Unlock instant, AI-driven research and patent intelligence for your innovation.

Security monitoring method and device, electronic device, storage medium

A monitoring equipment and security technology, applied in the fields of security monitoring, security monitoring devices, electronic equipment, and storage media, can solve the problems of document information verification, lack of recording and preservation, and difficulties that cannot be monitored.

Active Publication Date: 2022-07-08
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, the existing security scheme cannot effectively verify the certificate information of the monitoring target, nor can it conduct a risk assessment on the behavior of the monitoring target and the purpose of the visit
In addition, after the monitoring target enters the internal area, the behavior of the monitoring target in the internal area cannot be effectively monitored.
In addition, the existing technology also lacks an effective method for complete and detailed recording and preservation of the detailed access records of historical monitoring targets
There are certain difficulties in querying historical access records in the later period

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security monitoring method and device, electronic device, storage medium
  • Security monitoring method and device, electronic device, storage medium
  • Security monitoring method and device, electronic device, storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments, however, can be embodied in various forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.

[0052] Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repeated descriptions will be omitted. Some of the block diagrams shown in the figures are functional entities that do not necessarily necessarily correspond to physically or logically separate entities. These functi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure relates to the technical field of security monitoring, and in particular, to a security monitoring method, as well as a security monitoring device, an electronic device, and a storage medium. The method includes: generating a corresponding access path according to location information of an access object of a monitoring target; acquiring monitoring data, and performing image recognition on the monitoring data to determine whether the monitoring target appears in a prohibited area other than the access path; An alarm is triggered if the monitoring target enters the forbidden area. The solution of the present disclosure can realize real-time monitoring of the behavior and trajectory of the monitoring target.

Description

technical field [0001] The present disclosure relates to the technical field of security monitoring, and in particular, to a security monitoring method, as well as a security monitoring device, an electronic device, and a storage medium. Background technique [0002] In the field of security, when an enterprise, an agency or an internal area with a security level is visited by outsiders, most of the existing security measures adopt the method of manual registration. Access objects and other information. [0003] The above-mentioned prior art has certain defects and deficiencies. For example, the existing security solutions cannot effectively verify the credential information of the surveillance target, nor can it conduct risk assessment on the behavior of the surveillance target and the purpose of the visit. In addition, after the monitoring target enters the inner area, the behavior of the monitoring target in the inner area cannot be effectively monitored. In addition, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G08B13/196H04N7/18
Inventor 夏新
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN