Search

CN-117831185-B - Object security verification method and device, electronic equipment and storage medium

CN117831185BCN 117831185 BCN117831185 BCN 117831185BCN-117831185-B

Abstract

The embodiment of the application provides a method and a device for verifying the security of an object, electronic equipment and a storage medium, which can be used in the field of regional security management. The method comprises the steps of obtaining object information of a target object and user information of a user, obtaining area environment information of a target area, and determining a security verification result of the target object carried to the target area according to the object information, the user information and the area environment information. By the method, the safety of the area is improved.

Inventors

  • LIU TING
  • CHEN MU
  • HE JIACHENG
  • TANG DAWEI
  • LIN HANG
  • LU ZAIJUN
  • WANG KAIPING

Assignees

  • 杭州海康威视系统技术有限公司

Dates

Publication Date
20260505
Application Date
20231229

Claims (11)

  1. 1. A method of security verification of an object, comprising: Acquiring object information of a target object and user information of a user, wherein the target object is an object to be carried by the user and enters a target area; acquiring regional environment information of the target region; determining a security verification result of the target object carried to the target area according to the object information, the user information and the area environment information; Wherein determining, according to the object information, the user information, and the area environment information, a security verification result that the target object is carried to the target area includes: determining a first verification result according to the object information and the regional environment information, wherein the first verification result is used for indicating whether the target object has permission to enter the target region; Determining whether the user has the right to use the target object according to the user information; and when the first verification result indicates that the target object has the right to enter the target area and the user has the right to use the target object, determining that the security verification result is verification passing.
  2. 2. The method of claim 1, wherein determining a first verification result based on the object information and the region environment information comprises: Determining at least one security risk of the target object according to the object information; Judging whether the target area has safety equipment corresponding to each safety risk according to the area environment information; If the target area does not have the security equipment corresponding to each security risk, determining that the first verification result indicates that the target object does not have the right to enter the target area; And if the target area has the safety equipment corresponding to each safety risk, determining that the first verification result indicates that the target object has the authority to enter the target area, or acquiring the object storage information of the stored object in the target area, and determining the first verification result according to the object storage information.
  3. 3. The method of claim 2, wherein determining the first verification result from the object deposit information comprises: determining the number of stored objects corresponding to each security risk according to the object storage information; determining the number of objects to be stored corresponding to each security risk according to the object information; determining the sum of the stored object number and the object number to be stored as the target stored object number corresponding to each security risk; Determining the maximum number of objects corresponding to each security risk; if the number of the target storage objects corresponding to each security risk is respectively smaller than or equal to the corresponding maximum number of objects, determining that the first verification result indicates that the target objects have permission to enter the target area; If the number of the target storage objects corresponding to the security risk is larger than the corresponding maximum number of objects, determining that the first verification result indicates that the target object does not have permission to enter the target area.
  4. 4. The method of claim 2, wherein determining the first verification result from the object deposit information comprises: determining at least one stored object type according to the object storage information; Determining at least one object type to be stored according to the object information; If the at least one stored object type and the at least one object type to be stored meet coexistence conditions, determining that the first verification result indicates that the target object has permission to enter the target area; And if the at least one stored object type and the at least one object type to be stored do not meet the coexistence condition, determining that the first verification result indicates that the target object does not have the authority to enter the target area.
  5. 5. The method of any of claims 1-4, wherein determining that the security verification result is verification pass, the method further comprising: Updating the object storage information of the target area to obtain updated object storage information; And generating an emergency scheme corresponding to the target area according to the updated object storage information, wherein the emergency scheme comprises at least one abnormal event type and an emergency system corresponding to each abnormal event type.
  6. 6. The method according to any one of claims 1-4, further comprising: acquiring sensor data acquired by at least one sensor in the target area; determining an abnormal event existing in the target area according to the sensor data; determining an abnormal event type of the abnormal event, and determining at least one target emergency system according to the abnormal event type; And calling the target emergency system to process the at least one abnormal event.
  7. 7. The method according to any one of claims 1 to 4, wherein acquiring object information of the target object and user information of the user comprises: responding to the registration request input by the user, displaying a verification page, wherein the verification page comprises a user information input control; Acquiring user information of the user input by the user in the user information input control; performing verification processing on the user information to obtain a verification result, and displaying a registration page when the verification result is verification passing, wherein the registration page comprises an object information input control; And acquiring the object information input by the user in the object information input control, wherein the object information comprises object types and object quantity.
  8. 8. A security verification apparatus for an object, comprising: The first acquisition module is used for acquiring object information of a target object and user information of a user, wherein the target object is an object to be carried by the user into a target area; The second acquisition module is used for acquiring the regional environment information of the target region; the determining module is used for determining a first verification result according to the object information and the regional environment information, wherein the first verification result is used for indicating whether the target object has the right to enter the target region or not; Determining whether the user has the right to use the target object according to the user information; And when the first verification result indicates that the target object has the right to enter the target area and the user has the right to use the target object, determining that the security verification result of the target object carried to the target area is verification passing.
  9. 9. An electronic device comprising a processor and a memory communicatively coupled to the processor; The memory stores computer program instructions; The processor executes the computer program instructions stored in the memory to implement the method of any one of claims 1 to 7.
  10. 10. A computer readable storage medium, characterized in that the computer readable storage medium has stored therein computer program instructions for implementing the method according to any of claims 1 to 7 when executed by a processor.
  11. 11. A computer program product comprising a computer program which, when executed by a processor, implements the method of any one of claims 1 to 7.

Description

Object security verification method and device, electronic equipment and storage medium Technical Field The embodiment of the application relates to the field of regional security management, in particular to a method and a device for verifying the security of an object, electronic equipment and a storage medium. Background Currently, for the security management of an area, based on all object types and object numbers in the area, the security level and the category of the area are determined according to a weight rule. For example, in a laboratory, a researcher may put a hazard into the laboratory and register hazard information, and the laboratory makes a determination of a security level and a category according to the type and the number of the stored hazard. In the above process, if a danger occurs in a certain area, emergency facilities in the area may not support emergency treatment corresponding to the security level and the category of the area, which results in lower security of the area. Disclosure of Invention The embodiment of the application provides a method, a device, electronic equipment and a storage medium for verifying the safety of an object, which are used for solving the defect that in the prior art, if a certain area is dangerous, emergency facilities of the area possibly cannot support emergency treatment corresponding to the safety level and the category of the area, so that the safety of the area is lower. In a first aspect, an embodiment of the present application provides a method for security verification of an object, including: Acquiring object information of a target object and user information of a user, wherein the target object is an object to be carried by the user and enters a target area; acquiring regional environment information of the target region; and determining a security verification result of the target object carried to the target area according to the object information, the user information and the area environment information. In one possible implementation manner, determining a security verification result that the target object is carried to the target area according to the object information, the user information and the area environment information includes: determining a first verification result according to the object information and the regional environment information, wherein the first verification result is used for indicating whether the target object has permission to enter the target region; Determining whether the user has the right to use the target object according to the user information; and when the first verification result indicates that the target object has the right to enter the target area and the user has the right to use the target object, determining that the security verification result is verification passing. In one possible implementation manner, determining a first verification result according to the object information and the area environment information includes: Determining at least one security risk of the target object according to the object information; Judging whether the target area has safety equipment corresponding to each safety risk according to the area environment information; If the target area does not have the security equipment corresponding to each security risk, determining that the first verification result indicates that the target object does not have the right to enter the target area; And if the target area has the safety equipment corresponding to each safety risk, determining that the first verification result indicates that the target object has the authority to enter the target area, or acquiring the object storage information of the stored object in the target area, and determining the first verification result according to the object storage information. In one possible implementation manner, determining the first verification result according to the object storage information includes: determining the number of stored objects corresponding to each security risk according to the object storage information; determining the number of objects to be stored corresponding to each security risk according to the object information; determining the sum of the stored object number and the object number to be stored as the target stored object number corresponding to each security risk; Determining the maximum number of objects corresponding to each security risk; if the number of the target storage objects corresponding to each security risk is respectively smaller than or equal to the corresponding maximum number of objects, determining that the first verification result indicates that the target objects have permission to enter the target area; If the number of the target storage objects corresponding to the security risk is larger than the corresponding maximum number of objects, determining that the first verification result indicates that the target object does not have permission to enter the t