除非有特别申明,附图中的图不构成比例限制。The one or more embodiments are exemplified by the accompanying drawings in the accompanying drawings, and FIG. The figures in the drawings do not constitute a scale limitation unless otherwise stated.
图1是本申请实施例提供的一种运行环境的示意图;1 is a schematic diagram of an operating environment provided by an embodiment of the present application;
图2是本申请实施例提供的一种安检物品的检测方法的流程示意图;2 is a schematic flow chart of a method for detecting a security article according to an embodiment of the present application;
图3是本申请另一实施例提供的一种安检物品的检测方法的流程示意图;3 is a schematic flow chart of a method for detecting a security article according to another embodiment of the present application;
图4是本申请另一实施例提供的一种安检物品的检测方法中一种判断是否满足处理所述安检物品的预设条件的方法的流程示意图;4 is a schematic flow chart of a method for determining whether a predetermined condition for processing an security article is satisfied in a method for detecting a security article according to another embodiment of the present application;
图5是本申请另一实施例提供的一种安检物品的检测方法中一种判断所述安检物品所在环境是否匹配预设安全处理环境的方法的流程示意图;FIG. 5 is a schematic flowchart of a method for determining whether an environment of the security inspection item matches a preset security processing environment in a method for detecting a security article according to another embodiment of the present application;
图6是本申请另一实施例提供的一种安检物品的检测方法中另一种判断所述安检物品所在环境是否匹配预设安全处理环境的方法的流程示意图;FIG. 6 is a schematic flowchart of another method for determining whether an environment of the security inspection item matches a preset security processing environment in a method for detecting a security article according to another embodiment of the present application;
图7是本申请另一实施例提供的一种安检物品的检测方法中另一种判断是否满足处理所述安检物品的预设条件的方法的流程示意图;FIG. 7 is a schematic flow chart of another method for determining whether a predetermined condition for processing an security item is satisfied in a method for detecting a security article according to another embodiment of the present application;
图8是本申请又一实施例提供的一种安检物品的检测方法的流程示意图;8 is a schematic flow chart of a method for detecting a security article according to another embodiment of the present application;
图9是本申请再一实施例提供的一种安检物品的检测方法的流程示意图;9 is a schematic flow chart of a method for detecting a security article according to still another embodiment of the present application;
图10是本申请实施例提供的一种安检物品的检测装置的结构示意图;FIG. 10 is a schematic structural diagram of a device for detecting an inspection article according to an embodiment of the present application;
图11是本申请另一实施例提供的一种安检物品的检测装置的结构示意图;11 is a schematic structural diagram of a device for detecting an inspection article according to another embodiment of the present application;
图12是本申请又一实施例提供的一种安检物品的检测装置的结构示意图;FIG. 12 is a schematic structural diagram of a device for detecting an inspection article according to another embodiment of the present application; FIG.
图13是本申请再一实施例提供的一种安检物品的检测装置的结构示意图;FIG. 13 is a schematic structural diagram of a device for detecting an inspection article according to still another embodiment of the present application;
图14是本申请实施例提供的电子设备的硬件结构示意图。FIG. 14 is a schematic structural diagram of hardware of an electronic device according to an embodiment of the present application.
具体实施方式Detailed ways
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅用以解释本申请,并不用于限定本申请。In order to make the objects, technical solutions, and advantages of the present application more comprehensible, the present application will be further described in detail below with reference to the accompanying drawings and embodiments. It is understood that the specific embodiments described herein are merely illustrative of the application and are not intended to be limiting.
需要说明的是,如果不冲突,本申请实施例中的各个特征可以相互结合,均在本申请的保护范围之内。另外,虽然在装置示意图中进行了功能模块划分, 在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于装置示意图中的模块划分,或流程图中的顺序执行所示出或描述的步骤。It should be noted that, if there is no conflict, the various features in the embodiments of the present application may be combined with each other, and are all within the protection scope of the present application. In addition, although the functional module division is performed in the device schematic, The logical order is shown in the flowchart, but in some cases the steps shown or described may be performed in a different order than the modules in the device schematic, or in the sequence of the flowchart.
为了方便读者更好地理解本申请,在对本申请的发明思想进行描述之前,先对本申请的运行环境进行描述,请参阅图1,图1是本申请实施例的运行环境示意图,该运行环境包括检测终端10、云服务器20以及安保终端30。这三者之间互相通过无线网络或者有线网络通信连接。In order to facilitate the reader's understanding of the present application, the operating environment of the present application is described before the description of the inventive concept of the present application. Referring to FIG. 1 , FIG. 1 is a schematic diagram of an operating environment of an embodiment of the present application, where the operating environment includes The terminal 10, the cloud server 20, and the security terminal 30 are detected. The three are connected to each other via a wireless network or a wired network.
检测终端10可以是安全检测机器人,由机器人执行全部的安全检查工作。检测终端10还可以是安检X光机、金属探测仪以及安检门等终端设备,在人的配合下完成安检工作。检测终端10可以基于电磁波检测技术或者红外检测技术或者拉曼检测技术等其他技术完成对旅客或者游客的行李的安全检查。在安检的过程中,检测终端10除了获取检测对象的生物特征信息之外,还可以检测该安检对象当前的位置信息。检测终端还用于将检测结果发送至云服务器20。The detecting terminal 10 may be a safety detecting robot, and the robot performs all safety inspection work. The detecting terminal 10 can also be a terminal device such as a security X-ray machine, a metal detector, and a security door, and the security inspection work is completed under the cooperation of a person. The detecting terminal 10 can perform security check on the baggage of the passenger or the visitor based on electromagnetic wave detecting technology or infrared detecting technology or Raman detecting technology. In the process of the security check, the detecting terminal 10 can detect the current location information of the security object in addition to the biometric information of the detection object. The detecting terminal is further configured to send the detection result to the cloud server 20.
云服务器20可以提供相应的服务或逻辑运算能力,构成任何合适的,用以执行安检物品安全检测以及安检物品安全处理的电子计算平台,作为云端系统,云服务器20还可以连接至一个或者多个数据库,调用相关的数据或程序指令。The cloud server 20 can provide corresponding service or logical computing capabilities, and constitute any suitable electronic computing platform for performing security inspection of security articles and security processing of security articles. As a cloud system, the cloud server 20 can also be connected to one or more Database, calling related data or program instructions.
本申请实施例中的云服务器20主要用于检测安检对象是否需要安全处理以及何时进行安全处理。例如,在云服务器20中设置中央控制模块、危险判定模块、预警模块以及物质数据库。中央控制模块用于对接和管控检测终端10和安保终端30,中央控制模块接收检测终端10发送的检测结果信息后,通过调用物质数据库获取检测对象的识别信息,并调用危险判定模块对该识别信息进行分析,判定其危险级别,中央控制模块将判定结果发送至检测终端10和预警模块,由预警模块判定检测对象是否满足预设的处理条件,并将判定结果返回至中央控制模块,中央控制模块根据返回的结果向预警模块下发对应的指令,以使预警模块根据该指令执行相应的安全处理操作,其中预警模块连接所有安保终端30。The cloud server 20 in the embodiment of the present application is mainly used to detect whether a security object needs security processing and when to perform security processing. For example, a central control module, a danger determination module, an early warning module, and a substance database are provided in the cloud server 20. The central control module is used for the docking and control detection terminal 10 and the security terminal 30. After receiving the detection result information sent by the detection terminal 10, the central control module acquires the identification information of the detection object by calling the substance database, and calls the danger determination module to identify the identification information. Performing analysis to determine the danger level, the central control module sends the determination result to the detection terminal 10 and the early warning module, and the early warning module determines whether the detection object satisfies the preset processing condition, and returns the determination result to the central control module, and the central control module The corresponding instruction is sent to the early warning module according to the returned result, so that the early warning module performs a corresponding security processing operation according to the instruction, wherein the early warning module is connected to all the security terminals 30.
在一些实施例中,上述预警模块也可以完全独立存在与另一服务器中,而不存在上述云服务器20中。In some embodiments, the foregoing warning module may also exist completely independently of another server without being present in the cloud server 20.
安保终端30可以是安保机器人,或者安保人员随身携带的用于接收处理指令的智能终端设备等。The security terminal 30 may be a security robot or a smart terminal device carried by the security personnel for receiving processing instructions.
在一些实施例中,可以将检测终端10和安保终端30集成到一种智能终端上,比如机器人,由机器人执行全部的检测工作和安保工作。In some embodiments, the detection terminal 10 and the security terminal 30 can be integrated onto a smart terminal, such as a robot, which performs all of the inspection work and security work.
应当说明的是,本申请实施例提供的运行环境不限于图1中所示的运行环境。虽然图1中仅显示了1个检测终端10,2个安保终端30。但本领域技术人员可以理解的是,在实际应用过程中,该运行环境还可以包括更多的检测终端和安保终端。It should be noted that the operating environment provided by the embodiment of the present application is not limited to the operating environment shown in FIG. Although only one detection terminal 10 and two security terminals 30 are shown in FIG. However, those skilled in the art can understand that the operating environment may further include more detecting terminals and security terminals in the actual application process.
下面提供一种应用于上述运行环境的安检物品的检测方法,请参阅图2,图2是本申请实施例提供的一种安检物品的检测方法的流程示意图,该方法包括: A method for detecting a security article applied to the above-mentioned operating environment is provided. Referring to FIG. 2, FIG. 2 is a schematic flowchart of a method for detecting a security article according to an embodiment of the present application. The method includes:
步骤11、获取所述安检物品的物品识别信息,以及所述安检物品的位置信息;Step 11: Obtain item identification information of the security inspection item, and location information of the security inspection item;
该安检物品指的是在安全检查工作中所需要检查的全部对象,比如,旅客或者游客的行李,旅客或者游客本身。该物品识别信息指的是安检物品的特征信息,比如物品名称、物品图像等,通过该特征信息能够使机器识别出该安检物品具体是什么。The security item refers to all objects that need to be inspected during the security inspection work, such as the luggage of the passenger or the visitor, the passenger or the visitor itself. The item identification information refers to characteristic information of the security item, such as an item name, an item image, etc., by which the machine can identify the specificity of the security item.
获取安检物品的物品识别信息,即识别安检物品的过程,当该安检物品是物体时,通过电磁波检测、红外检测或者拉曼检测等技术可以识别出安检物品具体是什么。其中,使用拉曼检测技术识别该安检物品时,可以先使用拉曼检测终端检测该安检物品,然后可以由云端服务器接收该拉曼检测终端上传的拉曼光谱数据,通过分析及处理该拉曼光谱数据,从而获取该安检物品的物品识别信息。当该安检物品是待检测的旅客或游客本身时,可以通过人脸识别、虹膜检测或者指纹识别等技术识别出旅客或者游客的身份。Obtaining the item identification information of the security inspection item, that is, the process of identifying the security inspection item, when the security inspection item is an object, the specificity of the security inspection item can be identified by techniques such as electromagnetic wave detection, infrared detection or Raman detection. Wherein, when the Raman detection technology is used to identify the security inspection item, the Raman detection terminal may be used to detect the security inspection item, and then the Raman spectrum data uploaded by the Raman detection terminal may be received by the cloud server, and the Raman spectrum data is analyzed and processed. Spectral data to obtain item identification information of the security item. When the security item is the passenger or the visitor itself to be detected, the identity of the passenger or the visitor can be identified by techniques such as face recognition, iris detection or fingerprint recognition.
可以通过摄像头采集安检物品的图像,分析该图像后获取安检物品的位置信息,也可以通过其他方法获取安检物品的位置信息。安检物品的位置信息主要用于反映检测安检物品时的场景。The image of the security article can be collected by the camera, the location information of the security article can be obtained after analyzing the image, and the location information of the security article can be obtained by other methods. The location information of the security items is mainly used to reflect the scene when the security items are detected.
步骤12、根据所述物品识别信息和位置信息,确定所述安检物品的危险信息。Step 12: Determine danger information of the security inspection item according to the item identification information and the location information.
在本实施例中,确定安检物品的危险信息,即判断该安检物品是否是危险安检物品。可以理解的是,一些安检物品在不同的检测场景,其是否是危险安检物品的定义不完全相同,比如,200毫升的瓶装水在火车站安检时可以带上火车,但是在机场安检时却被认为是危险安检物品,不允许带上飞机。In this embodiment, the danger information of the security inspection item is determined, that is, whether the security inspection item is a dangerous security inspection item. Understandably, some security inspection items are not exactly the same in different inspection scenarios, and whether they are dangerous security inspection items. For example, 200 ml bottled water can be taken on the train at the railway station security check, but it is taken at the airport security check. It is considered a dangerous security item and is not allowed to be taken on board.
因此,结合安检物品的物品识别信息和位置信息来判断该安检物品是否是危险物品。在判断的过程中,可以由云服务器调用预设的比对算法,将安检物品的物品识别信息、位置信息,与预先建立的物质数据库进行比对,如果信息比对结果一致,则该安检物品是危险物品。其中,在比对过程中,可以先根据位置信息进行查找,找到相同的位置信息后,再查找该位置信息对应的危险品目录下是否存在该安检物品的物品识别信息(比如物品名称),如果存在,则表示在该地理位置,该安检物品是危险物品,否则,则不是危险物品。Therefore, the article identification information and the location information of the security article are combined to determine whether the security article is a dangerous article. In the process of judging, the cloud server may invoke a preset comparison algorithm to compare the item identification information and the location information of the security item with a pre-established substance database. If the information comparison result is consistent, the security item is It is a dangerous item. In the comparison process, the location information may be searched first, and after the same location information is found, the item identification information (such as the item name) of the security item may be found in the dangerous goods directory corresponding to the location information, if If it exists, it means that the security item is a dangerous item in the geographical location, otherwise it is not a dangerous item.
在一些实施例中,在检测出某安检物品是危险物品后,还可以通过上述预先建立的物质数据库获取该安检物品的危险级别以及常用的处置方法等。从而便于工作人员对该危险安检物品进行处理。In some embodiments, after detecting that the security item is a dangerous item, the dangerous level of the security item and the commonly used disposal method and the like may also be obtained through the pre-established substance database. This makes it easy for the staff to handle the dangerous security items.
本申请实施例提供了一种安检物品的检测方法,该方法根据获取到的安检物品的物品识别信息和安检物品的位置信息,来检测该安检物品是否是危险物品。该实施例能够结合当前的检测场景,准确的判断该安检物品是否存在危险,提高了安检物品检测结果的准确性。 The embodiment of the present application provides a method for detecting a security article, which is used to detect whether the security article is a dangerous article according to the obtained article identification information of the security article and the location information of the security article. The embodiment can accurately determine whether the security article has a danger in combination with the current detection scenario, and improve the accuracy of the security inspection result.
一般情况下,在检测出安检物品是危险物品后,安检人员会立即对该危险物品进行处理,然而,由于周围环境、危险物品的危险程序等不确定因素,都会造成安检人员不能有效而安全的处理掉该危险物品,甚至还可能造成其他意外发生,因此,下述实施例提供的安检物品的检测方法用于对检测出的危险安检物品进行安全而有效的处理。具体地,请参阅图3,图3是本申请另一实施例提供的一种安检物品的检测方法的流程示意图。图3与图2的主要区别在于,该方法还包括:Under normal circumstances, after detecting that the security items are dangerous goods, the security personnel will immediately deal with the dangerous goods. However, due to uncertainties such as the surrounding environment and dangerous procedures of dangerous goods, the security personnel will not be effective and safe. The disposal of the dangerous article may even cause other accidents. Therefore, the detection method of the security article provided in the following embodiments is used for safe and effective treatment of the detected dangerous security article. Specifically, please refer to FIG. 3 , which is a schematic flowchart of a method for detecting a security article according to another embodiment of the present application. The main difference between FIG. 3 and FIG. 2 is that the method further includes:
步骤13、如果所述安检物品是危险物品,则判断是否满足处理所述安检物品的预设条件; Step 13. If the security item is a dangerous item, determine whether the preset condition for processing the security item is met;
在确定检测的安检物品是危险安检物品之后,需要进一步判断当前是否满足处理该危险安检物品的预设条件,以便能够准确而安全的完成对该安检物品的处理工作。具体地,如图4所示,判断是否满足处理所述安检物品的预设条件,包括:After determining that the detected security article is a dangerous security article, it is necessary to further determine whether the preset condition for processing the dangerous security article is currently met, so that the processing of the security article can be completed accurately and safely. Specifically, as shown in FIG. 4, determining whether the preset condition for processing the security item is met, includes:
步骤131、获取所述安检物品所在环境的环境信息;Step 131: Obtain environmental information of an environment where the security article is located;
步骤132、根据所述环境信息,判断所述安检物品所在环境是否匹配预设安全处理环境;Step 132: Determine, according to the environmental information, whether the environment in which the security item is located matches a preset security processing environment;
步骤133、若匹配预设安全处理环境,则确定满足处理所述安检物品的预设条件;Step 133: If the preset security processing environment is matched, determine that the preset condition for processing the security item is met;
步骤134、若不匹配预设安全处理环境,则确定不满足处理所述安检物品的预设条件。Step 134: If the preset security processing environment is not matched, determining that the preset condition for processing the security item is not satisfied.
在本实施例中,根据检测安检物品时的具体应用场景的环境信息来确定当前是否能够对安检物品进行处理。其中,该环境信息可以是当前环境的人流量信息,因此,如图5所示,上述步骤132具体包括:In the present embodiment, it is determined whether the security article can be currently processed according to the environmental information of the specific application scenario when the security article is detected. The environment information may be the traffic information of the current environment. Therefore, as shown in FIG. 5, the foregoing step 132 specifically includes:
步骤1321、判断所述安检物品所在环境的人流量是否大于预设阈值;Step 1321: Determine whether the traffic of the environment in which the security object is located is greater than a preset threshold;
步骤1322、若大于所述预设阈值,则确定所述安检物品所在环境不匹配所述预设安全处理环境;Step 1322: If it is greater than the preset threshold, determine that the environment where the security item is located does not match the preset security processing environment;
步骤1323、若不大于所述预设阈值,则确定所述安检物品所在环境匹配所述预设安全处理环境。Step 1323: If it is not greater than the preset threshold, determine that the environment where the security item is located matches the preset security processing environment.
可以理解的是,如果在人流量很大的环境中对危险安检物品进行处理,可能会不能准确而有效的完成对该安检物品处理工作,而且还可能引发其他危险情况发生。因此,对当前环境的人流量进行检测,并与预设阈值进行比较,根据比较结果确定当前环境是否适合处理该危险安检物品。其中,人流量的检测方法在相关技术中均有介绍,在此不再赘述。该预设的阈值可以根据人的经验自定义设置,或者根据当前安保人员的数量来设置,安保人员比较多时,该预设阈值可以设置更大,安保人员比较少时,该预设阈值可以设置的比较小。Understandably, if the dangerous security items are handled in an environment with a large flow of people, the handling of the security items may not be completed accurately and effectively, and other dangerous situations may also occur. Therefore, the current traffic of the current environment is detected and compared with a preset threshold, and it is determined according to the comparison result whether the current environment is suitable for processing the dangerous security article. Among them, the detection method of the human flow is introduced in the related art, and details are not described herein again. The preset threshold may be customized according to the experience of the person, or may be set according to the number of current security personnel. When the security personnel are relatively long, the preset threshold may be set larger, and when the security personnel are relatively small, the preset threshold may be set. smaller.
其中,该环境信息还可以是该安检物品预设范围内是否有人的信息,因此,如图6所示,上述步骤132具体包括: The environment information may also be information about whether there is a person in the preset range of the security item. Therefore, as shown in FIG. 6, the foregoing step 132 specifically includes:
步骤1324、判断所述安检物品所在环境的预设范围内是否有人;Step 1324: Determine whether there is a person within a preset range of the environment in which the security item is located;
步骤1325、若所述预设范围内有人,则确定所述安检物品所在环境不匹配所述预设安全处理环境;Step 1325: If there is a person in the preset range, determine that the environment where the security item is located does not match the preset security processing environment;
步骤1326、若所述预设范围内没有人,则确定所述安检物品所在环境匹配所述预设安全处理环境。Step 1326: If there is no one in the preset range, determine that the environment where the security item is located matches the preset security processing environment.
其中,该预设范围的大小可以根据该安检物品的危险级别来确定,比如,危险级别高的安检物品所对应的预设范围要大于危险级别低的安检物品所对应的预设范围。还可以通过其他方法来确实上述预设范围。通过确定预设范围内是否有人来确定当前是否处理该安检物品,可以避免比如绑架人质等其他危险情况的发生。The size of the preset range may be determined according to the dangerous level of the security item. For example, the preset range corresponding to the security item with high dangerous level is greater than the preset range corresponding to the security item with low dangerous level. Other methods can also be used to confirm the above preset range. By determining whether someone in the preset range determines whether the security item is currently being processed, other dangerous situations such as kidnapping hostages can be avoided.
除了根据环境来判断是否满足处理所述安检物品的预设条件之外,还可以根据安检物品的危险级别和处理该安检物品的安保对象的个人素质来判断是否满足处理所述安检物品的预设条件。因此,如图7所示,所述判断是否满足处理所述安检物品的预设条件,包括:In addition to determining whether the predetermined condition for processing the security item is met according to the environment, whether the preset condition for processing the security item is satisfied may be determined according to the danger level of the security item and the personal quality of the security object that processes the security item. condition. Therefore, as shown in FIG. 7, the determining whether the predetermined condition for processing the security item is met includes:
步骤135、获取所述安检物品的危险级别,以及处理所述安检物品的安保对象的属性信息;Step 135: Obtain a risk level of the security inspection item, and process attribute information of the security object that processes the security inspection item;
步骤136、判断所述安检物品的危险级别与所述安保对象的属性信息是否匹配;Step 136: Determine whether the dangerous level of the security item matches the attribute information of the security object;
步骤137、若匹配,则确定满足处理所述安检物品的预设条件;Step 137: If yes, determining that a preset condition for processing the security item is met;
步骤138、若不匹配,则确定不满足处理所述安检物品的预设条件。Step 138: If there is no match, it is determined that the preset condition for processing the security item is not satisfied.
安检物品的危险级别的获取可以在识别出安检物品的物品识别信息后,根据该物品识别信息通过在预设的物质数据库中查找其危险级别,或者通过连接网络查找其危险级别,或者直接从预设物质数据库中根据对该安检物品的记录信息获取其危险级别。The acquisition of the dangerous level of the security item may be performed by identifying the dangerous level in the preset substance database according to the item identification information after identifying the item identification information of the security item, or finding the dangerous level by connecting to the network, or directly from the pre-requisite It is assumed that the substance database obtains its danger level based on the recorded information of the security item.
其中,安保对象的属性信息包括安保对象的数量、安保对象的经验值。The attribute information of the security object includes the number of security objects and the experience value of the security object.
判断安检物品的危险级别与安保对象的属性信息是否匹配,即判断当前安保对象的数量和安保对象的经验值是否具备处理该危险级别的安检物品的能力。可以预先建立安检物品危险级别与安保对象的属性配置信息的对应关系表,例如:如下表1所示。It is judged whether the dangerous level of the security item matches the attribute information of the security object, that is, whether the current security object quantity and the security object's experience value have the ability to handle the security level of the security item. A correspondence table between the dangerous level of the security item and the attribute configuration information of the security object may be established in advance, for example, as shown in Table 1 below.
表1Table 1
安检物品Security items 危险级别Hazard level 安保对象属性配置Security object attribute configuration
AA 高危险级别High risk level 数量>6;经验值>95%Quantity >6; experience value >95%
BB 中危险级别Medium danger level 数量>4;经验值>80%Quantity > 4; experience value > 80%
CC 低危险级别Low risk level 数量>2;经验值>50%Quantity > 2; experience value > 50%
根据预先建立的对应关系表,判断安检物品的危险级别与所述安保对象的属性信息是否匹配。 According to the pre-established correspondence table, it is determined whether the danger level of the security item matches the attribute information of the security object.
其中,该安保对象包括:自然人、机器人等。Among them, the security objects include: natural persons, robots, and the like.
步骤14、如果满足处理所述安检物品的预设条件,则发送处理所述安检物品的处理指令,所述处理指令包含处理所述安检物品的处理方法。 Step 14. If the preset condition for processing the security item is met, send a processing instruction for processing the security item, and the processing instruction includes a processing method for processing the security item.
在确定对安检物品进行处理后,向执行处理的安保对象发送处理指令,并同时发送处理该安检物品的处理方法。该处理方法具体可根据上述安检物品的识别信息进行确定,在识别出安检物品后,对不同的安检物品采用不同的处理方法,比如,易燃易爆的安检物品应该如何处理,携带凶器应该如何处理,等。After it is determined that the security article is processed, a processing instruction is sent to the security object that performs the processing, and a processing method of processing the security article is simultaneously transmitted. The processing method may be specifically determined according to the identification information of the security inspection item, and after the security inspection item is identified, different processing methods are adopted for different security inspection items, for example, how should the flammable and explosive security inspection item be handled, and how should the weapon be carried? Processing, etc.
本申请实施例提供了一种安检物品的检测方法,该方法通过获取安检物品的物品识别信息和安检物品的位置信息,判断该安检物品是否存在危险,如果存在危险,再判断是否满足处理该安检物品的预设条件,在满足处理安检物品的预设条件时,对该安检物品进行处理。该实施方式不仅能够准确的检测出有危险的安检物品,而且在处理有危险的安检物品时限定了预设条件,保证了在更加合适的场景中处理危险安检物品,从而提高了处理危险安检物品时的安全性和有效性。The embodiment of the present application provides a method for detecting a security article. The method determines whether the security article has a danger by acquiring the article identification information of the security article and the location information of the security article. If there is a danger, it is determined whether the security check is satisfied. The preset condition of the item is processed when the predetermined condition for processing the security item is met. The embodiment not only can accurately detect dangerous security articles, but also defines preset conditions when handling dangerous security articles, ensuring handling of dangerous security articles in more suitable scenarios, thereby improving the handling of dangerous security articles. Time safety and effectiveness.
请参阅图8,图8是本申请又一实施例提供的一种安检物品的检测方法的流程示意图,图8与图3的主要区别在于,该方法还包括:Please refer to FIG. 8. FIG. 8 is a schematic flowchart of a method for detecting a security article according to another embodiment of the present disclosure. The main difference between FIG. 8 and FIG. 3 is that the method further includes:
步骤15、如果不满足处理所述安检物品的预设条件,则根据所述安检物品的位置信息,获取所述安检物品的潜在移动轨迹;Step 15: If the preset condition for processing the security item is not met, obtaining a potential movement track of the security item according to the location information of the security item;
步骤16、建立工作组,所述工作组包括至少两个安保对象; Step 16. Establish a working group, where the working group includes at least two security objects;
步骤17、向所述工作组发送追踪指令,并控制所述工作组根据所述安检物品的潜在移动轨迹追踪所述安检物品,以及控制所述工作组在检测到满足处理所述安检物品的预设条件时,对所述安检物品执行安全处理;Step 17, sending a tracking instruction to the working group, and controlling the working group to track the security inspection item according to the potential movement trajectory of the security inspection item, and controlling the working group to detect that the processing of the security inspection item is satisfied When the condition is set, the security inspection is performed on the security inspection item;
其中,所述追踪指令包含所述安检物品的识别信息,以及携带所述安检物品的人员的生物特征信息。The tracking instruction includes identification information of the security inspection item, and biometric information of a person carrying the security inspection item.
本实施例对当前不满足处理安检物品的预设条件的情况进行了说明,在这种情况下,可以对待处理的安检物品进行追踪,在追踪的过程中实时检测当前是否满足处理安检物品的预设条件,如果满足即对该安检物品进行处理。This embodiment describes the case where the preset condition for processing the security item is not currently satisfied. In this case, the security item to be processed can be tracked, and in the tracking process, whether the current processing of the security item is satisfied is detected in real time. Set the condition and, if satisfied, handle the security item.
其中,对安检物品进行追踪的过程中,可以建立追踪小组,以工作组的形式追踪该安检物品。例如,参与追踪的安保人员与检测人员组成抓捕处置工作组,或者参与追踪的安保机器人与检测机器人组成抓捕处置工作组,检测人员或者检测机器人可以仅仅用于提供携带者最初离开的方向信息,以保证其检测工作不中断,由安保人员或者安保机器人进行追踪。In the process of tracking the security items, a tracking group can be established to track the security items in the form of a working group. For example, the security personnel and inspectors involved in the tracking constitute a capture and disposal working group, or the security robot and the detection robot involved in the tracking constitute a capture and disposal working group, and the inspector or the detection robot can be used only to provide the direction information of the carrier's initial departure. In order to ensure that its testing work is not interrupted, it is tracked by security personnel or security robots.
其中,检测是否满足预设条件的过程可以参考上述实施例中的叙述。The process of detecting whether the preset condition is met may be referred to the description in the above embodiment.
本申请实施例提供了一种安检物品的检测方法,该方法通过获取安检物品的物品识别信息和安检物品的位置信息,检测该安检物品是否存在危险,如果有危险,再判断是否满足处理安检物品的预设条件,在满足处理安检物品的预 设条件时,对该安检物品进行处理;如果不满足处理安检物品的预设条件,则对安检物品的携带者进行追踪,以便在满足预设条件的情况下处理危险安检物品。该实施方式能够准确的检测出有危险的安检物品,并且保证在合适的场景中处理危险安检物品,提高了处理危险安检物品时的安全性和有效性。The embodiment of the present application provides a method for detecting a security article, which is configured to detect whether the security article has a danger by acquiring the article identification information of the security article and the location information of the security article, and if it is dangerous, determine whether the security article is processed. Pre-set conditions, in the pre-satisfaction of handling security items When the condition is set, the security article is processed; if the preset condition for processing the security article is not met, the carrier of the security article is tracked to handle the dangerous security article if the preset condition is met. The embodiment can accurately detect dangerous security articles and ensure that dangerous security articles are handled in a suitable scenario, thereby improving the safety and effectiveness of handling dangerous security articles.
请参阅图9,图9是本申请再一实施例提供的一种安检物品的检测方法的流程示意图,图9与图3的主要区别在于,该方法还包括:Referring to FIG. 9 , FIG. 9 is a schematic flowchart of a method for detecting a security article according to still another embodiment of the present application. The main difference between FIG. 9 and FIG. 3 is that the method further includes:
步骤18、如果不满足处理所述安检物品的预设条件,则向其他安保对象发送安检物品待处理指令,并向当前处理所述安检物品的安保对象发送拖延指令,以使所述安保对象执行预设的拖延方法。Step 18: If the preset condition for processing the security item is not met, sending a security item pending processing instruction to the other security object, and sending a delay instruction to the security object currently processing the security item, so that the security object performs The default delay method.
在本实施例中,在不满足处理安检物品的预设条件时,采用预设的拖延机制来控制该安检物品,从而为满足预设条件争取时间,以便在预设条件满足后再处理该安检物品。其中,安检物品待处理指令包括安检物品的物品识别信息以及当前的位置信息,通过向其他安保对象发送该安检物品待处理指令可以告知其他安保对象当前有危险情况发生,并且需要其前来支援。所执行的预设的拖延方法可以根据当前不满足预设条件的具体情况而确定。例如,由于当前安保人员人数太少,造成不满足处理条件,此时可以采用“限流”的原因临时关闭安检口,从而为调度其他安保人员争取时间。In this embodiment, when the preset condition for processing the security item is not satisfied, the preset delay mechanism is used to control the security item, so that time is obtained for satisfying the preset condition, so that the security condition is processed after the preset condition is satisfied. article. The security inspection item pending processing instruction includes the item identification information of the security inspection item and the current position information, and the other security object may be notified that the dangerous situation occurs by sending the security inspection item pending processing instruction to other security objects, and needs to be supported. The preset delay method performed may be determined according to the specific situation in which the preset condition is not currently met. For example, because the current number of security personnel is too small, the processing conditions are not met. At this time, the security check port can be temporarily closed for the reason of “current limiting”, so as to obtain time for dispatching other security personnel.
本申请实施例提供了一种安检物品的检测方法,该方法通过获取安检物品的物品识别信息和安检物品的位置信息,检测该安检物品是否存在危险,如果存在危险,再判断是否满足处理安检物品的预设条件,在满足处理安检物品的预设条件时,对该安检物品进行处理;如果不满足处理安检物品的预设条件,则采用拖延机制,以便在满足预设条件的情况下处理危险安检物品。该实施方式能够准确的检测出有危险的安检物品,并且保证在合适的场景中处理危险安检物品,提高了处理危险安检物品时的安全性和有效性。The embodiment of the present application provides a method for detecting a security article, which is configured to detect whether the security article has a danger by acquiring the article identification information of the security article and the location information of the security article, and if there is a danger, determine whether the security article is processed. The preset condition is to process the security item when the predetermined condition for processing the security item is met; if the preset condition for processing the security item is not met, a delay mechanism is adopted to handle the danger if the preset condition is met Security items. The embodiment can accurately detect dangerous security articles and ensure that dangerous security articles are handled in a suitable scenario, thereby improving the safety and effectiveness of handling dangerous security articles.
请参阅图10,图10是本申请实施例提供的一种安检物品的检测装置的结构示意图,如图10所示,该装置40包括:第一获取模块41、检测模块42。Referring to FIG. 10, FIG. 10 is a schematic structural diagram of a device for detecting an inspection article according to an embodiment of the present invention. As shown in FIG. 10, the device 40 includes a first acquisition module 41 and a detection module 42.
其中,第一获取模块41,用于获取所述安检物品的物品识别信息,以及所述安检物品的位置信息;检测模块42,用于根据所述物品识别信息和位置信息,确定所述安检物品的危险信息。The first obtaining module 41 is configured to acquire the item identification information of the security inspection item and the location information of the security inspection item, and the detecting module 42 is configured to determine the security inspection item according to the item identification information and the location information. Danger information.
其中,该第一获取模块41,具体用于接收拉曼检测终端上传的拉曼光谱数据,分析所述拉曼光谱数据,从而获取所述安检物品的物品识别信息,以及所述安检物品的位置信息。The first obtaining module 41 is specifically configured to receive Raman spectral data uploaded by the Raman detecting terminal, analyze the Raman spectral data, thereby acquiring the item identification information of the security inspection item, and the location of the security inspection item. information.
同样请参阅图10,该装置40还包括:判断模块43和第一处理模块44。判断模块43,用于如果所述安检物品是危险物品,则判断是否满足处理所述安检物品的预设条件;第一处理模块44,用于如果满足处理所述安检物品的预设条 件,则发送处理所述安检物品的处理指令,所述处理指令包含处理所述安检物品的处理方法。Referring also to FIG. 10, the apparatus 40 further includes a determination module 43 and a first processing module 44. The determining module 43 is configured to determine, if the security item is a dangerous item, whether a predetermined condition for processing the security item is met; the first processing module 44 is configured to: if the preset bar for processing the security item is met And processing a processing instruction for processing the security item, the processing instruction including a processing method of processing the security item.
其中,判断模块43包括:第一获取单元431、第一判断单元432、第一确定单元433以及第二确定单元434。第一获取单元431,用于获取所述安检物品所在环境的环境信息;第一判断单元432,用于根据所述环境信息,判断所述安检物品所在环境是否匹配预设安全处理环境;第一确定单元433,用于若匹配预设安全处理环境,则确定满足处理所述安检物品的预设条件;第二确定单元434,用于若不匹配预设安全处理环境,则确定不满足处理所述安检物品的预设条件。The determining module 43 includes: a first acquiring unit 431, a first determining unit 432, a first determining unit 433, and a second determining unit 434. The first obtaining unit 431 is configured to obtain the environment information of the environment in which the security object is located; the first determining unit 432 is configured to determine, according to the environmental information, whether the environment of the security inspection item matches a preset security processing environment; The determining unit 433 is configured to determine that the preset condition for processing the security item is met if the preset security processing environment is matched; and the second determining unit 434 is configured to determine that the processing center is not satisfied if the preset security processing environment is not matched. Pre-set conditions for security items.
其中,第一判断单元432具体用于:判断所述安检物品所在环境的人流量是否大于预设阈值;若大于所述预设阈值,则确定所述安检物品所在环境不匹配所述预设安全处理环境;若不大于所述预设阈值,则确定所述安检物品所在环境匹配所述预设安全处理环境。The first determining unit 432 is specifically configured to: determine whether the traffic of the environment in which the security object is located is greater than a preset threshold; if greater than the preset threshold, determine that the environment in which the security object is located does not match the preset security Processing the environment; if not greater than the preset threshold, determining that the environment in which the security item is located matches the preset security processing environment.
在一些实施例中,第一判断单元432还具体用于:判断所述安检物品所在环境的预设范围内是否有人;若所述预设范围内有人,则确定所述安检物品所在环境不匹配所述预设安全处理环境;若所述预设范围内没有人,则确定所述安检物品所在环境匹配所述预设安全处理环境。In some embodiments, the first determining unit 432 is further configured to: determine whether there is a person within a preset range of the environment in which the security item is located; and if there is a person in the preset range, determine that the environment of the security item does not match And the preset security processing environment; if there is no one in the preset range, determining that the environment of the security item matches the preset security processing environment.
在一些实施例中,如图11所示,判断模块43包括:第二获取单元435、第二判断单元436、第三确定单元437以及第四确定单元438。第二获取单元435,用于获取所述安检物品的危险级别,以及处理所述安检物品的安保对象的属性信息;第二判断单元436,用于判断所述安检物品的危险级别与所述安保对象的属性信息是否匹配;第三确定单元437,用于若匹配,则确定满足处理所述安检物品的预设条件;第四确定单元438,用于若不匹配,则确定不满足处理所述安检物品的预设条件。In some embodiments, as shown in FIG. 11, the determining module 43 includes: a second obtaining unit 435, a second determining unit 436, a third determining unit 437, and a fourth determining unit 438. a second obtaining unit 435, configured to acquire a risk level of the security item, and attribute information of a security object that processes the security item; a second determining unit 436, configured to determine a danger level of the security item and the security Whether the attribute information of the object matches; the third determining unit 437 is configured to determine, if the matching, the preset condition that the security inspection item is processed; and the fourth determining unit 438 is configured to determine that the processing is not satisfied if the matching is not satisfied. Pre-set conditions for security items.
值得说明的是,上述装置内的模块、单元之间的信息交互、执行过程等内容,由于与本申请的方法实施例基于同一构思,具体内容可参见本申请方法实施例中的叙述,此处不再赘述。It should be noted that the content of the module, the information exchange between the units, the execution process, and the like are based on the same concept as the method embodiment of the present application. For details, refer to the description in the method embodiment of the present application. No longer.
本申请实施例提供了一种安检物品的检测装置,该装置通过获取安检物品的物品识别信息和安检物品的位置信息,检测该安检物品是否存在危险,如果有危险,再判断是否满足处理该安检物品的预设条件,在满足处理该安检物品的预设条件时,对该安检物品进行处理。该实施方式不仅能够准确的检测出有危险的安检物品,而且在处理有危险的安检物品时限定了预设条件,保证了在更加合适的场景中处理危险安检物品,从而提高了处理危险安检物品时的安全性和有效性。The embodiment of the present application provides a device for detecting an inspection article, which detects whether the security article has a danger by acquiring the article identification information of the security article and the location information of the security article, and if it is dangerous, determining whether the security inspection is satisfied. The preset condition of the item is processed when the predetermined condition for processing the security item is met. The embodiment not only can accurately detect dangerous security articles, but also defines preset conditions when handling dangerous security articles, ensuring handling of dangerous security articles in more suitable scenarios, thereby improving the handling of dangerous security articles. Time safety and effectiveness.
请参阅图12,图12是本申请又一实施例提供的一种安检物品的检测装置的结构示意图,图12与图10的主要区别在于,该装置40还包括:第二获取模块45、建立模块46以及第二处理模块47。 Referring to FIG. 12, FIG. 12 is a schematic structural diagram of a device for detecting an inspection article according to another embodiment of the present application. The main difference between FIG. 12 and FIG. 10 is that the device 40 further includes: a second acquisition module 45, Module 46 and second processing module 47.
第二获取模块45,用于如果不满足处理所述安检物品的预设条件,则根据所述安检物品的位置信息,获取所述安检物品的潜在移动轨迹;建立模块46,用于建立工作组,所述工作组包括至少两个安保对象;第二处理模块47,用于向所述工作组发送追踪指令,并控制所述工作组根据所述安检物品的潜在移动轨迹追踪所述安检物品,以及控制所述工作组在检测到满足处理所述安检物品的预设条件时,对所述安检物品执行安全处理;其中,所述追踪指令包含所述安检物品的识别信息,以及携带所述安检物品的人员的生物特征信息。a second obtaining module 45, configured to acquire a potential movement track of the security item according to the location information of the security item if the preset condition for processing the security item is not met; and the establishing module 46 is configured to establish a working group The working group includes at least two security objects; the second processing module 47 is configured to send a tracking instruction to the working group, and control the working group to track the security inspection item according to a potential movement trajectory of the security inspection item, And controlling the working group to perform security processing on the security inspection item when detecting that the predetermined condition for processing the security inspection item is met; wherein the tracking instruction includes identification information of the security inspection item, and carrying the security inspection Biometric information of the person of the item.
值得说明的是,上述装置内的模块之间的信息交互、执行过程等内容,由于与本申请的方法实施例基于同一构思,具体内容可参见本申请方法实施例中的叙述,此处不再赘述。It is to be noted that the information exchange, the execution process, and the like between the modules in the foregoing device are based on the same concept as the method embodiment of the present application. For details, refer to the description in the method embodiment of the present application. Narration.
本申请实施例提供了一种安检物品的检测装置,该装置通过获取安检物品的物品识别信息和安检物品的位置信息,检测该安检物品是否存在危险,如果有危险,再判断是否满足处理该安检物品的预设条件,在满足处理该安检物品的预设条件时,对该安检物品进行处理;如果不满足处理该安检物品的预设条件,则对该安检物品的携带者进行追踪,以便在满足预设条件的情况下处理该危险安检物品。该实施方式能够准确的检测出有危险的安检物品,而且保证在合适的场景中处理危险安检物品,提高了处理危险安检物品时的安全性和有效性。The embodiment of the present application provides a device for detecting an inspection article, which detects whether the security article has a danger by acquiring the article identification information of the security article and the location information of the security article, and if it is dangerous, determining whether the security inspection is satisfied. The preset condition of the item is processed when the predetermined condition for processing the security item is met; if the preset condition for processing the security item is not met, the carrier of the security item is tracked so as to Handle the dangerous security item if the preset conditions are met. The embodiment can accurately detect dangerous security articles, and ensure that dangerous security articles are handled in a suitable scenario, thereby improving the safety and effectiveness of handling dangerous security articles.
请参阅图13,图13是本申请再一实施例提供的一种安检物品的检测装置的结构示意图,图13与图10的主要区别在于,该装置40还包括:第三处理模块48。Referring to FIG. 13 , FIG. 13 is a schematic structural diagram of a device for detecting an inspection article according to still another embodiment of the present application. The main difference between FIG. 13 and FIG. 10 is that the device 40 further includes: a third processing module 48 .
第三处理模块48,用于如果不满足处理所述安检物品的预设条件,则向其他安保对象发送安检物品待处理指令,并向当前处理所述安检物品的安保对象发送拖延指令,以使所述安保对象执行预设的拖延方法。The third processing module 48 is configured to: if the preset condition for processing the security item is not met, send a security item pending processing instruction to the other security object, and send a delay instruction to the security object currently processing the security item, so that The security object performs a preset stalling method.
值得说明的是,上述装置内的模块之间的信息交互、执行过程等内容,由于与本申请的方法实施例基于同一构思,具体内容可参见本申请方法实施例中的叙述,此处不再赘述。It is to be noted that the information exchange, the execution process, and the like between the modules in the foregoing device are based on the same concept as the method embodiment of the present application. For details, refer to the description in the method embodiment of the present application. Narration.
本申请实施例提供了一种安检物品处理装置,该装置通过获取安检物品的物品识别信息和安检物品的位置信息,检测该安检物品是否存在危险,如果存在危险,再判断是否满足处理该安检物品的预设条件,在满足处理该安检物品的预设条件时,对该安检物品进行处理;如果不满足处理该安检物品的预设条件,则采用拖延机制,以便在满足预设条件的情况下处理该危险安检物品。该实施方式能够准确的检测出有危险的安检物品,而且保证在合适的场景中处理危险安检物品,提高了处理危险安检物品时的安全性和有效性。The embodiment of the present application provides a security article processing device, which detects whether the security article has a danger by acquiring the article identification information of the security article and the location information of the security article, and if there is a danger, determining whether the security article is processed. The preset condition is: when the preset condition for processing the security item is met, the security inspection item is processed; if the preset condition for processing the security inspection item is not met, the delay mechanism is adopted, so that the preset condition is met Dispose of the dangerous security items. The embodiment can accurately detect dangerous security articles, and ensure that dangerous security articles are handled in a suitable scenario, thereby improving the safety and effectiveness of handling dangerous security articles.
请参阅图14,图14是本申请实施例提供的电子设备的硬件结构示意图,该 电子设备50能够执行如上所述的安检物品的检测方法。该电子设备50可以是一个云服务器。Please refer to FIG. 14 , which is a schematic structural diagram of hardware of an electronic device according to an embodiment of the present disclosure. The electronic device 50 is capable of executing the detection method of the security article as described above. The electronic device 50 can be a cloud server.
如图14所示,该电子设备50包括:一个或多个处理器51以及存储器52,图14中以一个处理器51为例。As shown in FIG. 14, the electronic device 50 includes one or more processors 51 and a memory 52. One processor 51 is exemplified in FIG.
处理器51、存储器52可以通过总线或者其他方式连接,图14中以通过总线连接为例。The processor 51 and the memory 52 may be connected by a bus or other means, and the bus connection is taken as an example in FIG.
存储器51作为一种非易失性计算机可读存储介质,可用于存储非易失性软件程序、非易失性计算机可执行程序以及模块,如本申请实施例中的安检物品的检测方法对应的程序指令/模块(例如,附图10所示的第一获取模块41、检测模块42、判断模块43以及第一处理模块44)。处理器51通过运行存储在存储器52中的非易失性软件程序、指令以及模块,从而执行服务器的各种功能应用以及数据处理,即实现上述方法实施例安检物品的检测方法。The memory 51 is a non-volatile computer readable storage medium, and can be used for storing a non-volatile software program, a non-volatile computer-executable program, and a module, as in the method for detecting a security article in the embodiment of the present application. Program instructions/modules (for example, the first acquisition module 41, the detection module 42, the determination module 43, and the first processing module 44 shown in FIG. 10). The processor 51 executes various functional applications and data processing of the server by executing non-volatile software programs, instructions, and modules stored in the memory 52, that is, the method for detecting security items of the above method embodiments.
存储器52可以包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需要的应用程序;存储数据区可存储根据安检物品的检测装置的使用所创建的数据等。此外,存储器52可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。在一些实施例中,存储器52可以包括相对于处理器51远程设置的存储器,这些远程存储器可以通过网络连接至用安检物品的检测装置。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。The memory 52 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function; the storage data area may store data created according to use of the detection means of the security inspection item, and the like. Moreover, memory 52 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, memory 52 may include memory remotely located relative to processor 51, which may be connected to the detection device for security items via a network. Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
所述一个或者多个模块存储在所述存储器52中,当被所述一个或者多个处理器51执行时,执行上述任意方法实施例中的安检物品的检测方法。The one or more modules are stored in the memory 52, and when executed by the one or more processors 51, the method of detecting security items in any of the above method embodiments is performed.
上述产品可执行本申请实施例所提供的方法,具备执行方法相应的功能模块和有益效果。未在本实施例中详尽描述的技术细节,可参见本申请实施例所提供的方法。The above products can perform the methods provided by the embodiments of the present application, and have the corresponding functional modules and beneficial effects of the execution method. For technical details that are not described in detail in this embodiment, reference may be made to the method provided by the embodiments of the present application.
本申请实施例还提供了一种非易失性计算机可读存储介质,所述非易失性计算机可读存储介质存储有计算机可执行指令,该计算机可执行指令被电子设备执行上述任意方法实施例中的安检物品的检测方法,例如,执行以上描述的图2中的方法步骤11至步骤12,图3中的方法步骤11至步骤14,图4中的方法步骤131至步骤134,图5中的方法步骤1321至步骤1323,图6中的方法步骤1324至步骤1326,图7中的方法步骤135至步骤138,图8中的方法步骤11至步骤17,图9中的方法步骤11至步骤14、步骤18,实现图10中的模块41-44、单元431-434,图11中的模块41-44、单元435-438,图12中的模块41-47、单元431-434,图13中的模块41-48、单元431-434的功能。The embodiment of the present application further provides a non-transitory computer readable storage medium storing computer executable instructions executed by an electronic device by any of the above methods. The method for detecting the security article in the example, for example, performs the method steps 11 to 12 in FIG. 2 described above, the method steps 11 to 14 in FIG. 3, and the method steps 131 to 134 in FIG. 4, FIG. Method step 1321 to step 1323, method step 1324 to step 1326 in FIG. 6, method step 135 to step 138 in FIG. 7, method step 11 to step 17 in FIG. 8, method step 11 in FIG. Steps 14 and 18, implementing modules 41-44, 431-434 in FIG. 10, modules 41-44, 435-438 in FIG. 11, modules 41-47 and 431-434 in FIG. 12, The functions of modules 41-48 and units 431-434 in 13.
本申请实施例还提供了一种计算机程序产品,包括存储在非易失性计算机 可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述任意方法实施例中的安检物品处理方法,例如,执行以上描述的图2中的方法步骤11至步骤12,图3中的方法步骤11至步骤14,图4中的方法步骤131至步骤134,图5中的方法步骤1321至步骤1323,图6中的方法步骤1324至步骤1326,图7中的方法步骤135至步骤138,图8中的方法步骤11至步骤17,图9中的方法步骤11至步骤14、步骤18,实现图10中的模块41-44、单元431-434,图11中的模块41-44、单元435-438,图12中的模块41-47、单元431-434,图13中的模块41-48、单元431-434的功能。The embodiment of the present application further provides a computer program product, including stored in a non-volatile computer. A computer program on a readable storage medium, the computer program comprising program instructions, when executed by a computer, causing the computer to perform a security article processing method in any of the above method embodiments, eg, performing the above described Method step 11 to step 12 in FIG. 2, method step 11 to step 14 in FIG. 3, method step 131 to step 134 in FIG. 4, method step 1321 to step 1323 in FIG. 5, method step in FIG. 1324 to step 1326, method step 135 to step 138 in FIG. 7, method step 11 to step 17 in FIG. 8, method step 11 to step 14 and step 18 in FIG. 9, implementing module 41-44 in FIG. The functions of the units 431-434, the modules 41-44, 435-438 in Fig. 11, the modules 41-47 in Fig. 12, the units 431-434, the modules 41-48 in Fig. 13, and the units 431-434.
以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。The device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, ie may be located A place, or it can be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
通过以上的实施方式的描述,本领域普通技术人员可以清楚地了解到各实施方式可借助软件加通用硬件平台的方式来实现,当然也可以通过硬件。本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(RandomAccessMemory,RAM)等。Through the description of the above embodiments, those skilled in the art can clearly understand that the various embodiments can be implemented by means of software plus a general hardware platform, and of course, by hardware. A person skilled in the art can understand that all or part of the process of implementing the above embodiments can be completed by a computer program to instruct related hardware, and the program can be stored in a computer readable storage medium. When executed, the flow of an embodiment of the methods as described above may be included. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).
最后应说明的是:以上实施例仅用以说明本申请的技术方案,而非对其限制;在本申请的思路下,以上实施例或者不同实施例中的技术特征之间也可以进行组合,步骤可以以任意顺序实现,并存在如上所述的本申请的不同方面的许多其它变化,为了简明,它们没有在细节中提供;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的范围。 Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present application, and are not limited thereto; in the idea of the present application, the technical features in the above embodiments or different embodiments may also be combined. The steps may be carried out in any order, and there are many other variations of the various aspects of the present application as described above, which are not provided in the details for the sake of brevity; although the present application has been described in detail with reference to the foregoing embodiments, The skilled person should understand that the technical solutions described in the foregoing embodiments may be modified, or some of the technical features may be equivalently replaced; and the modifications or substitutions do not deviate from the embodiments of the present application. The scope of the technical solution.

Claims (22)

  1. 一种安检物品的检测方法,其特征在于,包括:A method for detecting a security article, characterized in that it comprises:
    获取所述安检物品的物品识别信息,以及所述安检物品的位置信息;Obtaining item identification information of the security inspection item, and location information of the security inspection item;
    根据所述物品识别信息和位置信息,确定所述安检物品的危险信息。Determining the danger information of the security item according to the item identification information and the location information.
  2. 根据权利要求1所述的方法,其特征在于,所述获取所述安检物品的物品识别信息包括:接收拉曼检测终端上传的拉曼光谱数据,分析所述拉曼光谱数据,从而获取所述安检物品的物品识别信息。The method according to claim 1, wherein the obtaining the item identification information of the security item comprises: receiving Raman spectrum data uploaded by the Raman detection terminal, analyzing the Raman spectrum data, thereby acquiring the Item identification information for security items.
  3. 根据权利要求1或2所述的方法,其特征在于,所述方法还包括:The method according to claim 1 or 2, wherein the method further comprises:
    如果所述安检物品是危险物品,则判断是否满足处理所述安检物品的预设条件;If the security item is a dangerous item, determining whether the predetermined condition for processing the security item is met;
    如果满足处理所述安检物品的预设条件,则发送处理所述安检物品的处理指令,所述处理指令包含处理所述安检物品的处理方法。If the preset condition for processing the security item is met, a processing instruction for processing the security item is transmitted, the processing instruction including a processing method of processing the security item.
  4. 根据权利要求3所述的方法,其特征在于,所述判断是否满足处理所述安检物品的预设条件,包括:The method according to claim 3, wherein the determining whether the predetermined condition for processing the security item is met comprises:
    获取所述安检物品所在环境的环境信息;Obtaining environmental information of the environment in which the security article is located;
    根据所述环境信息,判断所述安检物品所在环境是否匹配预设安全处理环境;Determining, according to the environmental information, whether the environment in which the security item is located matches a preset security processing environment;
    若匹配预设安全处理环境,则确定满足处理所述安检物品的预设条件;If the preset security processing environment is matched, determining that the preset condition for processing the security item is met;
    若不匹配预设安全处理环境,则确定不满足处理所述安检物品的预设条件。If the preset security processing environment is not matched, it is determined that the preset condition for processing the security item is not satisfied.
  5. 根据权利要求4所述的方法,其特征在于,所述判断所述安检物品所在环境是否匹配预设安全处理环境,包括:The method according to claim 4, wherein the determining whether the environment in which the security article is located matches a preset security processing environment includes:
    判断所述安检物品所在环境的人流量是否大于预设阈值;Determining whether the traffic of the environment in which the security article is located is greater than a preset threshold;
    若大于所述预设阈值,则确定所述安检物品所在环境不匹配所述预设安全处理环境;If the preset threshold is greater, determining that the environment where the security item is located does not match the preset security processing environment;
    若不大于所述预设阈值,则确定所述安检物品所在环境匹配所述预设安全处理环境。If not greater than the preset threshold, determining that the environment in which the security item is located matches the preset security processing environment.
  6. 根据权利要求4所述的方法,其特征在于,所述判断所述安检物品所在环境是否匹配预设安全处理环境,包括:The method according to claim 4, wherein the determining whether the environment in which the security article is located matches a preset security processing environment includes:
    判断所述安检物品所在环境的预设范围内是否有人;Determining whether there is a person within a preset range of the environment in which the security article is located;
    若所述预设范围内有人,则确定所述安检物品所在环境不匹配所述预设安全处理环境;If there is a person in the preset range, determining that the environment of the security item does not match the preset security processing environment;
    若所述预设范围内没有人,则确定所述安检物品所在环境匹配所述预设安全处理环境。If there is no one in the preset range, it is determined that the environment where the security item is located matches the preset security processing environment.
  7. 根据权利要求3所述的方法,其特征在于,所述判断是否满足处理所述 安检物品的预设条件,包括:The method according to claim 3, wherein said determining whether said processing is satisfied Pre-set conditions for security items, including:
    获取所述安检物品的危险级别,以及处理所述安检物品的安保对象的属性信息;Obtaining a danger level of the security item, and attribute information of a security object that processes the security item;
    判断所述安检物品的危险级别与所述安保对象的属性信息是否匹配;Determining whether the risk level of the security item matches the attribute information of the security object;
    若匹配,则确定满足处理所述安检物品的预设条件;If it matches, determining that the preset condition for processing the security item is met;
    若不匹配,则确定不满足处理所述安检物品的预设条件。If there is no match, it is determined that the preset condition for processing the security item is not satisfied.
  8. 根据权利要求7所述的方法,其特征在于,所述安保对象的属性信息包括安保对象的数量、安保对象的经验值。The method according to claim 7, wherein the attribute information of the security object includes the number of security objects and the experience value of the security object.
  9. 根据权利要求3至8任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 3 to 8, wherein the method further comprises:
    如果不满足处理所述安检物品的预设条件,则根据所述安检物品的位置信息,获取所述安检物品的潜在移动轨迹;If the preset condition for processing the security item is not met, obtaining a potential movement track of the security item according to the location information of the security item;
    建立工作组,所述工作组包括至少两个安保对象;Establishing a working group comprising at least two security objects;
    向所述工作组发送追踪指令,并控制所述工作组根据所述安检物品的潜在移动轨迹追踪所述安检物品,以及控制所述工作组在检测到满足处理所述安检物品的预设条件时,对所述安检物品执行安全处理;Sending a tracking instruction to the working group, and controlling the working group to track the security item according to a potential movement trajectory of the security item, and controlling the working group to detect that a predetermined condition for processing the security item is detected Performing security processing on the security article;
    其中,所述追踪指令包含所述安检物品的识别信息,以及携带所述安检物品的人员的生物特征信息。The tracking instruction includes identification information of the security inspection item, and biometric information of a person carrying the security inspection item.
  10. 根据权利要求3至8任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 3 to 8, wherein the method further comprises:
    如果不满足处理所述安检物品的预设条件,则向其他安保对象发送安检物品待处理指令,并向当前处理所述安检物品的安保对象发送拖延指令,以使所述安保对象执行预设的拖延方法。If the preset condition for processing the security item is not met, sending a security item pending processing instruction to the other security object, and sending a delay instruction to the security object currently processing the security item, so that the security object performs the preset Procrastination method.
  11. 一种安检物品的检测装置,其特征在于,包括:A device for detecting a security article, comprising:
    第一获取模块,用于获取所述安检物品的物品识别信息,以及所述安检物品的位置信息;a first obtaining module, configured to acquire item identification information of the security inspection item, and location information of the security inspection item;
    检测模块,用于根据所述物品识别信息和位置信息,确定所述安检物品的危险信息。The detecting module is configured to determine the danger information of the security item according to the item identification information and the location information.
  12. 根据权利要求11所述的装置,其特征在于,所述第一获取模块具体用于,接收拉曼检测终端上传的拉曼光谱数据,分析所述拉曼光谱数据,从而获取所述安检物品的物品识别信息,以及所述安检物品的位置信息。The device according to claim 11, wherein the first obtaining module is configured to receive Raman spectral data uploaded by the Raman detecting terminal, analyze the Raman spectral data, and thereby acquire the security inspection item. Item identification information, and location information of the security item.
  13. 根据权利要求11或12所述的装置,其特征在于,所述装置还包括:The device according to claim 11 or 12, wherein the device further comprises:
    判断模块,用于如果所述安检物品是危险物品,则判断是否满足处理所述安检物品的预设条件;a judging module, configured to determine whether the preset condition for processing the security item is met if the security item is a dangerous item;
    第一处理模块,用于如果满足处理所述安检物品的预设条件,则发送处理所述安检物品的处理指令,所述处理指令包含处理所述安检物品的处理方法。 The first processing module is configured to send a processing instruction for processing the security item if the preset condition for processing the security item is met, where the processing instruction includes a processing method for processing the security item.
  14. 根据权利要求13所述的装置,其特征在于,所述判断模块包括:The device according to claim 13, wherein the determining module comprises:
    第一获取单元,用于获取所述安检物品所在环境的环境信息;a first acquiring unit, configured to acquire environment information of an environment where the security item is located;
    第一判断单元,用于根据所述环境信息,判断所述安检物品所在环境是否匹配预设安全处理环境;a first determining unit, configured to determine, according to the environmental information, whether the environment in which the security item is located matches a preset security processing environment;
    第一确定单元,用于若匹配预设安全处理环境,则确定满足处理所述安检物品的预设条件;a first determining unit, configured to determine, if the preset security processing environment is matched, a preset condition that satisfies processing of the security item;
    第二确定单元,用于若不匹配预设安全处理环境,则确定不满足处理所述安检物品的预设条件。The second determining unit is configured to determine that the preset condition for processing the security item is not satisfied if the preset security processing environment is not matched.
  15. 根据权利要求14所述的装置,其特征在于,所述第一判断单元具体用于:The device according to claim 14, wherein the first determining unit is specifically configured to:
    判断所述安检物品所在环境的人流量是否大于预设阈值;Determining whether the traffic of the environment in which the security article is located is greater than a preset threshold;
    若大于所述预设阈值,则确定所述安检物品所在环境不匹配所述预设安全处理环境;If the preset threshold is greater, determining that the environment where the security item is located does not match the preset security processing environment;
    若不大于所述预设阈值,则确定所述安检物品所在环境匹配所述预设安全处理环境。If not greater than the preset threshold, determining that the environment in which the security item is located matches the preset security processing environment.
  16. 根据权利要求14所述的装置,其特征在于,所述第一判断单元具体用于:The device according to claim 14, wherein the first determining unit is specifically configured to:
    判断所述安检物品所在环境的预设范围内是否有人;Determining whether there is a person within a preset range of the environment in which the security article is located;
    若所述预设范围内有人,则确定所述安检物品所在环境不匹配所述预设安全处理环境;If there is a person in the preset range, determining that the environment of the security item does not match the preset security processing environment;
    若所述预设范围内没有人,则确定所述安检物品所在环境匹配所述预设安全处理环境。If there is no one in the preset range, it is determined that the environment where the security item is located matches the preset security processing environment.
  17. 根据权利要求13所述的装置,其特征在于,所述判断模块包括:The device according to claim 13, wherein the determining module comprises:
    第二获取单元,用于获取所述安检物品的危险级别,以及处理所述安检物品的安保对象的属性信息;a second acquiring unit, configured to acquire a danger level of the security inspection item, and attribute information of a security object that processes the security inspection item;
    第二判断单元,用于判断所述安检物品的危险级别与所述安保对象的属性信息是否匹配;a second determining unit, configured to determine whether a risk level of the security item matches a property information of the security object;
    第三确定单元,用于若匹配,则确定满足处理所述安检物品的预设条件;a third determining unit, configured to determine, if matched, a preset condition that satisfies processing of the security item;
    第四确定单元,用于若不匹配,则确定不满足处理所述安检物品的预设条件。And a fourth determining unit, configured to determine that the preset condition for processing the security item is not satisfied if the matching is not performed.
  18. 根据权利要求13至17任一项所述的装置,其特征在于,所述装置还包括:The device according to any one of claims 13 to 17, wherein the device further comprises:
    第二获取模块,用于如果不满足处理所述安检物品的预设条件,则根据所述安检物品的位置信息,获取所述安检物品的潜在移动轨迹;a second acquiring module, configured to acquire a potential movement track of the security inspection item according to the location information of the security inspection item if the preset condition for processing the security inspection item is not satisfied;
    建立模块,用于建立工作组,所述工作组包括至少两个安保对象; Establishing a module for establishing a working group, the working group including at least two security objects;
    第二处理模块,用于向所述工作组发送追踪指令,并控制所述工作组根据所述安检物品的潜在移动轨迹追踪所述安检物品,以及控制所述工作组在检测到满足处理所述安检物品的预设条件时,对所述安检物品执行安全处理;a second processing module, configured to send a tracking instruction to the working group, and control the working group to track the security inspection item according to a potential movement trajectory of the security inspection item, and control the working group to detect that the processing is satisfied Perform security processing on the security inspection item when the preset condition of the security item is checked;
    其中,所述追踪指令包含所述安检物品的识别信息,以及携带所述安检物品的人员的生物特征信息。The tracking instruction includes identification information of the security inspection item, and biometric information of a person carrying the security inspection item.
  19. 根据权利要求13至17任一项所述的装置,其特征在于,所述装置还包括:The device according to any one of claims 13 to 17, wherein the device further comprises:
    第三处理模块,用于如果不满足处理所述安检物品的预设条件,则向其他安保对象发送安检物品待处理指令,并向当前处理所述安检物品的安保对象发送拖延指令,以使所述安保对象执行预设的拖延方法。a third processing module, configured to send a security item pending processing instruction to the other security object if the preset condition for processing the security inspection item is not met, and send a delay instruction to the security object currently processing the security inspection item, so as to The security object performs a preset delay method.
  20. 一种电子设备,其特征在于,包括:至少一个处理器;以及,An electronic device, comprising: at least one processor; and
    与所述至少一个处理器通信连接的存储器;其中,a memory communicatively coupled to the at least one processor; wherein
    所述存储器存储有可被所述至少一个处理器执行的指令程序,所述指令程序被所述至少一个处理器执行,以使所述至少一个处理器执行权利要求1至10任一项所述的方法。The memory stores an instruction program executable by the at least one processor, the instruction program being executed by the at least one processor to cause the at least one processor to perform the method of any one of claims 1 to 10. Methods.
  21. 一种计算机程序产品,其特征在于,所述计算机程序产品包括:非易失性计算机可读存储介质以及内嵌于所述非易失性计算机可读存储介质的计算机程序指令;所述计算机程序指令包括用以使处理器执行权利要求1至10任一项所述的方法的指令。A computer program product, comprising: a non-transitory computer readable storage medium; and computer program instructions embedded in the non-transitory computer readable storage medium; The instructions include instructions for causing a processor to perform the method of any of claims 1 to 10.
  22. 一种非易失性计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于使计算机执行权力要求1至10任一项所述的方法。 A non-transitory computer readable storage medium, characterized in that the computer readable storage medium stores computer executable instructions for causing a computer to perform any of claims 1 to 10 The method described.
PCT/CN2017/097152 2017-08-11 2017-08-11 Method and device for inspecting object under security inspection, and electronic device WO2019028852A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2017/097152 WO2019028852A1 (en) 2017-08-11 2017-08-11 Method and device for inspecting object under security inspection, and electronic device
CN201780002592.2A CN108064394B (en) 2017-08-11 2017-08-11 Method and device for detecting security check article and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/097152 WO2019028852A1 (en) 2017-08-11 2017-08-11 Method and device for inspecting object under security inspection, and electronic device

Publications (1)

Publication Number Publication Date
WO2019028852A1 true WO2019028852A1 (en) 2019-02-14

Family

ID=62142068

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/097152 WO2019028852A1 (en) 2017-08-11 2017-08-11 Method and device for inspecting object under security inspection, and electronic device

Country Status (2)

Country Link
CN (1) CN108064394B (en)
WO (1) WO2019028852A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113283508A (en) * 2021-05-28 2021-08-20 中国联合网络通信集团有限公司 Passenger flow prediction method, device, equipment and storage medium
CN113671589A (en) * 2021-09-14 2021-11-19 清华大学 Safety detection match physical system
CN115457752A (en) * 2022-08-29 2022-12-09 江苏航空职业技术学院 Intelligent explosion-proof early warning system for security inspection

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109657753A (en) * 2018-12-14 2019-04-19 辽宁奇辉电子系统工程有限公司 A kind of railway safety check is searched for dangerous goods early warning system
CN109961029A (en) * 2019-03-15 2019-07-02 Oppo广东移动通信有限公司 A kind of dangerous goods detection method, device and computer readable storage medium
CN111753582A (en) * 2019-03-27 2020-10-09 杭州海康威视数字技术股份有限公司 Dangerous goods positioning method and device
CN110321800A (en) * 2019-06-05 2019-10-11 浙江大华技术股份有限公司 A kind of method and device that safety check article is shown
CN113009847A (en) * 2019-12-20 2021-06-22 北京宝沃汽车股份有限公司 Article safety monitoring system, method, computer readable storage medium and vehicle
CN112362656B (en) * 2020-09-29 2024-01-30 江西鹭鹭行科技有限公司 Pre-security inspection method, system, readable storage medium and pre-security inspection equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060056586A1 (en) * 2004-09-15 2006-03-16 Naohito Uetake Method and equipment for detecting explosives, etc.
CN104198462A (en) * 2014-09-11 2014-12-10 中国科学院重庆绿色智能技术研究院 Raman spectrometer with positioning function
CN104700058A (en) * 2015-04-02 2015-06-10 中国民用航空局信息中心 Passenger luggage detection method and device
CN105160514A (en) * 2015-07-10 2015-12-16 辽宁成远爆破工程有限公司 Public security integrated management system and public security integrated management method
CN106053494A (en) * 2016-05-26 2016-10-26 北京奇虎科技有限公司 Method, device and mobile terminal for detecting hazardous articles
CN106599967A (en) * 2016-12-08 2017-04-26 同方威视技术股份有限公司 Security check item positioning label and security check item positioning method
CN106770166A (en) * 2016-12-23 2017-05-31 同方威视技术股份有限公司 Safety inspection device and method

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4113913B2 (en) * 2006-09-04 2008-07-09 松下電器産業株式会社 Danger determination device, danger determination method, danger notification device, and danger determination program
US9251687B2 (en) * 2013-04-19 2016-02-02 Jonathan Thompson Global positioning system equipped hazard detector and a system for providing hazard alerts thereby
CN104089944A (en) * 2014-07-21 2014-10-08 同方威视技术股份有限公司 Method and device for security check of liquid article
CN105446379B (en) * 2015-11-18 2018-03-27 上海英曼尼安全装备有限公司 The adjusting method and system of the speed of service in a kind of safe examination system
CN106203264A (en) * 2016-06-28 2016-12-07 深圳市元征科技股份有限公司 Dangerous goods detection method and device
CN106296536A (en) * 2016-08-04 2017-01-04 秦卿 A kind of harmful influence emergency management and rescue commander and technical specialist's remote support system
CN106198580A (en) * 2016-08-26 2016-12-07 合肥丁点网络科技有限责任公司 A kind of X-ray screening machine luggage dangerous materials fast automatic detecting alarm device and method
CN106488013A (en) * 2016-09-27 2017-03-08 维沃移动通信有限公司 A kind of danger based reminding method and mobile terminal
CN206292170U (en) * 2016-12-26 2017-06-30 同方威视技术股份有限公司 Article based on Raman spectrum checks equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060056586A1 (en) * 2004-09-15 2006-03-16 Naohito Uetake Method and equipment for detecting explosives, etc.
CN104198462A (en) * 2014-09-11 2014-12-10 中国科学院重庆绿色智能技术研究院 Raman spectrometer with positioning function
CN104700058A (en) * 2015-04-02 2015-06-10 中国民用航空局信息中心 Passenger luggage detection method and device
CN105160514A (en) * 2015-07-10 2015-12-16 辽宁成远爆破工程有限公司 Public security integrated management system and public security integrated management method
CN106053494A (en) * 2016-05-26 2016-10-26 北京奇虎科技有限公司 Method, device and mobile terminal for detecting hazardous articles
CN106599967A (en) * 2016-12-08 2017-04-26 同方威视技术股份有限公司 Security check item positioning label and security check item positioning method
CN106770166A (en) * 2016-12-23 2017-05-31 同方威视技术股份有限公司 Safety inspection device and method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113283508A (en) * 2021-05-28 2021-08-20 中国联合网络通信集团有限公司 Passenger flow prediction method, device, equipment and storage medium
CN113283508B (en) * 2021-05-28 2023-11-10 中国联合网络通信集团有限公司 Passenger flow prediction method, device, equipment and storage medium
CN113671589A (en) * 2021-09-14 2021-11-19 清华大学 Safety detection match physical system
CN115457752A (en) * 2022-08-29 2022-12-09 江苏航空职业技术学院 Intelligent explosion-proof early warning system for security inspection
CN115457752B (en) * 2022-08-29 2023-10-03 江苏航空职业技术学院 Intelligent explosion-proof early warning system for security inspection

Also Published As

Publication number Publication date
CN108064394B (en) 2021-12-03
CN108064394A (en) 2018-05-22

Similar Documents

Publication Publication Date Title
WO2019028852A1 (en) Method and device for inspecting object under security inspection, and electronic device
CN109325964B (en) Face tracking method and device and terminal
BR112018072687B1 (en) STRUCTURAL HEALTH SYSTEM ACCORDING TO IDENTIFICATION OF DAMAGE THROUGH A DEVICE BASED ON AUGMENTED REALITY TECHNOLOGY
CN105590097B (en) Dual camera collaboration real-time face identification security system and method under the conditions of noctovision
US20230410518A1 (en) Information processing apparatus, control method, and program
SG11201809348VA (en) Data migration system and data migration method
CN106203264A (en) Dangerous goods detection method and device
CN110543800B (en) Target recognition tracking method and device for pod and pod
CN109214258B (en) Method and device for detecting illegal driving of non-driving personnel
MX2019006981A (en) Livestock biosecurity system and method of use.
CN110865415B (en) Security check method and device
WO2017101282A1 (en) Method and system for tracking target object
JP2020524928A (en) Method of providing a device with an information element that allows identifying an unauthorized user in a restricted area
CN103308538A (en) Security check system for bus
JP2020093890A (en) Crane work monitoring system, crane work monitoring method, dangerous state determination device, and program
CN111611991A (en) Fault processing method and device, electronic equipment and computer readable storage medium
CN114677740A (en) Person-bag association rapid person searching method, system, storage medium and terminal
TWI607336B (en) Monitoring method?for region
CN111259682A (en) Method and device for monitoring the safety of a construction site
CN109979202A (en) A kind of vehicle safety inspection method and device
WO2018075531A8 (en) Systems, devices, and methods for monitoring objects in a cart
JP2021051464A (en) Intrusion detection device and intrusion detection method
US10531210B2 (en) Systems, devices, and methods for detecting spills using audio sensors
JP2016066277A (en) Object management system, object management device, object management method, and object management program
CN116824167A (en) Non-inductive non-contact security inspection method, device, system and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17920931

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 16.04.2020)

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 29/07/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17920931

Country of ref document: EP

Kind code of ref document: A1