CN111212262A - Method, device, system and storage medium for discovering abnormal behavior personnel of internet bar - Google Patents
Method, device, system and storage medium for discovering abnormal behavior personnel of internet bar Download PDFInfo
- Publication number
- CN111212262A CN111212262A CN201911236490.4A CN201911236490A CN111212262A CN 111212262 A CN111212262 A CN 111212262A CN 201911236490 A CN201911236490 A CN 201911236490A CN 111212262 A CN111212262 A CN 111212262A
- Authority
- CN
- China
- Prior art keywords
- record
- internet bar
- internet
- person
- people
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/94—Hardware or software architectures specially adapted for image or video understanding
- G06V10/95—Hardware or software architectures specially adapted for image or video understanding structured as a network, e.g. client-server architectures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
- G07C1/10—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Abstract
The invention discloses a method, a device, a system and a storage medium for discovering abnormal behavior personnel of an internet bar, wherein the method comprises the following steps: acquiring a face snapshot image of a person entering and exiting the internet bar, which is acquired and uploaded by a snapshot machine arranged at an entrance and an exit of the internet bar, and generating an entrance and exit record of the internet bar; acquiring the people's identity verification information which is acquired by the identity verification equipment of the internet bar and uploaded by the internet bar system and contains the human face photo and the identity card number, and generating a people's identity verification record; acquiring Internet surfing information which is uploaded by an Internet bar system and contains an identity card number and Internet surfing data, and generating an on-computer record; the person certificate checking record and the computer record are associated through the identity card number; the Internet bar access record and the personal authentication check record are associated through portrait comparison; according to the two-time correlation results, the people meeting the preset strategy are judged as abnormal people, the method and the system can automatically discover abnormal behavior people, can assist policemen to effectively manage and control the public places of the internet bar where crimes are easy to breed, and reduce the rate of issuing a case of the internet bar.
Description
Technical Field
The invention relates to the field of monitoring of internet bars, in particular to a method, a device, a system and a storage medium for discovering abnormal behavior personnel of an internet bar.
Background
As the popularity of the internet is rapidly increasing, various works and activities are increasingly performed using the internet, and as the anonymity and low cost of the internet are increased, more and more lawbreakers use the internet to communicate, plan criminal activities, and perform various crimes and destroy social stability using the internet are also rapidly increasing. However, in China, more than 50% of people surf the internet in the internet bar, the liquidity of the internet bar is high, and lawbreakers prefer to use the internet environment of the internet bar to conduct criminal activities. Under the condition, the internet bar needs to be monitored in real time, when an abnormal problem is found, the internet bar patrol personnel can be informed in the first time, and the internet bar patrol personnel can catch up to the abnormal internet bar in the shortest time to process the abnormal internet bar.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method, an apparatus, a system and a storage medium for discovering an abnormal behavior person in an internet bar, aiming at the above requirements of the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows:
in one aspect, a method for discovering abnormal behavior personnel of an internet bar is constructed, the method comprising:
acquiring a face snapshot image of a person entering and exiting the internet bar, which is acquired and uploaded by a snapshot machine arranged at an entrance and an exit of the internet bar, and generating an entrance and exit record of the internet bar;
acquiring the people's identity verification information which is acquired by the identity verification equipment of the internet bar and uploaded by the internet bar system and contains the human face photo and the identity card number, and generating a people's identity verification record;
acquiring Internet surfing information which is uploaded by an Internet bar system and contains an identity card number and Internet surfing data, and generating an on-computer record;
the person certificate checking record and the computer record are associated through the identity card number;
the Internet bar access record and the personal authentication check record are associated through portrait comparison;
and judging the personnel meeting the preset strategy as abnormal personnel according to the two correlation results.
Preferably, the generating of the internet cafe entrance and exit record comprises:
establishing personnel files for the face snapshot image, allocating a virtual ID to each personnel file, and generating a log record of the personnel entering or leaving the internet bar;
through the portrait comparison, merge the log record of entering and leaving the internet bar of every personnel into an internet bar access record, the internet bar access record includes: the virtual ID of the person, the code of the internet bar, the snapshot image when entering the internet bar, the time when entering the internet bar, the snapshot image when leaving the internet bar and the time when leaving the internet bar.
Preferably, the computer-operating record comprises an identity card number, a personnel name, an internet bar code, computer-operating time and computer-off time.
Preferably, the determining, according to the two association results, the person who meets the preset policy as an abnormal person includes:
if the Internet bar access record exists, and the associated witness verification record and the Internet access record do not exist, determining that the person corresponding to the Internet bar access record is an abnormal person;
if the Internet bar access record exists, the associated people certificate verification record exists, and the associated computer-operating record does not exist, determining that the person corresponding to the Internet bar access record is an abnormal person;
and if the Internet bar access record exists, the associated people certificate verification record and the associated computer-operating record exist, but the time difference between the computer-operating time period determined by the computer-operating record and the access time period determined by the Internet bar access record exceeds a preset threshold value, determining that the person corresponding to the Internet bar access record is an abnormal person.
In a second aspect, a big data analysis device for discovering abnormal behavior people of an internet bar is constructed, the device comprising:
the system comprises an Internet bar access record generation module, a storage module and a display module, wherein the Internet bar access record generation module is used for acquiring a face snapshot image of a person who enters and exits an Internet bar and is acquired and uploaded by a snapshot machine arranged at an access of the Internet bar and generating an Internet bar access record;
the system comprises a people's identity verification record generating module, a people's identity verification record generating module and a people's identity verification record generating module, wherein the people's identity verification record generating module is used for acquiring people's identity verification information which is uploaded by an internet bar system and contains a human face photo and an identity card number and generating people's identity verification records;
the computer-operated record generating module is used for acquiring the Internet surfing information which is uploaded by the Internet bar system and contains the identity card number and the Internet surfing data, and generating computer-operated records;
the first correlation module is used for correlating the person certificate verification record and the computer record with the identity card number;
the second correlation module is used for correlating the Internet bar access record with the personal authentication check record through portrait comparison;
and the abnormity judgment module is used for judging the personnel meeting the preset strategy as abnormal personnel according to the two correlation results.
Preferably, the internet bar access record generating module is specifically configured to establish a person file for a face snapshot image, assign a virtual ID to each person file, generate a log record of the person entering or leaving the internet bar, and combine the log record of the person entering and leaving the internet bar into an internet bar access record by portrait comparison, where the internet bar access record includes: the virtual ID of the person, the code of the internet bar, the snapshot image when entering the internet bar, the time when entering the internet bar, the snapshot image when leaving the internet bar and the time when leaving the internet bar.
Preferably, the abnormality determination module is specifically configured to determine that a person corresponding to the internet bar access record is an abnormal person when it is analyzed that the internet bar access record exists and the associated witness verification record and the internet access record do not exist;
when the fact that the Internet bar access record exists, the associated person certificate verification record exists and the associated computer-on record does not exist is analyzed, the person corresponding to the Internet bar access record is judged to be an abnormal person;
and when the fact that the Internet bar access record exists, the correlated witness verification record and the correlated machine-operating record exist is analyzed, and the time difference between the machine-operating time period determined by the machine-operating record and the access time period determined by the Internet bar access record exceeds a preset threshold value, determining that the person corresponding to the Internet bar access record is an abnormal person.
In three aspects, a big data analysis device for discovering people with abnormal behavior in an internet bar is constructed, comprising a processor and a memory, wherein the memory stores a computer program, and the computer program realizes the steps of the method according to any one of the preceding items when being executed by the processor.
In four aspects, construct a system for discovering unusual action personnel of internet bar, including arranging snapshot machine, identity verification equipment, internet bar system and big data analysis device at the access & exit of internet bar, wherein: the big data analysis device adopts the big data analysis device as described in any one of the above.
In a fifth aspect, a computer-readable storage medium is provided, in which a computer program is stored, which computer program, when being executed by a processor, carries out the steps of the method according to any of the preceding claims.
The method, the device, the system and the storage medium for discovering the abnormal behavior personnel of the internet bar have the following beneficial effects that: the invention carries out correlation calculation on the face snapshot image captured by the entrance and exit of the internet bar, the real name verification information collected by the identity verification equipment when the internet bar accesses the internet and the internet access data generated by the entrance and the exit of the internet bar, thereby analyzing abnormal behavior personnel which do not aim at accessing the internet.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts:
FIG. 1 is a flow chart of a method for discovering an abnormal behavior person in an Internet cafe according to the present invention;
FIG. 2 is a functional block diagram of a big data analysis device for discovering abnormal behavior of Internet cafes according to the present invention.
Detailed Description
To facilitate an understanding of the invention, the invention will now be described more fully with reference to the accompanying drawings. Exemplary embodiments of the invention are shown in the drawings. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete. It should be understood that the embodiments and specific features in the embodiments of the present invention are described in detail in the present application, but not limited to the present application, and the features in the embodiments and specific features in the embodiments of the present invention may be combined with each other without conflict.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention.
The terms including ordinal numbers such as "first", "second", and the like used in the present specification may be used to describe various components, but the components are not limited by the terms. These terms are used only for the purpose of distinguishing one constituent element from other constituent elements. For example, a first component may be named a second component, and similarly, a second component may also be named a first component, without departing from the scope of the present invention.
Example one
Referring to fig. 1, the present embodiment discloses a method for discovering an abnormal behavior person in an internet cafe, which is suitable for being executed by a big data analysis device in communication connection with a snapshot machine disposed at an entrance of the internet cafe and an internet cafe system.
The method comprises the following steps:
s101: acquiring a face snapshot image of a person entering and exiting the internet bar, which is acquired and uploaded by a snapshot machine arranged at an entrance and an exit of the internet bar, and generating an entrance and exit record of the internet bar;
before the method of the invention is executed, a bidirectional high-definition portrait capturing machine, hereinafter referred to as capturing machine, needs to be installed on an entrance and an exit of the internet bar in advance.
Wherein, the generation internet bar discrepancy record includes:
1) establishing personnel files for the face snapshot images, assigning a virtual ID to each personnel file, and generating a log record of the person entering or leaving the internet bar, wherein the log record comprises the virtual ID of the person, the code of the internet bar, the snapshot image when the person enters/leaves the internet bar, and the time of entering/leaving the internet bar.
It should be noted that the virtual ID is only one ID number set for convenience in data storage and analysis.
It can be understood that the snapshot machine can continuously snapshot a plurality of images of the same person, the snapshot images are uploaded to the big data analysis device, the big data analysis device can compare the images before and after, whether the images are the same person or not is identified through portrait comparison, and finally only one snapshot image needs to be stored.
In addition, the portrait comparison mentioned in the present document is realized by adopting an existing portrait comparison method, the portrait comparison is a mature technology at present, and as long as two face images are provided, whether the two face images are the same person can be determined based on an existing portrait comparison algorithm, so that the present invention is not expanded here.
2) Through the portrait comparison, the log records of the entrance and the exit of each person from the internet bar are combined into an internet bar entrance and exit record.
Specifically, if the image in one log record a entering the internet cafe is compared with the image in another log record B leaving the internet cafe to find that the image is the same person, the log record a and the log record B can be merged, where merging refers to taking the collection of information contained in the two records, and the finally formed entry and exit records of the internet cafe include: virtual ID of person, Internet bar code, snap shot image when entering Internet bar, time of entering Internet bar, snap shot image when leaving Internet bar, and time of leaving Internet bar
S102: acquiring the people's identity verification information which is acquired by the identity verification equipment of the internet bar and uploaded by the internet bar system and contains the human face photo and the identity card number, and generating a people's identity verification record;
before the method of the invention is executed, identity verification equipment is required to be installed in the Internet bar in advance, and the identity verification equipment can be people authentication equipment or identity authentication equipment commonly used in the Internet bar at present. The person who surfs the internet can obtain the internet card to surf the internet only by the authentication of the person authentication verification device or the identity authentication name authentication device. That is, the information collected by the identity verification equipment is directly sent to the internet bar system, and the internet bar system authorizes the internet access authority according to the information. Therefore, the information collected by the identity verification equipment is uploaded to the big data analysis device through the internet bar system.
S103: and acquiring the internet surfing information comprising the identity card number and the internet surfing data uploaded by the internet bar system, and generating an on-computer record.
The computer-on record comprises an identity card number, a personnel name, an internet bar code, computer-on time and computer-off time. The information is the information which needs to be recorded by the current internet bar system. This embodiment is merely to upload the information to the big data analysis apparatus through the internet cafe system.
S104: the person certificate checking record and the computer record are associated through the identity card number;
because the identification card number is contained in the identification card verification record and the computer-operating record, the identification card number can be directly compared, and if the identification card number of the identification card verification record is consistent with that of the computer-operating record, the identification card verification record and the computer-operating record are associated.
S105: the Internet bar access record and the personal authentication check record are associated through portrait comparison;
because the Internet bar access record and the human license verification record contain the human images, people can directly compare the human images, and if the comparison results of the Internet bar access record and the human license verification record are consistent, the Internet bar access record and the human license verification record are associated.
S106: according to the two association results, determining the person meeting the preset strategy as an abnormal person, specifically, the method comprises the following steps:
1) if the Internet bar access record exists, and the associated witness verification record and the Internet access record do not exist, determining that the person corresponding to the Internet bar access record is an abnormal person;
2) if the Internet bar access record exists, the associated people certificate verification record exists, and the associated computer-operating record does not exist, determining that the person corresponding to the Internet bar access record is an abnormal person;
3) and if the Internet bar access record exists, the associated people certificate verification record and the associated computer-operating record exist, but the time difference between the computer-operating time period determined by the computer-operating record and the access time period determined by the Internet bar access record exceeds a preset threshold value, determining that the person corresponding to the Internet bar access record is an abnormal person.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above.
Based on this embodiment, can discover unusual action personnel automatically, can assist the policeman to carry out effective management and control to the internet bar public place of breeding the crime easily, reduce the rate of sending a case of internet bar.
Example two
Based on the same concept, an embodiment of the present invention further provides a big data analysis apparatus for discovering an abnormal behavior person in an internet bar, and with reference to fig. 2, the apparatus includes:
the internet bar access record generation module 201 is used for acquiring a face snapshot image of a person who is arranged at an internet bar access and is collected and uploaded by a snapshot machine at the internet bar access, and generating an internet bar access record. Specifically, the internet bar access record generating module 201 establishes a person file for a face snapshot image, assigns a virtual ID to each person file, generates a log record of the person entering or leaving the internet bar, and combines the log records of the person entering and leaving the internet bar into an internet bar access record by comparing the person images, wherein the internet bar access record comprises: the virtual ID of the person, the code of the internet bar, the snapshot image when entering the internet bar, the time when entering the internet bar, the snapshot image when leaving the internet bar and the time when leaving the internet bar.
The personal authentication record generating module 202 is used for acquiring personal authentication information which is uploaded by the internet bar system and contains the face photo and the identity card number, and generating a personal authentication record;
the computer-operated record generating module 203 is used for acquiring the internet information which is uploaded by the internet bar system and contains the identity card number and the internet data, and generating computer-operated records;
the first association module 204 is configured to associate the person certificate verification record with the computer-operating record through the identity card number;
the second correlation module 205 is configured to correlate the internet bar entrance and exit record with the personal authentication record through a portrait comparison;
and the abnormal judgment module 206 is used for judging the person meeting the preset strategy as an abnormal person according to the two correlation results.
Further, the anomaly determination module 206 is specifically configured to:
when the fact that the Internet bar access record exists and the associated person certificate verification record and the Internet access record do not exist is analyzed, determining that a person corresponding to the Internet bar access record is an abnormal person;
when the fact that the Internet bar access record exists, the associated person certificate verification record exists and the associated computer-on record does not exist is analyzed, the person corresponding to the Internet bar access record is judged to be an abnormal person;
and when the fact that the Internet bar access record exists, the correlated witness verification record and the correlated machine-operating record exist is analyzed, and the time difference between the machine-operating time period determined by the machine-operating record and the access time period determined by the Internet bar access record exceeds a preset threshold value, determining that the person corresponding to the Internet bar access record is an abnormal person.
The functions of the functional modules of the apparatus according to the embodiment of the present invention may be specifically implemented according to the method in the foregoing method embodiment, and the specific implementation process may refer to the description related to the foregoing method embodiment, which is not described herein again.
The above description relates to various modules, which generally include hardware and/or a combination of hardware and software. The modules may also include computer-readable media containing instructions that, when executed by a processor, perform various functional features of the present invention. Accordingly, the scope of the invention is not limited by the specific hardware and/or software characteristics of the modules explicitly mentioned in the embodiments, unless explicitly claimed. As a non-limiting example, the present invention may in embodiments be implemented by one or more processors executing software instructions. It should be noted that the above description of the various modules is divided into these modules for clarity of illustration. However, in actual implementation, the boundaries of the various modules may be fuzzy. For example, any or all of the functional modules herein may share various hardware and/or software elements. Also for example, any and/or all of the functional modules herein may be implemented in whole or in part by a common processor executing software instructions. Additionally, various software sub-modules executed by one or more processors may be shared among the various software modules. Accordingly, the scope of the present invention is not limited by the mandatory boundaries between the various hardware and/or software elements, unless explicitly claimed otherwise.
EXAMPLE III
Based on the same concept, an embodiment of the present invention further provides a big data analysis apparatus for discovering people with abnormal behavior in an internet bar, which includes a processor and a memory, where the memory stores a computer program, and the computer program, when executed by the processor, implements the steps of the method according to the first embodiment.
Example four
Based on the same concept, an embodiment of the present invention further provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the steps of the method according to the first embodiment are implemented, and the specific implementation process may refer to the description of the method embodiment, which is not described herein again.
EXAMPLE five
Based on the same concept, the embodiment of the invention also provides a system for discovering people with abnormal behaviors in the internet bar, which comprises a snapshot machine arranged at the entrance and the exit of the internet bar, identity verification equipment, an internet bar system and a big data analysis device, wherein the snapshot image of the snapshot machine is uploaded to the big data analysis device, information collected by the identity verification equipment is uploaded to the internet bar system and then uploaded to the big data analysis device by the internet bar system, and the internet bar system also uploads the information related to internet surfing recorded by the internet bar system to the big data analysis device. Wherein, the big data analysis device adopts two or three big data analysis devices.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.
Claims (10)
1. A method for discovering people with abnormal behaviors in an Internet bar, which is characterized by comprising the following steps:
acquiring a face snapshot image of a person entering and exiting the internet bar, which is acquired and uploaded by a snapshot machine arranged at an entrance and an exit of the internet bar, and generating an entrance and exit record of the internet bar;
acquiring the people's identity verification information which is acquired by the identity verification equipment of the internet bar and uploaded by the internet bar system and contains the human face photo and the identity card number, and generating a people's identity verification record;
acquiring Internet surfing information which is uploaded by an Internet bar system and contains an identity card number and Internet surfing data, and generating an on-computer record;
the person certificate checking record and the computer record are associated through the identity card number;
the Internet bar access record and the personal authentication check record are associated through portrait comparison;
and judging the personnel meeting the preset strategy as abnormal personnel according to the two correlation results.
2. The method of claim 1, wherein said generating an internet cafe entry record comprises:
establishing personnel files for the face snapshot image, allocating a virtual ID to each personnel file, and generating a log record of the personnel entering or leaving the internet bar;
through the portrait comparison, merge the log record of entering and leaving the internet bar of every personnel into an internet bar access record, the internet bar access record includes: the virtual ID of the person, the code of the internet bar, the snapshot image when entering the internet bar, the time when entering the internet bar, the snapshot image when leaving the internet bar and the time when leaving the internet bar.
3. The method of claim 1, wherein the boarding record comprises an identification number, a person name, an internet caf code, a boarding time, and a disembarking time.
4. The method according to claim 1, wherein the determining, according to the two correlation results, the person who meets the preset policy as an abnormal person includes:
if the Internet bar access record exists, and the associated witness verification record and the Internet access record do not exist, determining that the person corresponding to the Internet bar access record is an abnormal person;
if the Internet bar access record exists, the associated people certificate verification record exists, and the associated computer-operating record does not exist, determining that the person corresponding to the Internet bar access record is an abnormal person;
and if the Internet bar access record exists, the associated people certificate verification record and the associated computer-operating record exist, but the time difference between the computer-operating time period determined by the computer-operating record and the access time period determined by the Internet bar access record exceeds a preset threshold value, determining that the person corresponding to the Internet bar access record is an abnormal person.
5. A big data analysis device for discovering abnormal behavior personnel of an Internet bar, which is characterized by comprising:
the system comprises an Internet bar access record generation module, a storage module and a display module, wherein the Internet bar access record generation module is used for acquiring a face snapshot image of a person who enters and exits an Internet bar and is acquired and uploaded by a snapshot machine arranged at an access of the Internet bar and generating an Internet bar access record;
the system comprises a people's identity verification record generating module, a people's identity verification record generating module and a people's identity verification record generating module, wherein the people's identity verification record generating module is used for acquiring people's identity verification information which is uploaded by an internet bar system and contains a human face photo and an identity card number and generating people's identity verification records;
the computer-operated record generating module is used for acquiring the Internet surfing information which is uploaded by the Internet bar system and contains the identity card number and the Internet surfing data, and generating computer-operated records;
the first correlation module is used for correlating the person certificate verification record and the computer record with the identity card number;
the second correlation module is used for correlating the Internet bar access record with the personal authentication check record through portrait comparison;
and the abnormity judgment module is used for judging the personnel meeting the preset strategy as abnormal personnel according to the two correlation results.
6. The apparatus according to claim 5, wherein the internet cafe access record generating module is specifically configured to create person profiles for face-captured images, assign a virtual ID to each person profile, generate log records of the person entering or leaving the internet cafe, and combine the log records of the person entering and leaving the internet cafe into an internet cafe access record by comparing the images, and the internet cafe access record includes: the virtual ID of the person, the code of the internet bar, the snapshot image when entering the internet bar, the time when entering the internet bar, the snapshot image when leaving the internet bar and the time when leaving the internet bar.
7. The apparatus according to claim 5, wherein the abnormality determination module is specifically configured to determine that a person corresponding to the internet cafe access record is an abnormal person when it is analyzed that the internet cafe access record exists and the associated person identification verification record and the internet access record do not exist;
when the fact that the Internet bar access record exists, the associated person certificate verification record exists and the associated computer-on record does not exist is analyzed, the person corresponding to the Internet bar access record is judged to be an abnormal person;
and when the fact that the Internet bar access record exists, the correlated witness verification record and the correlated machine-operating record exist is analyzed, and the time difference between the machine-operating time period determined by the machine-operating record and the access time period determined by the Internet bar access record exceeds a preset threshold value, determining that the person corresponding to the Internet bar access record is an abnormal person.
8. Big data analysis device for discovering people of internet cafes behaving abnormally, comprising a processor and a memory, said memory storing a computer program which, when executed by the processor, carries out the steps of the method according to any one of claims 1 to 4.
9. The utility model provides a discover system of unusual action personnel of internet bar which characterized in that, is including arranging snapshot machine, identity verification equipment, internet bar system and big data analysis device at the access & exit of internet bar, wherein: the big data analysis device adopts the big data analysis device according to any one of claims 5 to 7, or the big data analysis device adopts the big data analysis device according to claim 8.
10. A computer-readable storage medium, characterized in that a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911236490.4A CN111212262B (en) | 2019-12-05 | 2019-12-05 | Method, device, system and storage medium for discovering abnormal behavior personnel of internet bar |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911236490.4A CN111212262B (en) | 2019-12-05 | 2019-12-05 | Method, device, system and storage medium for discovering abnormal behavior personnel of internet bar |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111212262A true CN111212262A (en) | 2020-05-29 |
CN111212262B CN111212262B (en) | 2021-02-12 |
Family
ID=70786377
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911236490.4A Active CN111212262B (en) | 2019-12-05 | 2019-12-05 | Method, device, system and storage medium for discovering abnormal behavior personnel of internet bar |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111212262B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2854709Y (en) * | 2005-12-01 | 2007-01-03 | 江苏中科梦兰电子科技有限公司 | True name management device for network bar |
US20070098172A1 (en) * | 2002-07-16 | 2007-05-03 | Levy Kenneth L | Digital Watermarking Applications |
CN101005611A (en) * | 2006-12-31 | 2007-07-25 | 深圳市中科新业信息科技发展有限公司 | Net bar video frequency monitor and real name shooting method, system and device |
CN101404107A (en) * | 2008-11-19 | 2009-04-08 | 公安部第三研究所 | Internet bar monitoring and warning system based on human face recognition technology |
US20110202427A1 (en) * | 2010-02-17 | 2011-08-18 | Carlos Garcia Jurado Suarez | Device-Pairing by Reading an Address Provided in Device-Readable Form |
KR20110092587A (en) * | 2010-02-09 | 2011-08-18 | 유태영 | The apparatus of 3d-pc room with head mounted display |
CN102394783A (en) * | 2011-11-18 | 2012-03-28 | 西安佳迅科技有限公司 | Remote network monitoring method |
CN108664846A (en) * | 2017-03-29 | 2018-10-16 | 杰创智能科技股份有限公司 | A kind of Internet bar management system and management method based on recognition of face |
CN108681720A (en) * | 2018-05-21 | 2018-10-19 | 中兴智能视觉大数据技术(湖北)有限公司 | A kind of testimony of a witness veritification management system and method |
CN110163120A (en) * | 2019-04-30 | 2019-08-23 | 厦门一通灵信息科技有限公司 | A kind of Internet bar's system of real name application system based on recognition of face |
-
2019
- 2019-12-05 CN CN201911236490.4A patent/CN111212262B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070098172A1 (en) * | 2002-07-16 | 2007-05-03 | Levy Kenneth L | Digital Watermarking Applications |
CN2854709Y (en) * | 2005-12-01 | 2007-01-03 | 江苏中科梦兰电子科技有限公司 | True name management device for network bar |
CN101005611A (en) * | 2006-12-31 | 2007-07-25 | 深圳市中科新业信息科技发展有限公司 | Net bar video frequency monitor and real name shooting method, system and device |
CN101404107A (en) * | 2008-11-19 | 2009-04-08 | 公安部第三研究所 | Internet bar monitoring and warning system based on human face recognition technology |
KR20110092587A (en) * | 2010-02-09 | 2011-08-18 | 유태영 | The apparatus of 3d-pc room with head mounted display |
US20110202427A1 (en) * | 2010-02-17 | 2011-08-18 | Carlos Garcia Jurado Suarez | Device-Pairing by Reading an Address Provided in Device-Readable Form |
CN102394783A (en) * | 2011-11-18 | 2012-03-28 | 西安佳迅科技有限公司 | Remote network monitoring method |
CN108664846A (en) * | 2017-03-29 | 2018-10-16 | 杰创智能科技股份有限公司 | A kind of Internet bar management system and management method based on recognition of face |
CN108681720A (en) * | 2018-05-21 | 2018-10-19 | 中兴智能视觉大数据技术(湖北)有限公司 | A kind of testimony of a witness veritification management system and method |
CN110163120A (en) * | 2019-04-30 | 2019-08-23 | 厦门一通灵信息科技有限公司 | A kind of Internet bar's system of real name application system based on recognition of face |
Non-Patent Citations (1)
Title |
---|
卢怀农: "嫌疑人物品信息智能采集方法研究", 《警察技术》 * |
Also Published As
Publication number | Publication date |
---|---|
CN111212262B (en) | 2021-02-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105261105B (en) | Safety door inhibition method | |
US8516586B1 (en) | Classification of unknown computer network traffic | |
US20110050876A1 (en) | Method and apparatus for detecting behavior in a monitoring system | |
US20040064453A1 (en) | Large-scale hierarchical identification and verification for secured ingress and egress using biometrics | |
CN109951436B (en) | Trusted terminal verification method and device | |
RU2622883C2 (en) | System and method for managing access to personal data | |
CN104240342A (en) | Access control method and device | |
CN102999716A (en) | virtual machine monitoring system and method | |
CA3195818A1 (en) | Intelligent gallery management for biometrics | |
WO2019134548A1 (en) | Identity recognition method, apparatus and system | |
CN112507314B (en) | Client identity verification method, device, electronic equipment and storage medium | |
CN111212262B (en) | Method, device, system and storage medium for discovering abnormal behavior personnel of internet bar | |
CN209435252U (en) | A kind of backup verifying network system | |
CN101702168A (en) | Method for inquiring information based on key information of the second generation identity card | |
CN111241566A (en) | Policy management method, electronic device, computer device, and storage medium | |
CN112669501B (en) | Access control method, device and computer readable storage medium | |
CN114299653A (en) | Identity authentication method, device, system and storage medium | |
CN111241139B (en) | Data statistical method, device, computer equipment and storage medium | |
KR102069567B1 (en) | Structured Cabling System Using Biometric Authentication | |
CN113923036A (en) | Block chain information management method and device of continuous immune safety system | |
US20180114005A1 (en) | System and method for managing identity information stored in a cloud server | |
CN106157412A (en) | A kind of personnel's access system and method | |
CN110969738A (en) | Control system and method of intelligent security entrance guard based on 5G architecture | |
CN103886660A (en) | Network finger vein access control system and control method thereof | |
US10558784B2 (en) | Time and motion data fusion for determining and remedying issues based on physical presence |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |