CN116957890A - Luggage pre-inspection risk interception method - Google Patents

Luggage pre-inspection risk interception method Download PDF

Info

Publication number
CN116957890A
CN116957890A CN202310873521.7A CN202310873521A CN116957890A CN 116957890 A CN116957890 A CN 116957890A CN 202310873521 A CN202310873521 A CN 202310873521A CN 116957890 A CN116957890 A CN 116957890A
Authority
CN
China
Prior art keywords
baggage
risk
passenger
luggage
positioning unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310873521.7A
Other languages
Chinese (zh)
Inventor
范福川
程连强
王有元
陈崇楷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Maxvision Technology Corp
Original Assignee
Maxvision Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Maxvision Technology Corp filed Critical Maxvision Technology Corp
Priority to CN202310873521.7A priority Critical patent/CN116957890A/en
Publication of CN116957890A publication Critical patent/CN116957890A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/20Instruments for performing navigational calculations
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/38Determining a navigation solution using signals transmitted by a satellite radio beacon positioning system
    • G01S19/39Determining a navigation solution using signals transmitted by a satellite radio beacon positioning system the satellite radio beacon positioning system transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • G01S19/42Determining position
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/70Multimodal biometrics, e.g. combining information from different biometric modalities
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/40Transportation
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y20/00Information sensed or collected by the things
    • G16Y20/10Information sensed or collected by the things relating to the environment, e.g. temperature; relating to location
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y20/00Information sensed or collected by the things
    • G16Y20/20Information sensed or collected by the things relating to the thing itself
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y20/00Information sensed or collected by the things
    • G16Y20/40Information sensed or collected by the things relating to personal data, e.g. biometric data, records or preferences
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/10Detection; Monitoring
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/20Analytics; Diagnosis
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/60Positioning; Navigation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/33Services specially adapted for particular environments, situations or purposes for indoor environments, e.g. buildings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Multimedia (AREA)
  • Tourism & Hospitality (AREA)
  • Economics (AREA)
  • Environmental & Geological Engineering (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Primary Health Care (AREA)
  • Emergency Management (AREA)
  • Human Resources & Organizations (AREA)
  • Public Health (AREA)
  • Educational Administration (AREA)
  • Human Computer Interaction (AREA)
  • General Engineering & Computer Science (AREA)
  • Operations Research (AREA)
  • Accounting & Taxation (AREA)
  • Automation & Control Theory (AREA)
  • Toxicology (AREA)
  • Biomedical Technology (AREA)
  • Devices For Checking Fares Or Tickets At Control Points (AREA)

Abstract

The application provides a luggage pre-inspection risk interception method, which comprises the following steps: pre-checking the baggage and marking the risk baggage; tracking and positioning the luggage and generating a real-time motion trail of the luggage; when the baggage is extracted, the baggage is risk-associated with the passenger; and intercepting the risk baggage and the risk passenger in the risk interception channel. According to the luggage pre-detection risk interception method, the luggage pre-detection is preposed, the risk luggage is marked, the luggage is tracked and positioned, the real-time movement track of the luggage is generated, the luggage and the passengers are subjected to risk association, synchronous interception of the risk luggage and the risk passengers is realized, and the safety risk and the success rate of risk interception in public places are improved.

Description

Luggage pre-inspection risk interception method
Technical Field
The application belongs to the technical field of baggage inspection, and particularly relates to a baggage pre-inspection risk interception method.
Background
When a passenger takes a transportation means such as an airplane, a shipping, an automobile and the like to go out for work or travel, the passenger can usually carry the baggage, and passenger stations of each transportation means need to check the checked baggage and the carried baggage of the passenger in order to prevent public hazard events, and if some contraband is met, the baggage needs to be intercepted, and then the baggage is finally arrived at a baggage owner, so that effective baggage management and control are realized.
In the prior art, a conventional baggage inspection method is that after a passenger arrives and baggage arrives, the passenger goes to handle related procedures, a worker performs a pre-inspection for each baggage, and then the problematic baggage is separated individually. The method is divided into baggage to be checked and safety baggage. At this time, after the passenger completes the relevant procedures, the passenger cannot find own baggage in the baggage extracting area, actively communicates with staff, and then takes the baggage and unpacks the baggage for inspection. However, the experienced illegal passengers avoid interception, so that risks can be perceived in advance to escape, and the illegal passengers avoid tracking, which is also the reason for the high acquisition rate and low interception rate of the existing transportation and passenger transport places; in addition, because of numerous luggage and personnel, the lack of an effective supervision method is easy to confuse.
Disclosure of Invention
The embodiment of the application aims to provide a luggage pre-inspection risk interception method, which aims to solve the technical problems of successful risk interception rate and insufficient character confusion in the risk interception process in the prior art.
In order to achieve the above purpose, the application adopts the following technical scheme: the luggage pre-inspection risk interception method comprises the following steps:
pre-checking the baggage and marking the risk baggage;
tracking and positioning the luggage and generating a real-time motion trail of the luggage;
when the baggage is extracted, the baggage is risk-associated with the passenger;
and intercepting the risk baggage and the risk passenger in the risk interception channel.
Preferably, the method for tracking and positioning the baggage comprises the following steps:
applying a positioning unit to the baggage;
the vibration sensing system of the positioning unit wakes up the positioning unit, and the positioning unit sends active positioning information to the background monitoring system through the active positioning unit;
the background monitoring system sends an instruction to the positioning unit when passive positioning information of the positioning unit is not acquired within a time threshold T after active positioning information is received;
after receiving the instruction, the positioning unit sends active positioning information to the background monitoring system through the active positioning unit.
Preferably, after the vibration sensing system of the positioning unit wakes up the positioning unit, the method comprises the steps of:
after the positioning unit sets an automatic wake-up clock of a time threshold T, the positioning unit enters a sleep state again, and the positioning unit cannot be repeatedly awakened by the vibration sensing system within the range of the time threshold T;
and after the time threshold value T is reached, the clock is automatically awakened to wake up the positioning unit, and the instruction of the background monitoring system is waited to be received.
Preferably, the method for generating the real-time motion trail of the baggage comprises the following steps:
and performing curve fitting on the passive positioning information and the active positioning information according to the receiving time to generate a real-time motion track of the luggage.
Preferably, the method for risk association of baggage with passengers when baggage is fetched comprises:
acquiring a face image of a passenger when the passenger extracts the luggage;
associating the passenger with the baggage;
if the baggage is marked as a risky baggage, the passenger is marked as a risky passenger.
Preferably, the method for associating baggage with a passenger when retrieving baggage further comprises:
when a passenger places luggage, a passenger bending placement action image and a face image are obtained in advance;
when a passenger extracts luggage, obtaining a passenger bending extraction action image and a face image;
if the action image recognition or the face image recognition of the same baggage is not consistent with the extraction, the baggage and the passengers when the baggage is extracted are marked as risk baggage and risk passengers.
Preferably, the passenger bending action image is the last frame image of the separation of the passenger finger and the luggage, and the passenger bending extraction action image is the first frame image of the contact of the passenger finger and the luggage.
Preferably, before the passenger extracts the baggage, the method comprises the steps of:
the baggage is spatially adjusted such that the spatial direction when the baggage is placed coincides with the spatial direction when the baggage is retrieved.
Preferably, the method for intercepting the risk baggage and the risk passenger in the risk interception channel comprises the following steps:
after the passengers and the baggage enter the risk interception channel, face images and baggage IDs are identified, the risk baggage and the risk passengers marked as risk are intercepted, and whether the risk is true is verified.
Preferably, if the risk is verified, the baggage with the same movement track is matched, the baggage is marked as the risk baggage, and the passenger picking up the baggage is marked as the risk passenger.
The luggage pre-inspection risk interception method provided by the application has the beneficial effects that: compared with the prior art, the method has the advantages that the risk baggage is marked by the pre-detection of the baggage, the baggage is tracked and positioned, the real-time movement track of the baggage is generated, the baggage and the passengers are subjected to risk association, the synchronous interception of the risk baggage and the risk passengers is realized, and the safety risk and the success rate of risk interception in public places are improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of a baggage pre-inspection risk interception method according to an embodiment of the present application;
FIG. 2 is a schematic top view of a baggage pre-screening scenario according to an exemplary embodiment of the present application;
FIG. 3 is a schematic perspective view of a baggage pre-screening process according to an exemplary embodiment of the present application;
FIG. 4 is a schematic top view of an extraction turret according to an exemplary embodiment of the application;
FIG. 5 is a schematic top view of a risk intercept channel according to an exemplary embodiment of the present application;
FIG. 6 is a flow chart of a method for tracking and locating baggage according to an exemplary embodiment of the present application;
FIG. 7 is a schematic diagram of generating a real-time motion profile of luggage, according to an exemplary embodiment of the present application;
fig. 8 is a schematic view of a scenario in which a passenger picks up baggage, according to an exemplary embodiment of the present application.
Detailed Description
In order to make the technical problems, technical schemes and beneficial effects to be solved more clear, the application is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
It will be understood that when an element is referred to as being "mounted" or "disposed" on another element, it can be directly on the other element or be indirectly on the other element. When an element is referred to as being "connected to" another element, it can be directly connected to the other element or be indirectly connected to the other element.
It is to be understood that the terms "length," "width," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like are merely for convenience in describing and simplifying the description based on the orientation or positional relationship shown in the drawings, and do not indicate or imply that the devices or elements referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus are not to be construed as limiting the application.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In the description of the present application, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
Referring to fig. 1, a method for intercepting a baggage pre-inspection risk according to an embodiment of the present application will now be described. The luggage pre-inspection risk interception method comprises the following steps:
step S1, pre-checking luggage and marking risk luggage;
s2, tracking and positioning the baggage and generating a real-time motion trail of the baggage;
step S3, carrying out risk association on the baggage and the passenger when the baggage is extracted;
and S4, intercepting the risk baggage and the risk passenger in the risk interception channel.
It will be appreciated that referring to fig. 1 to 5, in step S1, before a passenger enters a hall, the baggage is pre-checked in advance, the baggage pre-checking method includes that the passenger places the baggage in an upper baggage area of a baggage conveyor belt, an inductive power-off 10, a camera 20, an X-ray machine 30 and a sealing device 40 are arranged on the baggage conveyor belt, the inductive power-off 10 can monitor a conveying position of the baggage, the camera can record an image of each baggage, the X-ray machine can check the interior of the baggage, the baggage with abnormal baggage transmission or abnormal inspection by the X-ray machine is marked as a risk baggage, and the sealing device can seal a positioning card by using an adhesive tape or directly seal a positioning lock to realize tracking and positioning of the baggage.
It will be appreciated that the pre-screening action described above is performed for each baggage, so that the marking, tracking and locating of the risky baggage for the passenger is performed under hidden conditions, so that psychological stress is not generated for normal passengers, and the risky passengers are not perceived, reducing their vigilance.
In step S2-S3, after the sealing of the baggage is completed, the baggage can be tracked and positioned, a real-time movement track of the baggage is generated, the baggage can enter a baggage extracting area before the baggage is extracted, the baggage can be extracted by passengers in the area, the baggage extracted is not required, and the baggage can be circularly moved through an extracting turntable until the baggage is extracted.
Because the passengers cannot be tracked and positioned, the passengers can be tracked only through the baggage, the baggage can be intentionally exchanged after the baggage is pre-checked in order to avoid the situation of partner, or the baggage can be maliciously carried out by the passengers, and the baggage and the passengers are subjected to risk association when the baggage is extracted, so that the real association relationship can be obtained.
In step S4, the risk interception channel may set an area from which an alarm can be intercepted at a certain distance from the channel entrance. The personnel can check the baggage conveniently. The passageway mentioned here can set up the passageway of two gates, and the passenger gets into the entry gate after, and the entry gate is closed, and the passenger only need brush the export gate and can open behind the evidence piece, and the passenger is in the middle of the two gates this moment. The risk baggage and the risk passengers can be intercepted at the risk interception channel, so that the interception success rate is improved.
Compared with the prior art, the method for intercepting the risk of the baggage pre-inspection, provided by the application, has the advantages that the baggage pre-inspection is carried out, the risk baggage is marked, the baggage is tracked and positioned, the real-time motion trail of the baggage is generated, the baggage and the passenger are subjected to risk association, the synchronous interception of the risk baggage and the risk passenger is realized, and the safety risk of public places and the success rate of risk interception are improved.
In another embodiment of the present application, referring to fig. 6, in step S2, a method for tracking and positioning baggage includes:
applying a positioning unit to the baggage;
the vibration sensing system of the positioning unit wakes up the positioning unit, and the positioning unit sends active positioning information to the background monitoring system through the active positioning unit;
the background monitoring system sends an instruction to the positioning unit when passive positioning information of the positioning unit is not acquired within a time threshold T after active positioning information is received;
after receiving the instruction, the positioning unit sends active positioning information to the background monitoring system through the active positioning unit.
It will be appreciated that the locating unit may be built into a luggage sealing locating lock or card, which has a concealed and non-removable feature. When a passenger takes a rest in a hall, the luggage keeps still, the positioning unit keeps dormant, the vibration sensing system can sense vibration when the passenger drags the luggage to move, the positioning unit is awakened, the positioning unit sends active positioning information to the background monitoring system through the active positioning unit, the active positioning unit can be a GPS unit, but the background monitoring system only needs to know that the luggage is in the hall and starts to move through the active positioning information, the specific position of the luggage mainly passes through the passive positioning of the positioning unit, the positioning signal emission source in the hall sends positioning signals, for example, through the RFID identification device arranged in the hall, if the passenger carries the luggage to move in the hall, the RFID tag in the positioning unit can trigger different RFID identification devices in sequence along the way, the background monitoring system acquires the passive positioning information of the positioning unit, and does not send instructions to the positioning unit in the monitoring range; if the background monitoring system does not acquire the passive positioning information of the positioning unit within the range of the time threshold T after receiving the active positioning information, the background monitoring system indicates that the luggage is moving, but the luggage possibly escapes from the monitoring range, the background monitoring system sends an instruction to the positioning unit, and after receiving the instruction, the positioning unit sends the active positioning information to the background monitoring system through the active positioning unit, and the position of the luggage is determined again, if the escape phenomenon is confirmed, the luggage is detected at the first time.
Further, in step S2, after the vibration sensing system of the positioning unit wakes up the positioning unit, the method includes the steps of:
after the positioning unit sets an automatic wake-up clock of a time threshold T, the positioning unit enters a sleep state again, and the positioning unit cannot be repeatedly awakened by the vibration sensing system within the range of the time threshold T;
and after the time threshold value T is reached, the clock is automatically awakened to wake up the positioning unit, and the instruction of the background monitoring system is waited to be received.
It can be understood that the positioning unit enters the deep sleep state again after setting the automatic wake-up clock of the time threshold T, so that the power consumption can be saved during the sleep state, and the vibration sensing system cannot wake up repeatedly within the time threshold T. However, when the time threshold T is reached, the clock needs to be automatically awakened to wake up the positioning unit, and the instruction of the background monitoring system is waited to be received. Preferably, if the positioning unit waits for more than 2S, it enters the sleep state again. If the instruction is received in the waiting period of the positioning unit, the active positioning information is sent to the background monitoring system through the active positioning unit, the background monitoring system positions the active positioning information to judge the luggage position, and the passenger behavior is analyzed. In this way, the total time during the two wake-up states in the whole process does not exceed 5S, and the power consumption of the positioning unit is further saved.
Further, referring to fig. 7, the method for generating a real-time motion trajectory of baggage includes:
and performing curve fitting on the passive positioning information and the active positioning information according to the receiving time to generate a real-time motion track of the luggage.
It can be understood that by performing curve fitting on passive positioning information and active positioning information according to the receiving time, a real-time motion track of the baggage is generated, whether the behaviors of the baggage and the passenger are in an expected range can be monitored, and the real-time motion track is abnormal and can be intercepted in advance.
In another embodiment of the present application, referring to fig. 8, in step S3, a method for associating a baggage with a passenger at risk during baggage retrieval includes:
acquiring a face image of a passenger when the passenger extracts the luggage;
associating the passenger with the baggage;
if the baggage is marked as a risky baggage, the passenger is marked as a risky passenger.
It will be appreciated that since the baggage has been tracked prior to the passenger picking up the baggage, the passenger may be associated with the baggage by acquiring an image of the passenger's face as the passenger picks up the baggage, enabling a risk association of the baggage with the passenger.
Further, referring to fig. 8, in step S3, the method for associating the baggage with the passenger when the baggage is fetched further includes:
when a passenger places luggage, a passenger bending placement action image and a face image are obtained in advance;
when a passenger extracts luggage, obtaining a passenger bending extraction action image and a face image;
if the action image recognition or the face image recognition of the same baggage is not consistent with the extraction, the baggage and the passengers when the baggage is extracted are marked as risk baggage and risk passengers.
It can be understood that, since the passengers can track the baggage after placing the baggage on the conveyor belt under the action of the photoelectric or camera, the passengers maliciously picking up the baggage of other people or the passengers in combination with the crime to evade the tracking can be found by judging whether the action image recognition or the face image recognition of the baggage is consistent with the action image recognition of picking up the same baggage. Because of the action habit and human skeleton difference of each person, different passengers can enlarge the action gesture characteristics when bending down, which is beneficial to the accuracy of the identification of the action images.
Further, referring to fig. 8, in step S3, the passenger bending action image is the last frame image of the passenger finger separated from the baggage, and the passenger bending extraction action image is the first frame image of the passenger finger contacting the baggage.
It can be understood that the last frame of image of the separation of the passenger finger and the luggage and the first frame of image of the contact of the passenger finger and the luggage are in the unstressed state, and the action gesture of the same passenger under the two conditions is closest, so that the accuracy of the identification of the action image is further improved.
Further, in step S3, before the passenger extracts baggage, the method includes the steps of:
the baggage is spatially adjusted such that the spatial direction when the baggage is placed coincides with the spatial direction when the baggage is retrieved.
It can be understood that, in order to further improve the accuracy of motion image recognition, space adjustment is also performed on the baggage, for example, a rotating disc is provided on the conveyor belt, so that the space direction when the baggage is placed is consistent with the space direction when the baggage is extracted, the height of the baggage relative to the ground is also kept consistent, and the shooting angle of the camera is also kept consistent.
Further, referring to fig. 5, in step S4, a method for intercepting at-risk baggage and at-risk passengers in a at-risk interception channel includes:
after the passengers and the baggage enter the risk interception channel, face images and baggage IDs are identified, the risk baggage and the risk passengers marked as risk are intercepted, and whether the risk is true is verified.
It can be understood that the baggage ID can be sensed by the RFID recognition sensing device disposed in the risk interception channel, and the face image can be recognized by the face recognition device on the exit gate of the risk interception channel, and if the risk baggage or the risk passenger is determined, the risk baggage or the risk passenger is intercepted, and the security check personnel check the risk baggage or the risk passenger.
Further, in step S4, if the risk is verified, the baggage with the same movement track is matched, and the baggage is marked as a risk baggage, and the passenger who has picked up the baggage is marked as a risk passenger.
It can be understood that, in order to solve the problem of evading and tracking of the partner cases, the partner members of the same party can be found by matching the baggage with the same movement track, so that the security risk and the success rate of risk interception in public places are further improved. It should be noted that matching the same motion trajectory should include a time dimension, for example, the same motion trajectory formed by two passengers at different times or at larger time intervals, not the same motion trajectory. Of course, the same motion track may be that the matching rate of a certain period exceeds the matching threshold, and cannot be understood as the whole track or the track is identical.
The foregoing description of the preferred embodiments of the application is not intended to be limiting, but rather is intended to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the application.

Claims (10)

1. A baggage pre-screening risk interception method, comprising:
pre-checking the baggage and marking the risk baggage;
tracking and positioning the luggage and generating a real-time motion trail of the luggage;
when the baggage is extracted, the baggage is risk-associated with the passenger;
and intercepting the risk baggage and the risk passenger in the risk interception channel.
2. A baggage pre-screening risk interception method according to claim 1, wherein said baggage tracking and locating method comprises:
applying a positioning unit to the baggage;
the vibration sensing system of the positioning unit wakes up the positioning unit, and the positioning unit sends active positioning information to the background monitoring system through the active positioning unit;
the background monitoring system sends an instruction to the positioning unit when passive positioning information of the positioning unit is not acquired within a time threshold T after active positioning information is received;
after receiving the instruction, the positioning unit sends active positioning information to the background monitoring system through the active positioning unit.
3. The baggage pre-screening risk interception method according to claim 2, comprising the steps of, after waking up the locating unit by the vibration sensing system of the locating unit:
after the positioning unit sets an automatic wake-up clock of a time threshold T, the positioning unit enters a sleep state again, and the positioning unit cannot be repeatedly awakened by the vibration sensing system within the range of the time threshold T;
and after the time threshold value T is reached, the clock is automatically awakened to wake up the positioning unit, and the instruction of the background monitoring system is waited to be received.
4. The baggage claim risk interception method according to claim 2, wherein the method of generating a real-time motion trajectory of the baggage comprises:
and performing curve fitting on the passive positioning information and the active positioning information according to the receiving time to generate a real-time motion track of the luggage.
5. A baggage claim-pre-screening risk interception method according to claim 1, wherein said method for risk-relating baggage to a passenger when baggage is retrieved comprises:
acquiring a face image of a passenger when the passenger extracts the luggage;
associating the passenger with the baggage;
if the baggage is marked as a risky baggage, the passenger is marked as a risky passenger.
6. The baggage claim risk intercept method of claim 5, wherein the method of associating baggage with a passenger when retrieving baggage further comprises:
when a passenger places luggage, a passenger bending placement action image and a face image are obtained in advance;
when a passenger extracts luggage, obtaining a passenger bending extraction action image and a face image;
if the action image recognition or the face image recognition of the same baggage is not consistent with the extraction, the baggage and the passengers when the baggage is extracted are marked as risk baggage and risk passengers.
7. The baggage pre-screening risk interception method of claim 6, wherein the passenger stoop placement motion image is a last frame image in which a passenger finger is separated from the baggage, and the passenger stoop extraction motion image is a first frame image in which the passenger finger is in contact with the baggage.
8. The baggage claim 6 wherein the baggage claim risk interception method comprises the steps of, prior to the passenger's baggage extraction:
the baggage is spatially adjusted such that the spatial direction when the baggage is placed coincides with the spatial direction when the baggage is retrieved.
9. The baggage pre-screening risk interception method according to claim 1, wherein the method for intercepting the risk baggage and the risk passenger in the risk interception channel comprises:
after the passengers and the baggage enter the risk interception channel, face images and baggage IDs are identified, the risk baggage and the risk passengers marked as risk are intercepted, and whether the risk is true is verified.
10. The baggage claim-ing risk intercepting method according to claim 9, wherein if the risk is verified, baggage having the same movement trajectory is matched, and the baggage is marked as a risk baggage, and a passenger who picks up the baggage is marked as a risk passenger.
CN202310873521.7A 2023-07-17 2023-07-17 Luggage pre-inspection risk interception method Pending CN116957890A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310873521.7A CN116957890A (en) 2023-07-17 2023-07-17 Luggage pre-inspection risk interception method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310873521.7A CN116957890A (en) 2023-07-17 2023-07-17 Luggage pre-inspection risk interception method

Publications (1)

Publication Number Publication Date
CN116957890A true CN116957890A (en) 2023-10-27

Family

ID=88455938

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310873521.7A Pending CN116957890A (en) 2023-07-17 2023-07-17 Luggage pre-inspection risk interception method

Country Status (1)

Country Link
CN (1) CN116957890A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117877155A (en) * 2024-03-11 2024-04-12 盛视科技股份有限公司 Risk interception method based on automatic snapshot of mobile face

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117877155A (en) * 2024-03-11 2024-04-12 盛视科技股份有限公司 Risk interception method based on automatic snapshot of mobile face
CN117877155B (en) * 2024-03-11 2024-05-28 盛视科技股份有限公司 Risk interception method based on automatic snapshot of mobile face

Similar Documents

Publication Publication Date Title
US11978256B2 (en) Face concealment detection
EP3291191B1 (en) Suspicious person report system and suspicious person report method
CN104077648B (en) Radioactive source temporary library management method based on RFID tag
CN109598661A (en) Intelligence community security system and detection method based on recognition of face
CN109543625B (en) Mine personnel unique identification system and method
CN112489272A (en) Intelligent security control system special for garden
CN116957890A (en) Luggage pre-inspection risk interception method
CN106355721A (en) Intelligent access control security and protection system
CN111383132A (en) Intelligent construction site management system and management method suitable for epidemic situation period
CN207927879U (en) The intelligent protection helmet and system
CN108397235B (en) A kind of coal mine safety monitoring-inspecting management system
CN106546338A (en) Self-service passing method for health quarantine
CN108764388A (en) A kind of airdrome luggage label tracing system
CN209433456U (en) A kind of face identification system for computer room
AU2011383787B2 (en) System and method for alerting and tracking with improved confidentiality
CN206042220U (en) Prison personnel's indoor video monitor system based on RFID
CN111724526A (en) High-speed rail remote control operation door
CN106327760B (en) Limited space operation safety protection system
CN209312052U (en) A kind of carry-on police system of recognition of face
WO2024140800A1 (en) Early machine inspection item tracking method and system
CN215642755U (en) Hidden marking system for illegal luggage in customs inspection
CN106849355A (en) A kind of transformer station's detecting system based on X-ray machine people
CN209842636U (en) Identity recognition system for prisons
CN212433840U (en) Job site safety inspection access control system
CN209525689U (en) A kind of automatic attendance access control system of underground operators

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination