CN113112744A - Security management method and device, electronic equipment and storage medium - Google Patents

Security management method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113112744A
CN113112744A CN202110272346.7A CN202110272346A CN113112744A CN 113112744 A CN113112744 A CN 113112744A CN 202110272346 A CN202110272346 A CN 202110272346A CN 113112744 A CN113112744 A CN 113112744A
Authority
CN
China
Prior art keywords
preset
monitoring
target image
monitoring processing
initial target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110272346.7A
Other languages
Chinese (zh)
Inventor
邓练兵
逯明
欧阳可佩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Dahengqin Technology Development Co Ltd
Original Assignee
Zhuhai Dahengqin Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Dahengqin Technology Development Co Ltd filed Critical Zhuhai Dahengqin Technology Development Co Ltd
Priority to CN202110272346.7A priority Critical patent/CN113112744A/en
Publication of CN113112744A publication Critical patent/CN113112744A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/30Determination of transform parameters for the alignment of images, i.e. image registration
    • G06T7/33Determination of transform parameters for the alignment of images, i.e. image registration using feature-based methods
    • G06T7/337Determination of transform parameters for the alignment of images, i.e. image registration using feature-based methods involving reference images or patches
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B7/00Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
    • G08B7/06Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/30Subject of image; Context of image processing
    • G06T2207/30232Surveillance

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Theoretical Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

The application provides a security management method and device, electronic equipment and a storage medium, wherein a security management platform comprises monitoring acquisition equipment and monitoring processing equipment, the monitoring acquisition equipment is used for acquiring a monitoring video of a preset area, and the method comprises the following steps: the method comprises the steps that monitoring processing equipment of a security management platform obtains an initial target image which is extracted based on a monitoring video and accords with a first preset alarm condition; the monitoring processing equipment judges whether the initial target image meets a second preset alarm condition or not; if yes, sending a first alarm signal; according to the embodiment of the application, different monitoring acquisition devices can be set for different areas, different first preset alarm conditions and different second preset alarm conditions are set for different monitoring acquisition devices, and under the condition that the alarm conditions are met, the security management platform automatically sends out alarm signals, the safety and stability of the areas are ensured, and refined security management is realized.

Description

Security management method and device, electronic equipment and storage medium
Technical Field
The application relates to the technical field of security, in particular to a security management method and device, electronic equipment and a storage medium.
Background
In recent years, effective campus management has become an important means for promoting the health development of a campus, and with the continuous development of the campus, the traditional management mode is not suitable for the requirement of rapid development of the campus. The construction of wisdom garden is not only scientific and technological development's must, and informationization, intellectuality, wisdom are in bringing the great progress of management for the garden, and originally the garden management operation and for the angle that the park enterprise provides high-quality service that parks in, the park enterprise provides high-quality garden service through advanced scientific and technological product, also has brought the huge change of life style for the personnel who live in the garden and work simultaneously.
More and more large-scale parks advance to reside in the core region that each big city population is complicated, and novel garden gradually to opening first, the pluralism transformation, its personnel intensity and complexity far exceed traditional enterprise garden. Among the prior art, the security protection management in garden is more extensive, and the inside personnel of garden come in and go out, the perimeter management all supervises through security personnel, has drawbacks such as inefficiency, slow, the hourglass is many of reaction, can't satisfy newly-built garden and the demand that old garden reformed transform.
Disclosure of Invention
In view of the above problems, the present application is proposed to provide a security management method and apparatus, an electronic device, and a storage medium that overcome or at least partially solve the above problems, including:
a security management method is applied to a security management platform, the security management platform comprises monitoring acquisition equipment and monitoring processing equipment, and the monitoring acquisition equipment is used for acquiring monitoring videos of a preset area; the method comprises the following steps:
the monitoring processing equipment acquires an initial target image which is extracted based on the monitoring video and accords with a first preset alarm condition;
the monitoring processing equipment judges whether the initial target image meets a second preset alarm condition or not;
and the monitoring processing equipment sends out a first alarm signal when the initial target image meets the second preset alarm condition.
Optionally, the preset area includes a preset boundary; the monitoring processing equipment acquires an initial target image which is extracted based on the monitoring video and accords with a first preset alarm condition, and the method comprises the following steps:
the monitoring processing equipment receives the initial target image sent by the monitoring equipment, wherein the monitoring acquisition equipment is used for judging whether a moving target crossing the preset boundary exists in the monitoring video; when the moving target exists, extracting a picture or a video clip containing the moving target from the monitoring video as the initial target image;
or, the monitoring processing device acquires an initial target image which is extracted based on the monitoring video and accords with a first preset alarm condition, and the method comprises the following steps:
the monitoring processing equipment acquires the monitoring video from the monitoring acquisition equipment;
the monitoring processing equipment judges whether a moving object crossing the preset boundary exists in the monitoring video or not;
if so, the monitoring processing equipment extracts a picture or a video clip containing the moving target from the monitoring video to serve as the initial target image.
Optionally, the determining, by the monitoring processing device, whether the initial target image meets the second preset alarm condition includes:
the monitoring processing equipment acquires a time point when the moving target crosses the preset boundary;
the monitoring processing equipment judges whether the time point is within a preset time period or not;
if not, the monitoring processing equipment judges that the initial target image meets the second preset alarm condition.
Optionally, the determining, by the monitoring processing device, whether the initial target image meets the second preset alarm condition includes:
the monitoring processing equipment acquires the time length of the moving target staying in an area on one side of the preset boundary after the moving target crosses the preset boundary;
the monitoring processing equipment judges whether the time length exceeds a preset time length or not;
and if so, the monitoring processing equipment judges that the initial target image meets the second preset alarm condition.
Optionally, the determining, by the monitoring processing device, whether the initial target image meets the second preset alarm condition includes:
the monitoring processing equipment extracts the target characteristic information of the moving target from the initial target image;
the monitoring processing equipment acquires a preset characteristic information set containing an object with the cross-domain preset boundary authority;
the monitoring processing equipment searches preset characteristic information matched with the target characteristic information set from the preset characteristic information set;
if the initial target image is not found, the monitoring processing equipment judges that the initial target image meets the second preset alarm condition.
Optionally, the determining, by the monitoring processing device, whether the initial target image meets the second preset alarm condition includes:
the monitoring processing equipment acquires the number of objects with the same type as the moving object in the initial target image;
the monitoring processing equipment judges whether the number of the objects is within a corresponding preset number range;
if not, the monitoring processing equipment judges that the initial target image meets the second preset alarm condition.
Optionally, the monitoring processing device sends out a first alarm signal when the initial target image meets the second preset alarm condition, and further includes:
the monitoring processing equipment generates an alarm instruction when the initial target image meets the second preset alarm condition;
the monitoring processing equipment generates the alarm instruction to the monitoring acquisition equipment so that the monitoring acquisition equipment sends out a second alarm signal according to the alarm instruction.
A security management device is applied to a security management platform, the security management platform comprises monitoring acquisition equipment and monitoring processing equipment, and the monitoring acquisition equipment is used for acquiring a monitoring video of a preset area; the monitoring processing device includes:
the acquisition module is used for acquiring an initial target image which is extracted based on the monitoring video and accords with a first preset alarm condition;
the judging module is used for judging whether the initial target image meets a second preset alarm condition or not;
and the alarm module is used for sending out a first alarm signal when the initial target image meets the second preset alarm condition.
Optionally, the preset area includes a preset boundary; the monitoring and collecting device further comprises:
the first judgment module is used for judging whether a moving object crossing the preset boundary exists in the monitoring video or not;
the first extraction module is configured to, if a moving object crossing the preset boundary exists in the surveillance video, extract a picture or a video segment including the moving object from the surveillance video as the initial target image, and send the initial target image to the surveillance processing device.
Optionally, the preset area includes a preset boundary; the acquisition module is specifically configured to:
acquiring the monitoring video from the monitoring acquisition equipment; judging whether a moving object crossing the preset boundary exists in the monitoring video or not; if a moving object crossing the preset boundary exists in the monitoring video, extracting a picture or a video clip containing the moving object from the monitoring video as the initial object image.
Optionally, the determining module includes:
the time point acquisition module is used for acquiring the time point when the moving target crosses the preset boundary;
the time point judging module is used for judging whether the time point is positioned in a preset time period or not;
and the first judging module is used for judging that the initial target image meets the second preset alarm condition if the time point is not within a preset time period.
Optionally, the determining module includes:
the duration acquisition module is used for acquiring the duration of the moving object staying in an area on one side of the preset boundary after the moving object crosses the preset boundary;
the time length judging module is used for judging whether the time length exceeds a preset time length or not;
and the second judgment module is used for judging that the initial target image meets the second preset alarm condition if the duration exceeds the preset duration.
Optionally, the determining module includes:
the information extraction module is used for extracting target characteristic information of the moving target from the initial target image;
the information acquisition module is used for acquiring a preset characteristic information set containing an object with the cross-domain preset boundary authority;
the information matching module is used for searching preset characteristic information matched with the target characteristic information set from the preset characteristic information set;
and the third judging module is used for judging that the initial target image meets the second preset alarm condition if preset characteristic information matched with the target characteristic information set cannot be searched in the preset characteristic information set.
Optionally, the determining module includes:
the quantity obtaining module is used for obtaining the quantity of objects in the initial target image, wherein the types of the objects are the same as those of the moving target;
the quantity judging module is used for judging whether the quantity of the objects is within a corresponding preset quantity range or not;
and the fourth judging module is used for judging that the initial target image meets the second preset alarm condition if the number of the objects is not within the corresponding preset number range.
Optionally, the alarm module further includes:
the instruction generating module is used for generating an alarm instruction when the initial target image meets the second preset alarm condition;
and the instruction sending module is used for sending the alarm instruction to the monitoring acquisition equipment so that the monitoring acquisition equipment sends a second alarm signal according to the alarm instruction.
An electronic device comprising a processor, a memory and a computer program stored on the memory and capable of running on the processor, the computer program, when executed by the processor, implementing the steps of the security management method as described above.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the security management method as set forth above.
The application has the following advantages:
in the embodiment of the application, monitoring acquisition equipment of a security management platform is used for acquiring a monitoring video of a preset area, and monitoring processing equipment of the security management platform acquires an initial target image which is extracted based on the monitoring video and accords with a first preset alarm condition; the monitoring processing equipment judges whether the initial target image meets a second preset alarm condition or not; if yes, sending a first alarm signal; according to the embodiment of the application, different monitoring acquisition devices can be set for different areas, different first preset alarm conditions and different second preset alarm conditions are set for different monitoring acquisition devices or different areas, under the condition that the alarm conditions are met, the security management platform automatically sends out alarm signals, the safety and the stability of the areas are ensured, and refined security management is realized.
Drawings
In order to more clearly illustrate the technical solutions of the present application, the drawings needed to be used in the description of the present application will be briefly introduced below, and it is apparent that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive labor.
Fig. 1 is a schematic diagram of an operation service platform provided in an embodiment of the present application;
fig. 2 is a flowchart illustrating steps of a security management method according to an embodiment of the present application;
fig. 3 is a block diagram of a security management apparatus according to an embodiment of the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, a schematic diagram of an operation service platform provided by an embodiment of the present application is shown, which may include a security management platform, an easy-to-bring business platform, a property management platform, an enterprise service platform, a personal service platform, and the like, where the security management platform may provide a functional service for scheduling and managing various security monitoring devices inside a campus; the easy-to-recruit platform can provide functional services such as customer management, opportunity management, order management, house source management, statistical analysis and the like; the property management platform can provide functional services such as property maintenance, article release, decoration service, meeting room application, reporting, indoor cleaning, regular bus reservation, cartoon application and the like; the enterprise service platform can provide functional services such as a service category list, a user-defined form, a user-defined flow state, a service list, a newly added document, all documents and the like; the personal service platform can provide functional services such as campus activities, campus topics and campus life, and the like, and the application is not limited to the services.
The operation service platform adopts a high availability technology to ensure that the system can stably and uninterruptedly operate for a long time, and adopts popular, mature, stable and advanced system software platforms such as an operating system, a database, a network protocol, middleware and the like, so that the platform can be timely and quickly recovered when a problem occurs in a network, a host, the database or an application system, and the stability of the system is ensured. In addition, in the aspect of application system design, various possible conditions are fully considered, corresponding technical measures are taken, system faults are reduced as far as possible, and the system has a monitoring function on main links.
In terms of logical structure, the operation service platform can be composed of business applications and basic databases. Meanwhile, the parts can be respectively supported by park service, security management, property management, customer management, system analysis, system setting, general functions, technical platform databases and the like, and the parts form an organic whole together, so that individuation and depth of business functions are guaranteed, and open and extensible general functions are provided to meet future development.
Referring to fig. 2, a security management method provided in an embodiment of the present application is shown, where the method may be applied to a security management platform in an operation service platform, where the security management platform includes a monitoring acquisition device and a monitoring processing device.
Wherein, the monitoring acquisition equipment can be installed according to actual need, including installation quantity and mounted position. Each monitoring and collecting device is used for collecting monitoring videos of a preset area. The monitoring acquisition equipment is in communication connection with the monitoring processing equipment. The monitoring processing device can be used for correspondingly processing the monitoring videos acquired by the monitoring acquisition devices so as to determine whether the violation phenomenon exists in the preset area monitored by the monitoring acquisition devices.
In the embodiment of the present application, the method may specifically include the following steps:
step 201, the monitoring processing device obtains an initial target image which is extracted based on the monitoring video and accords with a first preset alarm condition.
A plurality of monitoring acquisition devices can be arranged in the park, each monitoring acquisition device is used for carrying out video monitoring on the corresponding preset area, and the monitoring acquisition devices can acquire the monitoring video of the preset area in real time or at regular time. The situation of the monitored area can be known through the monitoring video, and once the violation event is found, response and processing can be carried out in time.
The violation events corresponding to different areas can be the same or different; and may correspond to at least one violation event within the same area.
After the monitoring acquisition equipment acquires the monitoring video of a preset area, the monitoring video can be correspondingly processed, whether an initial target image meeting a first preset alarm condition exists in the monitoring video or not is judged, if yes, the initial target image is extracted from the monitoring video, wherein the first preset alarm condition can be set according to actual conditions, the first preset alarm conditions corresponding to different areas can be different, and the same area can correspond to a plurality of first preset alarm conditions; the initial target image may be a picture or a video clip.
It is understood that the initial target image meets the first preset alarm condition, i.e., the necessary condition that a specific violation event exists in the initial target image. The complete monitoring video collected by the monitoring and collecting device is subjected to primary filtering through the first preset alarm condition to obtain an initial target image, and then the initial target image is subjected to secondary filtering through the later second preset alarm condition, so that the total calculated amount can be reduced, and the response speed is improved.
It should be noted that the process of processing the monitoring video to obtain the initial target image may be executed in the monitoring acquisition device, may also be executed in the monitoring processing device, and may also be executed in a device other than the monitoring acquisition device and the monitoring processing device, where the other device may obtain the monitoring video from the monitoring acquisition device, and may send the processed initial target image to the monitoring processing device.
Optionally, when the monitoring and collecting device extracts the initial target image from the monitoring video, the monitoring and collecting device may send an initial alarm signal to prompt the relevant personnel in the monitored area, and at this time, an illegal event may exist, so that the relevant personnel can perform troubleshooting in time.
In practical application, security management is generally required to be performed on a specific area, a preset boundary is arranged on the specific area, and monitoring management is required to be performed on personnel or articles crossing the preset boundary.
For example, security management needs to be carried out on the periphery of a park, a warning line or an entrance guard is arranged on the periphery, and when people or articles cross the warning line or the entrance guard, the monitoring and acquisition equipment can carry out alarm and grab pictures.
For another example, security management needs to be performed on a key area, the key area is associated with a preset target object, the preset target object may be a specific person or a specific article, for example, in a workshop for producing a product with explosiveness, inflammability or other characteristics, the workshop needs to be monitored in key, it is ensured that a specific supervisor or a specific article in the workshop cannot leave the workshop or cannot leave a certain range, and when a person or an article leaves in an illegal manner, the monitoring and collecting device can perform alarm capture.
If the specific area needs to be subjected to security management, the specific area is associated with the preset object type, and the object quantity of the specific area associated with the preset object type is ensured to meet certain requirements; for example, a specific area in which the number of people or the number of vehicles needs to be controlled is associated with a preset object type, namely, a person or a vehicle; when a person or a vehicle leaves or enters the specific area, the number of objects of the preset object type associated with the specific area is influenced, so that when the person or the vehicle leaves or enters the specific area, the monitoring equipment can perform alarm image capturing.
Therefore, in an example of the present application, the preset area includes a preset boundary, and the first preset alarm condition may be that a moving object crossing the preset boundary exists in the monitoring video; the above-mentioned monitoring processing equipment obtains the initial target image that accords with first preset alarm condition based on the surveillance video draws, includes:
the monitoring processing equipment receives the initial target image sent by the monitoring equipment, wherein the monitoring acquisition equipment is used for judging whether a moving target crossing the preset boundary exists in the monitoring video; when the moving target exists, extracting a picture or a video clip containing the moving target from the monitoring video as the initial target image.
In a specific implementation, the monitoring acquisition device may determine a moving object according to changes of images of adjacent video frames of the monitoring video, and monitor whether the moving object has a behavior of crossing a preset boundary, and if so, take a video segment associated with the moving object crossing the preset boundary as an initial target image, or extract one or more video frames from the video segment associated with the moving object crossing the preset boundary as the initial target image.
When the process of extracting the initial target image is executed by the monitoring processing device, the monitoring processing device acquires the initial target image which is extracted based on the monitoring video and accords with a first preset alarm condition, and the process comprises the following steps:
the monitoring processing equipment acquires the monitoring video from the monitoring acquisition equipment;
the monitoring processing equipment judges whether a moving object crossing the preset boundary exists in the monitoring video or not;
if so, the monitoring processing equipment extracts a picture or a video clip containing the moving object crossing the preset boundary from the monitoring video to serve as the initial object image.
The process of extracting the initial target image from the surveillance video by the surveillance processing device is similar to the process of extracting the initial target image from the surveillance video by the surveillance acquisition device, and reference may be made to the above description, which is not repeated herein.
In step 203, the monitoring processing device determines whether the initial target image meets a second preset alarm condition.
And 204, the monitoring processing equipment sends out a first alarm signal when the initial target image meets the second preset alarm condition.
In the embodiment of the application, the monitoring processing device can perform secondary judgment on the initial target image meeting the first preset alarm condition, that is, judge whether the initial target image meets the second preset alarm condition; when the initial target image accords with the second preset alarm condition, the illegal event exists in the initial target image, and the first alarm signal is sent out at the moment to prompt related security personnel to intervene, so that the perimeter precaution alarm accuracy rate can be improved, and the false alarm condition is effectively prevented.
In practical application, when security management is performed, a preset time period can be set to allow all people or articles to cross a preset boundary. For example, 12 per day: 00-13: 00 as a preset time period, or a legal holiday time as a preset time period. It will be appreciated that when a person or item does not cross a preset boundary within a preset time period, an alarm needs to be triggered. Therefore, the above monitoring and processing device determining whether the initial target image meets the second preset alarm condition may include:
the monitoring processing equipment acquires a time point when the moving target crosses the preset boundary;
the monitoring processing equipment judges whether the time point is within a preset time period or not;
if not, the monitoring processing equipment judges that the initial target image meets the second preset alarm condition.
It should be noted that the preset time period may be set according to actual needs, and may include a case where the preset time period is 0, that is, when the preset time period is 0, it indicates that the person or the article is not allowed to cross the preset boundary at any time.
Optionally, when security management is performed, a preset time period may be set, and after all people or articles are allowed to cross a preset boundary, the people or articles stay in a corresponding area for the preset time period, that is, after a moving object crosses the preset boundary, if the stay time in the corresponding area exceeds the preset time period, an alarm needs to be triggered. Therefore, the above monitoring and processing device determining whether the initial target image meets the second preset alarm condition may include:
the monitoring processing equipment acquires the time length of the moving target staying in an area on one side of the preset boundary after the moving target crosses the preset boundary;
the monitoring processing equipment judges whether the time length exceeds a preset time length or not;
and if so, the monitoring processing equipment judges that the initial target image meets the second preset alarm condition.
It should be noted that the preset time period may be set according to actual needs, and may include a case where the preset time period is 0, that is, when the preset time period is 0, it indicates that the person or the article is not allowed to cross the preset boundary.
For example, when monitoring and managing an external object, when the retention time of an external person or article in a certain area is too long, an alarm can be triggered, so that an external vehicle or visitor is prevented from being retained in a specific area for a long time, and the safety of the area or the person is guaranteed.
Furthermore, when security management is carried out, only when people or articles crossing the preset boundary do not have access rights, an alarm is triggered. Therefore, the above monitoring and processing device determining whether the initial target image meets the second preset alarm condition may further include:
the monitoring processing equipment extracts the target characteristic information of the moving target from the initial target image;
the monitoring processing equipment acquires a preset characteristic information set containing an object with the cross-domain preset boundary authority;
the monitoring processing equipment searches preset characteristic information matched with the target characteristic information set from the preset characteristic information set;
if the initial target image is not found, the monitoring processing equipment judges that the initial target image meets the second preset alarm condition.
In this example, the monitoring processing device may obtain a preset feature information set of an object having an authority to cross a preset boundary corresponding to a preset region in advance, extract target feature information of the moving target from the initial target image, compare the target feature information with preset feature information in the preset feature information set to determine whether the moving target has a corresponding authority, and alarm when the moving target does not have a corresponding authority.
Optionally, when security management is performed, a preset object type may be set according to actual requirements of a preset area, and the number of objects of the object type is regulated to meet a certain number requirement, after a moving object crosses a preset boundary, the number of objects of the object type corresponding to the moving object in the preset area may be affected, and when the number of objects of the object type corresponding to the moving object in the preset area does not meet a preset number range, an alarm needs to be triggered. Therefore, the above monitoring and processing device determining whether the initial target image meets the second preset alarm condition may include:
the monitoring processing equipment judges the number of objects with the same type as the moving object in the initial target image;
the monitoring processing equipment judges whether the number of the objects is within a corresponding preset number range;
if not, the monitoring processing equipment judges that the initial target image meets the second preset alarm condition.
In this example, the monitoring processing device may obtain a preset number range of each preset object type associated with the preset area in advance, determine whether the type of the moving object in the initial target image is the preset object type associated with the preset area, and if not, directly determine that the initial target image does not meet a second preset alarm condition; if yes, further obtaining the number of objects in the preset area, which are the same as the type of the moving object, comparing the number of the objects with the corresponding preset number range, and triggering an alarm when the number of the objects is lower than or higher than the preset number range.
When the type of the moving target is a vehicle, the number of the objects in the preset area, which are the same as the type of the moving target, is obtained, and the number of the vehicles in the preset area can be obtained in a mode of combining vehicle identification and number statistics; when the type of the moving target is a person, the number of the objects in the preset area, which are the same as the type of the moving target, can be obtained, and the number of the persons in the preset area can be obtained in a mode of combining human body recognition and number statistics.
In an optional embodiment, the security management method may further monitor a specific target object, where the specific target object may be a person; for example, when a person is in a static state for more than a certain time, the person is considered to be possibly dangerous, and an alarm is triggered to timely rescue the person in case of coma and the like. For another example, in the equipment inspection scene, aiming at the inspection requirement of production equipment, an inspection point (a preset area) and an inspection route (a preset boundary) can be planned in a user-defined mode, an inspection person (a specific target object) and a period (a preset time period) are set, an inspection task is formulated, the monitoring requirement of timing inspection is met in an all-round mode, and when the inspection person does not inspect in the preset area within the preset time period, an alarm can be triggered.
In an optional embodiment, the monitoring processing device may further be in communication connection with a mobile device; the mobile device can be an electronic device such as a smart phone, a tablet personal computer and a smart watch, and can send information related to triggering alarm to the corresponding mobile device, so that related personnel can know security management conditions through the mobile device, and convenience of security management is improved. For example, the initial target image meeting the second preset alarm condition is sent to the corresponding mobile device, or the corresponding mobile device is triggered to send a corresponding alarm signal while the monitoring processing device sends the first alarm signal. The function of remotely controlling the monitoring processing equipment through the mobile equipment can be realized.
In addition, monitoring processing equipment can also be with positioning device communication connection, this positioning device can be the location chest card of wearing on one's body at the staff, positioning device has the function of gathering the current position and sending the information of seeking help, when the staff meets accident situation, can trigger positioning device and send the information of seeking help to monitoring processing equipment, including positioning device's current position in the information of seeking help, monitoring processing equipment can send first alarm information when receiving the information of seeking help, in order to remind relevant personnel to carry out timely rescue, reduce accident loss and casualties.
In the embodiment of the application, the first alarm signal can be set according to actual needs, and comprises various alarm modes such as an alarm pop-up window and a buzzer alarm. The pop-up window alarm can be embodied as popping up an alarm picture on a display screen of the monitoring processing equipment; the alarm picture can be a preset alarm picture in a fixed form, such as an alarm picture with a fixed warning mark. The alarm picture can also be an alarm picture containing an alarm identifier associated with the alarm condition, for example, when the alarm condition is that a person outside the authority crosses a warning line, the alarm picture can display an illegal border crossing identifier; for another example, when the alarm condition is that the number of people in the preset area exceeds or is lower than the specified number of people, the alarm picture can display the identification of over-person or under-person. Of course, the alarm picture can also be an initial target image which accords with a second preset alarm condition; alternatively, the alarm screen may be a combination of an initial target image meeting a second preset alarm condition and an alarm identifier associated with the alarm condition, and the like.
Optionally, the monitoring processing device sends out a first alarm signal when the initial target image meets the second preset alarm condition, and may further include:
the monitoring processing equipment generates an alarm instruction when the initial target image meets the second preset alarm condition;
the monitoring processing equipment generates the alarm instruction to the monitoring acquisition equipment so that the monitoring acquisition equipment sends out a second alarm signal according to the alarm instruction.
In this example, the monitoring processing device may be linked to a monitoring acquisition device alarm in the field. Specifically, when the monitoring processing device determines that the initial target image meets a second preset alarm condition, a first alarm signal is sent out, an alarm instruction is generated at the same time, and the alarm instruction is sent to the monitoring acquisition device corresponding to the initial target image meeting the second preset alarm condition, so that the monitoring acquisition device sends out a second alarm signal. The second alarm signal may be the same as or different from the first alarm signal, and is not intended to be limiting.
Alternatively, the second alarm signal should be embodied differently from the initial alarm signal. For example, when the initial alarm signal is a buzzer alarm, the second alarm signal may be an audible and visual alarm; as another example, when the initial alarm signal and the second alarm signal are both buzzer alarms, the alarm sounds of the two alarms should be differentiated, and the difference may be reflected in duration and/or volume.
Further, in an optional embodiment, the method may further include:
determining the initial target image meeting the second preset alarm condition as a target image;
and storing the target image into a preset image resource library.
The embodiment of the application can uniformly store all target images triggering the alarm of the monitoring processing equipment; that is, the target images stored in the preset image resource library all contain violation events, and the preset image resource library can be set in the monitoring processing equipment so as to be checked later and provide decision basis for event processing. Of course, in an optional example, the monitoring processing device may further store monitoring videos collected by all monitoring and collecting devices in the security management platform.
Further, a first incidence relation between the target image and the target image acquisition time is also stored in the preset image resource library, and/or a second incidence relation between the target image and a preset area corresponding to the target image is also stored in the preset image resource library; the method further comprises the following steps:
when a target image calling instruction is received, the target image calling instruction comprises acquisition time and/or a target area;
and calling a target image corresponding to the acquisition time and/or the target area from the preset image resource library.
According to the method and the device, the violation behaviors of historical trigger alarm can be checked in a classified mode through point positions (target areas), time and the like, and a decision basis is provided for event processing.
According to the embodiment of the application, the monitoring acquisition equipment of the security management platform is used for acquiring the monitoring video of the preset area, and the monitoring processing equipment of the security management platform acquires the initial target image which is extracted based on the monitoring video and accords with the first preset alarm condition; the monitoring processing equipment judges whether the initial target image meets a second preset alarm condition or not; if yes, sending a first alarm signal; according to the embodiment of the application, different monitoring acquisition devices can be set for different areas, different first preset alarm conditions and different second preset alarm conditions are set, under the condition that the alarm conditions are met, the security management platform automatically sends out alarm signals, the safety and stability of the areas are ensured, and fine security management is realized.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the embodiments. Further, those skilled in the art will also appreciate that the embodiments described in the specification are presently preferred and that no particular act is required of the embodiments of the application.
Referring to fig. 3, a structural block diagram of an embodiment of a security management device of the present application is shown, and is applied to a security management platform, where the security management platform includes a monitoring acquisition device and a monitoring processing device, and the monitoring acquisition device is used to acquire a monitoring video of a preset area; the monitoring processing device includes:
an obtaining module 301, configured to obtain an initial target image that is extracted based on the surveillance video and meets a first preset alarm condition;
a determining module 302, configured to determine whether the initial target image meets a second preset alarm condition;
and an alarm module 303, configured to send a first alarm signal when the initial target image meets the second preset alarm condition.
Optionally, the preset area includes a preset boundary; the monitoring and collecting device further comprises:
the first judgment module is used for judging whether a moving object crossing the preset boundary exists in the monitoring video or not;
a first extracting module, configured to, if a moving object crossing the preset boundary exists in the surveillance video, extract a picture or a video segment including the moving object from the surveillance video as the initial target image, so that the surveillance processing device obtains the initial target image.
Optionally, the preset area includes a preset boundary; the obtaining module 301 is specifically configured to:
acquiring the monitoring video from the monitoring acquisition equipment; judging whether a moving object crossing the preset boundary exists in the monitoring video or not; if a moving object crossing the preset boundary exists in the monitoring video, extracting a picture or a video clip containing the moving object from the monitoring video as the initial object image.
Optionally, the determining module 302 includes:
the time point acquisition module is used for acquiring the time point when the moving target crosses the preset boundary;
the time point judging module is used for judging whether the time point is positioned in a preset time period or not;
and the first judging module is used for judging that the initial target image meets the second preset alarm condition if the time point is not within a preset time period.
Optionally, the determining module 302 includes:
the duration acquisition module is used for acquiring the duration of the moving object staying in an area on one side of the preset boundary after the moving object crosses the preset boundary;
the time length judging module is used for judging whether the time length exceeds a preset time length or not;
and the second judgment module is used for judging that the initial target image meets the second preset alarm condition if the duration exceeds the preset duration.
Optionally, the determining module 302 includes:
the information extraction module is used for extracting target characteristic information of the moving target from the initial target image;
the information acquisition module is used for acquiring a preset characteristic information set containing an object with the cross-domain preset boundary authority;
the information matching module is used for searching preset characteristic information matched with the target characteristic information set from the preset characteristic information set;
and the third judging module is used for judging that the initial target image meets the second preset alarm condition if preset characteristic information matched with the target characteristic information set cannot be searched in the preset characteristic information set.
Optionally, the determining module 302 includes:
the quantity obtaining module is used for obtaining the quantity of objects in the initial target image, wherein the types of the objects are the same as those of the moving target;
the quantity judging module is used for judging whether the quantity of the objects is within a corresponding preset quantity range or not;
and the fourth judging module is used for judging that the initial target image meets the second preset alarm condition if the number of the objects is not within the corresponding preset number range.
Optionally, the alarm module 303 further includes:
the instruction generating module is used for generating an alarm instruction when the initial target image meets the second preset alarm condition;
and the instruction sending module is used for sending the alarm instruction to the monitoring acquisition equipment so that the monitoring acquisition equipment sends a second alarm signal according to the alarm instruction.
Optionally, the apparatus may further include:
the target image determining module is used for determining the initial target image which accords with the second preset alarm condition as a target image;
and the image storage module is used for storing the target image into a preset image resource library.
Optionally, the apparatus may further include:
the system comprises an instruction receiving module, a target image calling module and a target image calling module, wherein the instruction receiving module is used for receiving a target image calling instruction, and the target image calling instruction comprises acquisition time and/or a target area;
and the image calling module is used for calling the target image corresponding to the acquisition time and/or the target area from the preset image resource library.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiment of the application also discloses electronic equipment, which comprises a processor, a memory and a computer program which is stored on the memory and can run on the processor, wherein when the computer program is executed by the processor, the steps of the security management method are realized.
The embodiment of the application also discloses a computer readable storage medium, wherein a computer program is stored on the computer readable storage medium, and when the computer program is executed by a processor, the steps of the security management method are realized.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one of skill in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the true scope of the embodiments of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The security management method, the security management device, the electronic device and the storage medium provided by the application are introduced in detail, and a specific example is applied to explain the principle and the implementation mode of the application, and the description of the embodiment is only used for helping to understand the method and the core idea of the application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A security management method is characterized by being applied to a security management platform, wherein the security management platform comprises monitoring acquisition equipment and monitoring processing equipment, and the monitoring acquisition equipment is used for acquiring a monitoring video of a preset area; the method comprises the following steps:
the monitoring processing equipment acquires an initial target image which is extracted based on the monitoring video and accords with a first preset alarm condition;
the monitoring processing equipment judges whether the initial target image meets a second preset alarm condition or not;
and the monitoring processing equipment sends out a first alarm signal when the initial target image meets the second preset alarm condition.
2. The method of claim 1, wherein the preset area comprises a preset boundary; the monitoring processing equipment acquires an initial target image which is extracted based on the monitoring video and accords with a first preset alarm condition, and the method comprises the following steps:
the monitoring processing equipment receives the initial target image sent by the monitoring equipment, wherein the monitoring acquisition equipment is used for judging whether a moving target crossing the preset boundary exists in the monitoring video; when the moving target exists, extracting a picture or a video clip containing the moving target from the monitoring video as the initial target image;
or, the monitoring processing device acquires an initial target image which is extracted based on the monitoring video and accords with a first preset alarm condition, and the method comprises the following steps:
the monitoring processing equipment acquires the monitoring video from the monitoring acquisition equipment;
the monitoring processing equipment judges whether a moving object crossing the preset boundary exists in the monitoring video or not;
if so, the monitoring processing equipment extracts a picture or a video clip containing the moving target from the monitoring video to serve as the initial target image.
3. The method according to claim 2, wherein the monitoring processing device determining whether the initial target image meets the second preset alarm condition comprises:
the monitoring processing equipment acquires a time point when the moving target crosses the preset boundary;
the monitoring processing equipment judges whether the time point is within a preset time period or not;
if not, the monitoring processing equipment judges that the initial target image meets the second preset alarm condition.
4. The method according to claim 2, wherein the monitoring processing device determining whether the initial target image meets the second preset alarm condition comprises:
the monitoring processing equipment acquires the time length of the moving target staying in an area on one side of the preset boundary after the moving target crosses the preset boundary;
the monitoring processing equipment judges whether the time length exceeds a preset time length or not;
and if so, the monitoring processing equipment judges that the initial target image meets the second preset alarm condition.
5. The method according to claim 2, 3 or 4, wherein the monitoring processing device determines whether the initial target image meets the second preset alarm condition, including:
the monitoring processing equipment extracts the target characteristic information of the moving target from the initial target image;
the monitoring processing equipment acquires a preset characteristic information set containing an object with the cross-domain preset boundary authority;
the monitoring processing equipment searches preset characteristic information matched with the target characteristic information set from the preset characteristic information set;
if the initial target image is not found, the monitoring processing equipment judges that the initial target image meets the second preset alarm condition.
6. The method according to claim 2, wherein the monitoring processing device determining whether the initial target image meets the second preset alarm condition comprises:
the monitoring processing equipment acquires the number of objects with the same type as the moving object in the initial target image;
the monitoring processing equipment judges whether the number of the objects is within a corresponding preset number range;
if not, the monitoring processing equipment judges that the initial target image meets the second preset alarm condition.
7. The method of claim 1, wherein the monitoring processing device issues a first alarm signal when the initial target image meets the second preset alarm condition, further comprising:
the monitoring processing equipment generates an alarm instruction when the initial target image meets the second preset alarm condition;
the monitoring processing equipment generates the alarm instruction to the monitoring acquisition equipment so that the monitoring acquisition equipment sends out a second alarm signal according to the alarm instruction.
8. A security management device is characterized by being applied to a security management platform, wherein the security management platform comprises monitoring acquisition equipment and monitoring processing equipment, and the monitoring acquisition equipment is used for acquiring a monitoring video of a preset area; the monitoring processing device includes:
the acquisition module is used for acquiring an initial target image which is extracted based on the monitoring video and accords with a first preset alarm condition;
the judging module is used for judging whether the initial target image meets a second preset alarm condition or not;
and the alarm module is used for sending out a first alarm signal when the initial target image meets the second preset alarm condition.
9. An electronic device comprising a processor, a memory, and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the security management method according to any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the security management method according to any one of claims 1 to 7.
CN202110272346.7A 2021-03-12 2021-03-12 Security management method and device, electronic equipment and storage medium Pending CN113112744A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110272346.7A CN113112744A (en) 2021-03-12 2021-03-12 Security management method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110272346.7A CN113112744A (en) 2021-03-12 2021-03-12 Security management method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113112744A true CN113112744A (en) 2021-07-13

Family

ID=76711431

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110272346.7A Pending CN113112744A (en) 2021-03-12 2021-03-12 Security management method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113112744A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114040170A (en) * 2021-11-18 2022-02-11 北京华能新锐控制技术有限公司 Alarm method, alarm device, electronic equipment and storage medium
CN115879897A (en) * 2023-03-03 2023-03-31 中国水利水电科学研究院 Water conservancy and hydropower engineering construction management system and management method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106408833A (en) * 2016-11-02 2017-02-15 北京弘恒科技有限公司 Perimeter intrusion detection method and system
CN107818651A (en) * 2017-10-27 2018-03-20 华润电力技术研究院有限公司 A kind of illegal cross-border warning method and device based on video monitoring
CN109214249A (en) * 2017-07-04 2019-01-15 北京航天长峰科技工业集团有限公司 A kind of intelligent video analysis method for safety and protection monitoring system
CN110111515A (en) * 2018-02-01 2019-08-09 广州弘度信息科技有限公司 A kind of border intrusion detection method, apparatus, server and system
CN110113561A (en) * 2018-02-01 2019-08-09 广州弘度信息科技有限公司 A kind of personnel are detained detection method, device, server and system
CN112464755A (en) * 2020-11-13 2021-03-09 珠海大横琴科技发展有限公司 Monitoring method and device, electronic equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106408833A (en) * 2016-11-02 2017-02-15 北京弘恒科技有限公司 Perimeter intrusion detection method and system
CN109214249A (en) * 2017-07-04 2019-01-15 北京航天长峰科技工业集团有限公司 A kind of intelligent video analysis method for safety and protection monitoring system
CN107818651A (en) * 2017-10-27 2018-03-20 华润电力技术研究院有限公司 A kind of illegal cross-border warning method and device based on video monitoring
CN110111515A (en) * 2018-02-01 2019-08-09 广州弘度信息科技有限公司 A kind of border intrusion detection method, apparatus, server and system
CN110113561A (en) * 2018-02-01 2019-08-09 广州弘度信息科技有限公司 A kind of personnel are detained detection method, device, server and system
CN112464755A (en) * 2020-11-13 2021-03-09 珠海大横琴科技发展有限公司 Monitoring method and device, electronic equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114040170A (en) * 2021-11-18 2022-02-11 北京华能新锐控制技术有限公司 Alarm method, alarm device, electronic equipment and storage medium
CN115879897A (en) * 2023-03-03 2023-03-31 中国水利水电科学研究院 Water conservancy and hydropower engineering construction management system and management method

Similar Documents

Publication Publication Date Title
US7683929B2 (en) System and method for video content analysis-based detection, surveillance and alarm management
CN106780250B (en) Intelligent community security event processing method and system based on Internet of things technology
US20040240542A1 (en) Method and apparatus for video frame sequence-based object tracking
CN108206932A (en) A kind of campus intelligent monitoring management system
CN106454250A (en) Intelligent recognition and early warning processing information platform
CN108875466A (en) Monitoring method, monitoring system and storage medium based on recognition of face
CN112738468B (en) Safety early warning method for intelligent park
CN110245630A (en) Monitoring data processing method, device and readable storage medium storing program for executing
CN108205896A (en) A kind of Campus transport safety intelligence monitoring and controlling manages system
CN105868845A (en) Risk pre-warning method and apparatus
CN113112744A (en) Security management method and device, electronic equipment and storage medium
CN112112629A (en) Safety business management system and method in drilling operation process
CN109389794A (en) A kind of Intellectualized Video Monitoring method and system
CN110197158B (en) Security cloud system and application thereof
CN110503821A (en) Pedestrian and non-motor vehicle cross the street Intelligent management control system
CN110942580A (en) Intelligent building visitor management method and system and storage medium
CN112216010A (en) Campus security management method, system, equipment and storage medium
CN114358980A (en) Intelligent community property management system and method based on Internet of things
CN113538825A (en) Campus wall-turning event alarm method and system
CN111698473A (en) Method and device for detecting staff on duty
CN112699328A (en) Network point service data processing method, device, system, equipment and storage medium
CN112532920A (en) Construction site system intelligent monitoring implementation method and system
CN107920224B (en) Abnormity warning method, abnormity warning equipment and video monitoring system
CN112381435A (en) Gridding directional pushing management method for dynamic risk in hydropower station operation process
CN111083449A (en) Campus security system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210713

RJ01 Rejection of invention patent application after publication