Welcome to Xiamen Seetown Intelligent Technology co. LTD


Contact Us

You are here:Home >> Solution >> AI Smart Hospital...

AI Smart Hospital

Smart Hospital

Construction Purpose
Under the support of the IOT technology, a smart hospital is fully covered with the hospital information security system, featuring internet interconnection, information resource sharing, unified regulations and standards as well as its complete functions in application. It ensures an apparently comprehensive development and utilization of the hospital information resources which is applicable for the whole working staffs during their working time. To some extent, the functions in real-time monitoring, accurate location, event tracking and information records of its patients, vehicles, visitors and important materials can be achieved.   

Requirements Analysis
Hospital perimeter security systems 
Intelligent non-intrusive vehicle management service system 
Effective early warning systems for safety precautions on thefts and violent behaviors 
A strengthening oversight and supervision at nursing stations and pharmacy windows of a hospital
Effective preventative measures should be taken to the areas such as the lift lobbies or the hospital corridors that are of a massive human traffic
Line waiting time should be shortened for any medical payments
Evidence or proof of the stolen new-born baby should be obtainable
Provide solutions for critically ill patients in the ICU or emergency rooms who are unable to meet their relatives face to face
Improve scientific management and security control in key areas (financial room, machine room, hospital pharmacy, ect )

System Architecture
Security Control System Layer 1:Perimeter & Entry and Exit Security Control: Perimeter security systems and vehicle management systems can be deployed at the front gate of the hospital for enabling its black and white list security control and management. Security guards can improve their working efficiency with our smart patrol management system.

Security Control System Layer 2:Public Area Security Control: By having our dynamic video surveillance systems deployed at the hospital key areas, people fallen on the floor in the hospital  can be detected. Based on the facial recognition technology and the individual‘s biometric image captured during his hospital registration, his ID card and his captured images will be used for his ID authentication by having our advanced hospital registration service systems applied in the hospital. Medical payment can be paid by face scan. Face scan is able to speed up and streamline the medical procedures.

Security Control System Layer 3:Key Area Security Control: With the help of our trajectory tracking and analysis system, hospitals are able to monitor their medical working staffs dynamically and get to know their whereabouts. Trajectory diagrams can be automatically generated after getting the captured images of a personnel with the cameras installed in the entries and exits of each hospital. This system also supports a quick staff retrieval. The real-time situation of each ward in the hospital can be knowable on the phone by using our remote ward checking system which allows remote access control. Moreover, illegal intrusion can be avoid by having our human shape detection cameras installed in the key areas of a hospital. Alarm will be automatically triggered when there appears an illegal intrusion.  

Application & Design
Captured Face Registration and Management: Our system supports multi-way registration with face capturing.  
Whitelisting Your Datebase To Improve Your Access Control Management: Database whitelisting refers to the regarding hospital in-patient department which allows its authorized patients, patients’ relatives and hospital medical staffs to successfully enter into the department after having their identities authenticated by whitelisting the people in its database. Face images can be captured by our integrated terminals on site to allow a visitor’s registration. Additionally, security guards or managers could help with the visitors’ registrations together with captured faces on the client side as well. Default permissions for access can be granted to all channel terminals or to certain channel terminals. Several details of each person included in the white list, such as his department information and phone numbers, are able to be imported by scanning his ID card. Our batch import system enables batches of images to be imported into a white list.

Blacklisting Your Database For Issuing Early Warnings: Our systems support the database of the devices functioning in blacklist. System administrators will receive a notification of an emergency when there is a face blacklisted in the database being detected. Our batch import system enables batches of images to be imported into a black list.

Visitor Management: Face images can be captured by our integrated terminals on site to allow a visitor’s registration. Addition to this, security guards or administrators could help with the visitors’ registrations together with captured faces on the client side as well. In case of the access of the register’s information in the database, the access right and access hours to a certain place with regard to a designated register are specifiable. Detail information of the registers can be set flexibly according to the requirements under the related departments. The detail information and images of a register can be automatically put in or extracted from by having his ID card scanned for a while, in the same time, turning on the USB-based cameras for a visitor’s face capture. Another two-in-one solution for information input can be the result of the face and ID card authentication. In addition to this way, visitors can be also authorized and enter into the terminals by having their information manually registered as well as having their faces captured. Corresponding status for notification input will be shown when their information is unregistered or the registration responses timed out.

History Record Inquiry: History records can be inquired according to each corresponding access channel in the client systems. Time, face image, registered face images, access status and access information ( The information of a visitor or a visitee ) will be included in the records. Images can be retrieved by images among the history records for people’s further inquiry.