Key person monitoring method based on a face recognition technology

A face recognition and key technology, applied in the field of computer vision, to achieve the effect of flexible deployment and control mechanism, rich real-time alarms, and wide application fields

Pending Publication Date: 2019-05-24
北京远鉴信息技术有限公司
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For other biometric identification technologies, due to reasons such as user experience, accuracy, stability, and technical maturity, market feedback still needs further verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key person monitoring method based on a face recognition technology
  • Key person monitoring method based on a face recognition technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. Such as figure 1 Shown, method of the present invention comprises the following steps:

[0049] Step 1. Based on computer vision technology, the face images in the video are automatically collected and compared, and long-distance, non-contact monitoring and early warning of key people are carried out:

[0050] Step 1.1. Maintain key person information, enter the key person import interface, and import key person information in batches;

[0051] Step 1.2. Add, modify, and delete key person information in the system;

[0052] Step 2. Select the file to be imported, fill in the import description information and display the import success information and import failure information and explain the original image of the failure;

[0053] Step 3. Conduct key person query:

[0054] Step 3.1. Enter the name of the person on the key person query interface to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key person monitoring method based on a face recognition technology. The method is characterized in that on the basis of a computer vision technology, a camera is used for capturing the human face of each passing person, collected portrait information is compared with target persons in a key person deployment and control library in real time through a portrait comparisonmodule, and when the comparison value meets the set requirement, a real-time alarm message is sent for reminding. The system has the advantages that the system has automatic discovery and automatic alarm functions, alarm can be given through an APP, a short message or other forms, alarm information comprises suspect information, a flexible deployment and control mechanism is achieved, and the system is portable and capable of achieving real-time face deployment and control. The method has a perfect face library management mechanism, is also suitable for a non-real-time monitoring scene, namelyperforms identification and message pushing in a recorded video file, and has relatively high practical value and practical significance.

Description

technical field [0001] The invention belongs to the technical field of computer vision, and in particular relates to a key person monitoring method based on face recognition technology. Background technique [0002] Identification is a fundamental problem of social life with a wide range of needs. Mechanical keys have been used in human society for more than 3,000 years, which can be regarded as the earliest identification technology. With the development of modern electronic technology, passwords, barcodes, magnetic stripe cards, radio frequency cards, chip certificates, etc. have been widely used, but such identification technologies are all realized through "what do you have" or "what do you know", It is easy to be forged, lost, and forgotten, and it is inconvenient and unsafe, and cannot truly authenticate the person himself. [0003] Biometric identification is a technology to identify the identity based on the inherent physiological and behavioral characteristics of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00
Inventor 王黎明赵玉军伭剑辉郭泽文高志江孔彦赵海
Owner 北京远鉴信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products