Regional security method and system based on face recognition

A face recognition and area technology, applied in character and pattern recognition, image data processing, instruments, etc., can solve problems such as low accuracy, low efficiency of risk identification, and large labor costs

Active Publication Date: 2019-09-17
TERMINUSBEIJING TECH CO LTD
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of this application is to propose a method and system for regional security based on face recognition, to improve the level of crimina

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Regional security method and system based on face recognition
  • Regional security method and system based on face recognition
  • Regional security method and system based on face recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, not to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0052] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0053] figure 1 A flow chart showing an area security method based on face recognition according to an embodiment of the present invention. like figure 1 As shown, the regional security method based on face recognition includes:

[0054] Step S11 , perform face recognition on at ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a regional security method and system based on face recognition. The method comprises the following steps of extracting a criminal suspect feature set through a multi-overlapping face recognition algorithm; calculating a fan-shaped angle according to the escape direction of the criminal suspect, sending the criminal suspect feature set to an identification device in a fan-shaped region by taking the place of the criminal suspect identified by the identification device as a circle center in a fan-shaped gradient diffusion mode, starting a criminal suspect wandering program, and returning a wandering result when finding that the criminal suspect is hit; when the fan-shaped region touches the transportation hub, sending a criminal suspect prompt to a passage control device in the transportation hub, monitoring and intercepting the criminal suspect in real time, and returning an interception result to the security management department; and when the fan-shaped region touches the residential region, sending a criminal suspect prompt to an access control system of the residential region, forbidding the criminal suspect to enter, and returning an interception result to the security management department. According to the invention, the regional security efficiency is improved.

Description

technical field [0001] The present application relates to the field of security management, in particular to an area security method and system based on face recognition. Background technique [0002] Wanted criminal suspects are an important part of security management, which aims to improve security management and social security levels, and provide better support for protecting the safety of the people. The criminal suspect wanted is centered on identifying the criminal suspect, analyzing the characteristics of the criminal suspect, and focusing on monitoring the area where the criminal suspect has absconded. The traditional wanted criminal suspects are still in the manual wanted mode, or passively wait for relevant personnel to call the police, without realizing daily detection and intelligent monitoring, and failing to realize the use of face recognition technology, which wastes a lot of manpower, material resources and financial resources. Sometimes the timing of appr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00G06K9/32G06T7/246G06Q50/26
CPCG06T7/246G06Q50/265G06V40/172G06V10/25
Inventor 寇京珅
Owner TERMINUSBEIJING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products