Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Patrol intelligent monitoring terminal and working method thereof

A technology of intelligent monitoring and working methods, which is applied in the direction of TV, color TV, cameras, etc., can solve the problems of inaccurate and efficient video acquisition, large amount of collected data, low working methods and working efficiency, etc., and achieve comprehensive monitoring effects, safe operation, wide-ranging effect

Inactive Publication Date: 2019-11-08
SHENZHEN WELL ELECTRIC
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Although this kind of law enforcement recorder can directly transmit video to the server, it collects a lot of data and needs to be integrated, so it cannot accurately and efficiently collect video, and its working method and work efficiency are low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Patrol intelligent monitoring terminal and working method thereof
  • Patrol intelligent monitoring terminal and working method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] A kind of working method of patrol intelligent monitoring terminal, refer to figure 1 , including step S101 to step S105.

[0054] Step S101: Obtain a user's use request, which carries the user's identity information.

[0055] Obtaining the user's use request can be the user's fingerprint information, or information corresponding to the user's identity such as the account number and password information requested by the user. After obtaining such information, the user's use request is obtained. Request, the identity information is the unique identity corresponding to the fingerprint information or account password information.

[0056]Step S102: verify the identity information of the user, and allow the user to use after the verification is passed.

[0057] The user's identity information is compared with the information of the usable terminal preset in the database, and if it belongs to the permission information stored in the database, the user has passed the verifi...

Embodiment 2

[0071] A patrol intelligent monitoring terminal, refer to figure 2 , including a processor 1 and a memory 2, the memory 2 stores an instruction set for the processor 1 to call to realize the following functions:

[0072] Obtain the user's use request, which carries the user's identity information;

[0073] Verify the identity information of the user, and allow the user to use after the verification is passed;

[0074] Obtain wide-angle image monitoring information;

[0075] Extract the face information in the wide-angle image monitoring information, and compare the extracted face information with the target person information;

[0076] If it is judged that the extracted face information is consistent with the information of the target person, then another zoom camera is used to lock the target person.

[0077] After the authentication of the identity information is passed, the use authority corresponding to the identity information of the user is released.

[0078] Lockin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a patrol intelligent monitoring terminal and a working method thereof, and relates to the field of monitoring. The method comprises the following steps of verifying identity information of a user, and allowing the user to use after the verification is passed; acquiring wide-angle image monitoring information; extracting face information in the wide-angle image monitoring information, and comparing the extracted face information with target person information; and if the extracted face information is consistent with target person information, locking a target person through another zoom camera; and obtaining a use request of the user, and if the identity information passes the verification, allowing the user to use, thereby preventing a person without use permissionfrom influencing the use of the terminal. Wide-angle image monitoring information is obtained, the picture range is wide, a large range can be monitored, the extracted face information is compared with target person information, if the extracted face information is consistent with the target person information, another zoom camera is started to lock and monitor the target person, wide-area monitoring is guaranteed, and meanwhile target person monitoring is more targeted and comprehensive.

Description

technical field [0001] The invention relates to the monitoring field, and more specifically, it relates to a patrol intelligent monitoring terminal and a working method thereof. Background technique [0002] Law enforcement recorder is also called police law enforcement recorder or field law enforcement recorder. Integrating the functions of digital camera, digital camera and intercom transmitter, it can digitally record dynamic and static scene conditions during the law enforcement process, which is convenient for public security officers to use in law enforcement in various environments. [0003] During the law enforcement process, law enforcement personnel collect dynamic or static law enforcement data in fields, urban areas, factories and other law enforcement sites through law enforcement recorders, and bring the collected law enforcement data back to the control center, upload them to the indoor law enforcement data collection workstation, and The indoor law enforceme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N5/225H04N5/232H04N7/18G06K9/00G03B17/55G03B30/00
CPCH04N7/18G03B17/55G06V40/172G06V20/52H04N23/50H04N23/67H04N23/611H04N23/695
Inventor 欧添城胡文龙谭卓华陈勇
Owner SHENZHEN WELL ELECTRIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products