Security monitoring method and security monitoring system

A monitoring system and security technology, applied in character and pattern recognition, instruments, computer parts, etc., can solve problems such as difficulty in commercialization, and achieve the effect of low cost and storage space saving

Pending Publication Date: 2018-04-20
高域(北京)智能科技研究院有限公司
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The Skynet system that is being hyped by public opinion now is difficult to achieve commercialization due to different factors such as the cost of installing cameras, the promotion of policies in various cities, and the acceptance of the people.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security monitoring method and security monitoring system
  • Security monitoring method and security monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Specific embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although specific embodiments of the invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and is not limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present invention and to fully convey the scope of the present invention to those skilled in the art.

[0042] It should be noted that certain terms are used in the specification and claims to refer to specific components. Those skilled in the art should understand that they may use different terms to refer to the same component. The specification and claims do not use differences in nouns as a way of distinguishing components, but use differences in functions of components as a criterion for distinguishing. "Includes" or "comprises" mentioned throughout the spe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed shooting centralized processing security monitoring method and security monitoring system. The method comprises the steps: carrying out the distributed arrangement of face recognition equipment at a plurality of preset places; enabling each piece of face recognition equipment to collect and recognize a face image; enabling each piece of face recognition equipment to take a recognition object as an object for face image filing, so as to obtain the filing data of the recognition object, wherein the filing data is uploaded to a cloud server through a preset format, and the cloud server carries out the clustering analysis of the filing data.

Description

technical field [0001] The invention belongs to the technical field of security, and in particular relates to a security monitoring method and a security monitoring system for distributed shooting and centralized processing. Background technique [0002] At present, face recognition technology has gradually become a low-level application tool technology with the maturity of conditions such as cameras, algorithms, and data volume, and has been continuously popularized. [0003] However, a prerequisite for popularizing the application of face recognition technology is to have an open and shared data platform, so that enough recognition scenarios can be incorporated into this platform with unified standards. [0004] To put it simply, the premise of the application scenarios aimed at chasing fugitives, combating trafficking, and finding people and objects is that the recognition system, especially the face recognition system, must have enough data sources. [0005] The Skynet ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00G06K9/62
CPCG06V40/16G06V10/95G06F18/23
Inventor 不公告发明人
Owner 高域(北京)智能科技研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products