Based on computer identification technology, cooperate with on-site cameras to automatically identify suspicious persons at monitoring points, give early warning to those who do not comply with the regulations, fill in the gap of artificial control, and strengthen security control.