CN108650485A - Personnel monitoring's method and system based on image detection and wireless probe - Google Patents

Personnel monitoring's method and system based on image detection and wireless probe Download PDF

Info

Publication number
CN108650485A
CN108650485A CN201810236661.2A CN201810236661A CN108650485A CN 108650485 A CN108650485 A CN 108650485A CN 201810236661 A CN201810236661 A CN 201810236661A CN 108650485 A CN108650485 A CN 108650485A
Authority
CN
China
Prior art keywords
personnel
module
probe
access
wireless
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810236661.2A
Other languages
Chinese (zh)
Inventor
殷小军
刘凡华
李泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Mdt Infotech Ltd
Original Assignee
Jiangsu Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Mdt Infotech Ltd filed Critical Jiangsu Mdt Infotech Ltd
Priority to CN201810236661.2A priority Critical patent/CN108650485A/en
Publication of CN108650485A publication Critical patent/CN108650485A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • H04W64/006Locating users or terminals or network equipment for network management purposes, e.g. mobility management with additional information processing, e.g. for direction or speed determination
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/69Types of network addresses using geographic information, e.g. room number

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Alarm Systems (AREA)

Abstract

Personnel monitoring's method and system based on image detection and wireless probe that the invention discloses a kind of.This method extracts key images information and exception information first with video camera harvester using technologies such as image intrusion detection, object movement detections, it is found that the personnel of monitoring area access behavior;Then identity information and the position of invasion personnel are judged using Probe frames active probing technique and RSSI location technologies using wireless probe scan method;Finally combine image detecting method obtain as a result, judge restricted area with the presence or absence of unauthorized person invade the case where.The present invention improves on-site supervision accuracy of identification and efficiency, reduces the complexity and equipment cost of execute-in-place.

Description

Personnel monitoring's method and system based on image detection and wireless probe
Technical field
The present invention relates to monitoring technologies, and in particular to a kind of personnel monitoring's method based on image detection and wireless probe And system.
Background technology
In important institutional settings and critical infrastructures place, all there is more demanding special of some safe classes Region.These regions strictly forbid irrelevant personnel to access, and forbid donor according to access level limitation or access time limitation Member accesses.The scene requirement region of access time limitation, which limits personnel in some special time period and accesses, to be entered, such as The road and bridge of maintenance, because of closed scenic spot of weather reason etc..Only certain personnel are opened in the scene requirement region of access level limitation Put, for example, the safe care registry of institutional settings, communication common carrier computer room etc..In addition to this, there is also simultaneously require access time by The special area that limit and access level are limited, for example, the production district etc. of the substation of electric company, chemical plant.
Existing monitoring scheme at present, usually using dependence video human face identification technology, RFID technique.For example, patent " one Kind recognition of face tracking and system " (CN103824045A) describes a kind of personnel tracking using face recognition technology Method and system realize real-time, efficient, accurate people by showing personage's current kinetic route in face tracking system Object tracks.Patent " the monitoring tracking system based on recognition of face and radio frequency identification " (CN105913037A) describes a kind of knot The monitoring method for closing recognition of face and RFID technique is realized by video image collecting device and RFID reader to entering The all personnel of monitoring area carries out whole tracking.Patent " the substation field personnel monitoring based on video analysis and RFID Management system and method " (CN104318732A) describes a kind of personnel monitoring's method for safety cap, passes through video analysis Technology to field personnel whether with wearing a safety helmet and color is identified, and using RFID technique to staff's person Part permission is identified, the case where to prevent not wear a safety helmet and be strayed into forbidden zone.Above technical scheme has the following problems:
1) video human face identification technology is used, face identification rate is by shooting angle, camera site, background light source, resolution ratio Influence it is more serious, the case where accuracy of identification is insufficient, and there are parts of images None- identifieds.Simultaneously as current face is known Other algorithm recognition speed is slower, it is difficult to ensure effective identification of face in quick motion process.
2) active or passive RFID technology is used, needs largely to purchase RFID device, such as bracelet, card reader.However RFID device is easily lost, and maintenance management is of high cost.Importantly, RFID device can not force the one-to-one binding of user, Other people can be used RFID device to enter unauthorized area for personnel, can not ensure the identity uniqueness of user.
Invention content
Personnel monitoring's method and system based on image detection and wireless probe that the purpose of the present invention is to provide a kind of, Overcome recognition of face less efficient, the problem of RFID management costs are higher, and personnel identity uniqueness can not ensure.
Realize that the technical solution of the object of the invention is:Personnel monitoring's method based on image detection and wireless probe, Two parts are detected including permission registration and permission, detailed process is as follows:
Step 1, permission registration, the specific steps are:
Accessible area and Lawful access period is arranged in step 1.1, typing personal information to be visited;
Step 1.2, the wifi functions of opening personnel's mobile communication equipment to be visited, the mac address information of registering apparatus;
The detectability of step 1.3, verification equipment wifi, record authorize the correlation log issued, if wifi detections are lost It loses, then reissues the alternate device that can be effectively detected;
Step 2, permission detection, the specific steps are:
Step 2.1, the personnel's invasion for detecting monitoring area, abnormal mobile or face characteristic, after the behavior that notes abnormalities, Step 2.2 is gone to, wireless probe detection is carried out;
Wifi equipment in step 2.2, scanning area, if finding the wifi equipment in region, the MAC of recording equipment Address information is compared with enrollment results, determines access rights, and go to step 2.3, if not more than the setting time It was found that the wifi equipment in region, then report illegal invasion event;
Step 2.3, the location information for determining access personnel, if the Region Matching that positioning result and permission registration allow, Judgement access personnel are located at accessible area, and go to step 2.4, if the region of positioning result and permission registration permission is not Match, then judge that access personnel are located in restricted area, reports illegal invasion event;
The residence time of step 2.4, test access personnel in accessible area, the registration if access time exceeds authority The time of permission then reports illegal invasion, is otherwise Lawful access.
Personnel monitoring system based on image detection and wireless probe, including image analysis subsystem, wireless exploration subsystem System and analysis management subsystem, wherein:
Described image analyzing subsystem includes multiple IP Cameras and multiple video processing service devices, and the network is taken the photograph As head is used to acquire the image/video in monitored region;The video processing service device includes image analysis module, to monitoring figure As video is analyzed, access personnel entrance is judged whether there is;
The wireless exploration subsystem includes multiple wifi probe modules and wireless Analysis server, the Wifi probes Module is used to acquire the addresses mac of access personnel's mobile communication equipment;The wireless Analysis server includes no line analysis mould Block, for according to the addresses mac, determining the location information of access personnel;
The analysis management subsystem includes director server and display terminal, and the director server is according to image detection knot Fruit and wireless probe scanning result carry out data correlation and comprehensive descision, it is determined whether have illegal invasion;The display terminal is used In the displaying of offer analysis result, system configuration and interface management.
Compared with prior art, the present invention its remarkable advantage is:1) present invention employs ripe image detecting technique and Wireless probe technology improves the precision of on-site supervision identification, not only can effectively take precautions against information deception, and be avoided that system Wrong report;2) for the present invention due to not using complicated face recognition algorithms, monitoring efficiency is high, and occupying system resources are few;3) of the invention Due to using wireless probe technology, additional wearable device need not be used, only relies on personal communication's equipment of access personnel i.e. Can, the complexity and equipment cost of execute-in-place are reduced, ensure that the identity uniqueness of personnel.
Description of the drawings
Fig. 1 is the hardware arrangement figure of present system.
Fig. 2 is the architecture diagram of present system.
Specific implementation mode
Scheme is further illustrated the present invention in the following with reference to the drawings and specific embodiments.
The present invention uses the image detecting method based on OpenCV and the wireless probe scanning side based on mobile phone wifi Method, personnel positions monitoring and the tracking being implemented without in the confined area of additional wearable device.Image detecting method uses General video camera harvester moves the mature technologies such as detection using the image intrusion detection based on OpenCV, object, Key images information and exception information are extracted, it is found that the personnel of monitoring area access behavior.Wireless probe scan method uses Probe frames active probing technique based on IEEE802.11 agreements and RSSI location technologies, judge the identity information of invasion personnel And position, in conjunction with image detecting method obtain as a result, comprehensive analysis and judge restricted area whether there is juridical-person The case where member's invasion.
Personnel monitoring's method based on image detection and wireless probe, including permission registration and permission detect two parts, weigh Limit registration refers to that personnel need first to carry out mandate registration in system before entering restricted area, is accessed with acquisition limited The license in region processed.Permission detection refers to completing personnel's discovery, permission inspection by system automation when personnel access restricted area The work looked into, detailed process are as follows:
Step 1, permission registration, the specific steps are:
Accessible area and Lawful access period is arranged in step 1.1, typing personal information to be visited;
Step 1.2, the wifi functions of opening personnel's mobile communication equipment to be visited, the mac address information of registering apparatus;
The detectability of step 1.3, verification equipment wifi, record authorize the correlation log issued, if wifi detections are lost It loses, then reissues the alternate device that can be effectively detected;
Step 2, permission detection, the specific steps are:
Step 2.1, the personnel's invasion for detecting monitoring area, abnormal mobile or face characteristic, after the behavior that notes abnormalities, Step 2.2 is gone to, wireless probe detection is carried out.When carrying out image detection to confined area, need according to different applied fields Scape selects different detection methods.Image intrusion detection method and object movement detection are primarily adapted for use in long-term unattended Region should respond if finding invasion or mobile object in region;Method for detecting human face is primarily adapted for use in restricted area Mobile object is had existed in domain, but needs to distinguish the scene of people and object, such as manufactures the production line of processing factory.The present invention Image detecting method has specifically included image Intrusion Detection Technique based on inter-frame difference method, based on mean shift algorithm Object movement detection, the human face detection tech based on Haar features, the realization of 3 kinds of methods use the maturation based on OpenCV Algorithm.In order to obtain the identity information of access personnel, on the basis of image detection, wireless probe scanning is further carried out.
Wifi equipment in step 2.2, scanning area, if finding the wifi equipment in region, the MAC of recording equipment Address information is compared with enrollment results, determines access rights, and go to step 2.3, if not more than the setting time It was found that the wifi equipment in region, then report illegal invasion event.It is specific to use the Probe frames based on IEEE802.11 agreements Active probing technique, using radio scan equipment, active broadcast sends Probe Request frames, by receiving Probe Response frames obtain the mac address information of equipment.
Step 2.3, the location information for determining access personnel, if the Region Matching that positioning result and permission registration allow, Judgement access personnel are located at accessible area, and go to step 2.4, if the region of positioning result and permission registration permission is not Match, then judge that access personnel are located in restricted area, reports illegal invasion event.Specifically determined using RSSI localization methods The positioning result of access personnel.
The residence time of step 2.4, test access personnel in accessible area, the registration if access time exceeds authority The time of permission then reports illegal invasion, is otherwise Lawful access.
On this basis, the legitimacy method of discrimination that confined area accesses can be described by table 1.One kind is only listed in table 1 Possible validity judgement method.Towards different actual use scenes, need to be designed and determined according to on-site actual situations Justice.
1. legitimacy of table differentiates table
As shown in Fig. 2, the present invention is based on the personnel monitoring system of image detection and wireless probe, including image analysis System, wireless exploration subsystem and analysis management subsystem, wherein:
Described image analyzing subsystem includes multiple IP Cameras and multiple video processing service devices, and the network is taken the photograph As head is used to acquire the image/video in monitored region, in the present invention IP Camera layout monitored region boundary and Inside is transferred back to image video signal in video processing service device with H.264 coded format;The video processing service device Including image analysis module, monitoring image video is analyzed, judges whether there is access personnel entrance.
The wireless exploration subsystem includes multiple wifi probe modules and wireless Analysis server, the Wifi probes Module is used to acquire the addresses mac of access personnel's mobile communication equipment, and Wifi probe modules are using Multipoint Uniform point in the present invention The method of cloth is arranged at the inside and critical boundaries in monitored region (gate, passageway etc.), using wired ethernet transmission Result is pooled in wireless Analysis server by mode;The wireless Analysis server includes wireless analysis module, is used for basis The addresses mac determine the location information of access personnel;
The analysis management subsystem includes director server and display terminal, passes through interchanger and image analysis subsystem Video processing service device be connected with the wireless Analysis server of wireless exploration subsystem, receive two subsystems be transmitted across The analysis result come, the director server carry out data correlation and comprehensive according to image detection result and wireless probe scanning result It closes and judges, it is determined whether have illegal invasion;The display terminal is for providing analysis result displaying, system configuration and mouthpiece Reason.
In the present invention, director server specifically includes district management module, device management module, authority management module, image Analysis module, wireless analysis module, time synchronization module, logger module and Analytical Results Database, wherein:The area Domain management module is for recording restricted area information, the camera in associated region and wifi probe modules;The equipment Management module is used for all available cameras, video processing service device, wifi probe modules and nothing in registration and management system Line analysis server;The authority management module is used to manage the mac for the equipment that may have access to and forbid accessing certain confined area The addresses mac are carried out one-to-one binding by address with personal information is accessed;The time synchronization module is used in subsystems The time synchronization of all kinds of servers;Log recording of the logger module for completing personnel monitoring's event, system event And storage;The Analytical Results Database is for storing each subsystem analysis result.
Display terminal specifically includes monitor video display module, area map display module, access administration module, system Setup module, journal displaying module and interface administration module, wherein:The monitor video display module uses multiple window exhibitions Show multiple vision signals of different confined areas;The area map display module is used to provide the plan view in monitored region, Intuitive display accesses personnel positioning information;The access administration module is used for typing personal information to be visited, and people to be visited is arranged The permission of member;The system setup module is used to configure network configuration and the time of subsystems;The journal displaying module Normal or abnormal Access Events information for showing restricted area;The interface administration module is answered for third party to be arranged With api interface, including gate inhibition's operate interface and alarm alarm modules.

Claims (10)

1. personnel monitoring's method based on image detection and wireless probe, which is characterized in that including permission registration and permission detection Two parts, detailed process are as follows:
Step 1, permission registration, the specific steps are:
Accessible area and Lawful access period is arranged in step 1.1, typing personal information to be visited;
Step 1.2, the wifi functions of opening personnel's mobile communication equipment to be visited, the mac address information of registering apparatus;
The detectability of step 1.3, verification equipment wifi, record authorize the correlation log issued, if wifi detection failures, are mended Send out the alternate device that can be effectively detected;
Step 2, permission detection, the specific steps are:
Step 2.1, the personnel's invasion for detecting monitoring area, abnormal mobile or face characteristic, after the behavior that notes abnormalities, go to step Rapid 2.2, carry out wireless probe detection;
Wifi equipment in step 2.2, scanning area, if finding the wifi equipment in region, the MAC Address letter of recording equipment Breath, is compared with enrollment results, determines access rights, and go to step 2.3, if not finding region more than the setting time Interior wifi equipment then reports illegal invasion event;
Step 2.3, the location information for determining access personnel, if the Region Matching that positioning result and permission registration allow, judges Access personnel are located at accessible area, and go to step 2.4, if the region that positioning result and permission registration allow mismatches, Judgement access personnel are located in restricted area, report illegal invasion event;
The residence time of step 2.4, test access personnel in accessible area, the registration permission if access time exceeds authority Time then reports illegal invasion, is otherwise Lawful access.
2. personnel monitoring's method according to claim 1 based on image detection and wireless probe, which is characterized in that described Mobile communication equipment includes mobile phone and PAD.
3. personnel monitoring's method according to claim 1 based on image detection and wireless probe, which is characterized in that step 2.1 carry out image intrusion detection based on inter-frame difference method, carry out object movement detection based on mean shift algorithm, are based on Haar Characterization method carries out Face datection.
4. personnel monitoring's method according to claim 1 based on image detection and wireless probe, which is characterized in that step 2.2 use the Probe frame active probing techniques based on IEEE802.11 agreements, and using radio scan equipment, active broadcast is sent Probe Request frames obtain the mac address information of equipment by receiving Probe Response frames.
5. personnel monitoring's method according to claim 1 based on image detection and wireless probe, which is characterized in that step 2.3 on the basis of obtaining mac address information, the positioning result of access personnel is determined using RSSI localization methods.
6. the personnel monitoring system based on image detection and wireless probe, which is characterized in that including image analysis subsystem, wirelessly Detection subsystem and analysis management subsystem, wherein:
Described image analyzing subsystem includes multiple IP Cameras and multiple video processing service devices, and the IP Camera is used In the image/video for acquiring monitored region;The video processing service device includes image analysis module, to monitoring image video It is analyzed, judges whether there is access personnel entrance;
The wireless exploration subsystem includes multiple wifi probe modules and wireless Analysis server, and the Wifi probe modules are used In the addresses mac of acquisition access personnel's mobile communication equipment;The wireless Analysis server includes wireless analysis module, is used for root According to the addresses mac, the location information of access personnel is determined;
The analysis management subsystem includes director server and display terminal, and the director server is according to image detection result and nothing Line probe scanning result carries out data correlation and comprehensive descision, it is determined whether has illegal invasion;The display terminal is for providing Analysis result displaying, system configuration and interface management.
7. the personnel monitoring system according to claim 6 based on image detection and wireless probe, which is characterized in that described IP Camera is laid out on the boundary and inside in monitored region, is transferred back to image video signal with H.264 coded format and is regarded In frequency processing server.
8. the personnel monitoring system according to claim 6 based on image detection and wireless probe, which is characterized in that described Wifi probe modules are arranged in using the method for Multipoint Uniform distribution inside and the critical boundaries in monitored region, and use is wired Result is pooled in wireless Analysis server by the mode of Ethernet transmission.
9. the personnel monitoring system according to claim 6 based on image detection and wireless probe, which is characterized in that described Director server include district management module, device management module, authority management module, image analysis module, wireless analysis module, Time synchronization module, logger module and Analytical Results Database, wherein:
The district management module is for recording restricted area information, the camera in associated region and wifi probe moulds Block;
The device management module is used for all available cameras, video processing service device, wifi in registration and management system Probe module and wireless Analysis server;
The authority management module is used to manage the addresses mac for the equipment that may have access to and forbid accessing certain confined area, by mac Address carries out one-to-one binding with personal information is accessed;
The time synchronization module is used for the time synchronization of all kinds of servers in subsystems;
The logger module is for completing personnel monitoring's event, the log recording of system event and storage;
The Analytical Results Database is for storing each subsystem analysis result.
10. the personnel monitoring system according to claim 6 based on image detection and wireless probe, which is characterized in that institute It includes monitor video display module, area map display module, access administration module, system setup module, day to state display terminal Will display module and interface administration module, wherein:
The monitor video display module shows multiple vision signals of different confined areas using multiple windows;
The area map display module is used to provide the plan view in monitored region, and intuitive display accesses personnel positioning information;
The access administration module is used for typing personal information to be visited, and the permission of personnel to be visited is arranged;
The system setup module is used to configure network configuration and the time of subsystems;
The journal displaying module is used to show the normal or abnormal Access Events information of restricted area;
The interface administration module is for being arranged third-party application api interface, including gate inhibition's operate interface and alarm alarm modules.
CN201810236661.2A 2018-03-21 2018-03-21 Personnel monitoring's method and system based on image detection and wireless probe Pending CN108650485A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810236661.2A CN108650485A (en) 2018-03-21 2018-03-21 Personnel monitoring's method and system based on image detection and wireless probe

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810236661.2A CN108650485A (en) 2018-03-21 2018-03-21 Personnel monitoring's method and system based on image detection and wireless probe

Publications (1)

Publication Number Publication Date
CN108650485A true CN108650485A (en) 2018-10-12

Family

ID=63744642

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810236661.2A Pending CN108650485A (en) 2018-03-21 2018-03-21 Personnel monitoring's method and system based on image detection and wireless probe

Country Status (1)

Country Link
CN (1) CN108650485A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109977806A (en) * 2019-03-11 2019-07-05 赛特斯信息科技股份有限公司 Realize the system and method for IDC computer room disengaging personnel's fine-grained management
CN110020612A (en) * 2019-03-18 2019-07-16 杰创智能科技股份有限公司 A kind of identification system based on virtual probe system
CN110288801A (en) * 2019-06-25 2019-09-27 南方电网数字电网研究院有限公司 Electric field video monitoring method, device, computer equipment and storage medium
CN110363118A (en) * 2019-06-28 2019-10-22 珠海优特电力科技股份有限公司 Behavior monitoring method, apparatus, system and the storage medium of target object
CN111491258A (en) * 2020-03-26 2020-08-04 微民保险代理有限公司 Object type detection method and device
CN112153631A (en) * 2019-06-28 2020-12-29 北京奇虎科技有限公司 Method and device for identifying illegal intrusion and router
CN113965901A (en) * 2021-10-22 2022-01-21 山东高速股份有限公司 Expressway tunnel personnel monitoring method based on wireless probe
CN118249517A (en) * 2024-05-21 2024-06-25 国网江西省电力有限公司南昌供电分公司 Wi-Fi probe-based multi-mode substation operation and maintenance management method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105913037A (en) * 2016-04-26 2016-08-31 广东技术师范学院 Face identification and radio frequency identification based monitoring and tracking system
CN106327408A (en) * 2016-11-02 2017-01-11 浙江天地人科技有限公司 Electronic doorplate and house personnel management system
US20170046891A1 (en) * 2015-08-12 2017-02-16 Tyco Fire & Security Gmbh Systems and methods for location identification and tracking using a camera
US20170337431A1 (en) * 2016-05-18 2017-11-23 Canon Kabushiki Kaisha Image processing apparatus and method and monitoring system
CN107529221A (en) * 2017-08-22 2017-12-29 上海兴容信息技术有限公司 A kind of follow-up analysis system and method for combination video monitoring and Wi Fi positioning
CN107547865A (en) * 2017-07-06 2018-01-05 王连圭 Trans-regional human body video frequency object tracking intelligent control method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170046891A1 (en) * 2015-08-12 2017-02-16 Tyco Fire & Security Gmbh Systems and methods for location identification and tracking using a camera
CN105913037A (en) * 2016-04-26 2016-08-31 广东技术师范学院 Face identification and radio frequency identification based monitoring and tracking system
US20170337431A1 (en) * 2016-05-18 2017-11-23 Canon Kabushiki Kaisha Image processing apparatus and method and monitoring system
CN106327408A (en) * 2016-11-02 2017-01-11 浙江天地人科技有限公司 Electronic doorplate and house personnel management system
CN107547865A (en) * 2017-07-06 2018-01-05 王连圭 Trans-regional human body video frequency object tracking intelligent control method
CN107529221A (en) * 2017-08-22 2017-12-29 上海兴容信息技术有限公司 A kind of follow-up analysis system and method for combination video monitoring and Wi Fi positioning

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109977806A (en) * 2019-03-11 2019-07-05 赛特斯信息科技股份有限公司 Realize the system and method for IDC computer room disengaging personnel's fine-grained management
CN110020612A (en) * 2019-03-18 2019-07-16 杰创智能科技股份有限公司 A kind of identification system based on virtual probe system
CN110288801A (en) * 2019-06-25 2019-09-27 南方电网数字电网研究院有限公司 Electric field video monitoring method, device, computer equipment and storage medium
CN110363118A (en) * 2019-06-28 2019-10-22 珠海优特电力科技股份有限公司 Behavior monitoring method, apparatus, system and the storage medium of target object
CN112153631A (en) * 2019-06-28 2020-12-29 北京奇虎科技有限公司 Method and device for identifying illegal intrusion and router
CN110363118B (en) * 2019-06-28 2021-03-19 珠海优特电力科技股份有限公司 Behavior monitoring method, device and system of target object and storage medium
CN111491258A (en) * 2020-03-26 2020-08-04 微民保险代理有限公司 Object type detection method and device
CN113965901A (en) * 2021-10-22 2022-01-21 山东高速股份有限公司 Expressway tunnel personnel monitoring method based on wireless probe
CN113965901B (en) * 2021-10-22 2024-02-13 山东高速股份有限公司 Expressway tunnel personnel monitoring method based on wireless probe
CN118249517A (en) * 2024-05-21 2024-06-25 国网江西省电力有限公司南昌供电分公司 Wi-Fi probe-based multi-mode substation operation and maintenance management method and system
CN118249517B (en) * 2024-05-21 2024-07-26 国网江西省电力有限公司南昌供电分公司 Wi-Fi probe-based multi-mode substation operation and maintenance management method and system

Similar Documents

Publication Publication Date Title
CN108650485A (en) Personnel monitoring's method and system based on image detection and wireless probe
AU2018312581B2 (en) Supervising property access with portable camera
CN109658554B (en) Intelligent residential district security protection system based on big data
CN113033293A (en) Access & exit management equipment, system and method
CN112233300A (en) Community passing epidemic prevention monitoring joint defense system and method based on artificial intelligence
CN111862510A (en) Campus security monitoring system and method based on Internet of things
CN111968016A (en) College epidemic situation cooperative control platform and control method
KR102012672B1 (en) Anti-crime system and method using face recognition based people feature recognition
CN108540750A (en) Based on monitor video and the associated method, apparatus of electronic device identification and system
CN108540751A (en) Monitoring method, apparatus and system based on video and electronic device identification
CN106899827A (en) Image data acquiring, inquiry, video frequency monitoring method, equipment and system
CN106127618A (en) A kind of based on recognition of face, number sensing and the locating and monitoring system of RF identification and method
KR101946317B1 (en) User Identification and Tracking Method Using CCTV System
KR100815920B1 (en) Security system using location data of gps and image data of ccd camera and invader detection method using the same
CA2846624A1 (en) Gps directed intrusion system with data acquisition
CN108600700A (en) A kind of cell video monitoring system
KR101305371B1 (en) Real time location monitoring system and method for transmitting of image data
CN108540756A (en) Recognition methods, apparatus and system based on video and electronic device identification
CN111629184A (en) Video monitoring alarm system and method capable of identifying personnel in monitoring area
CN103519790B (en) Wireless Thermometer System based on community intelligent platform and operation method thereof
CN112784680A (en) Method and system for locking dense contacts in crowded place
CN110689694B (en) Intelligent monitoring system and method based on image processing
CN111192397A (en) Non-inductive identification passing device and identification method based on big data
CN114120597A (en) Public place epidemic situation normalized prevention and control system based on machine vision
JP2012008802A (en) Monitoring system and person specification method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181012

RJ01 Rejection of invention patent application after publication