Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security management method, device and equipment and computer storage medium

A management method and target object technology, applied in the field of security, can solve the problems of authorization control, high construction cost, and inability to identify personnel

Pending Publication Date: 2020-06-23
ZUNYI BRANCH OF CHINA MOBILE GRP GUIZHOU COMPANY +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Only when the person entering or exiting through the professional face recognition access control system, when the person's face is aligned with the recognition camera, the access control system can confirm whether there is a person entering and the legitimacy of the person entering through face comparison. The area of ​​the identification system, or the area where the access control is open, cannot carry out personnel identification and authorization control; the personnel identification function is limited to the identification system deployment channel, and requires short-distance identification; Centers, logistics parks, confidential unit areas, office buildings, colleges and other scenarios that require full coverage, real-time, accurate personnel identification, authorized supervision, fast positioning, and track tracking, the construction cost is high, the management is passive, and it cannot meet the supervision needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security management method, device and equipment and computer storage medium
  • Security management method, device and equipment and computer storage medium
  • Security management method, device and equipment and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The characteristics and exemplary embodiments of various aspects of the present invention will be described in detail below. In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only configured to explain the present invention, not to limit the present invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention.

[0051] It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security management method, device and equipment and a computer storage medium. The method comprises the following steps: acquiring monitoring videos in a plurality of regions; extracting physical features of the target object from the monitoring video; comparing the physical characteristics of the target object with the physical characteristics of the registered object to determine the identity of the target object; determining authorization information of the target object according to the identity; and displaying the identity and authorization information of the target object in a video picture. According to the embodiment of the invention, the identity of a person can be identified, and intelligent security management is realized.

Description

technical field [0001] The invention belongs to the field of security technology, and in particular relates to a security management method, device, equipment and computer storage medium. Background technique [0002] At present, face recognition technology is based on face biometrics and computer network technology. Through face comparison, it can efficiently realize functions such as visitor identity confirmation, visitor authorization information verification, and visitor activity range management. [0003] In the field of security, as an important means of personnel management, face recognition technology is more and more widely used. In various parks and offices, the popularity of face recognition access control systems has gradually increased, and it has become a trend, making it a new standard for security management in major communities, office buildings, schools and other places. [0004] As a mainstream biometric technology nowadays, face recognition access contro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/00H04N7/18
CPCH04N7/181G06V40/10
Inventor 雷剑谭明强李文华赵耀孙岚陶珮花玥
Owner ZUNYI BRANCH OF CHINA MOBILE GRP GUIZHOU COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products