CN111882738A - Security management method, security management system, server and readable storage medium - Google Patents

Security management method, security management system, server and readable storage medium Download PDF

Info

Publication number
CN111882738A
CN111882738A CN202010691551.2A CN202010691551A CN111882738A CN 111882738 A CN111882738 A CN 111882738A CN 202010691551 A CN202010691551 A CN 202010691551A CN 111882738 A CN111882738 A CN 111882738A
Authority
CN
China
Prior art keywords
enter
outputting
designated area
student
security management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010691551.2A
Other languages
Chinese (zh)
Inventor
周泊泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Hdcvt Technology Co ltd
Original Assignee
Shenzhen Hdcvt Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Hdcvt Technology Co ltd filed Critical Shenzhen Hdcvt Technology Co ltd
Priority to CN202010691551.2A priority Critical patent/CN111882738A/en
Publication of CN111882738A publication Critical patent/CN111882738A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)

Abstract

The embodiment of the invention relates to the field of security management, and discloses a security management method, a security management system, a server and a readable storage medium. The security management method comprises the following steps: acquiring biological characteristic information of an object to be identified; identifying the identity of the object to be identified according to the biological characteristic information; when the object to be identified is a school student, outputting an instruction for allowing the school student to enter a specified area; and when the object to be identified is a family member, inquiring whether a student associated with the family member reads at home, and if so, outputting an instruction for allowing the family member to enter a specified area. The security management method, the security management system, the server and the readable storage medium provided by the invention can improve the efficiency of receiving and delivering children and improve the safety of students.

Description

Security management method, security management system, server and readable storage medium
Technical Field
The embodiment of the invention relates to the field of security management, in particular to a security management method, a security management system, a server and a readable storage medium.
Background
The delivery of children as an indispensable thing in parents' daily life is currently in the stage of serious lack of relevant security management schemes. In the prior art, parents often go to school doorways directly to receive people when the parents send children, and the parents see children at home to receive the children.
The inventor finds that at least the following problems exist in the prior art: the number of students and parents is large, when the parents receive children, the parents are inconvenient to find the children at home, the efficiency of receiving and delivering the children is high, meanwhile, the risk that the children are received by illegal persons exists, and the safety of the students is low.
Disclosure of Invention
The embodiment of the invention aims to provide a security management method, a security management system, a server and a readable storage medium, which can improve the efficiency of receiving and sending children and improve the safety of students.
In order to solve the above technical problem, an embodiment of the present invention provides a security management method, including: acquiring biological characteristic information of an object to be identified; identifying the identity of the object to be identified according to the biological characteristic information; when the object to be identified is a school student, outputting an instruction for allowing the school student to enter a specified area; and when the object to be identified is a family member, inquiring whether a student associated with the family member reads at home, and if so, outputting an instruction for allowing the family member to enter a specified area.
The embodiment of the invention also provides a security management system, which comprises: acquiring a device and a server; the acquisition device is used for acquiring biological characteristic information of an object to be identified and uploading the biological characteristic information to the server; the server is used for receiving the biological characteristic information sent by the acquisition device and identifying the identity of the object to be identified according to the biological characteristic information; when the object to be identified is a school student, outputting an instruction for allowing the school student to enter a specified area; and when the object to be identified is a family member, inquiring whether a student associated with the family member reads at home, and if so, outputting an instruction for allowing the family member to enter a specified area.
An embodiment of the present invention further provides a server, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the security management method as described above.
The embodiment of the invention also provides a computer readable storage medium, which stores a computer program, and is characterized in that the computer program is executed by a processor to realize the security management method.
Compared with the prior art, the embodiment of the invention obtains the biological characteristic information of the object to be identified; identifying the identity of the object to be identified according to the biological characteristic information; when the object to be identified is a school student, outputting an instruction for allowing the school student to enter a specified area; when the object of waiting to discern is the family, the inquiry with whether the student that the family is correlated with is reading at school, if, then output and allow the family gets into the instruction in appointed region, promptly, judge that the student is reading for the family or the head of a family is reading for the head of a family, just can get into appointed region to avoided idle miscellaneous people etc. to get into appointed region, makeed number in the appointed region still less, more conveniently find own child, improved the efficiency of delivering children, simultaneously, improved student's security.
In addition, before the outputting the instruction for allowing the family member to enter the designated area, the method further comprises: determining whether a student associated with the family member has entered the designated area; and if so, executing the instruction for outputting the family members to enter the designated area. By allowing the family members to enter the designated area only when the students associated with the family members enter the designated area, the problem that the number of people in the designated area is too large due to the fact that parents enter the designated area in advance to wait is avoided.
In addition, the designated area is divided into a plurality of stations, and the outputting allows the native code to read out the instruction entering the designated area, further comprises: outputting a station assigned to the student; after the outputting the instruction for allowing the family member to enter the designated area, the method further comprises the following steps: and outputting the positions of the students associated with the family members. So set up, family members can acquire child's of oneself accurate position to improve the efficiency of looking for child.
In addition, before the outputting the instruction for allowing the family member to enter the designated area, the method further comprises: obtaining a school time of a student associated with the family member; judging whether the current time is within a first preset time period after the school time or not; and if so, executing the instruction for outputting the family members to enter the designated area. By adopting the time-sharing school keeping method, the family members can enter the designated area only in the first preset time period after the family members are school kept, so that the problem that the number of people in the designated area is too many because the family members arrive at the designated area too long in advance is avoided.
In addition, after the obtaining of the biometric information of the object to be recognized, the method further includes: acquiring monitoring information of the designated area; and judging whether unauthorized persons enter or not according to the monitoring information, and if so, triggering an alarm. By the arrangement, the safety of children is improved.
In addition, the acquiring of the biometric information of the object to be recognized specifically includes: shooting a face image of the object to be recognized; the identification of the identity of the object to be identified according to the biological characteristic information specifically comprises: matching the face image with the pre-stored face features; and acquiring identity information of the object to be recognized associated with the successfully matched face features, wherein the identity information of the object to be recognized is read from school or family.
In addition, the security management system further comprises: a monitoring device; the monitoring device is used for acquiring monitoring information of the designated area and uploading the monitoring information to the server; the server is also used for judging whether unauthorized persons enter according to the monitoring information, and if so, an alarm is triggered. By the arrangement, the safety of children is improved.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
Fig. 1 is a flowchart of a security management method according to a first embodiment of the present invention;
fig. 2 is a flowchart of a security management method according to a second embodiment of the present invention;
fig. 3 is a flowchart of a security management method according to a third embodiment of the present invention;
fig. 4 is a flowchart of a security management method according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of a server according to a fifth embodiment of the present invention;
fig. 6 is a schematic structural diagram of a security management system according to a sixth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present application in various embodiments of the present invention. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments.
A first embodiment of the present invention relates to a security management method, and a specific flow is shown in fig. 1, which includes the following steps:
s11: biometric information of an object to be identified is acquired.
In this step, the biometric information may be a face image, a fingerprint image, an iris image, or the like.
In practical applications, before step S11, the method further includes: and establishing a corresponding relation between the biological characteristic data and student information, a corresponding relation between the biological characteristic data and family information and an incidence relation between the family and the student in a database.
S12: and identifying the identity of the object to be identified according to the biological characteristic information.
In this step, the server compares the biometric information with the biometric data in the database, and when the matched biometric data is found in the database, it can be determined whether the object to be identified is a native school student or a family member. When no matching biometric data can be found in the database, the process may be terminated, and optionally, an "unauthorized user cannot enter the area" may be prompted, or biometric information of the object to be identified may be retrieved.
S13: and when the object to be identified is the school student, outputting an instruction for allowing the school student to enter the specified area.
In this step, when the object to be identified is a school student, the server outputs an instruction allowing the school student to enter the designated area to the access control device, and the access control device controls the access control device to open after receiving the instruction allowing the school student to enter the designated area.
S14: and when the object to be identified is the family, judging whether the student associated with the family reads at the school, if so, executing the step S15, and if not, ending the step.
In this step, when the object to be identified is a family, information of a student associated with the family is acquired, and it is determined whether the student associated with the family is reading at home, if so, step S15 is executed, and if not, the process is ended, optionally, an "unauthorized user cannot enter the area" may also be prompted.
S15: and outputting an instruction for allowing the family members to enter the designated area.
In this step, when the student associated with the family member is reading the school, the server outputs an instruction allowing the family member to enter the designated area to the access control device, and the access control device controls the access control device to open after receiving the instruction allowing the family member to enter the designated area.
Compared with the prior art, the embodiment of the invention obtains the biological characteristic information of the object to be identified; identifying the identity of the object to be identified according to the biological characteristic information; when the object to be identified is a school student, outputting an instruction for allowing the school student to enter a specified area; when the object of waiting to discern is the family, the inquiry with whether the student that the family is correlated with is reading at school, if, then output and allow the family gets into the instruction in appointed region, promptly, judge that the student is reading for the family or the head of a family is reading for the head of a family, just can get into appointed region to avoided idle miscellaneous people etc. to get into appointed region, makeed number in the appointed region still less, more conveniently find own child, improved the efficiency of delivering children, simultaneously, improved student's security.
The second embodiment of the invention relates to a security management method. The second embodiment is substantially the same as the first embodiment, and mainly differs therefrom in that: in the second embodiment of the present invention, before the outputting the instruction for allowing the family member to enter the designated area, the method further includes: determining whether a student associated with the family member has entered the designated area; and if so, executing the instruction for outputting the family members to enter the designated area. By allowing the family members to enter the designated area only when the students associated with the family members enter the designated area, the problem that the number of people in the designated area is too large due to the fact that parents enter the designated area in advance to wait is avoided.
As shown in fig. 2, the security management method in this embodiment specifically includes the following steps:
s21: biometric information of an object to be identified is acquired.
S22: and identifying the identity of the object to be identified according to the biological characteristic information.
S23: and when the object to be identified is the school student, outputting an instruction for allowing the school student to enter the specified area.
S24: and when the object to be identified is the family, judging whether the student associated with the family reads at the school, if so, executing the step S25, and if not, ending the step.
S25: and judging whether the students related to the family members enter the designated area, if so, executing the step S26, and if not, ending the step.
In the step, students related to the family members are inquired, whether the time when the students enter the designated area for the last time is within a preset time period or not is judged, and if yes, the students related to the family members are judged to enter the designated area; alternatively, it is identified by the monitoring device whether the student is currently within the designated area.
S26: and outputting an instruction for allowing the family members to enter the designated area.
Optionally, when the object to be identified is a native school student, before outputting the instruction for allowing the native school student to enter the designated area, the method may further include: and obtaining the student release time of the school student, and judging that the current time is within a second preset time period after the student release time, executing the instruction for allowing the school student to enter the appointed area, so as to avoid the problem that the number of students in the appointed area is too large when the school student enters the appointed area in the non-student release time.
Steps S21, S22, S23, S24, and S26 in the present embodiment are similar to steps S11, S12, S13, S14, and S15 in the first embodiment, and are not described again to avoid redundancy.
In practical applications, the designated area may be divided into several stations, and the outputting the instruction for allowing the student to enter the designated area may further include: outputting the station assigned to the student, wherein after outputting the instruction for allowing the family member to enter the designated area, the method further comprises: and outputting the positions of the students associated with the family members. So set up, family members can acquire child's of oneself accurate position to improve the efficiency of looking for child.
The "output station allocated to the student" may specifically be: displaying a map of a designated area on an electronic screen, identifying the stations allocated to the students, and displaying labels of the stations (within the designated area, each station can be divided by a ground indicating line, and each station can be labeled); it is also possible to display only the number of the station on the screen or to report the number of the station by voice.
The "output the standing position of the student associated with the family" may specifically be: displaying a map of a designated area on an electronic screen, identifying the station positions of students related to the family members, and displaying the labels of the station positions (within the designated area, each station position can be divided by a ground indication line, and each station position can be labeled); it is also possible to display only the number of the station on the screen or to report the number of the station by voice.
It should be noted that, the two steps of "outputting an instruction for allowing the student to enter a designated area" and "outputting a station assigned to the student" have no definite precedence relationship, and either one of the steps may be executed first or may be executed simultaneously; the two steps of "outputting an instruction for allowing the family member to enter the designated area" and "outputting the standing position of the student associated with the family member" have no definite precedence relationship, and either one of the steps can be executed first or simultaneously.
Optionally, in the scheme of assigning the station to the student, "determining whether the student associated with the family member has entered the designated area" may be "acquiring a monitoring picture of the station of the student through the monitoring device, identifying whether the student is currently at the station of the student, if so, determining that the student associated with the family member has entered the designated area," and improving the identification efficiency through identification of the monitoring picture in the specific area.
Compared with the prior art, the embodiment of the invention obtains the biological characteristic information of the object to be identified; identifying the identity of the object to be identified according to the biological characteristic information; when the object to be identified is a school student, outputting an instruction for allowing the school student to enter a specified area; when the object to be identified is a family, inquiring whether students associated with the family read by the school, if so, outputting an instruction for allowing the family to enter the designated area, namely judging whether the students read the students by the school or parents read the students by the school, and then entering the designated area, so that the situation that people who are idle and miscellaneous enter the designated area is avoided, the number of people in the designated area is less, the children can be found conveniently, the efficiency of delivering the children is improved, and meanwhile, the safety of the students is improved; and the family members are allowed to enter the designated area only when the students associated with the family members enter the designated area, so that the problem that the number of people in the designated area is too large due to the fact that parents enter the designated area in advance to wait is avoided.
The third embodiment of the invention relates to a security management method. The third embodiment is substantially the same as the first embodiment, and mainly differs therefrom in that: in the third embodiment of the present invention, before the outputting the instruction for allowing the family member to enter the designated area, the method further includes: obtaining a school time of a student associated with the family member; judging whether the current time is within a first preset time period after the school time or not; and if so, executing the instruction for outputting the family members to enter the designated area. By adopting the time-sharing school holding, the family members can enter the designated area only in the first preset time period after the family members have the school, so that the situation that the family members arrive at the designated area too long in advance to cause crowding is avoided.
As shown in fig. 3, the security management method in this embodiment specifically includes the following steps:
s31: biometric information of an object to be identified is acquired.
S32: and identifying the identity of the object to be identified according to the biological characteristic information.
S33: and when the object to be identified is the school student, outputting an instruction for allowing the school student to enter the specified area.
S34: and when the object to be identified is the family, judging whether the student associated with the family reads at the school, if so, executing the step S35, and if not, ending the step.
S35: and acquiring the school time of the students associated with the family members.
Before step S35, the method may further include: the server receives the school time corresponding to each grade sent by the terminal in advance, and step S35 is specifically to obtain the school time of the grade of the student associated with the family, that is, the school time of the student associated with the family.
S36: and judging whether the current time is within a first preset time period after the school time, if so, executing the step S37, and if not, ending the step.
The preset time period may be determined according to the distance from the designated area to the teaching building, for example, the distance from the designated area to the teaching building is 500 meters, and the preset time period may be set to about 5 minutes according to the walking or running speed of the student.
S37: and outputting an instruction for allowing the family members to enter the designated area.
Optionally, when the object to be identified is a school student, before outputting the instruction allowing the school student to enter the designated area, the school student playing time may also be acquired, and the instruction allowing the school student to enter the designated area is executed only when the current time is determined to be within a second preset time period after the school student playing time, so that the problem that the number of people in the designated area is too many when students enter the designated area in non-school time is avoided.
Steps S31, S32, S33, S34, and S37 in the present embodiment are similar to steps S11, S12, S13, S14, and S15 in the first embodiment, and are not described again to avoid redundancy.
In practical applications, the designated area may be divided into several stations, and the outputting the instruction for allowing the student to enter the designated area may further include: outputting the station assigned to the student, wherein after outputting the instruction for allowing the family member to enter the designated area, the method further comprises: and outputting the positions of the students associated with the family members. So set up, family members can acquire child's of oneself accurate position to improve the efficiency of looking for child.
The "output station allocated to the student" may specifically be: displaying a map of a designated area on an electronic screen, identifying the stations allocated to the students, and displaying labels of the stations (within the designated area, each station can be divided by a ground indicating line, and each station can be labeled); it is also possible to display only the number of the station on the screen or to report the number of the station by voice.
The "output the standing position of the student associated with the family" may specifically be: displaying a map of a designated area on an electronic screen, identifying the station positions of students related to the family members, and displaying the labels of the station positions (within the designated area, each station position can be divided by a ground indication line, and each station position can be labeled); it is also possible to display only the number of the station on the screen or to report the number of the station by voice.
It should be noted that, the two steps of "outputting an instruction for allowing the student to enter a designated area" and "outputting a station assigned to the student" have no definite precedence relationship, and either one of the steps may be executed first or may be executed simultaneously; the two steps of "outputting an instruction for allowing the family member to enter the designated area" and "outputting the standing position of the student associated with the family member" have no definite precedence relationship, and either one of the steps can be executed first or simultaneously.
Compared with the prior art, the embodiment of the invention obtains the biological characteristic information of the object to be identified; identifying the identity of the object to be identified according to the biological characteristic information; when the object to be identified is a school student, outputting an instruction for allowing the school student to enter a specified area; when the object to be identified is a family, inquiring whether students associated with the family read by the school, if so, outputting an instruction for allowing the family to enter the designated area, namely judging whether the students read the students by the school or parents read the students by the school, and then entering the designated area, so that the situation that people who are idle and miscellaneous enter the designated area is avoided, the number of people in the designated area is less, the children can be found conveniently, the efficiency of delivering the children is improved, and meanwhile, the safety of the students is improved; moreover, by adopting the time-interval school leaving, the family members can enter the designated area only in the first preset time interval after the family members leave the school, and the situation that the family members arrive at the designated area too long in advance to cause crowding is avoided.
A fourth embodiment of the present invention relates to a security management method. The fourth embodiment is substantially the same as the first embodiment, and mainly differs therefrom in that: in a fourth embodiment of the present invention, the designated area is divided into a plurality of stations, and the outputting allows the native code to read an instruction entering the designated area, and further includes: outputting a station assigned to the student; after the outputting the instruction for allowing the family member to enter the designated area, the method further comprises the following steps: and outputting the positions of the students associated with the family members. So set up, family members can acquire child's of oneself accurate position to improve the efficiency of looking for child.
As shown in fig. 4, the security management method in this embodiment specifically includes the following steps:
s41: biometric information of an object to be identified is acquired.
S42: and identifying the identity of the object to be identified according to the biological characteristic information.
S43: when the object to be identified is a student at the school, an instruction for allowing the student at the school to enter the designated area is output, and a station assigned to the student is output.
In this step, "outputting the station allocated to the student" may specifically be: displaying a map of a designated area on an electronic screen, identifying the stations allocated to the students, and displaying labels of the stations (within the designated area, each station can be divided by a ground indicating line, and each station can be labeled); it is also possible to display only the number of the station on the screen or to report the number of the station by voice.
S44: and when the object to be identified is the family, judging whether the student associated with the family reads at the school, if so, executing the step S15, and if not, ending the step.
S45: and outputting an instruction for allowing the family members to enter the designated area, and outputting the positions of the students associated with the family members.
In this step, "outputting the station of the student associated with the family" may specifically be: displaying a map of a designated area on an electronic screen, identifying the station positions of students related to the family members, and displaying the labels of the station positions (within the designated area, each station position can be divided by a ground indication line, and each station position can be labeled); it is also possible to display only the number of the station on the screen or to report the number of the station by voice.
It should be noted that, the two steps of "outputting an instruction for allowing the student to enter a designated area" and "outputting a station assigned to the student" have no definite precedence relationship, and either one of the steps may be executed first or may be executed simultaneously; the two steps of "outputting an instruction for allowing the family member to enter the designated area" and "outputting the standing position of the student associated with the family member" have no definite precedence relationship, and either one of the steps can be executed first or simultaneously.
Steps S41, S42, and S44 in this embodiment are similar to steps S11, S12, and S14 in the first embodiment, and are not repeated here to avoid redundancy.
Compared with the prior art, the embodiment of the invention obtains the biological characteristic information of the object to be identified; identifying the identity of the object to be identified according to the biological characteristic information; when the object to be identified is a school student, outputting an instruction for allowing the school student to enter a specified area; when the object to be identified is a family, inquiring whether students associated with the family read by the school, if so, outputting an instruction for allowing the family to enter the designated area, namely judging whether the students read the students by the school or parents read the students by the school, and then entering the designated area, so that the situation that people who are idle and miscellaneous enter the designated area is avoided, the number of people in the designated area is less, the children can be found conveniently, the efficiency of delivering the children is improved, and meanwhile, the safety of the students is improved; and by outputting the station positions of the students associated with the family members, the family members can acquire the accurate positions of children at home, so that the efficiency of finding the children is improved.
The steps of the above methods are divided for clarity, and the implementation may be combined into one step or split some steps, and the steps are divided into multiple steps, so long as the same logical relationship is included, which are all within the protection scope of the present patent; it is within the scope of the patent to add insignificant modifications to the algorithms or processes or to introduce insignificant design changes to the core design without changing the algorithms or processes.
A fifth embodiment of the present invention relates to a server 100, as shown in fig. 5, including:
at least one processor 501; and the number of the first and second groups,
a memory 502 communicatively coupled to the at least one processor 501; wherein the content of the first and second substances,
the memory 502 stores instructions executable by the at least one processor 501, the instructions being executable by the at least one processor 501 to enable the at least one processor 501 to perform the above-described method of recommending informational alerts for user top-up.
The memory 502 and the processor 501 are coupled by a bus, which may include any number of interconnected buses and bridges that couple one or more of the various circuits of the processor 501 and the memory 502 together. The bus may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor 501 is transmitted over a wireless medium through an antenna, which further receives the data and transmits the data to the processor 501.
The processor 501 is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And memory 502 may be used to store data used by processor 501 in performing operations.
A fifth embodiment of the present invention relates to a security management system, as shown in fig. 6, including: an acquisition device 200 and a server 100 as described above. The acquiring device 200 is configured to acquire biometric information of an object to be identified, and upload the biometric information to the server 100. The server 100 is configured to receive the biometric information sent by the obtaining apparatus 200, identify the identity of the object to be identified according to the biometric information, output an instruction that allows the native school student to enter a specified area when the object to be identified is a native school student, query whether a student associated with the family student reads the native school when the object to be identified is a family, and output an instruction that allows the family student to enter the specified area if the student associated with the family student reads the native school.
Specifically, the acquisition apparatus 200 may include: the system comprises an image acquisition module, a power management module and a communication module, wherein the image acquisition module is used for acquiring biological characteristic information of students and family members, the power management module is used for supplying power to the image acquisition module and the communication module, and the communication module (which can be 4G/WiFi and the like) is used for transmitting the acquired biological characteristic information to a server.
Optionally, the security management system may further include: monitoring device 300, monitoring device 300 is used for gathering the monitoring information in appointed region to upload to server 100, server 100 still is used for according to the monitoring information judges whether unauthorized personnel get into, if, triggers the warning, so sets up, has improved and has connect child's security.
It should be understood that this embodiment is a system example corresponding to the first embodiment, and may be implemented in cooperation with the first embodiment. The related technical details mentioned in the first embodiment are still valid in this embodiment, and are not described herein again in order to reduce repetition. Accordingly, the related-art details mentioned in the present embodiment can also be applied to the first embodiment.
A seventh embodiment of the present invention relates to a computer-readable storage medium storing a computer program. The computer program realizes the above-described method embodiments when executed by a processor.
That is, as can be understood by those skilled in the art, all or part of the steps in the method for implementing the embodiments described above may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (10)

1. A security management method is characterized by comprising the following steps:
acquiring biological characteristic information of an object to be identified;
identifying the identity of the object to be identified according to the biological characteristic information;
when the object to be identified is a school student, outputting an instruction for allowing the school student to enter a specified area;
and when the object to be identified is a family member, inquiring whether a student associated with the family member reads at home, and if so, outputting an instruction for allowing the family member to enter a specified area.
2. The security management method according to claim 1, wherein before outputting the instruction for allowing the family member to enter the designated area, the method further comprises:
determining whether a student associated with the family member has entered the designated area;
and if so, executing the instruction for outputting the family members to enter the designated area.
3. The security management method of claim 1, wherein the designated area is divided into a plurality of stations, and the outputting allows the native school to read an instruction to enter the designated area, further comprising:
outputting a station assigned to the student;
after the outputting the instruction for allowing the family member to enter the designated area, the method further comprises the following steps:
and outputting the positions of the students associated with the family members.
4. The security management method according to claim 1, wherein before outputting the instruction for allowing the family member to enter the designated area, the method further comprises:
obtaining a school time of a student associated with the family member;
judging whether the current time is within a first preset time period after the school time or not;
and if so, executing the instruction for outputting the family members to enter the designated area.
5. The security management method according to claim 1, wherein after the obtaining of the biometric information of the object to be recognized, the method further comprises:
acquiring monitoring information of the designated area;
and judging whether unauthorized persons enter or not according to the monitoring information, and if so, triggering an alarm.
6. The security management method according to claim 1, wherein the acquiring of the biometric information of the object to be recognized specifically includes:
shooting a face image of the object to be recognized;
the identification of the identity of the object to be identified according to the biological characteristic information specifically comprises:
matching the face image with the pre-stored face features;
and acquiring identity information of the object to be recognized associated with the successfully matched face features, wherein the identity information of the object to be recognized is read from school or family.
7. A security management system, comprising: acquiring a device and a server;
the acquisition device is used for acquiring biological characteristic information of an object to be identified and uploading the biological characteristic information to the server;
the server is used for receiving the biological characteristic information sent by the acquisition device and identifying the identity of the object to be identified according to the biological characteristic information;
when the object to be identified is a school student, outputting an instruction for allowing the school student to enter a specified area;
and when the object to be identified is a family member, inquiring whether a student associated with the family member reads at home, and if so, outputting an instruction for allowing the family member to enter a specified area.
8. The security management system of claim 7, further comprising: a monitoring device;
the monitoring device is used for acquiring monitoring information of the designated area and uploading the monitoring information to the server;
the server is also used for judging whether unauthorized persons enter according to the monitoring information, and if so, an alarm is triggered.
9. A server, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the security management method of any of claims 1 to 6.
10. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the security management method of any one of claims 1 to 6.
CN202010691551.2A 2020-07-17 2020-07-17 Security management method, security management system, server and readable storage medium Pending CN111882738A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010691551.2A CN111882738A (en) 2020-07-17 2020-07-17 Security management method, security management system, server and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010691551.2A CN111882738A (en) 2020-07-17 2020-07-17 Security management method, security management system, server and readable storage medium

Publications (1)

Publication Number Publication Date
CN111882738A true CN111882738A (en) 2020-11-03

Family

ID=73156110

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010691551.2A Pending CN111882738A (en) 2020-07-17 2020-07-17 Security management method, security management system, server and readable storage medium

Country Status (1)

Country Link
CN (1) CN111882738A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114783094A (en) * 2022-04-08 2022-07-22 无锡和风***集成有限公司 Receiving and sending method, receiving and sending device and storage medium
CN115331346A (en) * 2022-08-30 2022-11-11 深圳市巨龙创视科技有限公司 Campus access control management method and device, electronic equipment and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101848217A (en) * 2010-05-10 2010-09-29 黄焰 Electronic conference plate system based on ZigBee wireless technology network
CN106683027A (en) * 2017-03-17 2017-05-17 北京中矿赛力贝特科技有限公司 Management system for safely picking up and sending pupils and operation method
US9666073B1 (en) * 2016-03-08 2017-05-30 Paking Technology, Inc. Innovated smart parking assistance system and information system
CN206961186U (en) * 2017-03-17 2018-02-02 北京中矿赛力贝特科技有限公司 A kind of pupil's ensuring pick-up safety management system
CN108720389A (en) * 2018-05-28 2018-11-02 铜陵学院 A kind of system and method for seat management
CN108830981A (en) * 2018-05-23 2018-11-16 马惠星 A kind of intelligence towards campus administration picks system
CN108932778A (en) * 2018-07-13 2018-12-04 安徽灵图壹智能科技有限公司 A kind of block chain recognition of face campus connects student system and its method
CN108986530A (en) * 2018-08-01 2018-12-11 平安科技(深圳)有限公司 Parking stall management method, device and computer readable storage medium
CN110009789A (en) * 2019-04-18 2019-07-12 广东德融汇科技有限公司 System is picked in a kind of kindergarten, the middle and primary schools campus based on biological identification technology
CN110751774A (en) * 2019-11-05 2020-02-04 杜明利 Location sharing system based on intra-block security verification and wireless positioning

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101848217A (en) * 2010-05-10 2010-09-29 黄焰 Electronic conference plate system based on ZigBee wireless technology network
US9666073B1 (en) * 2016-03-08 2017-05-30 Paking Technology, Inc. Innovated smart parking assistance system and information system
CN106683027A (en) * 2017-03-17 2017-05-17 北京中矿赛力贝特科技有限公司 Management system for safely picking up and sending pupils and operation method
CN206961186U (en) * 2017-03-17 2018-02-02 北京中矿赛力贝特科技有限公司 A kind of pupil's ensuring pick-up safety management system
CN108830981A (en) * 2018-05-23 2018-11-16 马惠星 A kind of intelligence towards campus administration picks system
CN108720389A (en) * 2018-05-28 2018-11-02 铜陵学院 A kind of system and method for seat management
CN108932778A (en) * 2018-07-13 2018-12-04 安徽灵图壹智能科技有限公司 A kind of block chain recognition of face campus connects student system and its method
CN108986530A (en) * 2018-08-01 2018-12-11 平安科技(深圳)有限公司 Parking stall management method, device and computer readable storage medium
CN110009789A (en) * 2019-04-18 2019-07-12 广东德融汇科技有限公司 System is picked in a kind of kindergarten, the middle and primary schools campus based on biological identification technology
CN110751774A (en) * 2019-11-05 2020-02-04 杜明利 Location sharing system based on intra-block security verification and wireless positioning

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114783094A (en) * 2022-04-08 2022-07-22 无锡和风***集成有限公司 Receiving and sending method, receiving and sending device and storage medium
CN115331346A (en) * 2022-08-30 2022-11-11 深圳市巨龙创视科技有限公司 Campus access control management method and device, electronic equipment and storage medium
CN115331346B (en) * 2022-08-30 2024-02-13 深圳市巨龙创视科技有限公司 Campus access control management method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US8928483B2 (en) Automated attendance tracking and event notification
CN109017344B (en) Charging pile automatic authentication method
CN103473826B (en) Register method, system and server automatically in a kind of classroom based on wifi
JP4660391B2 (en) Target person management system
CN111882738A (en) Security management method, security management system, server and readable storage medium
KR101425345B1 (en) An authentication method of an electronic attendance system with smart devices using wi-fi beacon frames
WO2007075076A1 (en) System and method for supporting lecture room on the basis of ubiquitous
US9836901B2 (en) Method of managing student arrival and student dismissal
CN108564674A (en) A kind of intelligent attendance system based on comprehensive identification
CN104519460A (en) Kindergarten monitoring system
CN105894600A (en) Method, device and system for checking attendance
JP2015022439A (en) Search controller, search control method, and program
CN110620988B (en) Information reporting method, device and equipment
CN109829995A (en) A kind of recognition of face classroom is registered system
CN205862590U (en) A kind of break in traffic rules and regulations monitoring system
US20190114594A1 (en) Attendance status management apparatus, attendance status management method, and non-transitory computer readable medium storing attendance status management program
CN107705576A (en) Vehicle fake-license detection method, server and storage medium
KR20160030431A (en) Attendance recognition system and attendance recognition method
KR101845692B1 (en) Method for Providing Location Based Off-line Lecture Management Service, and Managing Server Used Therein
CN106780806A (en) A kind of classroom exchange method based on biological information identification
KR20150094921A (en) Using a short-range communications capabilities Xidstory attendance app and check how
CN103310497A (en) Automatic attendance checking system and method
CN115206541A (en) Health code travel card real-time display method and system and old man machine
CN210428587U (en) Intelligent access control system applied to school parent receiving and sending
US11436885B2 (en) In-vehicle intelligent access control system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201103

RJ01 Rejection of invention patent application after publication