Unlock instant, AI-driven research and patent intelligence for your innovation.

Security monitoring method and system

A security and monitoring threshold technology, applied in the field of communication, can solve problems such as the inability to accurately determine the flow of children and the large flow of flow

Active Publication Date: 2020-11-17
北京微油科技服务有限公司
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In modern society, people pay more and more attention to the safety of kindergartens. For safety considerations, kindergartens will place at least one security guard at the school gate, and the security guards will monitor the mobile personnel who often stay or stay around the school gate for a long time to prevent certain Some floating personnel spy on the internal situation of the kindergarten and threaten the safety of children, such as abducting children, etc. However, due to the large flow of floating personnel and the existence of certain defects (such as face blindness) in the security personnel, the security personnel cannot accurately determine the possible Migrants who threaten young children

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security monitoring method and system
  • Security monitoring method and system
  • Security monitoring method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0042] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It should be understood that the data so used may be interchanged under appropriate circumstances for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a security monitoring method and system, the method comprising: the camera sends the preset area data collected in real time to the server; the server analyzes the preset area data, obtains the faces contained in the preset area, and The number of times and / or the length of appearance of each face in the preset area; the server judges whether the number of times and / or the length of appearance of each face in the preset area exceeds the first monitoring threshold; if the number of people in the preset area When the number of times and / or the duration of appearance of the face exceeds the first monitoring threshold, the server sends warning information to the user terminal of the user, wherein the warning information includes the face data. Through the above method, data collection is carried out on the migrants in the area around the kindergarten gate, and the server can accurately find the migrants who may threaten the children, and remind the security personnel to pay attention to these migrants who may threaten the children.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular, to a security monitoring method and system. Background technique [0002] In modern society, people pay more and more attention to the safety of kindergartens. For safety considerations, kindergartens will place at least one security guard at the school gate, and the security guards will monitor the mobile personnel who often stay or stay around the school gate for a long time to prevent certain Some floating personnel spy on the internal situation of the kindergarten and threaten the safety of children, such as abducting children, etc. However, due to the large flow of floating personnel and the existence of certain defects (such as face blindness) in the security personnel, the security personnel cannot accurately determine the possible Migrants who threaten young children. Contents of the invention [0003] The main purpose of this application is to provi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G08B21/02G06K9/00
CPCG08B21/02G07C2209/08G07C9/38G07C9/37G06V40/161G06V40/172
Inventor 张小勇
Owner 北京微油科技服务有限公司