Safety visual management method and management device

A technology of management devices and management methods, applied in the field of security visualization management methods and management devices, can solve problems such as poor coordination, safety environment risks, and paralysis, and achieve the effect of improving stability and ensuring the scope of monitoring

Pending Publication Date: 2021-11-19
ZHENGZHOU YOUMEI INTELLIGENT TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] As the most front-end monitoring device, the camera is the most important part of the entire security monitoring and visual management. Once the camera is damaged, the entire security visual management system will be paralyzed; but the cameras currently on the market, such as dome cameras, hemispherical Cameras, pinhole cameras, etc. are often pursuing technological updates such as image quality effects and automatic control performance, and often lack anti-theft and anti-vandalism functions. On-site conditions; and after the camera is damaged, it is impossible to continue security monitoring, or it cannot be repaired in time, which poses a great risk to the security environment; moreover, in an environment where multiple cameras are jointly monitored, multiple cameras often work independently , each monitors the environment within its own field of vision, and when one of the cameras is damaged, the other cameras often cannot perform corresponding emergency responses, and the coordination is poor, resulting in an unstable security network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety visual management method and management device
  • Safety visual management method and management device
  • Safety visual management method and management device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0032] see Figure 1 to Figure 6 , a safety visualization management device, used to implement a safety visualization management method, the management device includes a support part 1 for supporting the entire device, and one side of the support part 1 is provided with a bracket for fixing the entire management device;

[0033] A first rotating platform 2 is movably embedded in the cavity of the supporting part 1, and the first rotating platform 2 is used to support and adjust the first camera 205; specifically, an annular chute is provided on the inner wall of the supporting part 1, and the first rotating platform 2 is used to support and adjust the first camera 205; Free-rotating sliding balls 208 are evenly embedded on the outer circumference of the rotating platform 2 , and the outer circumference of the first rotating platform 2 and the sliding balls 208 are located in the chute. During the rotation of the first rotating platform 2, its outer circumference and the slidin...

no. 2 example

[0044] When the damaged management device is severely damaged and the first camera 205 is destroyed, the real-time shooting picture cannot be obtained. Even if the first driving motor 203 is controlled to work remotely through the control platform, the shooting picture of the first camera 205 cannot be obtained. Also just can't determine whether the first drive motor 203 works normally, if the first drive motor 203 is damaged, will not be able to drive the first rotating platform 2 to rotate by the first driving motor 203, and then also cannot drive the second rotation by the first rotating platform 2 The platform 3 rotates, and the shooting angle of the second camera 303 cannot be accurately adjusted to capture the personal characteristics of the saboteur. Therefore, before the relevant device works according to the working principle in Embodiment 1, it must be confirmed whether the first driving motor 203 is intact; If the first drive motor 203 is intact, the relevant devices...

no. 3 example

[0050] A security visualization management method, the security visualization management method involves invoking a management device for security management, such as Figure 7-8 As shown, the management method includes the following steps:

[0051] Set up multiple sets of management devices, so that the first camera 205 of any one of the management devices is located within the field of view of the first camera 205 of the adjacent management device, and the second camera 303 of any one of the management devices is located in the adjacent management device within the field of view of the second camera 303 of the device; to ensure that when the first camera 205 of any management device is artificially destroyed, the angle of the first camera 205 of the nearest or adjacent management device can be remotely adjusted by the control platform , to capture the information of saboteurs, so that each management device can cooperate with each other, and improve the stability of monitoring...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of visual safety management, and discloses a safety visual management method and management device. When a first camera of any one management device is artificially damaged, a control platform calls the nearest management device and adjusts the visual angles of the first camera and the second camera above the nearest management device, and the first camera and the second camera are controlled by the control platform; then the control platform controls the second camera of the nearest management device to extend out of the management device and calculates the descending height at the same time, and the control platform controls the damaged second camera in the management device to extend out of the management device according to the descending height of the second camera in the nearest management device. The descending height of the second camera in the damaged management device is controlled, so that the second camera in the damaged management device shoots a destroying person and obtains clear image information of the destroying person, thereby improving the effectiveness of monitoring protection and increasing the reliability of creating a safe monitoring environment.

Description

technical field [0001] The invention relates to the technical field of visualized security management, in particular to a security visualized management method and a management device. Background technique [0002] Security visualization refers to the presentation technology in security monitoring, which converts data and results in the process of security monitoring equipment, security reinforcement, detection, defense, response, etc. Theories, methods and technologies for searching, invoking, summarizing and other operations in an interactive manner. The most front-end monitoring security information source of security visualization management is often the camera. The camera converts the picture in the monitored security environment into an information signal and transmits it to the control platform, and then the control platform equipment presents the monitoring picture on the control platform screen for monitoring personnel. View in real time. [0003] As the most fron...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/18F16M11/18
CPCH04N7/181F16M11/18
Inventor 李忠李国朋郭利军张在渊
Owner ZHENGZHOU YOUMEI INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products