CN112528322A - Method and device for relieving user equipment control, electronic equipment and storage medium - Google Patents

Method and device for relieving user equipment control, electronic equipment and storage medium Download PDF

Info

Publication number
CN112528322A
CN112528322A CN202011431848.1A CN202011431848A CN112528322A CN 112528322 A CN112528322 A CN 112528322A CN 202011431848 A CN202011431848 A CN 202011431848A CN 112528322 A CN112528322 A CN 112528322A
Authority
CN
China
Prior art keywords
visitor
determining
user equipment
control
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011431848.1A
Other languages
Chinese (zh)
Other versions
CN112528322B (en
Inventor
吴岩
侯怀德
孙中山
潘乐扬
戈东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Skycomm Co ltd
Original Assignee
Shenzhen Skycomm Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Skycomm Co ltd filed Critical Shenzhen Skycomm Co ltd
Priority to CN202011431848.1A priority Critical patent/CN112528322B/en
Publication of CN112528322A publication Critical patent/CN112528322A/en
Application granted granted Critical
Publication of CN112528322B publication Critical patent/CN112528322B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application relates to the technical field of artificial intelligence, and particularly discloses a method and a device for removing management and control of user equipment, electronic equipment and a storage medium, wherein the method for removing management and control of the user equipment comprises the following steps: receiving a management and control release request from the user equipment, the management and control release request being generated by an application installed on the user equipment, the application being used for managing and controlling functions of the user equipment; determining identity information of the visitor according to the management and control release request; determining the position information of the visitor according to the identity information; determining the shortest distance between the visitor and the access place according to the position information, wherein the shortest distance refers to the distance corresponding to the shortest one of the connection lines between the position of the visitor and the boundary of the access place; and if the shortest distance is greater than the threshold value, sending a control releasing command to the user equipment, wherein the control releasing command is used for releasing the control of the application program on the functions of the user equipment.

Description

Method and device for relieving user equipment control, electronic equipment and storage medium
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to a visitor location-based user equipment management and control releasing method and device, electronic equipment and a storage medium.
Background
Due to social needs, there is a group of specific places that need information privacy or strict regulations, which are unavoidable in society, such as: prison, high-confidentiality research room, enterprise core site, etc. However, even in specific places where information is required to be kept secret or strictly regulated, some special access requests cannot be completely rejected.
At present, usually, the visiting journey of the visitor is managed and controlled by a user device for receiving the visitor and a way of dispatching a specially-assigned person for accompanying. Meanwhile, when the visitor is finished and the visitor is confirmed to have no abnormal behavior, the electronic equipment can be handed back and released.
However, at the end of the visitor's visit, there may be cases such as stay, vacation, or return. At this time, no person is accompanied, and no control is performed on the user equipment of the visitor, which is very easy to cause the condition of secret leakage in the specific place.
Disclosure of Invention
In order to solve the above problems in the prior art, embodiments of the present application provide a method, an apparatus, an electronic device, and a storage medium for removing user equipment management and control based on a visitor location, so that after it is determined that a visitor really leaves, management and control of functions of user equipment of the visitor can be removed, and a risk of secret leakage is reduced.
In a first aspect, an embodiment of the present application provides a visitor location-based method for releasing user equipment management and control, including:
receiving a management and control release request from the user equipment, the management and control release request being generated by an application installed on the user equipment, the application being used for managing and controlling functions of the user equipment;
determining identity information of the visitor according to the management and control release request;
determining the position information of the visitor according to the identity information;
determining the shortest distance between the visitor and the access place according to the position information, wherein the shortest distance refers to the distance corresponding to the shortest one of the connection lines between the position of the visitor and the boundary of the access place;
and if the shortest distance is greater than the threshold value, sending a control releasing command to the user equipment, wherein the control releasing command is used for releasing the control of the application program on the functions of the user equipment.
In a second aspect, an embodiment of the present application provides a visitor location-based user equipment control release apparatus, including:
the data receiving module is used for receiving a control releasing request from the user equipment, wherein the control releasing request is generated by an application program installed on the user equipment, and the application program is used for controlling the functions of the user equipment;
the data query module is used for determining the identity information of the visitor according to the management and control removal request and determining the position information of the visitor according to the identity information;
the data processing module is used for determining the shortest distance between the visitor and the access place according to the position information, wherein the shortest distance refers to the distance corresponding to the shortest one of the connection lines between the position of the visitor and the boundary of the access place;
and if the shortest distance is greater than the threshold value, sending a control releasing command to the user equipment, wherein the control releasing command is used for releasing the control of the application program on the user equipment.
In a third aspect, an embodiment of the present application provides an electronic device, including: a processor coupled to the memory, the memory for storing a computer program, the processor for executing the computer program stored in the memory to cause the electronic device to perform the method of the first aspect.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium having a computer program stored thereon, the computer program causing a computer to perform the method according to the first aspect.
In a fifth aspect, embodiments of the present application provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program, the computer operable to cause the computer to perform a method according to the first aspect.
The implementation of the embodiment of the application has the following beneficial effects:
it can be seen that, in the embodiment of the application, after the identity of the visitor is verified, the current location information of the visitor is acquired, and whether to cancel the control on the function of the user equipment is determined based on the shortest distance between the current location of the visitor and the access place. Specifically, when the shortest distance between the visitors and the access place exceeds a preset threshold value, the visitors are judged to really leave, and a control releasing instruction is sent. Therefore, after the fact that the visitor really leaves is determined, the control over the functions of the user equipment of the visitor can be removed, and the risk of secret leakage is reduced. In addition, automatic execution of user equipment management and control removal is achieved, and labor cost is reduced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic flowchart of a method for releasing management and control of a user equipment based on a visitor location according to an embodiment of the present disclosure;
FIG. 2 is a flowchart illustrating a manner of determining location information of a visitor according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of another method for releasing user equipment management and control based on visitor location according to an embodiment of the present disclosure;
fig. 4 is a block diagram illustrating functional modules of a visitor location-based apparatus for releasing user equipment management and control according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments obtained by a person of ordinary skill in the art without any inventive work based on the embodiments in the present application are within the scope of protection of the present application.
The terms "first," "second," "third," and "fourth," etc. in the description and claims of this application and in the accompanying drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, result, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Referring to fig. 1, fig. 1 is a flowchart illustrating a method for releasing user equipment management and control based on visitor location according to an embodiment of the present disclosure. The visitor location-based user equipment control releasing method comprises the following steps:
101: a deregistration request is received from a user device.
In the present embodiment, the regulation release request is generated by an application installed on the user device, and the application is used to regulate the function of the user device.
Illustratively, the user device may be an electronic device such as a mobile phone, a tablet computer, etc. in which an application program may be installed. When a visitor enters a specific place needing information confidentiality or strict control, the application program is downloaded in a two-dimensional code scanning mode, and after registration and identity verification are carried out, the control function of the application program is started, so that the control on the functions of user equipment is realized, and information stealing behaviors such as shooting, sound recording and video recording are prevented.
After the visitor leaves the visiting place after finishing visiting, the application program can submit a control removal request to the system background to request to remove the function control of the user equipment. Of course, the deregistration request may also be submitted in other ways, such as: local area network communication, NFC, and the like, which are not limited in this application.
102: and determining the identity information of the visitor according to the management and control releasing request.
In the embodiment, since the visitor performs registration and authentication operations through the application program at the time of entry access. At this time, the system background records and stores the corresponding registration number and identity information. Therefore, after receiving a management and control release request sent by the user equipment, the identity information of the visitor can be determined by inquiring the visitor database according to the registration number of the application program carried in the management and control release request.
103: and determining the position information of the visitor according to the identity information.
Referring to fig. 2, fig. 2 is a flowchart illustrating a manner of determining location information of a visitor according to an embodiment of the present disclosure. The method for determining the position information of the visitor comprises the following steps:
201: and determining at least one piece of real-time video information according to at least one monitoring camera, and respectively carrying out face recognition processing on each piece of real-time video information in the at least one piece of real-time video information to obtain at least one piece of face data.
In this embodiment, the at least one monitoring camera corresponds to the at least one real-time video information one to one.
Illustratively, a plurality of monitoring cameras are arranged in advance in the area which is possibly passed by the visitor when leaving at the periphery of the visiting place, and the monitoring cameras cover the peripheral area of the whole visiting place. Therefore, no matter how far the visitor leaves, some monitoring cameras can capture the image of the visitor leaving. Meanwhile, each monitoring camera can transmit the shot picture back to the system background in real time, the system background carries out face recognition processing, the face data existing in the system background are extracted and stored in a dynamic face database.
202: and for each face data in the at least one face data, comparing each face data with the face information in the identity information respectively to obtain at least one similarity.
203: and determining face data corresponding to the visitor according to at least one similarity.
In the embodiment, after receiving the control release request, the identity information of the visitor is determined by querying the visitor database, and the face information contained in the identity information is extracted. Then, by comparing the similarity between the face data and the face information in the dynamic face database, if the similarity is greater than a preset threshold, it can be determined that the corresponding face data and the face information are the same person. Therefore, the data of real-time face recognition of the monitoring cameras are stored in a dynamic face database by the background of the system, so that the face information contained in the identity information of the visitor can be quickly compared, the approximate area of the visitor can be quickly positioned, and the efficiency of the user equipment management and control removal processing is further improved.
204: and according to the face data corresponding to the visitor, carrying out face tracking processing in at least one piece of real-time video information to obtain the space coordinates of the visitor in the three-dimensional point cloud space.
In the embodiment, after the face information of the visitor in real-time monitoring is confirmed, the source of the face information is determined, so that the visitor can be determined to be in the shooting range of which monitoring cameras. Therefore, the real-time image of the corresponding monitoring camera is called to carry out face tracking processing, and the real-time image information containing the visitor can be found.
For the spatial coordinates of the visitor in the three-dimensional point cloud space, the three-dimensional point cloud space is generated by scanning the real space through the instant positioning and mapping device in advance. After the three-dimensional point cloud space is generated, an access place is set as an origin, and setting parameters of at least one monitoring camera in a real space are used, for example: the number of the cameras and the positions of the cameras, and at least one virtual camera is arranged at the corresponding position in the three-dimensional point cloud space. The at least one monitoring camera corresponds to the at least one virtual camera one to one.
Therefore, after real-time image information containing the visitor is tracked, the monitoring camera for shooting the real-time image information returns shooting angle information of the visitor, and meanwhile, pixel coordinates of the visitor in the image are obtained through image processing. Therefore, a corresponding scene can be constructed in the three-dimensional point cloud space by integrating the shooting angle information and the pixel coordinates returned by the plurality of monitoring cameras, so that the space coordinates of the visitor in the three-dimensional point cloud space are determined.
205: the spatial coordinates are taken as position information.
104: and determining the shortest distance between the visitor and the visiting place according to the position information.
In the present embodiment, the shortest distance refers to a distance corresponding to the shortest one of the lines connecting the position of the visitor and the boundary of the visiting place. Therefore, whether the visitor really leaves can be more accurately judged, and the user equipment management and control release processing is more accurate.
For example, since a spatial coordinate of a visitor in a three-dimensional point cloud space may be used as the location information, a first distance between the spatial coordinate and the origin may be used as the shortest distance.
In an alternative embodiment, the location request information may also be sent to the user equipment according to the identity information. Then, a GPS signal returned by the user equipment is received, and the position information of the visitor is determined according to the GPS signal.
Thus, by marking the center point of the visit place as the origin, a first coordinate system is established. Then, at least one reference point is determined on the boundary of the access location, which in this embodiment is evenly distributed over the boundary of the access location. For each reference point in the at least one reference point, a first coordinate of each reference point in the first coordinate system is determined, and then a second coordinate of the visitor's location information in the first coordinate system is determined. Finally, for each first coordinate of the at least one first coordinate, a second distance between each first coordinate and the second coordinate is determined, respectively, such that the minimum value of the at least one second distance is taken as the shortest distance.
105: and if the shortest distance is greater than the threshold value, sending a control releasing command to the user equipment.
In the present embodiment, the management release command is used to release the management of the function of the user equipment by the application program.
In summary, the method for releasing management and control of the user equipment based on the visitor location obtains the current location information of the visitor after verifying the identity of the visitor, and determines whether to release management and control of the function of the user equipment based on the shortest distance between the current location of the visitor and the access place. Specifically, when the shortest distance between the visitors and the access place exceeds a preset threshold value, the visitors are judged to really leave, and a control releasing instruction is sent. Therefore, after the fact that the visitor really leaves is determined, the control over the functions of the user equipment of the visitor can be removed, and the risk of secret leakage is reduced. In addition, automatic execution of user equipment management and control removal is achieved, and labor cost is reduced.
The embodiment of the present application further provides another visitor location-based method for releasing management and control of user equipment, as shown in fig. 3, the visitor location-based method for releasing management and control of user equipment includes:
301: a deregistration request is received from a user device.
302: and determining the identity information of the visitor according to the management and control removing request.
303: and determining the position information of the visitor according to the identity information.
304: and predicting the next area where the visitor appears and the appearance time according to the position information.
305: and if the visitor appears in the next predicted area at the predicted appearance time, sending a control releasing command to the user equipment.
For example, in the method for releasing management and control of user equipment based on a visitor location, the processes of receiving a request for releasing management and control, determining identity information of a visitor, and determining location information of the visitor are similar to those of the method for releasing management and control of user equipment based on a visitor location in fig. 1, and are not repeated again.
In the embodiment, the similarity between the face data and the face information in the dynamic face database and the face information corresponding to the visitor are compared, and then after the source of the face information is determined, the real-time image of the corresponding monitoring camera is called to perform face tracking processing, so that the real-time image information containing the visitor is found.
Then, by analyzing the walking direction and walking distance of the visitor in the real-time image information containing the visitor, the area and the appearing time of the visitor appearing later are predicted. And when the time is predicted, calling a monitoring camera in the predicted area, and checking whether the visitor appears. The predicted time can be a time period generated by up-down floating of a preset threshold on the basis of the predicted occurrence time, so that the fault tolerance rate is improved. If the visitor appears, the prediction is continued until the visitor appears in the boundary of the preset monitoring area or the monitoring picture of the external monitoring camera. If the visitor does not exist, determining the current position of the visitor to predict again through face tracking, marking the visitor, and informing personnel in the visiting place. And if the visitor appears in the boundary of the preset monitoring area or the monitoring picture of the external monitoring camera, confirming that the visitor really leaves, and sending a control releasing command to the user equipment of the visitor.
Further, after the management release command is transmitted to the user equipment of the visitor, the face information of the visitor may also be maintained for a period of time. And in the maintenance time, if the visitor appears in the monitoring area again, immediately sending a control command to the user equipment of the visitor and informing personnel in the visiting place. Therefore, the condition that the visitor turns back after the fake suit leaves is avoided.
In summary, according to another method for releasing management and control of user equipment based on visitor location provided by the present invention, after verifying the identity of a visitor, current location information of the visitor is obtained, a next action of the visitor under a normal leaving condition is predicted based on the current location of the visitor, and whether the visitor really leaves is determined according to whether the actual action of the visitor is similar to the predicted next action. Therefore, after the fact that the visitor really leaves is determined, the control over the functions of the user equipment of the visitor can be removed, and the risk of secret leakage is reduced. Meanwhile, automatic execution of user equipment management and control removal is achieved, and labor cost is reduced. In addition, the condition that secret is leaked due to the fact that a visitor turns back additionally after the fake clothes is left is avoided.
Referring to fig. 4, fig. 4 is a block diagram illustrating functional modules of a visitor location-based user equipment release apparatus according to an embodiment of the present disclosure. As shown in fig. 4, the guest location-based user equipment deregistration release apparatus 1 includes:
the data receiving module 11 is configured to receive a control release request from the user equipment, where the control release request is generated by an application installed on the user equipment, and the application is configured to control a function of the user equipment.
And the data query module 12 is used for determining the identity information of the visitor according to the management and control removal request and determining the position information of the visitor according to the identity information.
And the data processing module 13 is configured to determine a shortest distance between the visitor and the access place according to the location information, where the shortest distance is a distance corresponding to a shortest one of connection lines between the location of the visitor and a boundary of the access place. And if the shortest distance is greater than the threshold value, sending a control releasing command to the user equipment, wherein the control releasing command is used for releasing the control of the application program on the user equipment.
In the embodiment of the present invention, in determining the location information of the visitor according to the identity information, the data processing module 13 is specifically configured to:
determining at least one piece of real-time video information according to at least one monitoring camera, and respectively carrying out face recognition processing on each piece of real-time video information in the at least one piece of real-time video information to obtain at least one piece of face data, wherein the at least one monitoring camera corresponds to the at least one piece of real-time video information one to one;
for each face data in at least one face data, comparing each face data with face information in identity information respectively to obtain at least one similarity;
determining face data corresponding to the visitor according to at least one similarity;
according to the face data corresponding to the visitor, face tracking processing is carried out in at least one piece of real-time video information, and the space coordinate of the visitor in the three-dimensional point cloud space is obtained;
the spatial coordinates are taken as position information.
In an embodiment of the invention, the three-dimensional point cloud space is generated by scanning a real space through an instant positioning and mapping device.
In terms of obtaining the space coordinates of the visitor in the three-dimensional point cloud space, the data processing module 13 is specifically configured to:
marking the visit place as an origin of a three-dimensional point cloud space;
acquiring the setting parameters of at least one monitoring camera, wherein the setting parameters comprise: the number of cameras and the positions of the cameras;
setting at least one virtual camera in a three-dimensional point cloud space according to the number and the position of the cameras, wherein at least one monitoring camera corresponds to at least one virtual camera one to one;
determining at least one pixel coordinate of the visitor in at least one piece of real-time video information according to a tracking result of face tracking processing;
and determining the space coordinates of the visitor in the three-dimensional point cloud space according to the at least one pixel coordinate and the at least one virtual camera.
In an embodiment of the present invention, in determining the shortest distance between the visitor and the visiting place according to the location information, the data processing module 13 is specifically configured to:
and determining a first distance between the space coordinate and the origin, and taking the first distance as the shortest distance.
In the embodiment of the present invention, in determining the location information of the visitor according to the identity information, the data processing module 13 is specifically configured to:
sending position request information to the user equipment according to the identity information;
receiving a GPS signal returned by user equipment;
and determining the position information of the visitor according to the GPS signal.
In an embodiment of the present invention, in determining the shortest distance between the visitor and the visiting place according to the location information, the data processing module 13 is specifically configured to:
marking the central point of the access place as an origin point, and establishing a first coordinate system;
determining at least one reference point on the boundary of the visit place, wherein the at least one reference point is uniformly distributed on the boundary of the visit place;
for each reference point in the at least one reference point, respectively determining a first coordinate of each reference point in a first coordinate system;
determining a second coordinate of the position information of the visitor in a first coordinate system;
for each first coordinate in the at least one first coordinate, respectively determining a second distance between each first coordinate and the second coordinate;
and taking the minimum value of the at least one second distance as the shortest distance.
In the embodiment of the present invention, in determining the identity information of the visitor according to the deregulation request, the data query module 12 is specifically configured to:
confirming the registration number of the application program according to the management and control releasing request;
and inquiring a visitor database according to the registration number to determine the identity information of the visitor.
Referring to fig. 5, fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. As shown in fig. 5, the electronic device 500 includes a transceiver 501, a processor 502, and a memory 503. Connected to each other by a bus 504. The memory 503 is used to store computer programs and data, and may transfer the data stored by the memory 503 to the processor 502.
The processor 502 is configured to read the computer program in the memory 503 to perform the following operations:
receiving a regulation release request from the user device, the regulation release request being generated by an application installed on the user device, the application being for regulating a function of the user device.
And determining identity information of the visitor according to the management and control removing request, and determining the position information of the visitor according to the identity information.
And determining the shortest distance between the visitor and the access place according to the position information, wherein the shortest distance refers to the distance corresponding to the shortest one of the connection lines between the position of the visitor and the boundary of the access place. And if the shortest distance is greater than the threshold value, sending a control releasing command to the user equipment, wherein the control releasing command is used for releasing the control of the application program on the user equipment.
In an embodiment of the present invention, in determining location information of a visitor according to identity information, the processor 502 is specifically configured to perform the following operations:
determining at least one piece of real-time video information according to at least one monitoring camera, and respectively carrying out face recognition processing on each piece of real-time video information in the at least one piece of real-time video information to obtain at least one piece of face data, wherein the at least one monitoring camera corresponds to the at least one piece of real-time video information one to one;
for each face data in at least one face data, comparing each face data with face information in identity information respectively to obtain at least one similarity;
determining face data corresponding to the visitor according to at least one similarity;
according to the face data corresponding to the visitor, face tracking processing is carried out in at least one piece of real-time video information, and the space coordinate of the visitor in the three-dimensional point cloud space is obtained;
the spatial coordinates are taken as position information.
In an embodiment of the invention, the three-dimensional point cloud space is generated by scanning a real space through an instant positioning and mapping device.
In terms of obtaining the spatial coordinates of the visitor in the three-dimensional point cloud space, the processor 502 is specifically configured to perform the following operations:
marking the visit place as an origin of a three-dimensional point cloud space;
acquiring the setting parameters of at least one monitoring camera, wherein the setting parameters comprise: the number of cameras and the positions of the cameras;
setting at least one virtual camera in a three-dimensional point cloud space according to the number and the position of the cameras, wherein at least one monitoring camera corresponds to at least one virtual camera one to one;
determining at least one pixel coordinate of the visitor in at least one piece of real-time video information according to a tracking result of face tracking processing;
and determining the space coordinates of the visitor in the three-dimensional point cloud space according to the at least one pixel coordinate and the at least one virtual camera.
In an embodiment of the present invention, in determining the shortest distance between the visitor and the visiting place according to the location information, the processor 502 is specifically configured to perform the following operations:
and determining a first distance between the space coordinate and the origin, and taking the first distance as the shortest distance.
In an embodiment of the present invention, in determining location information of a visitor according to identity information, the processor 502 is specifically configured to perform the following operations:
sending position request information to the user equipment according to the identity information;
receiving a GPS signal returned by user equipment;
and determining the position information of the visitor according to the GPS signal.
In an embodiment of the present invention, in determining the shortest distance between the visitor and the visiting place according to the location information, the processor 502 is specifically configured to perform the following operations:
marking the central point of the access place as an origin point, and establishing a first coordinate system;
determining at least one reference point on the boundary of the visit place, wherein the at least one reference point is uniformly distributed on the boundary of the visit place;
for each reference point in the at least one reference point, respectively determining a first coordinate of each reference point in a first coordinate system;
determining a second coordinate of the position information of the visitor in a first coordinate system;
for each first coordinate in the at least one first coordinate, respectively determining a second distance between each first coordinate and the second coordinate;
and taking the minimum value of the at least one second distance as the shortest distance.
In an embodiment of the present invention, in determining identity information of a guest according to a deregistration request, the processor 502 is specifically configured to perform the following operations:
confirming the registration number of the application program according to the management and control releasing request;
and inquiring a visitor database according to the registration number to determine the identity information of the visitor.
It should be understood that the user equipment control releasing device based on the visitor location in the present application may include a smart Phone (e.g., an Android Phone, an iOS Phone, a Windows Phone, etc.), a tablet computer, a palm computer, a notebook computer, a Mobile Internet device MID (MID), a wearable device, or the like. The apparatus for releasing user equipment management based on visitor location is merely an example, and is not exhaustive, and includes but is not limited to the apparatus for releasing user equipment management based on visitor location. In practical applications, the apparatus for releasing user equipment management and control based on visitor location may further include: intelligent vehicle-mounted terminal, computer equipment and the like.
Through the above description of the embodiments, those skilled in the art will clearly understand that the present invention can be implemented by combining software and a hardware platform. With this understanding in mind, all or part of the technical solutions of the present invention that contribute to the background can be embodied in the form of a software product, which can be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes instructions for causing a computer device (which can be a personal computer, a server, or a network device, etc.) to execute the methods according to the embodiments or some parts of the embodiments.
Accordingly, embodiments of the present application also provide a computer-readable storage medium storing a computer program, the computer program being executed by a processor to implement part or all of the steps of any one of the visitor location-based user equipment deregulation releasing methods as set forth in the above method embodiments. For example, the storage medium may include a hard disk, a floppy disk, an optical disk, a magnetic tape, a magnetic disk, a flash memory, and the like.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the guest location based user equipment deregistration methods as recited in the above method embodiments.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are all alternative embodiments and that the acts and modules referred to are not necessarily required by the application.
In the above embodiments, the description of each embodiment has its own emphasis, and for parts not described in detail in a certain embodiment, reference may be made to the description of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is merely a logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit. The integrated unit may be implemented in the form of hardware, or may be implemented in the form of a software program module.
The integrated units, if implemented in the form of software program modules and sold or used as stand-alone products, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, and the memory may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the methods and their core ideas of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A visitor location-based User Equipment (UE) deregulation method, the method comprising:
receiving a regulation release request from a user device, the regulation release request being generated by an application installed on the user device, the application being for regulating a function of the user device;
determining identity information of the visitor according to the control releasing request;
determining the position information of the visitor according to the identity information;
determining the shortest distance between the visitor and the visiting place according to the position information, wherein the shortest distance refers to the distance corresponding to the shortest one of the connection lines between the position of the visitor and the boundary of the visiting place;
and if the shortest distance is greater than a threshold value, sending a control releasing command to the user equipment, wherein the control releasing command is used for releasing the control of the application program on the functions of the user equipment.
2. The method of claim 1, wherein determining the location information of the visitor based on the identity information comprises:
determining at least one piece of real-time video information according to at least one monitoring camera, and respectively performing face recognition processing on each piece of real-time video information in the at least one piece of real-time video information to obtain at least one piece of face data, wherein the at least one monitoring camera corresponds to the at least one piece of real-time video information one to one;
for each face data in the at least one face data, comparing each face data with face information in the identity information respectively to obtain at least one similarity;
determining face data corresponding to the visitor according to the at least one similarity;
according to the face data corresponding to the visitor, face tracking processing is carried out in the at least one piece of real-time video information, and the space coordinate of the visitor in the three-dimensional point cloud space is obtained;
and taking the space coordinate as the position information.
3. The method of claim 2,
the three-dimensional point cloud space is generated by scanning a real space through instant positioning and map building equipment;
the obtaining of the space coordinates of the visitor in the three-dimensional point cloud space includes:
marking the visit place as an origin of the three-dimensional point cloud space;
acquiring setting parameters of the at least one monitoring camera, wherein the setting parameters comprise: the number of cameras and the positions of the cameras;
setting at least one virtual camera in the three-dimensional point cloud space according to the number of the cameras and the positions of the cameras, wherein the at least one monitoring camera corresponds to the at least one virtual camera one to one;
determining at least one pixel coordinate of the visitor in the at least one piece of real-time video information according to a tracking result of the face tracking processing;
and determining the space coordinates of the visitor in the three-dimensional point cloud space according to the at least one pixel coordinate and the at least one virtual camera.
4. The method of claim 3, wherein determining the shortest distance between the visitor and a visiting location based on the location information comprises:
determining a first distance between the spatial coordinates and the origin;
and taking the first distance as the shortest distance.
5. The method of claim 1, wherein determining the location information of the visitor based on the identity information comprises:
sending position request information to the user equipment according to the identity information;
receiving a GPS signal returned by the user equipment;
and determining the position information of the visitor according to the GPS signal.
6. The method of claim 5, wherein determining the shortest distance between the visitor and a visiting location based on the location information comprises:
marking the central point of the visit place as an origin, and establishing a first coordinate system;
determining at least one reference point on the boundary of the visit place, wherein the at least one reference point is evenly distributed on the boundary of the visit place;
for each reference point of the at least one reference point, respectively determining a first coordinate of each reference point in the first coordinate system;
determining a second coordinate of the visitor's location information in the first coordinate system;
for each first coordinate in at least one first coordinate, respectively determining a second distance between each first coordinate and the second coordinate;
taking the minimum value of at least one second distance as the shortest distance.
7. The method according to claim 1, wherein the determining identity information of the guest according to the deregistration request comprises:
confirming the registration number of the application program according to the management and control releasing request;
and inquiring a visitor database according to the registration number, and determining the identity information of the visitor.
8. An apparatus for releasing user equipment management and control based on visitor location, the apparatus comprising:
a data receiving module, configured to receive a control release request from a user device, where the control release request is generated by an application installed on the user device, and the application is configured to control a function of the user device;
the data query module is used for determining the identity information of the visitor according to the control release request and determining the position information of the visitor according to the identity information;
the data processing module is used for determining the shortest distance between the visitor and the visiting place according to the position information, wherein the shortest distance refers to the distance corresponding to the shortest one of the connection lines between the position of the visitor and the boundary of the visiting place;
and if the shortest distance is greater than a threshold value, sending a control releasing command to the user equipment, wherein the control releasing command is used for releasing the control of the application program on the user equipment.
9. An electronic device comprising a processor, a memory, a communication interface, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the processor, the one or more programs including instructions for performing the steps in the method of any of claims 1-7.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which is executed by a processor to implement the method according to any one of claims 1-7.
CN202011431848.1A 2020-12-09 2020-12-09 User equipment control release method and device, electronic equipment and storage medium Active CN112528322B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011431848.1A CN112528322B (en) 2020-12-09 2020-12-09 User equipment control release method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011431848.1A CN112528322B (en) 2020-12-09 2020-12-09 User equipment control release method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112528322A true CN112528322A (en) 2021-03-19
CN112528322B CN112528322B (en) 2024-07-12

Family

ID=74999775

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011431848.1A Active CN112528322B (en) 2020-12-09 2020-12-09 User equipment control release method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112528322B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007193450A (en) * 2006-01-17 2007-08-02 Sky Kk Reception system
CN107579947A (en) * 2016-07-05 2018-01-12 中兴通讯股份有限公司 A kind of control method, device, server and the mobile terminal of visitor's terminal
CN107958515A (en) * 2017-12-11 2018-04-24 武汉虹信技术服务有限责任公司 A kind of visitor management system to be opened the door based on Quick Response Code and management method
CN108806026A (en) * 2017-05-03 2018-11-13 腾讯科技(深圳)有限公司 The self-service method and system for realizing visiting authentication of visitor
CN109360314A (en) * 2018-10-24 2019-02-19 平安科技(深圳)有限公司 Reserve access method, system, computer equipment and storage medium
CN110415420A (en) * 2019-08-22 2019-11-05 广东鉴面智能科技有限公司 A kind of visitor's intelligent management system and its management method based on recognition of face
CN110599711A (en) * 2019-09-03 2019-12-20 北京小米移动软件有限公司 Doorbell prompt control method and device and storage medium
CN111046725A (en) * 2019-10-24 2020-04-21 宝略科技(浙江)有限公司 Spatial positioning method based on face recognition and point cloud fusion of surveillance video
CN111243145A (en) * 2020-03-15 2020-06-05 腾讯科技(深圳)有限公司 Method, device, medium and electronic equipment for processing visitor information
CN111340998A (en) * 2020-03-11 2020-06-26 淄博职业学院 Intelligent office management system based on face recognition function
CN112040418A (en) * 2020-09-01 2020-12-04 日立楼宇技术(广州)有限公司 Visitor positioning method, visitor positioning device, visitor positioning server, visitor positioning storage medium and visitor positioning system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007193450A (en) * 2006-01-17 2007-08-02 Sky Kk Reception system
CN107579947A (en) * 2016-07-05 2018-01-12 中兴通讯股份有限公司 A kind of control method, device, server and the mobile terminal of visitor's terminal
CN108806026A (en) * 2017-05-03 2018-11-13 腾讯科技(深圳)有限公司 The self-service method and system for realizing visiting authentication of visitor
CN107958515A (en) * 2017-12-11 2018-04-24 武汉虹信技术服务有限责任公司 A kind of visitor management system to be opened the door based on Quick Response Code and management method
CN109360314A (en) * 2018-10-24 2019-02-19 平安科技(深圳)有限公司 Reserve access method, system, computer equipment and storage medium
CN110415420A (en) * 2019-08-22 2019-11-05 广东鉴面智能科技有限公司 A kind of visitor's intelligent management system and its management method based on recognition of face
CN110599711A (en) * 2019-09-03 2019-12-20 北京小米移动软件有限公司 Doorbell prompt control method and device and storage medium
CN111046725A (en) * 2019-10-24 2020-04-21 宝略科技(浙江)有限公司 Spatial positioning method based on face recognition and point cloud fusion of surveillance video
CN111340998A (en) * 2020-03-11 2020-06-26 淄博职业学院 Intelligent office management system based on face recognition function
CN111243145A (en) * 2020-03-15 2020-06-05 腾讯科技(深圳)有限公司 Method, device, medium and electronic equipment for processing visitor information
CN112040418A (en) * 2020-09-01 2020-12-04 日立楼宇技术(广州)有限公司 Visitor positioning method, visitor positioning device, visitor positioning server, visitor positioning storage medium and visitor positioning system

Also Published As

Publication number Publication date
CN112528322B (en) 2024-07-12

Similar Documents

Publication Publication Date Title
CN108885698B (en) Face recognition method and device and server
CN107948592B (en) Method and device for sharing camera and intelligent terminal
JP2022122858A (en) Method for providing information element that enables identification of unauthorized user in restricted area to device
KR101534808B1 (en) Method and System for managing Electronic Album using the Facial Recognition
CN107657219B (en) Face detection method and related product
CN107832598B (en) Unlocking control method and related product
KR101891781B1 (en) Time and attendance management apparatus based on mac address verification and operating method thereof
CN112036242A (en) Face picture acquisition method and device, computer equipment and storage medium
CN112417497A (en) Privacy protection method and device, electronic equipment and storage medium
CN110674834A (en) Geo-fence identification method, device, equipment and computer-readable storage medium
CN111881740A (en) Face recognition method, face recognition device, electronic equipment and medium
CN109800656B (en) Positioning method and related product
CN107563338B (en) Face detection method and related product
CN107832669B (en) Face detection method and related product
CN111432286B (en) Video processing method, device and system
CN110933314B (en) Focus-following shooting method and related product
CN112528322A (en) Method and device for relieving user equipment control, electronic equipment and storage medium
JP6150019B2 (en) Usage control system, personal information management system, and terminal device
CN112188283B (en) Method, device and equipment for cutting video and storage medium
CN114038026A (en) Face recognition method and device
CN110276681B (en) Method and device for developing business
CN109819207B (en) Target searching method and related equipment
CN109785617B (en) Method for processing traffic control information
CN114333098B (en) Night patrol method, night patrol device, electronic equipment and computer readable medium
CN107633180B (en) Data query method and system of public security system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant