[go: up one dir, main page]

CN112819989A - Park patrol method, device and equipment - Google Patents

Park patrol method, device and equipment Download PDF

Info

Publication number
CN112819989A
CN112819989A CN202110071216.7A CN202110071216A CN112819989A CN 112819989 A CN112819989 A CN 112819989A CN 202110071216 A CN202110071216 A CN 202110071216A CN 112819989 A CN112819989 A CN 112819989A
Authority
CN
China
Prior art keywords
patrol
information
route
client
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110071216.7A
Other languages
Chinese (zh)
Inventor
周坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN202110071216.7A priority Critical patent/CN112819989A/en
Publication of CN112819989A publication Critical patent/CN112819989A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/20Checking timed patrols, e.g. of watchman

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a park patrol method, a park patrol device and park patrol equipment, wherein the method comprises the following steps: acquiring a patrol route matched with the patrol object, wherein the patrol route comprises patrol points in a garden; sending the patrol route to a client corresponding to the patrol object so that the client stores the patrol route; receiving patrol data sent by acquisition equipment deployed at the patrol point, wherein the patrol data is patrol data acquired by the acquisition equipment when a patrol object passes through the patrol point; the patrol data at least comprises information to be identified of the patrol object, time information when the patrol object passes through the patrol point, and position information when the patrol object passes through the patrol point; determining identity information of the night patrol object based on the information to be identified; and storing the mapping relation among the identity information, the time information and the position information. Through the technical scheme of this application, can improve the efficiency of patrolling more object, conveniently patrol more object and patrol more to the garden according to the plan.

Description

Park patrol method, device and equipment
Technical Field
The application relates to the technical field of intelligent management, in particular to a park patrol method, a park patrol device and park patrol equipment.
Background
With the development of economy and the continuous increase of garden investment, the quantity of gardens is more and more, and the area of garden is bigger and bigger. The garden is the region of concentrating unified planning, sets up the enterprise of certain type specific trade or form specially in the region to unified management carries out, like industrial park (giving first place to with industrial enterprise), trade garden (giving first place to with trade enterprise), industrial park, commodity circulation garden, science and technology garden, agricultural park etc..
For property management of a campus, it is necessary to manage the entry and exit of personnel in the campus, check the facility state of the campus, and handle emergency situations in the campus. In order to realize property management of the park, the patrol of workers (also called security personnel or patrol personnel and the like) is an indispensable part of the property management, and the workers can patrol important places, discover the emergency conditions of the park in time and check the facility state of the park.
However, along with the area in garden is bigger and bigger, and the route in the garden is more and more, and how the staff should patrol the garden, especially, to the staff that the route is unclear in the garden, can't know through which route to patrol the garden to lead to staff's the efficiency of patrolling is very low.
Disclosure of Invention
The application provides a park patrol method, which is applied to management equipment and comprises the following steps:
acquiring a patrol route matched with a patrol object, wherein the patrol route comprises patrol points in a garden;
sending the patrol route to a client corresponding to the patrol object so that the client stores the patrol route, performing identity authentication on the patrol object when the patrol object logs in the client, and allowing the patrol object to check the patrol route if the identity authentication is successful;
receiving patrol data sent by acquisition equipment deployed at the patrol point, wherein the patrol data is patrol data acquired by the acquisition equipment when the patrol object passes through the patrol point; wherein the patrol data at least comprises information to be identified of the patrol object, time information when the patrol object passes through the patrol point, and position information when the patrol object passes through the patrol point;
determining identity information of the night patrol object based on the information to be identified;
and storing the mapping relation among the identity information, the time information and the position information.
For example, after the routing module sends the patrol route to the client corresponding to the patrol object, the method further includes: acquiring the current position of the night patrol object and the target position of the night patrol object; the target position is a position which needs to be reached when the patrol object patrols the garden;
acquiring an updated patrol route based on the current position and the target position;
and sending the updated patrol route to the client, so that the client replaces the patrol route before updating with the updated patrol route, and the patrol object is allowed to view the updated patrol route.
For example, the determining the identity information of the night patrol object based on the information to be identified includes:
if the acquisition equipment is a camera and the information to be identified is a target image of the night patrol object acquired by the camera, analyzing target characteristic information of the night patrol object from the target image, and inquiring a mapping relation between preset characteristic information and identity information through the target characteristic information to obtain identity information corresponding to the target characteristic information; or,
and if the acquisition equipment is NFC equipment and the information to be identified is the target label value of the night patrol object acquired by the NFC equipment, inquiring a mapping relation between a preset label value and identity information through the target label value to obtain identity information corresponding to the target label value.
In one possible embodiment, the method further comprises:
when an abnormal event occurs, acquiring the event type and the occurrence position of the abnormal event;
determining the current positions of all initial objects corresponding to the event type;
selecting a target object for processing the abnormal event from all the initial objects based on the current positions of all the initial objects and the occurrence position of the abnormal event;
and sending the information of the abnormal event to the target object.
Illustratively, the obtaining the event type and the occurrence location of the abnormal event includes:
after the patrol route is sent to a client corresponding to the patrol object, abnormal event data sent by the client is received, wherein the abnormal event data is data corresponding to an abnormal event discovered when the patrol object carries out patrol according to the patrol route; wherein the exceptional event data at least comprises an event type of the exceptional event and an occurrence location of the exceptional event.
Illustratively, the selecting a target object for processing the exception event from all the initial objects based on the current positions of all the initial objects and the occurrence position of the exception event includes:
determining the distance between the current position of each initial object and the occurrence position of the abnormal event based on the current position of the initial object and the occurrence position of the abnormal event;
and selecting the initial object corresponding to the minimum distance as the target object.
For example, after the routing module sends the patrol route to the client corresponding to the patrol object, the method further includes: receiving vehicle data sent by the client, wherein the vehicle data is vehicle data corresponding to illegal vehicles found when the patrol object patrols according to the patrol route; the vehicle data is a target license plate identification or a license plate image of the illegal vehicle, and if the vehicle data is the license plate image, the target license plate identification of the illegal vehicle is analyzed from the license plate image;
inquiring a mapping relation between a preset license plate identifier and an owner identity through the target license plate identifier to obtain the owner identity corresponding to the target license plate identifier;
and sending the information of the illegal vehicle to terminal equipment corresponding to the owner identity.
The application provides a park patrol method, which is applied to a client side and comprises the following steps:
acquiring a patrol route matched with a patrol object from a management device, and storing the patrol route; wherein the patrol route comprises at least one patrol point within the campus;
when the patrol object logs in the client, performing identity authentication on the patrol object; performing identity authentication on the patrol object comprises: acquiring the face data of the patrol object, comparing the face data with the face data in the database, and determining success or failure of identity authentication based on a comparison result;
and if the identity authentication is successful, allowing the patrol object to log in the client to check the patrol route, and prompting the patrol object to patrol according to the patrol route.
The application provides a park patrols and more installs, is applied to the management equipment, the device includes: the acquisition module is used for acquiring a patrol route matched with the patrol object; wherein the patrol route comprises patrol points in the garden; the sending module is used for sending the patrol route to a client corresponding to the patrol object so that the client stores the patrol route, performs identity authentication on the patrol object when the patrol object logs in the client, and allows the patrol object to check the patrol route if the identity authentication is successful; the receiving module is used for receiving patrol data sent by acquisition equipment deployed at the patrol point, wherein the patrol data is obtained by the acquisition equipment when the patrol object passes through the patrol point; wherein the patrol data at least comprises information to be identified of the patrol object, time information when the patrol object passes through the patrol point, and position information when the patrol object passes through the patrol point; the determining module is used for determining the identity information of the night patrol object based on the information to be identified; and the storage module is used for storing the mapping relation among the identity information, the time information and the position information.
The application provides a management device, including: a processor and a machine-readable storage medium storing machine-executable instructions executable by the processor;
the processor is configured to execute machine executable instructions to perform the steps of:
acquiring a patrol route matched with a patrol object, wherein the patrol route comprises patrol points in a garden;
sending the patrol route to a client corresponding to the patrol object so that the client stores the patrol route, performing identity authentication on the patrol object when the patrol object logs in the client, and allowing the patrol object to check the patrol route if the identity authentication is successful;
receiving patrol data sent by acquisition equipment deployed at the patrol point, wherein the patrol data is patrol data acquired by the acquisition equipment when the patrol object passes through the patrol point; wherein the patrol data at least comprises information to be identified of the patrol object, time information when the patrol object passes through the patrol point, and position information when the patrol object passes through the patrol point;
determining identity information of the night patrol object based on the information to be identified;
and storing the mapping relation among the identity information, the time information and the position information.
It can be seen from the above technical solution that in the embodiment of the present application, the management device can send the patrol route to the client, so that the client stores the patrol route, and when the patrol object logs in the client, if the identity authentication of the patrol object succeeds, the patrol object is allowed to view the patrol route, so that the patrol object who succeeds in the identity authentication can view the patrol route, and the garden is patrolled according to the patrol route, and the patrol object shall patrol the garden through which route, thereby improving the patrol efficiency of the patrol object, and facilitating the patrol object to patrol the garden according to the plan. Moreover, only the patrol object with successful identity authentication can check the patrol route, and other objects are prevented from replacing the patrol object to patrol the garden.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments of the present application or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art according to the drawings of the embodiments of the present application.
FIG. 1 is a schematic flow diagram of a campus night patrol method in one embodiment of the present application;
FIG. 2 is a schematic flow chart diagram of a campus night patrol method in one embodiment of the present application;
FIG. 3 is a schematic flow chart diagram of a campus night patrol method in one embodiment of the present application;
FIG. 4 is a schematic diagram of face recognition in one embodiment of the present application;
FIG. 5 is a schematic illustration of a night watch in one embodiment of the present application;
FIG. 6 is a schematic diagram of a night patrol function module in one embodiment of the present application;
FIG. 7 is a diagram illustrating message pushing according to an embodiment of the present application;
FIG. 8 is a schematic diagram of a campus night patrol unit according to an embodiment of the present application;
fig. 9 is a hardware configuration diagram of a management device according to an embodiment of the present application.
Detailed Description
The terminology used in the embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein is meant to encompass any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in the embodiments of the present application to describe various information, the information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. Depending on the context, moreover, the word "if" as used may be interpreted as "at … …" or "when … …" or "in response to a determination".
The embodiment of the present application provides a park patrol method, which may be applied to a management device (may also be referred to as a server), and referring to fig. 1, as a schematic flow diagram of the method, the method may include:
step 101, acquiring a patrol route matched with the patrol object, where the patrol route may include one or at least two patrol points in the garden, and the number of the patrol points is not limited.
For example, a worker (also referred to as a security guard, a patrol inspector, or the like) who patrols the park may be referred to as a patrol object, and the number of the patrol objects may be at least one. For each patrol object, the management device may configure a patrol route for the patrol object, and this configuration manner is not limited.
For example, the patrol route refers to a route that needs to be passed when a patrol object patrols a garden, that is, the patrol object needs to patrol the garden according to the patrol route, and the patrol route needs to include at least one patrol point in the garden, for example, the patrol route may sequentially pass through a patrol point a, a patrol point b, a patrol point c, a patrol point d, a patrol point e, a patrol point f and a patrol point g in the garden, and the patrol route is not limited.
The patrol routes for different patrol objects may be the same or different. The same patrol routes mean that the patrol routes are completely the same, and the different patrol routes mean that the patrol routes are not completely the same.
For the patrol routes of different patrol objects, completely different patrol points may be included, completely the same patrol points may be included, and partially repeated patrol points may be included. For example, the patrol route 1 is configured for the patrol object 1, the patrol route 1 includes a patrol point a, a patrol point b, and a patrol point c, the patrol object 2 is configured for the patrol object 2, the patrol route 2 includes a patrol point a, a patrol point b, and a patrol point c, the patrol object 3 is configured for the patrol object 3, the patrol route 3 includes a patrol point a, a patrol point c, and a patrol point d, the patrol object 4 is configured for the patrol object 4, the patrol route 4 includes a patrol point e and a patrol point f, and so on.
In summary, for each patrol object, the management device may obtain a patrol route matched with the patrol object, and the patrol route may include at least one patrol point in the garden.
And 102, sending the patrol route matched with the patrol object to a client corresponding to the patrol object, so that the client stores the patrol route, performs identity authentication on the patrol object when the patrol object logs in the client, and allows the patrol object to check the patrol route if the identity authentication is successful.
For example, for each patrol object, the management device may store a mapping relationship between an identifier of the patrol object and information (e.g., an APP identifier, an IP address of a terminal device where the client is located, etc.) of a client (i.e., APP) corresponding to the patrol object. After the patrol route matched with the patrol object is obtained, the mapping relation can be inquired based on the identification of the patrol object, the information of the client corresponding to the patrol object is obtained, and the patrol route matched with the patrol object is sent to the client based on the information of the client.
For example, after the patrol route 1 matched with the patrol object 1 is acquired, the mapping relationship may be queried based on an identifier (such as a user name) of the patrol object 1 to obtain information of a client corresponding to the patrol object 1, and the patrol route 1 may be sent to the client corresponding to the patrol object 1 based on the information of the client.
For example, after receiving the patrol route matched with the patrol object, the client may store the patrol route, and the patrol route includes at least one patrol point in the garden. For example, the client may store the patrol route in a specified storage medium of the terminal device, and the storage manner is not limited thereto.
For example, when the patrol object logs in the client, the client may also perform identity authentication on the patrol object. And if the identity authentication of the night patrol object is successful, allowing the night patrol object to log in the client to check the night patrol route by the client, and prompting the night patrol object to perform night patrol according to the night patrol route. For example, if the identity authentication of the patrol object is successful, the patrol object can log in the client, and the client can read the patrol route from the specified storage medium and display the patrol route to the patrol object, so that the patrol object views the patrol route, and then the patrol object patrols according to the patrol route. If the identity authentication of the patrol object is unsuccessful, the patrol object cannot log in the client, and the client cannot display the patrol route to the patrol object, namely, the patrol object which does not pass the identity authentication cannot check the patrol route.
The client performs identity authentication on the night patrol object, and may include: and the client receives the user name and the password input by the patrol object, and performs identity authentication on the patrol object based on the user name and the password. Or the client acquires the face data of the night patrol object, compares the face data with the face data in the database, and determines whether the identity authentication is successful or failed based on the comparison result. For example, if the face data of the patrol object matches with certain face data in the database (i.e. the similarity between the face data and the certain face data is greater than the similarity threshold), it is determined that the identity authentication is successful based on the comparison result. And if the face data of the night patrol object is not matched with all the face data in the database (namely the similarity is smaller than the similarity threshold), determining that the identity authentication fails based on the comparison result.
Step 103, receiving patrol data sent by a collection device deployed at a patrol point, where the patrol data may be patrol data obtained by the collection device when the patrol object passes through the patrol point. Illustratively, the patrol data may include, but is not limited to: the information to be identified of the patrol object, the time information when the patrol object passes through the patrol point, and the position information when the patrol object passes through the patrol point.
For example, after the patrol object checks the patrol route through the client, the patrol object can patrol the garden according to the patrol route, and the patrol route includes at least one patrol point in the garden, so the patrol object can pass through each patrol point included in the patrol route, and then one patrol point is taken as an example. For example, the patrol route includes a patrol point a, a patrol point b, and a patrol point c, and when the patrol object patrols the park according to the patrol route, the patrol object sequentially passes through the patrol point a, the patrol point b, and the patrol point c.
For example, at each patrol point on the campus, a collection device may be deployed, and the collection device is configured to obtain patrol data of the patrol object passing through the patrol point. For example, the acquisition device may be a camera (e.g., an analog camera or a web camera), and the patrol data of the patrol object passing through the patrol point is acquired by the camera. For another example, the acquisition device may be an NFC (Near Field Communication) device, and the NFC device acquires patrol data of the patrol object passing through the patrol point. Of course, the above are just two examples of the acquisition device, and the type of the acquisition device is not limited.
For example, a patrol point a in the garden can deploy collection equipment, a patrol route comprises the patrol point a, and when a patrol object patrols the garden according to the patrol route, the patrol point a can be passed through. Based on this, when the patrol object passes through the patrol point a, the acquisition device deployed at the patrol point a can acquire patrol data of the patrol object and send the patrol data of the patrol object to the management device, so that the management device receives the patrol data.
For example, if the acquisition device is a camera, the information to be identified may be a target image of the patrol object acquired by the camera, that is, when the patrol object passes through the patrol point a, the target image of the patrol object is acquired by the camera, and the target image is used as the information to be identified. Alternatively, if the acquiring device is a camera, the information to be recognized may be target feature information of the night patrol object, that is, when the night patrol object passes through the night patrol point a, the camera acquires a target image of the night patrol object, and the target feature information of the night patrol object is analyzed from the target image, for example, a face recognition technique is used to analyze face feature information of the night patrol object (e.g., feature information for representing a face of the night patrol object) from the target image, and the target feature information is used as the information to be recognized. Or, if the acquiring device is an NFC device, the information to be identified may be a target tag value of the patrol object acquired by the NFC device, that is, when the patrol object passes through the patrol point a, the NFC device acquires the target tag value of the patrol object (for example, when the patrol object contacts the NFC device using the terminal device, the NFC device acquires the tag value of the terminal device, and the tag value is used as the target tag value of the patrol object), and the target tag value is used as the information to be identified.
Of course, the above is only an example of the information to be identified, and the information to be identified is not limited thereto.
The patrol data may include time information (e.g., a certain time point) when the patrol object passes through the patrol point, for example, when the acquisition device acquires the information to be identified of the patrol object, the acquisition time point is used as the time information when the patrol object passes through the patrol point, and of course, other time points may also be used as the time information when the patrol object passes through the patrol point, and the time information is not limited.
The patrol data may include location information (e.g., location coordinates) of the patrol object passing through the patrol point, for example, the location coordinates of the acquisition device are used as the location information of the patrol object passing through the patrol point, and of course, other location coordinates may also be used as the location information, which is not limited to this.
To sum up, the acquisition device can acquire the patrol data of the patrol object passing through the patrol point, send the patrol data to the management device, and receive the patrol data by the management device, wherein the patrol data comprises the information to be identified of the patrol object, and the time information and the position information of the patrol object passing through the patrol point.
And 104, determining the identity information of the night patrol object based on the information to be identified.
For example, after receiving the patrol data, the management device may analyze information to be identified of the patrol object from the patrol data, and determine the identity information of the patrol object based on the information to be identified, where the following describes a determination process of the identity information. Of course, the following cases are only a few examples, and are not limited thereto.
In the first case, if the acquisition device is a camera and the information to be recognized is a target image of the patrol object acquired by the camera, the management device analyzes target feature information of the patrol object from the target image (for example, human face feature information of the patrol object is analyzed from the target image by adopting a human face recognition technology, such as feature information for representing a human face of the patrol object), and queries a mapping relationship between pre-configured feature information and identity information through the target feature information to obtain identity information corresponding to the target feature information.
And in the second situation, if the acquisition equipment is a camera and the information to be identified is target characteristic information of the night patrol object acquired by the camera, the management equipment can query a mapping relation between the preset characteristic information and the identity information through the target characteristic information to obtain the identity information corresponding to the target characteristic information.
In the first and second cases, the management device may pre-configure a mapping relationship between the feature information and the identity information, for example, for each patrol object used for patrolling the garden, collect an image (e.g., a face image) of the patrol object, analyze feature information (e.g., face feature information) of the patrol object from the image, and record a mapping relationship between the feature information and the identity information (e.g., a name, an identity card, a mobile phone number, etc.) of the patrol object. Of course, the mapping relationship may be configured in other ways, which is not limited in this respect.
In the first and second cases, after obtaining the target feature information of the patrol object, the management device may also query the mapping relationship through the target feature information, so as to obtain the identity information corresponding to the target feature information, where the identity information is the identity information corresponding to the patrol object.
And thirdly, if the acquisition equipment is NFC equipment and the information to be identified is a target label value of the night patrol object acquired by the NFC equipment, the management equipment can inquire a mapping relation between a preset label value and the identity information through the target label value to obtain the identity information corresponding to the target label value.
In a third case, the management device may pre-configure a mapping relationship between the tag value and the identity information, for example, for each patrol object used for patrolling the campus, first obtain the tag value (that is, the NFC tag value) of the terminal device used by the patrol object, and record the mapping relationship between the tag value and the identity information of the patrol object. Of course, the mapping relationship may be configured in other ways, which is not limited in this respect.
After the target tag value of the night patrol object is obtained, the mapping relation can be inquired through the target tag value, and the identity information corresponding to the target tag value, namely the identity information corresponding to the night patrol object, is obtained.
In summary, the management device may determine the identity information of the patrol object based on the information to be identified.
Step 105, storing the mapping relationship between the identity information, the time information and the location information.
For example, the management device may maintain a patrol record table, where the patrol record table is used to record a patrol record of each patrol object, and each patrol record may include a mapping relationship between identity information, time information, and location information. Based on this, after the management device receives the patrol data of the patrol object and determines the identity information of the patrol object, the management device can store the mapping relation of the identity information, the time information and the position information in the patrol record table. In the subsequent management process, the patrol record of each patrol object can be acquired based on the patrol record table. See table 1 for an example of the patrol record table.
TABLE 1
Figure BDA0002906010350000101
Figure BDA0002906010350000111
It can be seen from the above technical solution that in the embodiment of the present application, the management device can send the patrol route to the client, so that the client stores the patrol route, and when the patrol object logs in the client, if the identity authentication of the patrol object succeeds, the patrol object is allowed to view the patrol route, so that the patrol object who succeeds in the identity authentication can view the patrol route, and the garden is patrolled according to the patrol route, and the patrol object shall patrol the garden through which route, thereby improving the patrol efficiency of the patrol object, and facilitating the patrol object to patrol the garden according to the plan. Moreover, only the patrol object with successful identity authentication can check the patrol route, and other objects are prevented from replacing the patrol object to patrol the garden.
Based on the same application and communication as the above method, an embodiment of the present application provides a park patrol method, which can be applied to a client, and as shown in fig. 2, is a flow diagram of the method, and the method may include:
in step 201, a patrol route matched with a patrol object is acquired from a management device and stored, and the patrol route may include at least one patrol point in a garden, for example.
Step 202, when the patrol object logs in the client, performing identity authentication on the patrol object. The identity authentication of the patrol object may include: and acquiring the face data of the night patrol object, comparing the face data with the face data in the database, and determining whether the identity authentication is successful or failed based on the comparison result.
And step 203, if the identity authentication of the patrol object is successful, allowing the patrol object to log in the client to check the patrol route, and prompting the patrol object to patrol according to the patrol route.
Illustratively, steps 201 to 203 are similar to steps 101 to 102, and are not described again.
It can be seen from the above technical solution that in the embodiment of the present application, the management device can send the patrol route to the client, so that the client stores the patrol route, and when the patrol object logs in the client, if the identity authentication of the patrol object succeeds, the patrol object is allowed to view the patrol route, so that the patrol object who succeeds in the identity authentication can view the patrol route, and the garden is patrolled according to the patrol route, and the patrol object shall patrol the garden through which route, thereby improving the patrol efficiency of the patrol object, and facilitating the patrol object to patrol the garden according to the plan. Moreover, only the patrol object with successful identity authentication can check the patrol route, and other objects are prevented from replacing the patrol object to patrol the garden.
In a possible implementation manner, after the management device sends the patrol route to the client corresponding to the patrol object, the management device may further obtain a current position of the patrol object and a target position of the patrol object, and obtain an updated patrol route based on the current position and the target position. And sending the updated patrol route to the client so that the client replaces the patrol route before updating with the updated patrol route, allows the patrol object to check the updated patrol route, and patrols the park according to the updated patrol route.
For example, when the patrol object patrols the garden according to the patrol route before update, the management device may periodically acquire the current position of the patrol object, where the current position is the current position of the patrol object, and the current position of the patrol object is acquired based on a positioning system such as a GPS (global positioning system) or a beidou.
After obtaining the current position of the patrol object, the management device may determine whether the patrol route needs to be updated based on the current position, and this determination manner is not limited. For example, if the current position is on the route where the route is no longer being patrolled, if the current position has a more optimal route to reach the target position, and if a route needs to be changed to reach the target position from the current position, the management device may determine that the route needs to be updated.
And if the patrol route does not need to be updated, waiting for the next period, and continuously acquiring the current position of the patrol object by the management equipment, and so on. If the patrol route needs to be updated, the management device may further obtain a target position of the patrol object, where the target position is a position that the patrol object needs to reach when patrolling the garden, for example, a final position that the patrol object needs to reach when patrolling the garden, that is, the patrol is completed after the final position is reached.
Based on the current position of the patrol object and the target position of the patrol object, the management device may acquire an updated patrol route, that is, the updated patrol route reaches the target position of the patrol object from the current position of the patrol object, and the updated patrol route also includes at least one patrol point in the campus.
The updated patrol route is obtained in this embodiment without limitation.
Then, the management device transmits the updated patrol route to the client, so that the client replaces the patrol route before update with the updated patrol route, that is, stores the updated patrol route. And the client allows the patrol object to check the updated patrol route and patrol the park according to the updated patrol route.
When the patrol object patrols the park according to the updated patrol route, the acquisition device can acquire patrol data when the patrol object passes through a patrol point and send the patrol data to the management device, and the management device stores the mapping relationship between the identity information, the time information and the position information, and the specific implementation process is shown in steps 102 to 105, but the patrol route is replaced by the updated patrol route, which is not described herein again.
In a possible implementation manner, an embodiment of the present application provides a method for round robin, which may be applied to a management device, and as shown in fig. 3, for a flowchart of the method, the method may include:
step 301, when an abnormal event occurs, acquiring an event type and an occurrence position of the abnormal event.
For example, after sending the patrol route to the client corresponding to the patrol object, the management device may receive abnormal event data sent by the client, where the abnormal event data is data corresponding to an abnormal event found when the patrol object performs patrol according to the patrol route. Illustratively, the exception event data may include at least an event type of the exception event and an occurrence location of the exception event.
For example, the patrol object may log in to the client to check the patrol route, patrol the garden according to the patrol route, and when the garden is patrolled according to the patrol route, if the patrol object finds an abnormal event, such as a wall turnover, a facility fault, a fire fighting channel accumulation, a high temperature alarm, and other abnormal events, the patrol object may send abnormal event data to the management device through the client, where the abnormal event data is data corresponding to the abnormal event, such as an event type of the abnormal event, an occurrence location of the abnormal event, and the like. For example, if a patrol object finds a fire aisle pile, the exceptional event data may be event type 1 (representing a fire aisle pile) and coordinate P1 (i.e., the location of occurrence of a fire aisle pile). If the patrol object finds a high temperature alarm, the abnormal event data may be event type 2 (representing the high temperature alarm) and coordinate P2 (i.e., the occurrence location of the high temperature alarm).
In summary, the patrol object may send the abnormal event data to the management device through the client, and the management device may receive the abnormal event data sent by the client, such as the event type and the occurrence location.
For example, in addition to the abnormal event found when the patrol object patrols, the management device may also learn the abnormal event in other manners, for example, after the user in the campus finds the abnormal event, the management device may also be notified of the event type and the occurrence location of the abnormal event, for example, the management device is notified of the event type and the occurrence location of the abnormal event in an alarm manner, which is not limited herein.
In step 302, the current locations of all the initial objects corresponding to the event type are determined.
For example, the management device may pre-configure a mapping relationship between an event type and an initial object, indicating that the initial object is capable of handling an exception event of the event type, where the initial object may be a night patrol object or may not be a night patrol object, but is another worker capable of handling an exception event of the event type. The present embodiment refers to an object for processing an exceptional event as an initial object.
For example, see table 2 for an example of a mapping relationship between an event type and an initial object.
TABLE 2
Figure BDA0002906010350000141
Illustratively, after the management device obtains the event type of the abnormal event, the management device may query the mapping relationship through the event type to obtain all initial objects corresponding to the event type. Then, the management device may acquire the current location of each initial object, i.e., the location where the initial object is currently located.
Step 303, selecting a target object for processing the abnormal event from all the initial objects based on the current positions of all the initial objects and the occurrence position of the abnormal event.
For example, based on the current position of each initial object and the occurrence position of the abnormal event, the distance between the current position of the initial object and the occurrence position of the abnormal event may be determined, and the initial object corresponding to the smallest distance may be selected as the target object. For example, a distance 1 between the current position of the initial object 1 and the occurrence position of the abnormal event is determined, a distance 2 between the current position of the initial object 2 and the occurrence position of the abnormal event is determined, and if the distance 1 is the minimum distance, the initial object 1 is selected as the target object.
Step 304, sending the information of the abnormal event to the target object.
For example, information such as an event type of the abnormal event, an occurrence location of the abnormal event, a resolution of the abnormal event, and the like may be transmitted to the target object. The target object knows which type of abnormal event is based on the event type of the abnormal event, the target object can reach the occurrence position of the abnormal event based on the occurrence position of the abnormal event, and the target object can process the abnormal event based on the solution mode of the abnormal event.
Of course, the above are only a few examples of the information of the abnormal event, and the information is not limited thereto. For example, the information of the abnormal event may further include a route for the current position of the target object to reach the occurrence position of the abnormal event, but not the occurrence position of the abnormal event. As another example, the information of the exception event may not include the event type of the exception event. As another example, the information of the exception event may not include a resolution of the exception event.
In a possible implementation manner, the embodiment of the present application further provides a park patrol method, which can be applied to a management device, and is used for implementing processing of parking violations, where the method may include:
step S11, receiving vehicle data sent by the client, where the vehicle data is vehicle data corresponding to an illegal parking vehicle found when the patrol object patrols according to the patrol route, and the vehicle data may be a target license plate identifier of the illegal parking vehicle, or the vehicle data may be a license plate image of the illegal parking vehicle.
Illustratively, after the management device sends the patrol route to the client corresponding to the patrol object, the patrol object can log in the client to check the patrol route, patrol the park according to the patrol route, and when the park is patrolled according to the patrol route, if the patrol object finds an illegal vehicle, the patrol object sends vehicle data to the management device through the client, and the management device receives the vehicle data sent by the client.
For example, the client may collect a license plate image of the illegal vehicle, that is, an image including a license plate of the illegal vehicle, and use the license plate image as vehicle data, and the client sends the license plate image to the management device.
For another example, the client may collect a license plate image of an illegal vehicle, and analyze a license plate identifier (denoted as a target license plate identifier) of the illegal vehicle from the license plate image, without limitation on the analysis manner, and use the target license plate identifier as vehicle data, and the client sends the target license plate identifier to the management device.
And step S12, if the vehicle data is a license plate image, analyzing the target license plate identification of the illegal vehicle from the license plate image. And if the vehicle data is the target license plate identification, directly obtaining the target license plate identification of the illegal vehicle.
Step S13, the mapping relation between the preset license plate identification and the vehicle owner identification is inquired through the target license plate identification, and the vehicle owner identification (such as a mobile phone number, a short message number and the like) corresponding to the target license plate identification is obtained.
For example, the management device may pre-configure a mapping relationship between the license plate identifier and the vehicle owner identity, and thus, after obtaining the target license plate identifier, the management device may query the vehicle owner identity corresponding to the target license plate identifier.
And step S14, sending the information of the illegal vehicle to the terminal equipment corresponding to the owner identity.
For example, the management device may use a short message mode, a telephone mode, a short message mode, or the like to send the information of the illegal vehicle to the terminal device corresponding to the owner identity, and the notification mode is not limited. The information of the illegal vehicle can comprise a target license plate identification of the illegal vehicle, an occurrence position of the illegal vehicle and the like.
The park patrol method according to the embodiment of the present application will be described below with reference to specific examples.
In this embodiment, a client (such as patrol software, patrol APP, etc.) may be installed on a terminal device (also referred to as an individual device) used by a patrol object, the terminal device supports functions such as an internal camera, an external camera, face recognition, NFC, image acquisition, license plate recognition, voice broadcast, etc., the patrol object uses the terminal device to patrol, and a management device records patrol time, place, patrol object, abnormal event, etc. through a database.
For example, the park patrol method provided in the embodiment of the present application may involve the following processes:
1. and issuing the patrol route. The management device acquires a patrol route matched with the patrol object and sends the patrol route to a client corresponding to the patrol object, so that the client stores the patrol route.
2. And confirming the personnel information, namely confirming the patrol object. When the patrol object logs in the client, the client performs identity authentication on the patrol object, and if the identity authentication is successful, the patrol object is allowed to check the patrol route, so that the patrol object can be ensured to check the patrol route by himself, and the patrol of other patrol objects can be prevented.
When the identity authentication is performed on the night watching object, the identity authentication can be performed on the night watching object by adopting a face recognition mode. Referring to fig. 4, in a schematic diagram of a face recognition mode, in a face recognition interface, a client acquires face data of a patrol object and inputs the face data of the patrol object to a comparison model. The comparison model obtains legal face data from a face database (used for recording legal face data capable of logging in a client). The comparison model compares the face data of the night patrol object with legal face data in the face database, if the similarity between the face data of the night patrol object and the legal face data in the face database is greater than a similarity threshold value, the identity authentication of the night patrol object is determined to be successful, the identity authentication is obviously successful through a face recognition interface, and the night patrol object is allowed to log in the client.
3. And 4, night watching planning. After the patrol object logs in the client, the client can display the patrol route to the patrol object, the patrol object can patrol the garden according to the patrol route, the patrol route comprises at least one patrol point, and the management device can also send a patrol plan to the client, wherein the patrol plan represents the patrol point which the patrol object should reach at which time, and the patrol object can patrol according to the patrol plan.
Taking the acquisition device as an NFC device for example, the NFC device is deployed at each patrol point, and when a patrol object reaches each patrol point, an NFC card punching form needs to be adopted to ensure that a specified patrol point is patrolled on time.
The NFC equipment can send patrol data when the patrol object reaches the patrol point to the management equipment, wherein the patrol data comprises information to be identified of the patrol object, time information when the patrol object passes the patrol point and position information when the patrol object passes the patrol point. And the management equipment determines the identity information of the night patrol object based on the information to be identified and stores the mapping relation of the identity information, the time information and the position information.
4. And (5) event processing. In the process of patrol, if abnormal events occur in the garden, such as wall turning, facility faults, fire channel accumulation, high-temperature alarm and other abnormal events, the patrol object can send abnormal event data to the management device through the client, wherein the abnormal event data can include event types, occurrence positions and the like. The abnormal event data may include, in addition to the event type and the occurrence location, an image of the abnormal event (i.e., an image obtained by taking a picture of the abnormal event), description information of the abnormal event, and the like, which is not limited thereto. After receiving the abnormal event data, the management device can determine a target object for processing the abnormal event and dispatch the abnormal event to the target object for processing.
In the process of patrolling, if illegal parking vehicles in a park are found, the patrolling object can shoot the license plate of the illegal parking vehicles, so that a client side obtains the license plate image of the illegal parking vehicles, the license plate image is identified through a license plate identification technology to obtain target license plate identification of the illegal parking vehicles, the target license plate identification is sent to a management device, the owner identity corresponding to the target license plate identification is obtained through the management device, information of the illegal parking vehicles is sent to an owner, and the owner is informed to timely process the illegal parking vehicles.
For example, the client may provide an event processing interface, so that the patrol object can conveniently input relevant information on the event processing interface, and then processes of processing an abnormal event, processing an illegal vehicle, and the like are realized.
Illustratively, the client may further provide a one-key alarm function, and when the night watching object encounters an emergency, the one-key alarm function provided by the client may be used to send alarm information to the management device.
5. And pushing the message. In the process of patrol, the reported abnormal event is recorded to the management device, and the management device can allocate the abnormal event to the target object for processing and send the information of the abnormal event to the target object. For example, if the target object accesses the network using the intranet, the information of the abnormal event may be sent to the target object in a WebSocket (web socket) manner. Alternatively, the information of the abnormal event may be transmitted to the target object through a mobile network (e.g., a 3G network, a 4G network, a 5G network, etc.).
For example, the information of the abnormal event reported by the patrol object may also be pushed to a terminal device used by the administrator, for example, the information of the abnormal event is pushed to the terminal device used by the administrator by a short message or the like, so that the administrator can know the information of the abnormal event in time and process the abnormal event.
Referring to fig. 5, the patrol object can patrol the garden according to the patrol route, and in the patrol process, a card is punched at each patrol point. In the night patrol process, if an abnormal event (such as wall turning, facility failure, fire fighting channel accumulation and high-temperature alarm) is found, the client side can send the abnormal event data to the management equipment, the management equipment determines a target object and assigns the abnormal event to the target object for processing.
Referring to fig. 6, the client may support the following patrol service function modules: and a login (portal) module, wherein the login module allows the patrol object to log in the client. And the patrol module is used for realizing patrol card punching and event reporting through the patrol module. And the face module is used for realizing the identity authentication of the night patrol object. And the pushing module is used for receiving the message pushed by the management device, for example, the message pushed by the management device is received in a WebSocket mode. And the event module is used for displaying and processing events through the event module.
Referring to fig. 7, when the client receives the push message in the WebSocket manner, the following process may be adopted: and calling the campus core service by the client to obtain the address of the management equipment. And sending a connection request to the management equipment based on the address of the management equipment, returning a connection success response to the management equipment, and establishing the WebSocket connection between the client and the management equipment. In the subsequent process, if the management device pushes a message to the client, the message can be pushed to the client through the WebSocket connection.
Based on the same application concept as the method, the embodiment of the present application provides a park patrol apparatus, which is applied to a management device, and is shown in fig. 8, and is a schematic structural diagram of the apparatus, including: an obtaining module 81, configured to obtain a patrol route matched with the patrol object; wherein the patrol route comprises patrol points in the garden; a sending module 82, configured to send the patrol route to a client corresponding to the patrol object, so that the client stores the patrol route, performs identity authentication on the patrol object when the patrol object logs in the client, and allows the patrol object to view the patrol route if the identity authentication is successful; a receiving module 83, configured to receive patrol data sent by a collection device deployed at the patrol point, where the patrol data is patrol data obtained by the collection device when the patrol object passes through the patrol point; wherein the patrol data at least comprises information to be identified of the patrol object, time information when the patrol object passes through the patrol point, and position information when the patrol object passes through the patrol point; a determining module 84, configured to determine identity information of the night patrol object based on the information to be identified; the storage module 85 is configured to store a mapping relationship between the identity information, the time information, and the location information.
The obtaining module 81 is further configured to: acquiring the current position of the night patrol object and the target position of the night patrol object; the target position is a position which needs to be reached when the patrol object patrols the park; acquiring an updated patrol route based on the current position and the target position; the sending module 82 is further configured to: and sending the updated patrol route to the client, so that the client replaces the patrol route before updating with the updated patrol route, and the patrol object is allowed to view the updated patrol route.
Illustratively, the determining module 84 is specifically configured to: if the acquisition equipment is a camera and the information to be identified is a target image of the night patrol object acquired by the camera, analyzing target characteristic information of the night patrol object from the target image, and inquiring a mapping relation between preset characteristic information and identity information through the target characteristic information to obtain identity information corresponding to the target characteristic information; or, if the acquisition device is an NFC device and the information to be identified is a target tag value of the patrol object acquired by the NFC device, querying a mapping relationship between a pre-configured tag value and identity information through the target tag value to obtain identity information corresponding to the target tag value.
Illustratively, the obtaining module 81 is further configured to: when an abnormal event occurs, acquiring the event type and the occurrence position of the abnormal event; the determination module 84 is further configured to: determining the current positions of all initial objects corresponding to the event type; selecting a target object for processing the abnormal event from all the initial objects based on the current positions of all the initial objects and the occurrence position of the abnormal event; the sending module 82 is further configured to: and sending the information of the abnormal event to the target object.
Illustratively, the receiving module 83 is further configured to: receiving vehicle data sent by the client, wherein the vehicle data is vehicle data corresponding to illegal vehicles found when the patrol object patrols according to the patrol route; the vehicle data is a target license plate identification or a license plate image of the illegal vehicle, and if the vehicle data is the license plate image, the target license plate identification of the illegal vehicle is analyzed from the license plate image; the determination module 84 is further configured to: inquiring a mapping relation between a preset license plate identifier and an owner identity through the target license plate identifier to obtain the owner identity corresponding to the target license plate identifier; the sending module 82 is further configured to: and sending the information of the illegal vehicle to terminal equipment corresponding to the owner identity.
Based on the same application concept as the method, the embodiment of the present application provides a management device, as shown in fig. 9, the management device may include: a processor 91 and a machine-readable storage medium 92, the machine-readable storage medium 92 storing machine-executable instructions executable by the processor 91; the processor 91 is configured to execute machine executable instructions to perform the steps of:
acquiring a patrol route matched with a patrol object, wherein the patrol route comprises patrol points in a garden;
sending the patrol route to a client corresponding to the patrol object so that the client stores the patrol route, performing identity authentication on the patrol object when the patrol object logs in the client, and allowing the patrol object to check the patrol route if the identity authentication is successful;
receiving patrol data sent by acquisition equipment deployed at the patrol point, wherein the patrol data is patrol data acquired by the acquisition equipment when the patrol object passes through the patrol point; wherein the patrol data at least comprises information to be identified of the patrol object, time information when the patrol object passes through the patrol point, and position information when the patrol object passes through the patrol point;
determining identity information of the night patrol object based on the information to be identified;
and storing the mapping relation among the identity information, the time information and the position information.
Based on the same application concept as the method, embodiments of the present application further provide a machine-readable storage medium, where a plurality of computer instructions are stored on the machine-readable storage medium, and when the computer instructions are executed by a processor, the park patrol method disclosed in the above examples of the present application can be implemented.
The machine-readable storage medium may be any electronic, magnetic, optical, or other physical storage device that can contain or store information such as executable instructions, data, and the like. For example, the machine-readable storage medium may be: a RAM (random Access Memory), a volatile Memory, a non-volatile Memory, a flash Memory, a storage drive (e.g., a hard drive), a solid state drive, any type of storage disk (e.g., an optical disk, a dvd, etc.), or similar storage medium, or a combination thereof.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Furthermore, these computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the present application.

Claims (10)

1. A park patrol method applied to a management device, the method comprising:
acquiring a patrol route matched with a patrol object, wherein the patrol route comprises patrol points in a garden;
sending the patrol route to a client corresponding to the patrol object so that the client stores the patrol route, performing identity authentication on the patrol object when the patrol object logs in the client, and allowing the patrol object to check the patrol route if the identity authentication is successful;
receiving patrol data sent by acquisition equipment deployed at the patrol point, wherein the patrol data is patrol data acquired by the acquisition equipment when the patrol object passes through the patrol point; wherein the patrol data at least comprises information to be identified of the patrol object, time information when the patrol object passes through the patrol point, and position information when the patrol object passes through the patrol point;
determining identity information of the night patrol object based on the information to be identified;
and storing the mapping relation among the identity information, the time information and the position information.
2. The method according to claim 1, wherein after the sending the tour route to a client corresponding to the tour object, the method further comprises:
acquiring the current position of the night patrol object and the target position of the night patrol object; the target position is a position which needs to be reached when the patrol object patrols the garden;
acquiring an updated patrol route based on the current position and the target position;
and sending the updated patrol route to the client, so that the client replaces the patrol route before updating with the updated patrol route, and the patrol object is allowed to view the updated patrol route.
3. The method of claim 1,
the determining the identity information of the night patrol object based on the information to be identified includes:
if the acquisition equipment is a camera and the information to be identified is a target image of the night patrol object acquired by the camera, analyzing target characteristic information of the night patrol object from the target image, and inquiring a mapping relation between preset characteristic information and identity information through the target characteristic information to obtain identity information corresponding to the target characteristic information; or,
and if the acquisition equipment is NFC equipment and the information to be identified is the target label value of the night patrol object acquired by the NFC equipment, inquiring a mapping relation between a preset label value and identity information through the target label value to obtain identity information corresponding to the target label value.
4. The method of claim 1, further comprising:
when an abnormal event occurs, acquiring the event type and the occurrence position of the abnormal event;
determining the current positions of all initial objects corresponding to the event type;
selecting a target object for processing the abnormal event from all the initial objects based on the current positions of all the initial objects and the occurrence position of the abnormal event;
and sending the information of the abnormal event to the target object.
5. The method of claim 4,
the acquiring the event type and the occurrence position of the abnormal event comprises the following steps:
after the patrol route is sent to a client corresponding to the patrol object, abnormal event data sent by the client is received, wherein the abnormal event data is data corresponding to an abnormal event discovered when the patrol object carries out patrol according to the patrol route; wherein the exceptional event data at least comprises an event type of the exceptional event and an occurrence location of the exceptional event.
6. The method of claim 4,
the selecting a target object for processing the abnormal event from all the initial objects based on the current positions of all the initial objects and the occurrence position of the abnormal event comprises:
determining the distance between the current position of each initial object and the occurrence position of the abnormal event based on the current position of the initial object and the occurrence position of the abnormal event;
and selecting the initial object corresponding to the minimum distance as the target object.
7. The method according to claim 1, wherein after the sending the tour route to a client corresponding to the tour object, the method further comprises:
receiving vehicle data sent by the client, wherein the vehicle data is vehicle data corresponding to illegal vehicles found when the patrol object patrols according to the patrol route; the vehicle data is a target license plate identification or a license plate image of the illegal vehicle, and if the vehicle data is the license plate image, the target license plate identification of the illegal vehicle is analyzed from the license plate image;
inquiring a mapping relation between a preset license plate identifier and an owner identity through the target license plate identifier to obtain the owner identity corresponding to the target license plate identifier;
and sending the information of the illegal vehicle to terminal equipment corresponding to the owner identity.
8. A park patrol method is applied to a client side, and comprises the following steps:
acquiring a patrol route matched with a patrol object from a management device, and storing the patrol route; wherein the patrol route comprises at least one patrol point within the campus;
when the patrol object logs in the client, performing identity authentication on the patrol object; performing identity authentication on the patrol object comprises: acquiring the face data of the patrol object, comparing the face data with the face data in the database, and determining success or failure of identity authentication based on a comparison result;
and if the identity authentication is successful, allowing the patrol object to log in the client to check the patrol route, and prompting the patrol object to patrol according to the patrol route.
9. A park patrol device, which is applied to management equipment, the device comprises:
the acquisition module is used for acquiring a patrol route matched with the patrol object; wherein the patrol route comprises patrol points in the garden;
the sending module is used for sending the patrol route to a client corresponding to the patrol object so that the client stores the patrol route, performs identity authentication on the patrol object when the patrol object logs in the client, and allows the patrol object to check the patrol route if the identity authentication is successful;
the receiving module is used for receiving patrol data sent by acquisition equipment deployed at the patrol point, wherein the patrol data is obtained by the acquisition equipment when the patrol object passes through the patrol point; wherein the patrol data at least comprises information to be identified of the patrol object, time information when the patrol object passes through the patrol point, and position information when the patrol object passes through the patrol point;
the determining module is used for determining the identity information of the night patrol object based on the information to be identified;
and the storage module is used for storing the mapping relation among the identity information, the time information and the position information.
10. A management device, comprising: a processor and a machine-readable storage medium storing machine-executable instructions executable by the processor;
the processor is configured to execute machine executable instructions to perform the steps of:
acquiring a patrol route matched with a patrol object, wherein the patrol route comprises patrol points in a garden;
sending the patrol route to a client corresponding to the patrol object so that the client stores the patrol route, performing identity authentication on the patrol object when the patrol object logs in the client, and allowing the patrol object to check the patrol route if the identity authentication is successful;
receiving patrol data sent by acquisition equipment deployed at the patrol point, wherein the patrol data is patrol data acquired by the acquisition equipment when the patrol object passes through the patrol point; wherein the patrol data at least comprises information to be identified of the patrol object, time information when the patrol object passes through the patrol point, and position information when the patrol object passes through the patrol point;
determining identity information of the night patrol object based on the information to be identified;
and storing the mapping relation among the identity information, the time information and the position information.
CN202110071216.7A 2021-01-19 2021-01-19 Park patrol method, device and equipment Pending CN112819989A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110071216.7A CN112819989A (en) 2021-01-19 2021-01-19 Park patrol method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110071216.7A CN112819989A (en) 2021-01-19 2021-01-19 Park patrol method, device and equipment

Publications (1)

Publication Number Publication Date
CN112819989A true CN112819989A (en) 2021-05-18

Family

ID=75870179

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110071216.7A Pending CN112819989A (en) 2021-01-19 2021-01-19 Park patrol method, device and equipment

Country Status (1)

Country Link
CN (1) CN112819989A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113689587A (en) * 2021-08-25 2021-11-23 山东新一代信息产业技术研究院有限公司 Method and system for inspecting trunk occupation in park
CN114218346A (en) * 2022-02-21 2022-03-22 浪潮通用软件有限公司 Method and system for guiding vehicles in park and park layout drawing method
CN114944022A (en) * 2022-04-07 2022-08-26 中国电力工程顾问集团西南电力设计院有限公司 Factory security patrol system based on NFC technology and use method thereof
CN117615304A (en) * 2023-11-30 2024-02-27 北京中科医信科技有限公司 Patrol management method and device applied to hospital security and electronic equipment
CN118014310A (en) * 2024-04-08 2024-05-10 绿城科技产业服务集团有限公司 Point patrol method and system used in park inspection
CN118941780A (en) * 2024-09-30 2024-11-12 浙江大华技术股份有限公司 Method and device for processing detection data, storage medium and electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106023334A (en) * 2016-05-04 2016-10-12 郝迎春 Routing inspection method and device
CN106251420A (en) * 2016-07-29 2016-12-21 国网山西省电力公司大同供电公司 Electric power equipment inspection system
CN108734808A (en) * 2018-05-11 2018-11-02 星络科技有限公司 A kind of night watching method and system
CN108986248A (en) * 2018-05-04 2018-12-11 西安艾润物联网技术服务有限责任公司 The information collecting method of patrol point, device and system
CN111951510A (en) * 2020-08-24 2020-11-17 广州立信电子科技有限公司 Forestry fire prevention intelligence patrols and examines monitoring early warning system based on big data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106023334A (en) * 2016-05-04 2016-10-12 郝迎春 Routing inspection method and device
CN106251420A (en) * 2016-07-29 2016-12-21 国网山西省电力公司大同供电公司 Electric power equipment inspection system
CN108986248A (en) * 2018-05-04 2018-12-11 西安艾润物联网技术服务有限责任公司 The information collecting method of patrol point, device and system
CN108734808A (en) * 2018-05-11 2018-11-02 星络科技有限公司 A kind of night watching method and system
CN111951510A (en) * 2020-08-24 2020-11-17 广州立信电子科技有限公司 Forestry fire prevention intelligence patrols and examines monitoring early warning system based on big data

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113689587A (en) * 2021-08-25 2021-11-23 山东新一代信息产业技术研究院有限公司 Method and system for inspecting trunk occupation in park
CN114218346A (en) * 2022-02-21 2022-03-22 浪潮通用软件有限公司 Method and system for guiding vehicles in park and park layout drawing method
CN114944022A (en) * 2022-04-07 2022-08-26 中国电力工程顾问集团西南电力设计院有限公司 Factory security patrol system based on NFC technology and use method thereof
CN117615304A (en) * 2023-11-30 2024-02-27 北京中科医信科技有限公司 Patrol management method and device applied to hospital security and electronic equipment
CN117615304B (en) * 2023-11-30 2024-05-24 北京中科医信科技有限公司 Patrol management method and device applied to hospital security and electronic equipment
CN118014310A (en) * 2024-04-08 2024-05-10 绿城科技产业服务集团有限公司 Point patrol method and system used in park inspection
CN118014310B (en) * 2024-04-08 2024-07-23 绿城科技产业服务集团有限公司 Point patrol method and system used in park inspection
CN118941780A (en) * 2024-09-30 2024-11-12 浙江大华技术股份有限公司 Method and device for processing detection data, storage medium and electronic device

Similar Documents

Publication Publication Date Title
CN112819989A (en) Park patrol method, device and equipment
US11647281B2 (en) Surveillance and monitoring system
CN107909668B (en) Sign-in method and terminal equipment
US10691902B2 (en) Device control using entity identifiers
KR20170118575A (en) Method And System For Finding Ward Based On Two-dimension Code
CN106960172A (en) Personal identification processing method, apparatus and system
US20210004759A1 (en) System and method for monitoring and sharing location and activity of devices
CN110738779A (en) personnel trajectory detection method, system and device
CN113572757B (en) Server access risk monitoring method and device
US11368814B2 (en) Evacuation tracking
CN112950152A (en) Personnel on-duty positioning management system and method
CN111369797A (en) Vehicle monitoring method, electronic fence construction method, electronic fence and device
CN105744071A (en) One-key emergency help system and method based on fingerprint identification
CN103984716A (en) Method and system for precisely positioning space address based on geographical information
CN115984677A (en) Intelligent data analysis method, device and system
CN109039827B (en) Social software hotspot acquisition system and method based on positions
US20180006748A1 (en) Radio information system and method for remote locations
CN117528035B (en) Object cross-border head tracking method and system based on active notification
CN113051981B (en) Face recognition method and device
KR20150140485A (en) Integrated control system using cctv camera
CN107798504B (en) Equipment and method for high-risk radioactive source automatic safety supervision
CN112734313A (en) Information processing method and system of logistics transportation platform and electronic equipment
CN110311809A (en) The access terminal monitoring and managing method and device of video monitoring system
CN111372197B (en) Early warning method and related device
CN110418020B (en) List state information processing method and device, electronic terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210518