CN115471942A - Campus access control system and monitoring method thereof - Google Patents

Campus access control system and monitoring method thereof Download PDF

Info

Publication number
CN115471942A
CN115471942A CN202211424644.4A CN202211424644A CN115471942A CN 115471942 A CN115471942 A CN 115471942A CN 202211424644 A CN202211424644 A CN 202211424644A CN 115471942 A CN115471942 A CN 115471942A
Authority
CN
China
Prior art keywords
school
record
access control
abnormal
personnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211424644.4A
Other languages
Chinese (zh)
Inventor
周凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Neijiang Sensory Cryptography Technology Co ltd
Original Assignee
Neijiang Sensory Cryptography Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neijiang Sensory Cryptography Technology Co ltd filed Critical Neijiang Sensory Cryptography Technology Co ltd
Priority to CN202211424644.4A priority Critical patent/CN115471942A/en
Publication of CN115471942A publication Critical patent/CN115471942A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education
    • G06Q50/205Education administration or guidance
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Educational Administration (AREA)
  • Educational Technology (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Alarm Systems (AREA)

Abstract

The invention relates to the technical field of access control monitoring, in particular to a campus access control system and a monitoring method thereof, wherein the system comprises: a gate access control unit; a dormitory access control unit; a first specific access control unit; the school level server module is used for receiving and processing real-time monitoring data uploaded by a gate access control unit, a dormitory access control unit and a first specific access control unit and feeding back corresponding control instructions.

Description

Campus access control system and monitoring method thereof
Technical Field
The invention relates to the technical field of access control monitoring, in particular to a campus access control system and a monitoring method thereof.
Background
The campus is used as a teenager centralized place, a relatively rigorous and comprehensive security system is needed to guarantee the personal safety of people in schools, the existing access control system only records the access situations of the people, no analysis is conducted on the access data, the access data recorded by the access control system is used as key data capable of reflecting the movement tracks of the people in schools, the access control system has extremely high analysis and mining values, and therefore the technical problem to be solved urgently is solved by how to utilize the access records to perfect the security system of the whole campus.
Disclosure of Invention
The invention aims to provide a campus access control method, a campus access control device, campus access control equipment and a readable storage medium, so as to solve the problems.
In order to achieve the above object, the embodiments of the present application provide the following technical solutions:
on the one hand, this application embodiment provides a campus access control system, the system includes: the gate access control unit is arranged at a plurality of gates of the campus and used for monitoring and recording personnel information entering and exiting the campus; the dormitory entrance guard units are arranged at the doorways of a plurality of dormitories of the campus, and users supervise and record the information of personnel entering and exiting each dormitory; the first specific access control unit is arranged at the entrances of the plurality of functional venues, and the user supervises and records the information of personnel entering and exiting the functional venues; and the school-level server module is used for receiving and processing real-time monitoring data uploaded by the gate access control unit, the dormitory access control unit and the first specific access control unit, and feeding back a corresponding control instruction so that the gate access control unit, the dormitory access control unit or the first specific access control unit can block or release related personnel.
In a second aspect, an embodiment of the present application provides a monitoring method based on the above campus access control system, where the method includes:
recording the information of the personnel at the school, wherein the information of the personnel at the school comprises name, sex, job title, grade and face data;
the entrance guard record that corresponds at school's personnel information is every regularly detected, and under the entrance guard record was judged to be unusual the condition, send the alarm instruction to the security protection platform to make campus security protection personnel intervene the investigation, the entrance guard record includes the first business turn over record that gate access control unit generated, the second business turn over record that dormitory access control unit generated and the third business turn over record that first specific access control unit generated.
Optionally, the entering of the staff information at the school includes:
acquiring a plurality of pieces of information of people at school, and respectively generating corresponding coded identifications according to each piece of information of people at school;
and sending the code identification to information input equipment so as to write the code identification into a corresponding campus card, wherein the campus card is used for meeting the access control passing requirement of school personnel in the campus.
Optionally, after acquiring the plurality of pieces of staff at school information and generating the corresponding code identifier according to each piece of staff at school information, the method further includes:
generating an access control authority mapping table according to the plurality of in-school personnel information and the corresponding coding identifiers, and sending the plurality of in-school personnel information to a first privacy storage server, wherein the first privacy storage server is not connected with an external network and is connected with a school-level server unit through a security gateway, the access control authority mapping table is used for representing access control authorities corresponding to each coding identifier, and the access control authorities are rights to open a gate access control unit, a dormitory access control unit or a first specific access control unit;
deleting privacy data including face data among a plurality of the school attendant information stored locally.
Optionally, the periodically detecting each entrance guard record corresponding to the school staff information, and sending an alarm instruction to a security platform when the entrance guard record is determined to be abnormal, includes:
screening out a staff number corresponding to the staff under school with a staff state value as a first state value from the staff under school according to the staff state value in the staff identification codes, and marking the staff number as a first staff number, wherein the first state value is a numerical value for identifying the identity of the staff under school as a student, and the staff identification codes under school are codes reflecting the information of the staff under school;
dividing a plurality of first person numbers into a first investigation object and a second investigation object according to the lodging state value in the school person identification code corresponding to the first person number, wherein the first investigation object is a person number corresponding to a student in an accommodation school, and the second investigation object is a person number corresponding to a student in a non-accommodation school;
respectively calling a first access record corresponding to each second investigation object, and marking the second investigation object with the last record state in the first access records as an access state as a second abnormal object;
respectively calling a second access record corresponding to each first survey object, and marking the corresponding first survey object as a first abnormal object under the condition that the second access record is judged to be abnormal;
and generating an alarm instruction according to the identification codes of the persons in the school corresponding to the first abnormal object and the second abnormal object so as to enable security personnel to realize the specific situation of the abnormal persons in the school.
Optionally, in a case that the second entry and exit record is determined to be abnormal, marking the corresponding first survey object as a first abnormal object includes:
detecting the state of the last record in the second in-out record;
if the second access record is in the exit state, marking a first survey object corresponding to the second access record as a first abnormal object;
and if the second entering and exiting record is in the entering state, detecting a difference value between the current time and the time for triggering the entering state, and marking a first survey object corresponding to the second entering and exiting record as a first abnormal object when the difference value is greater than a first preset threshold value.
Optionally, after the retrieving a second entry and exit record corresponding to each first surveyor, and marking the corresponding first surveyor as a first abnormal object when the second entry and exit record is determined to be abnormal, the method further includes:
calling a first in-out record corresponding to a first abnormal object, detecting the state of the last record in the record, if the record is in an out state, marking the record as a third abnormal object, setting a trigger timing for each third abnormal object, wherein the trigger timing is used for calculating the leaving-school time of school staff corresponding to the third abnormal object, and terminating timing after detecting a card swiping or face swiping record corresponding to the third abnormal object at any access control position in a preset time period;
when the trigger timing reaches a second preset threshold value, generating a primary alarm instruction and sending the primary alarm instruction to the security platform;
and if the security platform does not feed back a corresponding elimination instruction within a preset time period, generating an alarm instruction according to personnel information in the primary alarm instruction, and sending the alarm instruction to a local police organization, wherein the personnel information comprises names, sexes, facial data or stop current student card GPS activity data.
Optionally, the periodically detecting each access control record corresponding to the school staff information, and sending an alarm instruction to the security platform when the access control record is determined to be abnormal, includes:
detecting whether the card swiping or face swiping times of the entering state of the current day in each third entering-exiting record is matched with the card swiping or face swiping times of the exiting state, if not, screening out the numbers of the persons in the school corresponding to the abnormal card swiping or face swiping states, recording the numbers as fourth abnormal objects, and recording the entering time of the card swiping or face swiping corresponding to the fourth abnormal objects as first abnormal time nodes;
detecting time nodes of card swiping or face swiping of a fourth abnormal object in other access records, and recording the time nodes as other time nodes, wherein the other access records comprise a first access record generated by a gate access control unit, a second access record generated by a dormitory access control unit and a third access record generated by other first specific access control units;
if any other time node is later than the first abnormal time node, eliminating a fourth abnormal object;
and if the other time nodes are all earlier than the first abnormal time node, generating an alarm instruction corresponding to a fourth abnormal object so as to enable security personnel to implement the specific situation of abnormal personnel in the school.
In a third aspect, an embodiment of the present application provides a level correction server device, which includes a memory and a processor. The memory is used for storing a computer program; the processor is used for realizing the steps of the monitoring method when executing the computer program.
In a fourth aspect, an embodiment of the present application provides a readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the steps of the foregoing monitoring method are implemented.
The invention has the beneficial effects that:
traditional entrance guard only discerns the entering authority of the person of punching the card, can cooperate the camera in the aspect of the security protection, and the realization degree of difficulty of camera in the aspect of initiatively taking precautions against is great, only can discover after the occurence of failure usually, and timeliness and comprehensiveness have seriously not enough, and what the comprehensiveness pointed out is the scope and the precision of the object that detects.
According to the campus security system, a plurality of different door controls, specifically, a gate door control, a dormitory door control and a first specific door control are arranged in a campus, the conditions of students in and out of the campus are collected, the card swiping or face swiping records of the different door controls are periodically analyzed, the activity conditions of the students, especially the students, in the schools are obtained, the student information with abnormal activity records is timely found, the personal safety of the students in the universities can be rapidly and comprehensively early warned, and the security system of the whole campus is further improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the embodiments of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
Fig. 1 is a schematic structural diagram of a campus access control system according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a monitoring method based on a campus access control system according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a school level server device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments of the present invention, are within the scope of protection of the present invention.
It should be noted that: like reference numbers or letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined or explained in subsequent figures. Meanwhile, in the description of the present invention, the terms "first", "second", and the like are used only for distinguishing the description, and are not construed as indicating or implying relative importance.
Example 1
As shown in fig. 1, the present embodiment provides a campus access control system, which includes:
the gate access control unit is arranged at a plurality of gates of the campus and used for monitoring and recording personnel information entering and exiting the campus;
the dormitory entrance guard units are arranged at the doorways of a plurality of dormitories in the campus, users supervise and record the information of personnel entering and exiting each dormitory, and for theft prevention, the entrance guard of one dormitory unit only allows the entrance of the dormitory unit;
first specific entrance guard's unit locates the entrance in a plurality of function venues, and the personnel's information that the user supervision record came in and go out this function venue, first specific entrance guard's unit mainly can be used to large-scale teaching or study venues such as library, auditorium meeting room, and this kind of venues all have specific open time everyday, do not allow in principle to cross night in this kind of venues.
And the school-level server module is used for receiving and processing real-time monitoring data uploaded by the gate access control unit, the dormitory access control unit and the first specific access control unit, and feeding back a corresponding control instruction so that the gate access control unit, the dormitory access control unit or the first specific access control unit can block or release related personnel.
Example 2
As shown in fig. 2, this embodiment provides a monitoring method based on the campus access control system according to embodiment 1, where the method includes steps S1 and S2.
The method comprises the following steps of S1, recording in-school personnel information, wherein the in-school personnel information comprises name, gender, job title, grade and face data, and the face data serving as privacy data needs to be stored separately;
s2, regularly detecting each access control record corresponding to the school personnel information, and sending an alarm instruction to a security platform under the condition that the access control record is judged to be abnormal so that campus security personnel intervene in investigation, wherein the access control record comprises a first access record generated by a gate access control unit, a second access record generated by a dormitory access control unit and a third access record generated by a first specific access control unit.
In step S1, the specific recording manner may be:
s11, acquiring a plurality of information of the school staff, generating corresponding code identifications according to the information of each school staff respectively, and recording the code identifications as identification codes of the school staff, wherein the identification codes of the school staff are convenient for distinguishing and calling binary codes, and the school-level server module can call corresponding information of the school staff, such as names, family addresses, contact ways of parents, birth years and months, long-phase (face data) and other privacy data from a privacy storage server through the codes;
and S12, sending the coded identifier to information entry equipment so as to write the coded identifier into a corresponding campus card, wherein the campus card is used for meeting the access control passing requirement of the school personnel in the campus, only the identification code of the school personnel is recorded in the campus card, and if the coded identifier is lost, a wrongdoer cannot know the specific information of the relevant school personnel.
Secondly in order to further protect the personal privacy of the teacher and the students in the school, an independent off-line privacy storage device can be used for storing data and reducing the circulation times or range of the privacy data, and specifically, the method can be as follows:
s13, generating an access control permission mapping table according to the plurality of college personnel information and the corresponding coding identifications, and sending the plurality of college personnel information to a first privacy storage server, wherein the first privacy storage server is not connected with an external network and is connected with a school grade server unit through a security gateway, the access control permission mapping table is used for representing access control permissions corresponding to the coding identifications, and the access control permissions are rights of opening a gate access control unit, a dormitory access control unit or a first specific access control unit;
the access control permission mapping table is used for facilitating each access control unit to quickly detect the door opening permission of a current card swiping or face swiping person, does not relate to transmission of information of a school person between a server and each door diameter unit in the process, and further reduces the risk of revealing privacy of the school person;
secondly, a security gateway is arranged between the first privacy storage server and the school class server unit for storing information of school personnel, other external network servers cannot access the first privacy storage server and can only be connected through the school class server unit in a specific coding mode through the security gateway, and privacy security of the school personnel is greatly protected;
and S14, deleting the privacy data in the plurality of college staff information stored locally, wherein the privacy data comprises face data, names, family addresses, parent names, contact information and the like.
In summary, the monitoring method according to the present embodiment reduces the risk of leakage of the school staff information from the aspects of data storage and data usage through the manner of steps S13 to S14. In step S2, the situation of the access record corresponding to each piece of school staff information is periodically detected to screen out the movement track of the abnormal school staff, wherein the movement track is mainly divided into two major categories, and the first major category is the outgoing control of students in the residence school, and includes but is not limited to monitoring the time point of entering a dormitory gate and monitoring the time point of entering a school gate; the second category is the abnormal investigation of daily entry and exit records for a particular venue.
The specific monitoring method for the first major category, namely the going-out management and control of the students in the colleges and universities, can be as follows:
step S211, screening out staff numbers corresponding to the school staff, of which the staff state values are first state values, from the school staff identification codes according to the staff state values in the school staff identification codes, and marking the staff numbers as first staff numbers, wherein the first state values are numerical values used for identifying the identities of the school staff as students, the school staff identification codes are codes reflecting the information of the school staff, and identification codes of the students are screened out from the current school staff;
s212, according to the lodging state values, corresponding to the first person numbers, in the school person identification codes, dividing the first person numbers into a first investigation object and a second investigation object, wherein the first investigation object is a person number corresponding to a student in an accommodation school, the second investigation object is a person number corresponding to a student in a non-accommodation school, and the student is classified into a student in the accommodation school and a student in the non-accommodation school again;
the steps of S211-S212 are not required to be executed before each detection, and after the first survey object, which is the identification code corresponding to the student in the residence school, is obtained, the first survey object can be directly called to investigate the abnormal behavior in the later period without changing the staff; the principle of the checking early-stage work of the students in the non-resident schools is the same, and the detailed description is omitted;
step S213, respectively calling a first in-out record corresponding to each second investigation object, and marking a second investigation object with the last record state in the first in-out record as an entering state as a second abnormal object, wherein the first in-out record corresponding to the second investigation object is detected between 9-10 pm every day, if only the entering record does not exist in the same day, the student is judged to be out of the campus, the student does not go out, the security protection personnel can contact a shift master or inform parents and the like, if the security personnel are safe, the security personnel can eliminate the abnormal alarm on a placement operation platform, the in-out abnormal record of any school student can be found almost within 24 hours through the detection mode, and the personal safety of the non-school student in the campus is regularly monitored through the combination of online platform monitoring and offline security personnel implementation;
step S214, respectively calling a second access record corresponding to each first surveyor, and under the condition that the second access record is judged to be abnormal, marking the corresponding first surveyor as a first abnormal object, and monitoring residence staff is divided into two aspects, namely whether the residence enters a bedroom within the time specified by the school or not, and on the other hand, whether the residence is in the campus or out of the campus or not if the residence is not in the bedroom, so that the implementation difficulty of security staff is reduced;
s215, generating an alarm instruction according to the identification codes of the persons in the school corresponding to the first abnormal object and the second abnormal object, so that the security personnel can implement the specific situation of the abnormal persons in the school.
To further explain the two-way abnormality determination method for the resident students in step S214, the present embodiment is described in detail in two types:
the first type is that students in a residence school do not enter a dormitory unit on time, but do not go out of the school, and only move in other places of the campus, and the detection mode at the moment is as follows:
s2141, checking the state of the last record in second access records corresponding to each first surveyor, wherein the second access records are personnel access records generated by a dormitory access control unit, and at the moment, two situations still exist;
the first case is that the last record is in an outgoing state, and at this time, it can be directly determined that the student does not go back to the bedroom for rest according to the rule, and at this time, the detection mode can be as follows: step S2142, if the last record in the second entry-exit record is in an exit state, marking the first survey object corresponding to the second entry-exit record as a first abnormal object;
the second case is that the last record of the student is an entry, but the entry time may be a time node one day or two days ago, and the student needs to enter and exit the entrance guard every day in a normal working day, so this record may also be determined as an abnormal record, and the detection method may be: step S2143, if the last record in the second entry-exit record is in an entry state, detecting a difference value between the current time and the time for triggering the entry state, and when the difference value is greater than a first preset threshold value, marking a first investigation object corresponding to the second entry-exit record as a first abnormal object, wherein the first preset threshold value is not a fixed value, if the detection time is Monday, the time of the first preset threshold value is at least greater than 36 hours, the system does not intervene in leisure life of students in Saturday, and the setting is used for avoiding false alarm of card swiping records of students waiting in bedrooms on two days, and the first preset threshold value can be 24 hours on Tuesday to Friday, so as to realize first detection every day;
after a student with an abnormal card swiping or face swiping record is detected through the two modes, the system marks the staff number corresponding to the student as a first abnormal object, wherein it needs to be explained that the difference between the staff identification code of the school and the staff number is to be distinguished, the staff identification code of the school is a binary code for being identified by a calculator and is recorded in the student card, the staff number is suitable for being identified by people, and can be a student certificate number and the like, namely one is identified by a machine, the other is identified by people, and the staff identification code-staff number-information of the school are in a one-to-one mapping relationship;
after the first abnormal objects are obtained, the system can further detect the calibration condition of the abnormal person, and the specific mode is as follows:
step S2144, a first entry and exit record generated by a gate access control unit corresponding to the first abnormal object is called, the state of the last record in the record is detected, if the entry state is the entry state, the student is still in a school, an alarm instruction is sent to a security platform, the alarm instruction comprises personnel information, so that the security personnel can realize the specific situation that the abnormality is found in the school personnel, the specific situation is a telephone or a campus search when the abnormality is found, but the security platform also needs to give a system reply within a certain time end so as to eliminate the abnormal alarm;
the second type is that students in the residence school do not enter the dormitory unit on time and have already gone out of the school, and the detection mode at this moment is:
the screening method of the first abnormal object may refer to the first category, which is not described herein again, and after the first abnormal object is obtained, the specific monitoring measures are as follows:
step S2144, a first entry-exit record corresponding to the first abnormal object is called, the state of the last record in the record is detected, if the first entry-exit record is in an exit state, the first entry-exit record is marked as a third abnormal object, a trigger timing is set for each third abnormal object, the trigger timing is used for calculating the departure time of a person in a school corresponding to the third abnormal object, and the timing is terminated after a card swiping or face swiping record corresponding to the third abnormal object is detected at any entrance guard within a preset time period;
s2145, when the trigger timing reaches a second preset threshold value, generating a primary alarm instruction, and sending the primary alarm instruction to the security platform;
s2146, if the security platform does not feed back a corresponding elimination instruction within a preset time period, generating an alarm instruction according to personnel information in the primary alarm instruction, and sending the alarm instruction to a local police organization, wherein the personnel information comprises names, sexes, facial data or stop current student card GPS activity data;
for students who live in a school and have a long time from the school during learning, the system can generate a primary alarm instruction, security personnel can process the abnormal situation preferentially, a corresponding timer can be automatically generated in the system at the moment, after the timing time is up, the security personnel still do not remove the abnormality, the system can judge that the students are missing, in order to protect the safety of the students, the system can take out the information data of the students from a privacy storage and generate alarm information, so that the police intervene in investigation in time, because the information shows that along with the development of science and technology, a plurality of existing student cards and child watches have a positioning function, the system can collect related GPS position data at ordinary times and backup the most safely, when the alarm information is generated, the part of data can be collected regularly, and the case investigation of the police is facilitated.
Similarly, in the first kind of situations, if the system does not receive the exception cancellation command fed back by the security platform in time, the system may also adopt the same strategy, which is not described herein again.
Secondly, for the second main category, the specific monitoring method for performing exception checking on the daily entry and exit records of a special venue can be as follows:
step S221, detecting whether the number of times of swiping a card or swiping a face of a student in an entry state of the same day in a third entry-exit record generated by each first specific access control unit is matched with the number of times of swiping a card or swiping a face of the student in an exit state, if not, screening out the number of the students in the school corresponding to the card or swiping the face in the entry state of the student in the entry state as an abnormal state, and marking the number as a fourth abnormal object, recording the entry time of swiping the card or swiping the face corresponding to the fourth abnormal object as a first abnormal time node, and judging whether the entry time is matched according to the fact that the entry time recorded by the gate in the day is equal to the exit time of the student in the entry state can be agreed as a data match, wherein when the data can be matched, the first specific access control unit can realize detection without calling any data, and due to frequent detection, the program logic is simpler and more reliable, and when the total number of times of swiping the card or swiping the face in the entry state is different from the total number of the card or swiping the student in the exit state, the student is different from the number, starting abnormal object screening work, and specifically, the students in the student corresponding to screen out the number as an abnormal object;
at this time, the student is still in the specific venue theoretically, but in order to prevent misoperation or system bug of the student, the system performs traversal check on the full access control record of the student at this time, the specific method is as follows: step S222, detecting time nodes of card swiping or face swiping of a fourth abnormal object in other access records, and recording the time nodes as other time nodes, wherein the other access records comprise a first access record generated by a gate access control unit, a second access record generated by a dormitory access control unit and a third access record generated by other first specific access control units;
step S223, if any other time node is later than the first abnormal time node, eliminating a fourth abnormal object, namely detecting a card swiping record later than the entering time in other places, and judging that the student leaves the specific venue;
and S224, if the other time nodes are all earlier than the first abnormal time node, generating an alarm instruction corresponding to a fourth abnormal object so as to enable security protection personnel to implement the specific situation of abnormal personnel in the school, and if no card swiping record later than the entry time is detected in other places, determining that the student is still in the venue, at the moment, the security protection personnel needs to intervene for further investigation, and meanwhile, the security protection platform needs to feed back an abnormal elimination instruction so as to enable the system to eliminate the alarm.
Example 3
Corresponding to the above method embodiment, the embodiment of the present disclosure further provides a school level server device, and a campus access control device described below and a campus access control monitoring method described above may be referred to in a corresponding manner.
Fig. 3 is a block diagram illustrating a campus access control device 800 according to an example embodiment. As shown in fig. 3, the electronic device 800 may include: a processor 801, a memory 802. The electronic device 800 may also include one or more of a multimedia component 803, an I/O interface 804, and a communications component 805.
The processor 801 is configured to control overall operations of the electronic device 800, so as to complete all or part of the steps in the campus access control method. The memory 802 is used to store various types of data to support operation at the electronic device 800, such as instructions for any application or method operating on the electronic device 800 and application-related data, such as contact data, messages sent or received, pictures, audio, video, and so forth. The Memory 802 may be implemented by any type of volatile or non-volatile Memory device or combination thereof, such as Static Random Access Memory (SRAM), electrically Erasable Programmable Read-Only Memory (EEPROM), erasable Programmable Read-Only Memory (EPROM), programmable Read-Only Memory (PROM), read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk or optical disk. The multimedia components 803 may include screen and audio components. Wherein the screen may be, for example, a touch screen and the audio component is used for outputting and/or inputting audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signal may further be stored in the memory 802 or transmitted through the communication component 805. The audio assembly also includes at least one speaker for outputting audio signals. The I/O interface 804 provides an interface between the processor 801 and other interface modules, such as a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons. The communication component 805 is used for wired or wireless communication between the electronic device 800 and other devices. Wireless communication, such as Wi-Fi, bluetooth, near field communication (NFC for short), 2G, 3G, or 4G, or a combination of one or more of them, so the corresponding communication component 805 may include: wi-Fi module, bluetooth module, NFC module.
In an exemplary embodiment, the electronic Device 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic components for performing the campus access method described above.
In another exemplary embodiment, a computer readable storage medium including program instructions is provided, which when executed by a processor, implement the steps of the campus access control method described above. For example, the computer readable storage medium may be the memory 802 described above that includes program instructions that are executable by the processor 801 of the electronic device 800 to perform the campus access method described above.
Example 4
Corresponding to the above method embodiment, the embodiment of the present disclosure further provides a readable storage medium, and a readable storage medium described below and the above described campus access monitoring method may be referred to correspondingly.
A readable storage medium is provided, and a computer program is stored on the readable storage medium, and when being executed by a processor, the computer program realizes the steps of the campus access control method of the above method embodiment.
The readable storage medium may be a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, an optical disk, or other various readable storage media capable of storing program codes.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. The utility model provides a campus access control system which characterized in that includes:
the gate access control unit is arranged at a plurality of gates of the campus and used for monitoring and recording personnel information entering and exiting the campus;
the dormitory entrance guard unit is arranged at the doorways of a plurality of dormitories in the campus, and a user supervises and records the personnel information entering and exiting each dormitory;
the first specific access control unit is arranged at the entrances of the plurality of functional venues, and the user supervises and records the information of personnel entering and exiting the functional venues;
and the school-level server module is used for receiving and processing real-time monitoring data uploaded by the gate access control unit, the dormitory access control unit and the first specific access control unit, and feeding back a corresponding control instruction so that the gate access control unit, the dormitory access control unit or the first specific access control unit can block or release related personnel.
2. The campus access control system monitoring method based on claim 1, characterized by comprising:
recording the information of staff at school, wherein the information of staff at school comprises name, gender, job title, grade and facial data;
the entrance guard record that corresponds at school's personnel information is every regularly detected, and under the entrance guard record was judged to be unusual the condition, send the alarm instruction to the security protection platform to make campus security protection personnel intervene the investigation, the entrance guard record includes the first business turn over record that gate access control unit generated, the second business turn over record that dormitory access control unit generated and the third business turn over record that first specific access control unit generated.
3. The monitoring method according to claim 2, wherein the entering of the staff-at-school information comprises:
acquiring a plurality of school personnel information, and respectively generating corresponding code identifications according to each school personnel information, and recording the code identifications as school personnel identification codes;
and sending the code identification to information input equipment so as to write the code identification into a corresponding campus card, wherein the campus card is used for meeting the access control passing requirement of school personnel in the campus.
4. The monitoring method according to claim 3, wherein after acquiring the plurality of the school personnel information and generating the corresponding coded identifiers according to each school personnel information, the method further comprises:
generating an access control permission mapping table according to the plurality of school-in personnel information and the corresponding coding identifications, and sending the plurality of school-in personnel information to a first privacy storage server, wherein the first privacy storage server is not connected with an external network and is connected with a school-level server unit through a security gateway, the access control permission mapping table is used for representing access control permissions corresponding to the coding identifications, and the access control permissions are rights to open a gate access control unit, a dormitory access control unit or a first specific access control unit;
deleting private data including face data in a plurality of the school staff information stored locally.
5. The monitoring method according to claim 2, wherein the step of periodically detecting the entrance guard record corresponding to each piece of school staff information and sending an alarm instruction to a security platform if the entrance guard record is determined to be abnormal comprises the steps of:
screening out a staff number corresponding to the staff under school with a staff state value as a first state value from the staff under school according to the staff state value in the staff identification codes, and marking the staff number as a first staff number, wherein the first state value is a numerical value for identifying the identity of the staff under school as a student, and the staff identification codes under school are codes reflecting the information of the staff under school;
dividing a plurality of first personnel numbers into a first survey object and a second survey object according to lodging state values corresponding to the first personnel numbers in school personnel identification codes, wherein the first survey object is a personnel number corresponding to an accommodation school student, and the second survey object is a personnel number corresponding to a non-accommodation school student;
respectively calling a first access record corresponding to each second investigation object, and marking the second investigation object with the last record state in the first access records as an access state as a second abnormal object;
respectively calling a second access record corresponding to each first surveyor, and marking the corresponding first surveyor as a first abnormal object under the condition that the second access record is judged to be abnormal;
and generating an alarm instruction according to the identification codes of the persons in the school corresponding to the first abnormal object and the second abnormal object so as to enable security personnel to realize the specific situation of the abnormal persons in the school.
6. The monitoring method according to claim 5, wherein, in case that the second entry and exit record is determined to be abnormal, marking the corresponding first surveyor object as a first abnormal object comprises:
detecting the state of the last record in the second entry and exit record;
if the second entering and exiting record is in the exiting state, marking a first survey object corresponding to the second entering and exiting record as a first abnormal object;
and if the second entering and exiting record is in the entering state, detecting a difference value between the current time and the time for triggering the entering state, and marking a first survey object corresponding to the second entering and exiting record as a first abnormal object when the difference value is greater than a first preset threshold value.
7. The monitoring method according to claim 5, wherein the retrieving the second entry and exit record corresponding to each of the first survey objects, and marking the corresponding first survey object as a first abnormal object if the second entry and exit record is determined to be abnormal, further comprises:
calling a first in-out record corresponding to a first abnormal object, detecting the state of the last record in the record, if the record is in an out state, marking the record as a third abnormal object, and setting a trigger timing for each third abnormal object, wherein the trigger timing is used for calculating the departure time of a school employee corresponding to the third abnormal object, and terminating the timing after detecting a card swiping or face swiping record corresponding to the third abnormal object at any entrance guard within a preset time period;
when the trigger timing reaches a second preset threshold value, generating a primary alarm instruction and sending the primary alarm instruction to the security platform;
and if the security platform does not feed back a corresponding elimination instruction within a preset time period, generating an alarm instruction according to personnel information in the primary alarm instruction, and sending the alarm instruction to a local police organization, wherein the personnel information comprises names, sexes, face data or current stop-current student card GPS activity data.
8. The monitoring method according to claim 2, wherein the step of periodically detecting the entrance guard record corresponding to each piece of school staff information and sending an alarm instruction to a security platform if the entrance guard record is determined to be abnormal comprises the steps of:
detecting whether the card swiping or face swiping times of the entering state in each third entering-exiting record in the current day are matched with the card swiping or face swiping times of the exiting state, if not, screening out the numbers of the persons in the school corresponding to the card swiping or face swiping state in which the entering state is abnormal, recording the numbers as fourth abnormal objects, and recording the entering time of the card swiping or face swiping corresponding to the fourth abnormal objects as first abnormal time nodes;
detecting time nodes of card swiping or face swiping of a fourth abnormal object in other access records, and recording the time nodes as other time nodes, wherein the other access records comprise a first access record generated by a gate access control unit, a second access record generated by a dormitory access control unit and a third access record generated by other first specific access control units;
if any other time node is later than the first abnormal time node, eliminating a fourth abnormal object;
and if the other time nodes are all earlier than the first abnormal time node, generating an alarm instruction corresponding to a fourth abnormal object so as to enable security personnel to implement the specific situation of abnormal personnel in the school.
CN202211424644.4A 2022-11-15 2022-11-15 Campus access control system and monitoring method thereof Pending CN115471942A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211424644.4A CN115471942A (en) 2022-11-15 2022-11-15 Campus access control system and monitoring method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211424644.4A CN115471942A (en) 2022-11-15 2022-11-15 Campus access control system and monitoring method thereof

Publications (1)

Publication Number Publication Date
CN115471942A true CN115471942A (en) 2022-12-13

Family

ID=84338176

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211424644.4A Pending CN115471942A (en) 2022-11-15 2022-11-15 Campus access control system and monitoring method thereof

Country Status (1)

Country Link
CN (1) CN115471942A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118195083A (en) * 2024-04-02 2024-06-14 广东科技学院 Student information intelligent management system and method based on data analysis

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104252690A (en) * 2013-06-30 2014-12-31 郑州单点科技软件有限公司 E-card system for inquiring student information
CN104318389A (en) * 2014-10-24 2015-01-28 宁波邦谷网络科技有限公司 Campus dormitory prevention and evacuation safety management system
CN104967547A (en) * 2015-08-05 2015-10-07 广州晓润网络科技有限公司 Information security type intelligent home gateway
CN205563127U (en) * 2016-04-26 2016-09-07 温州职业技术学院 Thing networking smart home systems with privacy protection function
CN106023013A (en) * 2016-05-14 2016-10-12 北京彩云动力教育科技有限公司 Student behavior big data analysis system and operating method thereof
CN106981037A (en) * 2017-03-27 2017-07-25 临沂大学 A kind of student health management system and method based on campus card usage record
CN106991187A (en) * 2017-04-10 2017-07-28 武汉朱雀闻天科技有限公司 The analysis method and device of a kind of campus data
CN107845173A (en) * 2017-11-15 2018-03-27 南京航空航天大学 A kind of Internet of Things gate control system and its control method suitable for campus
CN107918967A (en) * 2017-12-04 2018-04-17 成都星达微科技有限公司 A kind of campus dormitory access control system gathered based on radio frequency induction and face
CN108985726A (en) * 2018-09-19 2018-12-11 李招兵 A kind of students'growth culture system and its method
CN109448178A (en) * 2018-10-15 2019-03-08 上海顺舟智能科技股份有限公司 A kind of low power-consumption intelligent door-locking system and its control method
CN109949188A (en) * 2019-03-06 2019-06-28 余小强 Intelligent campus card system
CN109978099A (en) * 2019-04-01 2019-07-05 长春工业大学 A kind of pupilage reflexless terminal based on recognition of face and RFID
CN110910549A (en) * 2019-11-15 2020-03-24 江苏高泰软件技术有限公司 Campus personnel safety management system based on deep learning and face recognition features
CN111292436A (en) * 2020-02-08 2020-06-16 安徽军号信息科技有限公司 Campus security protection management system
CN112037357A (en) * 2020-09-11 2020-12-04 山东卡尔电气股份有限公司 Smart campus management system and management method thereof
CN212135521U (en) * 2020-04-29 2020-12-11 深圳市世纪纵横科技发展有限公司 Hotel self-service experience system
CN113139887A (en) * 2021-05-17 2021-07-20 汇智道晟(温州)***技术有限公司 Big data-based smart campus management system
CN114663994A (en) * 2022-03-22 2022-06-24 广西塔易信息技术有限公司 Intelligent campus comprehensive management system and method

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104252690A (en) * 2013-06-30 2014-12-31 郑州单点科技软件有限公司 E-card system for inquiring student information
CN104318389A (en) * 2014-10-24 2015-01-28 宁波邦谷网络科技有限公司 Campus dormitory prevention and evacuation safety management system
CN104967547A (en) * 2015-08-05 2015-10-07 广州晓润网络科技有限公司 Information security type intelligent home gateway
CN205563127U (en) * 2016-04-26 2016-09-07 温州职业技术学院 Thing networking smart home systems with privacy protection function
CN106023013A (en) * 2016-05-14 2016-10-12 北京彩云动力教育科技有限公司 Student behavior big data analysis system and operating method thereof
CN106981037A (en) * 2017-03-27 2017-07-25 临沂大学 A kind of student health management system and method based on campus card usage record
CN106991187A (en) * 2017-04-10 2017-07-28 武汉朱雀闻天科技有限公司 The analysis method and device of a kind of campus data
CN107845173A (en) * 2017-11-15 2018-03-27 南京航空航天大学 A kind of Internet of Things gate control system and its control method suitable for campus
CN107918967A (en) * 2017-12-04 2018-04-17 成都星达微科技有限公司 A kind of campus dormitory access control system gathered based on radio frequency induction and face
CN108985726A (en) * 2018-09-19 2018-12-11 李招兵 A kind of students'growth culture system and its method
CN109448178A (en) * 2018-10-15 2019-03-08 上海顺舟智能科技股份有限公司 A kind of low power-consumption intelligent door-locking system and its control method
CN109949188A (en) * 2019-03-06 2019-06-28 余小强 Intelligent campus card system
CN109978099A (en) * 2019-04-01 2019-07-05 长春工业大学 A kind of pupilage reflexless terminal based on recognition of face and RFID
CN110910549A (en) * 2019-11-15 2020-03-24 江苏高泰软件技术有限公司 Campus personnel safety management system based on deep learning and face recognition features
CN111292436A (en) * 2020-02-08 2020-06-16 安徽军号信息科技有限公司 Campus security protection management system
CN212135521U (en) * 2020-04-29 2020-12-11 深圳市世纪纵横科技发展有限公司 Hotel self-service experience system
CN112037357A (en) * 2020-09-11 2020-12-04 山东卡尔电气股份有限公司 Smart campus management system and management method thereof
CN113139887A (en) * 2021-05-17 2021-07-20 汇智道晟(温州)***技术有限公司 Big data-based smart campus management system
CN114663994A (en) * 2022-03-22 2022-06-24 广西塔易信息技术有限公司 Intelligent campus comprehensive management system and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118195083A (en) * 2024-04-02 2024-06-14 广东科技学院 Student information intelligent management system and method based on data analysis

Similar Documents

Publication Publication Date Title
US11017106B2 (en) Emergency notification, access control, and monitoring systems and methods
US10503921B2 (en) Emergency notification system and methods
US7289023B2 (en) Supervised guard tour tracking systems and methods
US10565838B2 (en) Building access control system with complex event processing
US10163313B2 (en) System and method for sound based surveillance
US11778424B2 (en) Evacuation tracking
US20220050911A1 (en) Emergency notification system and methods
CN115471942A (en) Campus access control system and monitoring method thereof
CN106303382A (en) A kind of emergency command comprehensive management platform based on Internet of Things
CN110166734A (en) A kind of Intelligence In Baogang Kindergarten monitoring method and system
US20090249433A1 (en) System and method for collaborative monitoring of policy violations
CN111160319A (en) Campus dormitory management system based on face recognition real-time statistics multi-terminal presentation
US20040046654A1 (en) Supervised guard tour systems and methods
CN113223222A (en) Intelligent monitoring system for industrial pollution source
CN111178816A (en) Dormitory monitoring management method and device, electronic equipment and storage medium
CN107808238A (en) A kind of management method and system for equipping assets
CN111489276B (en) Personnel management method and related device
KR20140022705A (en) The safety keeper using the pre registry system
US20170330459A1 (en) People Management System
CN113301300A (en) Building intelligent monitoring system and method based on Internet
CN112949397A (en) Object access control method and control system in target area and terminal
CN111343417A (en) Monitoring system for kindergarten student supervision
CN206179051U (en) Intelligent supervising system is used in campus
KR101564046B1 (en) Apparatus, method and computer readable recording medium for controlling entry by a board to board communication
CN116071206B (en) Intelligent campus management method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20221213