CN108650485A - Personnel monitoring's method and system based on image detection and wireless probe - Google Patents
Personnel monitoring's method and system based on image detection and wireless probe Download PDFInfo
- Publication number
- CN108650485A CN108650485A CN201810236661.2A CN201810236661A CN108650485A CN 108650485 A CN108650485 A CN 108650485A CN 201810236661 A CN201810236661 A CN 201810236661A CN 108650485 A CN108650485 A CN 108650485A
- Authority
- CN
- China
- Prior art keywords
- personnel
- module
- probe
- access
- wireless
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/181—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
- H04W64/006—Locating users or terminals or network equipment for network management purposes, e.g. mobility management with additional information processing, e.g. for direction or speed determination
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/005—Discovery of network devices, e.g. terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/69—Types of network addresses using geographic information, e.g. room number
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Alarm Systems (AREA)
Abstract
Personnel monitoring's method and system based on image detection and wireless probe that the invention discloses a kind of.This method extracts key images information and exception information first with video camera harvester using technologies such as image intrusion detection, object movement detections, it is found that the personnel of monitoring area access behavior;Then identity information and the position of invasion personnel are judged using Probe frames active probing technique and RSSI location technologies using wireless probe scan method;Finally combine image detecting method obtain as a result, judge restricted area with the presence or absence of unauthorized person invade the case where.The present invention improves on-site supervision accuracy of identification and efficiency, reduces the complexity and equipment cost of execute-in-place.
Description
Technical field
The present invention relates to monitoring technologies, and in particular to a kind of personnel monitoring's method based on image detection and wireless probe
And system.
Background technology
In important institutional settings and critical infrastructures place, all there is more demanding special of some safe classes
Region.These regions strictly forbid irrelevant personnel to access, and forbid donor according to access level limitation or access time limitation
Member accesses.The scene requirement region of access time limitation, which limits personnel in some special time period and accesses, to be entered, such as
The road and bridge of maintenance, because of closed scenic spot of weather reason etc..Only certain personnel are opened in the scene requirement region of access level limitation
Put, for example, the safe care registry of institutional settings, communication common carrier computer room etc..In addition to this, there is also simultaneously require access time by
The special area that limit and access level are limited, for example, the production district etc. of the substation of electric company, chemical plant.
Existing monitoring scheme at present, usually using dependence video human face identification technology, RFID technique.For example, patent " one
Kind recognition of face tracking and system " (CN103824045A) describes a kind of personnel tracking using face recognition technology
Method and system realize real-time, efficient, accurate people by showing personage's current kinetic route in face tracking system
Object tracks.Patent " the monitoring tracking system based on recognition of face and radio frequency identification " (CN105913037A) describes a kind of knot
The monitoring method for closing recognition of face and RFID technique is realized by video image collecting device and RFID reader to entering
The all personnel of monitoring area carries out whole tracking.Patent " the substation field personnel monitoring based on video analysis and RFID
Management system and method " (CN104318732A) describes a kind of personnel monitoring's method for safety cap, passes through video analysis
Technology to field personnel whether with wearing a safety helmet and color is identified, and using RFID technique to staff's person
Part permission is identified, the case where to prevent not wear a safety helmet and be strayed into forbidden zone.Above technical scheme has the following problems:
1) video human face identification technology is used, face identification rate is by shooting angle, camera site, background light source, resolution ratio
Influence it is more serious, the case where accuracy of identification is insufficient, and there are parts of images None- identifieds.Simultaneously as current face is known
Other algorithm recognition speed is slower, it is difficult to ensure effective identification of face in quick motion process.
2) active or passive RFID technology is used, needs largely to purchase RFID device, such as bracelet, card reader.However
RFID device is easily lost, and maintenance management is of high cost.Importantly, RFID device can not force the one-to-one binding of user,
Other people can be used RFID device to enter unauthorized area for personnel, can not ensure the identity uniqueness of user.
Invention content
Personnel monitoring's method and system based on image detection and wireless probe that the purpose of the present invention is to provide a kind of,
Overcome recognition of face less efficient, the problem of RFID management costs are higher, and personnel identity uniqueness can not ensure.
Realize that the technical solution of the object of the invention is:Personnel monitoring's method based on image detection and wireless probe,
Two parts are detected including permission registration and permission, detailed process is as follows:
Step 1, permission registration, the specific steps are:
Accessible area and Lawful access period is arranged in step 1.1, typing personal information to be visited;
Step 1.2, the wifi functions of opening personnel's mobile communication equipment to be visited, the mac address information of registering apparatus;
The detectability of step 1.3, verification equipment wifi, record authorize the correlation log issued, if wifi detections are lost
It loses, then reissues the alternate device that can be effectively detected;
Step 2, permission detection, the specific steps are:
Step 2.1, the personnel's invasion for detecting monitoring area, abnormal mobile or face characteristic, after the behavior that notes abnormalities,
Step 2.2 is gone to, wireless probe detection is carried out;
Wifi equipment in step 2.2, scanning area, if finding the wifi equipment in region, the MAC of recording equipment
Address information is compared with enrollment results, determines access rights, and go to step 2.3, if not more than the setting time
It was found that the wifi equipment in region, then report illegal invasion event;
Step 2.3, the location information for determining access personnel, if the Region Matching that positioning result and permission registration allow,
Judgement access personnel are located at accessible area, and go to step 2.4, if the region of positioning result and permission registration permission is not
Match, then judge that access personnel are located in restricted area, reports illegal invasion event;
The residence time of step 2.4, test access personnel in accessible area, the registration if access time exceeds authority
The time of permission then reports illegal invasion, is otherwise Lawful access.
Personnel monitoring system based on image detection and wireless probe, including image analysis subsystem, wireless exploration subsystem
System and analysis management subsystem, wherein:
Described image analyzing subsystem includes multiple IP Cameras and multiple video processing service devices, and the network is taken the photograph
As head is used to acquire the image/video in monitored region;The video processing service device includes image analysis module, to monitoring figure
As video is analyzed, access personnel entrance is judged whether there is;
The wireless exploration subsystem includes multiple wifi probe modules and wireless Analysis server, the Wifi probes
Module is used to acquire the addresses mac of access personnel's mobile communication equipment;The wireless Analysis server includes no line analysis mould
Block, for according to the addresses mac, determining the location information of access personnel;
The analysis management subsystem includes director server and display terminal, and the director server is according to image detection knot
Fruit and wireless probe scanning result carry out data correlation and comprehensive descision, it is determined whether have illegal invasion;The display terminal is used
In the displaying of offer analysis result, system configuration and interface management.
Compared with prior art, the present invention its remarkable advantage is:1) present invention employs ripe image detecting technique and
Wireless probe technology improves the precision of on-site supervision identification, not only can effectively take precautions against information deception, and be avoided that system
Wrong report;2) for the present invention due to not using complicated face recognition algorithms, monitoring efficiency is high, and occupying system resources are few;3) of the invention
Due to using wireless probe technology, additional wearable device need not be used, only relies on personal communication's equipment of access personnel i.e.
Can, the complexity and equipment cost of execute-in-place are reduced, ensure that the identity uniqueness of personnel.
Description of the drawings
Fig. 1 is the hardware arrangement figure of present system.
Fig. 2 is the architecture diagram of present system.
Specific implementation mode
Scheme is further illustrated the present invention in the following with reference to the drawings and specific embodiments.
The present invention uses the image detecting method based on OpenCV and the wireless probe scanning side based on mobile phone wifi
Method, personnel positions monitoring and the tracking being implemented without in the confined area of additional wearable device.Image detecting method uses
General video camera harvester moves the mature technologies such as detection using the image intrusion detection based on OpenCV, object,
Key images information and exception information are extracted, it is found that the personnel of monitoring area access behavior.Wireless probe scan method uses
Probe frames active probing technique based on IEEE802.11 agreements and RSSI location technologies, judge the identity information of invasion personnel
And position, in conjunction with image detecting method obtain as a result, comprehensive analysis and judge restricted area whether there is juridical-person
The case where member's invasion.
Personnel monitoring's method based on image detection and wireless probe, including permission registration and permission detect two parts, weigh
Limit registration refers to that personnel need first to carry out mandate registration in system before entering restricted area, is accessed with acquisition limited
The license in region processed.Permission detection refers to completing personnel's discovery, permission inspection by system automation when personnel access restricted area
The work looked into, detailed process are as follows:
Step 1, permission registration, the specific steps are:
Accessible area and Lawful access period is arranged in step 1.1, typing personal information to be visited;
Step 1.2, the wifi functions of opening personnel's mobile communication equipment to be visited, the mac address information of registering apparatus;
The detectability of step 1.3, verification equipment wifi, record authorize the correlation log issued, if wifi detections are lost
It loses, then reissues the alternate device that can be effectively detected;
Step 2, permission detection, the specific steps are:
Step 2.1, the personnel's invasion for detecting monitoring area, abnormal mobile or face characteristic, after the behavior that notes abnormalities,
Step 2.2 is gone to, wireless probe detection is carried out.When carrying out image detection to confined area, need according to different applied fields
Scape selects different detection methods.Image intrusion detection method and object movement detection are primarily adapted for use in long-term unattended
Region should respond if finding invasion or mobile object in region;Method for detecting human face is primarily adapted for use in restricted area
Mobile object is had existed in domain, but needs to distinguish the scene of people and object, such as manufactures the production line of processing factory.The present invention
Image detecting method has specifically included image Intrusion Detection Technique based on inter-frame difference method, based on mean shift algorithm
Object movement detection, the human face detection tech based on Haar features, the realization of 3 kinds of methods use the maturation based on OpenCV
Algorithm.In order to obtain the identity information of access personnel, on the basis of image detection, wireless probe scanning is further carried out.
Wifi equipment in step 2.2, scanning area, if finding the wifi equipment in region, the MAC of recording equipment
Address information is compared with enrollment results, determines access rights, and go to step 2.3, if not more than the setting time
It was found that the wifi equipment in region, then report illegal invasion event.It is specific to use the Probe frames based on IEEE802.11 agreements
Active probing technique, using radio scan equipment, active broadcast sends Probe Request frames, by receiving Probe
Response frames obtain the mac address information of equipment.
Step 2.3, the location information for determining access personnel, if the Region Matching that positioning result and permission registration allow,
Judgement access personnel are located at accessible area, and go to step 2.4, if the region of positioning result and permission registration permission is not
Match, then judge that access personnel are located in restricted area, reports illegal invasion event.Specifically determined using RSSI localization methods
The positioning result of access personnel.
The residence time of step 2.4, test access personnel in accessible area, the registration if access time exceeds authority
The time of permission then reports illegal invasion, is otherwise Lawful access.
On this basis, the legitimacy method of discrimination that confined area accesses can be described by table 1.One kind is only listed in table 1
Possible validity judgement method.Towards different actual use scenes, need to be designed and determined according to on-site actual situations
Justice.
1. legitimacy of table differentiates table
As shown in Fig. 2, the present invention is based on the personnel monitoring system of image detection and wireless probe, including image analysis
System, wireless exploration subsystem and analysis management subsystem, wherein:
Described image analyzing subsystem includes multiple IP Cameras and multiple video processing service devices, and the network is taken the photograph
As head is used to acquire the image/video in monitored region, in the present invention IP Camera layout monitored region boundary and
Inside is transferred back to image video signal in video processing service device with H.264 coded format;The video processing service device
Including image analysis module, monitoring image video is analyzed, judges whether there is access personnel entrance.
The wireless exploration subsystem includes multiple wifi probe modules and wireless Analysis server, the Wifi probes
Module is used to acquire the addresses mac of access personnel's mobile communication equipment, and Wifi probe modules are using Multipoint Uniform point in the present invention
The method of cloth is arranged at the inside and critical boundaries in monitored region (gate, passageway etc.), using wired ethernet transmission
Result is pooled in wireless Analysis server by mode;The wireless Analysis server includes wireless analysis module, is used for basis
The addresses mac determine the location information of access personnel;
The analysis management subsystem includes director server and display terminal, passes through interchanger and image analysis subsystem
Video processing service device be connected with the wireless Analysis server of wireless exploration subsystem, receive two subsystems be transmitted across
The analysis result come, the director server carry out data correlation and comprehensive according to image detection result and wireless probe scanning result
It closes and judges, it is determined whether have illegal invasion;The display terminal is for providing analysis result displaying, system configuration and mouthpiece
Reason.
In the present invention, director server specifically includes district management module, device management module, authority management module, image
Analysis module, wireless analysis module, time synchronization module, logger module and Analytical Results Database, wherein:The area
Domain management module is for recording restricted area information, the camera in associated region and wifi probe modules;The equipment
Management module is used for all available cameras, video processing service device, wifi probe modules and nothing in registration and management system
Line analysis server;The authority management module is used to manage the mac for the equipment that may have access to and forbid accessing certain confined area
The addresses mac are carried out one-to-one binding by address with personal information is accessed;The time synchronization module is used in subsystems
The time synchronization of all kinds of servers;Log recording of the logger module for completing personnel monitoring's event, system event
And storage;The Analytical Results Database is for storing each subsystem analysis result.
Display terminal specifically includes monitor video display module, area map display module, access administration module, system
Setup module, journal displaying module and interface administration module, wherein:The monitor video display module uses multiple window exhibitions
Show multiple vision signals of different confined areas;The area map display module is used to provide the plan view in monitored region,
Intuitive display accesses personnel positioning information;The access administration module is used for typing personal information to be visited, and people to be visited is arranged
The permission of member;The system setup module is used to configure network configuration and the time of subsystems;The journal displaying module
Normal or abnormal Access Events information for showing restricted area;The interface administration module is answered for third party to be arranged
With api interface, including gate inhibition's operate interface and alarm alarm modules.
Claims (10)
1. personnel monitoring's method based on image detection and wireless probe, which is characterized in that including permission registration and permission detection
Two parts, detailed process are as follows:
Step 1, permission registration, the specific steps are:
Accessible area and Lawful access period is arranged in step 1.1, typing personal information to be visited;
Step 1.2, the wifi functions of opening personnel's mobile communication equipment to be visited, the mac address information of registering apparatus;
The detectability of step 1.3, verification equipment wifi, record authorize the correlation log issued, if wifi detection failures, are mended
Send out the alternate device that can be effectively detected;
Step 2, permission detection, the specific steps are:
Step 2.1, the personnel's invasion for detecting monitoring area, abnormal mobile or face characteristic, after the behavior that notes abnormalities, go to step
Rapid 2.2, carry out wireless probe detection;
Wifi equipment in step 2.2, scanning area, if finding the wifi equipment in region, the MAC Address letter of recording equipment
Breath, is compared with enrollment results, determines access rights, and go to step 2.3, if not finding region more than the setting time
Interior wifi equipment then reports illegal invasion event;
Step 2.3, the location information for determining access personnel, if the Region Matching that positioning result and permission registration allow, judges
Access personnel are located at accessible area, and go to step 2.4, if the region that positioning result and permission registration allow mismatches,
Judgement access personnel are located in restricted area, report illegal invasion event;
The residence time of step 2.4, test access personnel in accessible area, the registration permission if access time exceeds authority
Time then reports illegal invasion, is otherwise Lawful access.
2. personnel monitoring's method according to claim 1 based on image detection and wireless probe, which is characterized in that described
Mobile communication equipment includes mobile phone and PAD.
3. personnel monitoring's method according to claim 1 based on image detection and wireless probe, which is characterized in that step
2.1 carry out image intrusion detection based on inter-frame difference method, carry out object movement detection based on mean shift algorithm, are based on Haar
Characterization method carries out Face datection.
4. personnel monitoring's method according to claim 1 based on image detection and wireless probe, which is characterized in that step
2.2 use the Probe frame active probing techniques based on IEEE802.11 agreements, and using radio scan equipment, active broadcast is sent
Probe Request frames obtain the mac address information of equipment by receiving Probe Response frames.
5. personnel monitoring's method according to claim 1 based on image detection and wireless probe, which is characterized in that step
2.3 on the basis of obtaining mac address information, the positioning result of access personnel is determined using RSSI localization methods.
6. the personnel monitoring system based on image detection and wireless probe, which is characterized in that including image analysis subsystem, wirelessly
Detection subsystem and analysis management subsystem, wherein:
Described image analyzing subsystem includes multiple IP Cameras and multiple video processing service devices, and the IP Camera is used
In the image/video for acquiring monitored region;The video processing service device includes image analysis module, to monitoring image video
It is analyzed, judges whether there is access personnel entrance;
The wireless exploration subsystem includes multiple wifi probe modules and wireless Analysis server, and the Wifi probe modules are used
In the addresses mac of acquisition access personnel's mobile communication equipment;The wireless Analysis server includes wireless analysis module, is used for root
According to the addresses mac, the location information of access personnel is determined;
The analysis management subsystem includes director server and display terminal, and the director server is according to image detection result and nothing
Line probe scanning result carries out data correlation and comprehensive descision, it is determined whether has illegal invasion;The display terminal is for providing
Analysis result displaying, system configuration and interface management.
7. the personnel monitoring system according to claim 6 based on image detection and wireless probe, which is characterized in that described
IP Camera is laid out on the boundary and inside in monitored region, is transferred back to image video signal with H.264 coded format and is regarded
In frequency processing server.
8. the personnel monitoring system according to claim 6 based on image detection and wireless probe, which is characterized in that described
Wifi probe modules are arranged in using the method for Multipoint Uniform distribution inside and the critical boundaries in monitored region, and use is wired
Result is pooled in wireless Analysis server by the mode of Ethernet transmission.
9. the personnel monitoring system according to claim 6 based on image detection and wireless probe, which is characterized in that described
Director server include district management module, device management module, authority management module, image analysis module, wireless analysis module,
Time synchronization module, logger module and Analytical Results Database, wherein:
The district management module is for recording restricted area information, the camera in associated region and wifi probe moulds
Block;
The device management module is used for all available cameras, video processing service device, wifi in registration and management system
Probe module and wireless Analysis server;
The authority management module is used to manage the addresses mac for the equipment that may have access to and forbid accessing certain confined area, by mac
Address carries out one-to-one binding with personal information is accessed;
The time synchronization module is used for the time synchronization of all kinds of servers in subsystems;
The logger module is for completing personnel monitoring's event, the log recording of system event and storage;
The Analytical Results Database is for storing each subsystem analysis result.
10. the personnel monitoring system according to claim 6 based on image detection and wireless probe, which is characterized in that institute
It includes monitor video display module, area map display module, access administration module, system setup module, day to state display terminal
Will display module and interface administration module, wherein:
The monitor video display module shows multiple vision signals of different confined areas using multiple windows;
The area map display module is used to provide the plan view in monitored region, and intuitive display accesses personnel positioning information;
The access administration module is used for typing personal information to be visited, and the permission of personnel to be visited is arranged;
The system setup module is used to configure network configuration and the time of subsystems;
The journal displaying module is used to show the normal or abnormal Access Events information of restricted area;
The interface administration module is for being arranged third-party application api interface, including gate inhibition's operate interface and alarm alarm modules.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810236661.2A CN108650485A (en) | 2018-03-21 | 2018-03-21 | Personnel monitoring's method and system based on image detection and wireless probe |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810236661.2A CN108650485A (en) | 2018-03-21 | 2018-03-21 | Personnel monitoring's method and system based on image detection and wireless probe |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108650485A true CN108650485A (en) | 2018-10-12 |
Family
ID=63744642
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810236661.2A Pending CN108650485A (en) | 2018-03-21 | 2018-03-21 | Personnel monitoring's method and system based on image detection and wireless probe |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108650485A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109977806A (en) * | 2019-03-11 | 2019-07-05 | 赛特斯信息科技股份有限公司 | Realize the system and method for IDC computer room disengaging personnel's fine-grained management |
CN110020612A (en) * | 2019-03-18 | 2019-07-16 | 杰创智能科技股份有限公司 | A kind of identification system based on virtual probe system |
CN110288801A (en) * | 2019-06-25 | 2019-09-27 | 南方电网数字电网研究院有限公司 | Electric field video monitoring method, device, computer equipment and storage medium |
CN110363118A (en) * | 2019-06-28 | 2019-10-22 | 珠海优特电力科技股份有限公司 | Behavior monitoring method, apparatus, system and the storage medium of target object |
CN111491258A (en) * | 2020-03-26 | 2020-08-04 | 微民保险代理有限公司 | Object type detection method and device |
CN112153631A (en) * | 2019-06-28 | 2020-12-29 | 北京奇虎科技有限公司 | Method and device for identifying illegal intrusion and router |
CN113965901A (en) * | 2021-10-22 | 2022-01-21 | 山东高速股份有限公司 | Expressway tunnel personnel monitoring method based on wireless probe |
CN118249517A (en) * | 2024-05-21 | 2024-06-25 | 国网江西省电力有限公司南昌供电分公司 | Wi-Fi probe-based multi-mode substation operation and maintenance management method and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105913037A (en) * | 2016-04-26 | 2016-08-31 | 广东技术师范学院 | Face identification and radio frequency identification based monitoring and tracking system |
CN106327408A (en) * | 2016-11-02 | 2017-01-11 | 浙江天地人科技有限公司 | Electronic doorplate and house personnel management system |
US20170046891A1 (en) * | 2015-08-12 | 2017-02-16 | Tyco Fire & Security Gmbh | Systems and methods for location identification and tracking using a camera |
US20170337431A1 (en) * | 2016-05-18 | 2017-11-23 | Canon Kabushiki Kaisha | Image processing apparatus and method and monitoring system |
CN107529221A (en) * | 2017-08-22 | 2017-12-29 | 上海兴容信息技术有限公司 | A kind of follow-up analysis system and method for combination video monitoring and Wi Fi positioning |
CN107547865A (en) * | 2017-07-06 | 2018-01-05 | 王连圭 | Trans-regional human body video frequency object tracking intelligent control method |
-
2018
- 2018-03-21 CN CN201810236661.2A patent/CN108650485A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170046891A1 (en) * | 2015-08-12 | 2017-02-16 | Tyco Fire & Security Gmbh | Systems and methods for location identification and tracking using a camera |
CN105913037A (en) * | 2016-04-26 | 2016-08-31 | 广东技术师范学院 | Face identification and radio frequency identification based monitoring and tracking system |
US20170337431A1 (en) * | 2016-05-18 | 2017-11-23 | Canon Kabushiki Kaisha | Image processing apparatus and method and monitoring system |
CN106327408A (en) * | 2016-11-02 | 2017-01-11 | 浙江天地人科技有限公司 | Electronic doorplate and house personnel management system |
CN107547865A (en) * | 2017-07-06 | 2018-01-05 | 王连圭 | Trans-regional human body video frequency object tracking intelligent control method |
CN107529221A (en) * | 2017-08-22 | 2017-12-29 | 上海兴容信息技术有限公司 | A kind of follow-up analysis system and method for combination video monitoring and Wi Fi positioning |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109977806A (en) * | 2019-03-11 | 2019-07-05 | 赛特斯信息科技股份有限公司 | Realize the system and method for IDC computer room disengaging personnel's fine-grained management |
CN110020612A (en) * | 2019-03-18 | 2019-07-16 | 杰创智能科技股份有限公司 | A kind of identification system based on virtual probe system |
CN110288801A (en) * | 2019-06-25 | 2019-09-27 | 南方电网数字电网研究院有限公司 | Electric field video monitoring method, device, computer equipment and storage medium |
CN110363118A (en) * | 2019-06-28 | 2019-10-22 | 珠海优特电力科技股份有限公司 | Behavior monitoring method, apparatus, system and the storage medium of target object |
CN112153631A (en) * | 2019-06-28 | 2020-12-29 | 北京奇虎科技有限公司 | Method and device for identifying illegal intrusion and router |
CN110363118B (en) * | 2019-06-28 | 2021-03-19 | 珠海优特电力科技股份有限公司 | Behavior monitoring method, device and system of target object and storage medium |
CN111491258A (en) * | 2020-03-26 | 2020-08-04 | 微民保险代理有限公司 | Object type detection method and device |
CN113965901A (en) * | 2021-10-22 | 2022-01-21 | 山东高速股份有限公司 | Expressway tunnel personnel monitoring method based on wireless probe |
CN113965901B (en) * | 2021-10-22 | 2024-02-13 | 山东高速股份有限公司 | Expressway tunnel personnel monitoring method based on wireless probe |
CN118249517A (en) * | 2024-05-21 | 2024-06-25 | 国网江西省电力有限公司南昌供电分公司 | Wi-Fi probe-based multi-mode substation operation and maintenance management method and system |
CN118249517B (en) * | 2024-05-21 | 2024-07-26 | 国网江西省电力有限公司南昌供电分公司 | Wi-Fi probe-based multi-mode substation operation and maintenance management method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108650485A (en) | Personnel monitoring's method and system based on image detection and wireless probe | |
AU2018312581B2 (en) | Supervising property access with portable camera | |
CN109658554B (en) | Intelligent residential district security protection system based on big data | |
CN113033293A (en) | Access & exit management equipment, system and method | |
CN112233300A (en) | Community passing epidemic prevention monitoring joint defense system and method based on artificial intelligence | |
CN111862510A (en) | Campus security monitoring system and method based on Internet of things | |
CN111968016A (en) | College epidemic situation cooperative control platform and control method | |
KR102012672B1 (en) | Anti-crime system and method using face recognition based people feature recognition | |
CN108540750A (en) | Based on monitor video and the associated method, apparatus of electronic device identification and system | |
CN108540751A (en) | Monitoring method, apparatus and system based on video and electronic device identification | |
CN106899827A (en) | Image data acquiring, inquiry, video frequency monitoring method, equipment and system | |
CN106127618A (en) | A kind of based on recognition of face, number sensing and the locating and monitoring system of RF identification and method | |
KR101946317B1 (en) | User Identification and Tracking Method Using CCTV System | |
KR100815920B1 (en) | Security system using location data of gps and image data of ccd camera and invader detection method using the same | |
CA2846624A1 (en) | Gps directed intrusion system with data acquisition | |
CN108600700A (en) | A kind of cell video monitoring system | |
KR101305371B1 (en) | Real time location monitoring system and method for transmitting of image data | |
CN108540756A (en) | Recognition methods, apparatus and system based on video and electronic device identification | |
CN111629184A (en) | Video monitoring alarm system and method capable of identifying personnel in monitoring area | |
CN103519790B (en) | Wireless Thermometer System based on community intelligent platform and operation method thereof | |
CN112784680A (en) | Method and system for locking dense contacts in crowded place | |
CN110689694B (en) | Intelligent monitoring system and method based on image processing | |
CN111192397A (en) | Non-inductive identification passing device and identification method based on big data | |
CN114120597A (en) | Public place epidemic situation normalized prevention and control system based on machine vision | |
JP2012008802A (en) | Monitoring system and person specification method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181012 |
|
RJ01 | Rejection of invention patent application after publication |