CN111212262A - Method, device, system and storage medium for discovering abnormal behavior personnel of internet bar - Google Patents

Method, device, system and storage medium for discovering abnormal behavior personnel of internet bar Download PDF

Info

Publication number
CN111212262A
CN111212262A CN201911236490.4A CN201911236490A CN111212262A CN 111212262 A CN111212262 A CN 111212262A CN 201911236490 A CN201911236490 A CN 201911236490A CN 111212262 A CN111212262 A CN 111212262A
Authority
CN
China
Prior art keywords
record
internet bar
internet
person
people
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911236490.4A
Other languages
Chinese (zh)
Other versions
CN111212262B (en
Inventor
胡齐波
朱生尊
李斌辉
马啸尘
周勇林
沈智杰
景晓军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Surfilter Technology Development Co ltd
Surfilter Network Technology Co ltd
Original Assignee
Shenzhen Surfilter Technology Development Co ltd
Surfilter Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Surfilter Technology Development Co ltd, Surfilter Network Technology Co ltd filed Critical Shenzhen Surfilter Technology Development Co ltd
Priority to CN201911236490.4A priority Critical patent/CN111212262B/en
Publication of CN111212262A publication Critical patent/CN111212262A/en
Application granted granted Critical
Publication of CN111212262B publication Critical patent/CN111212262B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/94Hardware or software architectures specially adapted for image or video understanding
    • G06V10/95Hardware or software architectures specially adapted for image or video understanding structured as a network, e.g. client-server architectures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Abstract

The invention discloses a method, a device, a system and a storage medium for discovering abnormal behavior personnel of an internet bar, wherein the method comprises the following steps: acquiring a face snapshot image of a person entering and exiting the internet bar, which is acquired and uploaded by a snapshot machine arranged at an entrance and an exit of the internet bar, and generating an entrance and exit record of the internet bar; acquiring the people's identity verification information which is acquired by the identity verification equipment of the internet bar and uploaded by the internet bar system and contains the human face photo and the identity card number, and generating a people's identity verification record; acquiring Internet surfing information which is uploaded by an Internet bar system and contains an identity card number and Internet surfing data, and generating an on-computer record; the person certificate checking record and the computer record are associated through the identity card number; the Internet bar access record and the personal authentication check record are associated through portrait comparison; according to the two-time correlation results, the people meeting the preset strategy are judged as abnormal people, the method and the system can automatically discover abnormal behavior people, can assist policemen to effectively manage and control the public places of the internet bar where crimes are easy to breed, and reduce the rate of issuing a case of the internet bar.

Description

Method, device, system and storage medium for discovering abnormal behavior personnel of internet bar
Technical Field
The invention relates to the field of monitoring of internet bars, in particular to a method, a device, a system and a storage medium for discovering abnormal behavior personnel of an internet bar.
Background
As the popularity of the internet is rapidly increasing, various works and activities are increasingly performed using the internet, and as the anonymity and low cost of the internet are increased, more and more lawbreakers use the internet to communicate, plan criminal activities, and perform various crimes and destroy social stability using the internet are also rapidly increasing. However, in China, more than 50% of people surf the internet in the internet bar, the liquidity of the internet bar is high, and lawbreakers prefer to use the internet environment of the internet bar to conduct criminal activities. Under the condition, the internet bar needs to be monitored in real time, when an abnormal problem is found, the internet bar patrol personnel can be informed in the first time, and the internet bar patrol personnel can catch up to the abnormal internet bar in the shortest time to process the abnormal internet bar.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method, an apparatus, a system and a storage medium for discovering an abnormal behavior person in an internet bar, aiming at the above requirements of the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows:
in one aspect, a method for discovering abnormal behavior personnel of an internet bar is constructed, the method comprising:
acquiring a face snapshot image of a person entering and exiting the internet bar, which is acquired and uploaded by a snapshot machine arranged at an entrance and an exit of the internet bar, and generating an entrance and exit record of the internet bar;
acquiring the people's identity verification information which is acquired by the identity verification equipment of the internet bar and uploaded by the internet bar system and contains the human face photo and the identity card number, and generating a people's identity verification record;
acquiring Internet surfing information which is uploaded by an Internet bar system and contains an identity card number and Internet surfing data, and generating an on-computer record;
the person certificate checking record and the computer record are associated through the identity card number;
the Internet bar access record and the personal authentication check record are associated through portrait comparison;
and judging the personnel meeting the preset strategy as abnormal personnel according to the two correlation results.
Preferably, the generating of the internet cafe entrance and exit record comprises:
establishing personnel files for the face snapshot image, allocating a virtual ID to each personnel file, and generating a log record of the personnel entering or leaving the internet bar;
through the portrait comparison, merge the log record of entering and leaving the internet bar of every personnel into an internet bar access record, the internet bar access record includes: the virtual ID of the person, the code of the internet bar, the snapshot image when entering the internet bar, the time when entering the internet bar, the snapshot image when leaving the internet bar and the time when leaving the internet bar.
Preferably, the computer-operating record comprises an identity card number, a personnel name, an internet bar code, computer-operating time and computer-off time.
Preferably, the determining, according to the two association results, the person who meets the preset policy as an abnormal person includes:
if the Internet bar access record exists, and the associated witness verification record and the Internet access record do not exist, determining that the person corresponding to the Internet bar access record is an abnormal person;
if the Internet bar access record exists, the associated people certificate verification record exists, and the associated computer-operating record does not exist, determining that the person corresponding to the Internet bar access record is an abnormal person;
and if the Internet bar access record exists, the associated people certificate verification record and the associated computer-operating record exist, but the time difference between the computer-operating time period determined by the computer-operating record and the access time period determined by the Internet bar access record exceeds a preset threshold value, determining that the person corresponding to the Internet bar access record is an abnormal person.
In a second aspect, a big data analysis device for discovering abnormal behavior people of an internet bar is constructed, the device comprising:
the system comprises an Internet bar access record generation module, a storage module and a display module, wherein the Internet bar access record generation module is used for acquiring a face snapshot image of a person who enters and exits an Internet bar and is acquired and uploaded by a snapshot machine arranged at an access of the Internet bar and generating an Internet bar access record;
the system comprises a people's identity verification record generating module, a people's identity verification record generating module and a people's identity verification record generating module, wherein the people's identity verification record generating module is used for acquiring people's identity verification information which is uploaded by an internet bar system and contains a human face photo and an identity card number and generating people's identity verification records;
the computer-operated record generating module is used for acquiring the Internet surfing information which is uploaded by the Internet bar system and contains the identity card number and the Internet surfing data, and generating computer-operated records;
the first correlation module is used for correlating the person certificate verification record and the computer record with the identity card number;
the second correlation module is used for correlating the Internet bar access record with the personal authentication check record through portrait comparison;
and the abnormity judgment module is used for judging the personnel meeting the preset strategy as abnormal personnel according to the two correlation results.
Preferably, the internet bar access record generating module is specifically configured to establish a person file for a face snapshot image, assign a virtual ID to each person file, generate a log record of the person entering or leaving the internet bar, and combine the log record of the person entering and leaving the internet bar into an internet bar access record by portrait comparison, where the internet bar access record includes: the virtual ID of the person, the code of the internet bar, the snapshot image when entering the internet bar, the time when entering the internet bar, the snapshot image when leaving the internet bar and the time when leaving the internet bar.
Preferably, the abnormality determination module is specifically configured to determine that a person corresponding to the internet bar access record is an abnormal person when it is analyzed that the internet bar access record exists and the associated witness verification record and the internet access record do not exist;
when the fact that the Internet bar access record exists, the associated person certificate verification record exists and the associated computer-on record does not exist is analyzed, the person corresponding to the Internet bar access record is judged to be an abnormal person;
and when the fact that the Internet bar access record exists, the correlated witness verification record and the correlated machine-operating record exist is analyzed, and the time difference between the machine-operating time period determined by the machine-operating record and the access time period determined by the Internet bar access record exceeds a preset threshold value, determining that the person corresponding to the Internet bar access record is an abnormal person.
In three aspects, a big data analysis device for discovering people with abnormal behavior in an internet bar is constructed, comprising a processor and a memory, wherein the memory stores a computer program, and the computer program realizes the steps of the method according to any one of the preceding items when being executed by the processor.
In four aspects, construct a system for discovering unusual action personnel of internet bar, including arranging snapshot machine, identity verification equipment, internet bar system and big data analysis device at the access & exit of internet bar, wherein: the big data analysis device adopts the big data analysis device as described in any one of the above.
In a fifth aspect, a computer-readable storage medium is provided, in which a computer program is stored, which computer program, when being executed by a processor, carries out the steps of the method according to any of the preceding claims.
The method, the device, the system and the storage medium for discovering the abnormal behavior personnel of the internet bar have the following beneficial effects that: the invention carries out correlation calculation on the face snapshot image captured by the entrance and exit of the internet bar, the real name verification information collected by the identity verification equipment when the internet bar accesses the internet and the internet access data generated by the entrance and the exit of the internet bar, thereby analyzing abnormal behavior personnel which do not aim at accessing the internet.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts:
FIG. 1 is a flow chart of a method for discovering an abnormal behavior person in an Internet cafe according to the present invention;
FIG. 2 is a functional block diagram of a big data analysis device for discovering abnormal behavior of Internet cafes according to the present invention.
Detailed Description
To facilitate an understanding of the invention, the invention will now be described more fully with reference to the accompanying drawings. Exemplary embodiments of the invention are shown in the drawings. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete. It should be understood that the embodiments and specific features in the embodiments of the present invention are described in detail in the present application, but not limited to the present application, and the features in the embodiments and specific features in the embodiments of the present invention may be combined with each other without conflict.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention.
The terms including ordinal numbers such as "first", "second", and the like used in the present specification may be used to describe various components, but the components are not limited by the terms. These terms are used only for the purpose of distinguishing one constituent element from other constituent elements. For example, a first component may be named a second component, and similarly, a second component may also be named a first component, without departing from the scope of the present invention.
Example one
Referring to fig. 1, the present embodiment discloses a method for discovering an abnormal behavior person in an internet cafe, which is suitable for being executed by a big data analysis device in communication connection with a snapshot machine disposed at an entrance of the internet cafe and an internet cafe system.
The method comprises the following steps:
s101: acquiring a face snapshot image of a person entering and exiting the internet bar, which is acquired and uploaded by a snapshot machine arranged at an entrance and an exit of the internet bar, and generating an entrance and exit record of the internet bar;
before the method of the invention is executed, a bidirectional high-definition portrait capturing machine, hereinafter referred to as capturing machine, needs to be installed on an entrance and an exit of the internet bar in advance.
Wherein, the generation internet bar discrepancy record includes:
1) establishing personnel files for the face snapshot images, assigning a virtual ID to each personnel file, and generating a log record of the person entering or leaving the internet bar, wherein the log record comprises the virtual ID of the person, the code of the internet bar, the snapshot image when the person enters/leaves the internet bar, and the time of entering/leaving the internet bar.
It should be noted that the virtual ID is only one ID number set for convenience in data storage and analysis.
It can be understood that the snapshot machine can continuously snapshot a plurality of images of the same person, the snapshot images are uploaded to the big data analysis device, the big data analysis device can compare the images before and after, whether the images are the same person or not is identified through portrait comparison, and finally only one snapshot image needs to be stored.
In addition, the portrait comparison mentioned in the present document is realized by adopting an existing portrait comparison method, the portrait comparison is a mature technology at present, and as long as two face images are provided, whether the two face images are the same person can be determined based on an existing portrait comparison algorithm, so that the present invention is not expanded here.
2) Through the portrait comparison, the log records of the entrance and the exit of each person from the internet bar are combined into an internet bar entrance and exit record.
Specifically, if the image in one log record a entering the internet cafe is compared with the image in another log record B leaving the internet cafe to find that the image is the same person, the log record a and the log record B can be merged, where merging refers to taking the collection of information contained in the two records, and the finally formed entry and exit records of the internet cafe include: virtual ID of person, Internet bar code, snap shot image when entering Internet bar, time of entering Internet bar, snap shot image when leaving Internet bar, and time of leaving Internet bar
S102: acquiring the people's identity verification information which is acquired by the identity verification equipment of the internet bar and uploaded by the internet bar system and contains the human face photo and the identity card number, and generating a people's identity verification record;
before the method of the invention is executed, identity verification equipment is required to be installed in the Internet bar in advance, and the identity verification equipment can be people authentication equipment or identity authentication equipment commonly used in the Internet bar at present. The person who surfs the internet can obtain the internet card to surf the internet only by the authentication of the person authentication verification device or the identity authentication name authentication device. That is, the information collected by the identity verification equipment is directly sent to the internet bar system, and the internet bar system authorizes the internet access authority according to the information. Therefore, the information collected by the identity verification equipment is uploaded to the big data analysis device through the internet bar system.
S103: and acquiring the internet surfing information comprising the identity card number and the internet surfing data uploaded by the internet bar system, and generating an on-computer record.
The computer-on record comprises an identity card number, a personnel name, an internet bar code, computer-on time and computer-off time. The information is the information which needs to be recorded by the current internet bar system. This embodiment is merely to upload the information to the big data analysis apparatus through the internet cafe system.
S104: the person certificate checking record and the computer record are associated through the identity card number;
because the identification card number is contained in the identification card verification record and the computer-operating record, the identification card number can be directly compared, and if the identification card number of the identification card verification record is consistent with that of the computer-operating record, the identification card verification record and the computer-operating record are associated.
S105: the Internet bar access record and the personal authentication check record are associated through portrait comparison;
because the Internet bar access record and the human license verification record contain the human images, people can directly compare the human images, and if the comparison results of the Internet bar access record and the human license verification record are consistent, the Internet bar access record and the human license verification record are associated.
S106: according to the two association results, determining the person meeting the preset strategy as an abnormal person, specifically, the method comprises the following steps:
1) if the Internet bar access record exists, and the associated witness verification record and the Internet access record do not exist, determining that the person corresponding to the Internet bar access record is an abnormal person;
2) if the Internet bar access record exists, the associated people certificate verification record exists, and the associated computer-operating record does not exist, determining that the person corresponding to the Internet bar access record is an abnormal person;
3) and if the Internet bar access record exists, the associated people certificate verification record and the associated computer-operating record exist, but the time difference between the computer-operating time period determined by the computer-operating record and the access time period determined by the Internet bar access record exceeds a preset threshold value, determining that the person corresponding to the Internet bar access record is an abnormal person.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above.
Based on this embodiment, can discover unusual action personnel automatically, can assist the policeman to carry out effective management and control to the internet bar public place of breeding the crime easily, reduce the rate of sending a case of internet bar.
Example two
Based on the same concept, an embodiment of the present invention further provides a big data analysis apparatus for discovering an abnormal behavior person in an internet bar, and with reference to fig. 2, the apparatus includes:
the internet bar access record generation module 201 is used for acquiring a face snapshot image of a person who is arranged at an internet bar access and is collected and uploaded by a snapshot machine at the internet bar access, and generating an internet bar access record. Specifically, the internet bar access record generating module 201 establishes a person file for a face snapshot image, assigns a virtual ID to each person file, generates a log record of the person entering or leaving the internet bar, and combines the log records of the person entering and leaving the internet bar into an internet bar access record by comparing the person images, wherein the internet bar access record comprises: the virtual ID of the person, the code of the internet bar, the snapshot image when entering the internet bar, the time when entering the internet bar, the snapshot image when leaving the internet bar and the time when leaving the internet bar.
The personal authentication record generating module 202 is used for acquiring personal authentication information which is uploaded by the internet bar system and contains the face photo and the identity card number, and generating a personal authentication record;
the computer-operated record generating module 203 is used for acquiring the internet information which is uploaded by the internet bar system and contains the identity card number and the internet data, and generating computer-operated records;
the first association module 204 is configured to associate the person certificate verification record with the computer-operating record through the identity card number;
the second correlation module 205 is configured to correlate the internet bar entrance and exit record with the personal authentication record through a portrait comparison;
and the abnormal judgment module 206 is used for judging the person meeting the preset strategy as an abnormal person according to the two correlation results.
Further, the anomaly determination module 206 is specifically configured to:
when the fact that the Internet bar access record exists and the associated person certificate verification record and the Internet access record do not exist is analyzed, determining that a person corresponding to the Internet bar access record is an abnormal person;
when the fact that the Internet bar access record exists, the associated person certificate verification record exists and the associated computer-on record does not exist is analyzed, the person corresponding to the Internet bar access record is judged to be an abnormal person;
and when the fact that the Internet bar access record exists, the correlated witness verification record and the correlated machine-operating record exist is analyzed, and the time difference between the machine-operating time period determined by the machine-operating record and the access time period determined by the Internet bar access record exceeds a preset threshold value, determining that the person corresponding to the Internet bar access record is an abnormal person.
The functions of the functional modules of the apparatus according to the embodiment of the present invention may be specifically implemented according to the method in the foregoing method embodiment, and the specific implementation process may refer to the description related to the foregoing method embodiment, which is not described herein again.
The above description relates to various modules, which generally include hardware and/or a combination of hardware and software. The modules may also include computer-readable media containing instructions that, when executed by a processor, perform various functional features of the present invention. Accordingly, the scope of the invention is not limited by the specific hardware and/or software characteristics of the modules explicitly mentioned in the embodiments, unless explicitly claimed. As a non-limiting example, the present invention may in embodiments be implemented by one or more processors executing software instructions. It should be noted that the above description of the various modules is divided into these modules for clarity of illustration. However, in actual implementation, the boundaries of the various modules may be fuzzy. For example, any or all of the functional modules herein may share various hardware and/or software elements. Also for example, any and/or all of the functional modules herein may be implemented in whole or in part by a common processor executing software instructions. Additionally, various software sub-modules executed by one or more processors may be shared among the various software modules. Accordingly, the scope of the present invention is not limited by the mandatory boundaries between the various hardware and/or software elements, unless explicitly claimed otherwise.
EXAMPLE III
Based on the same concept, an embodiment of the present invention further provides a big data analysis apparatus for discovering people with abnormal behavior in an internet bar, which includes a processor and a memory, where the memory stores a computer program, and the computer program, when executed by the processor, implements the steps of the method according to the first embodiment.
Example four
Based on the same concept, an embodiment of the present invention further provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the steps of the method according to the first embodiment are implemented, and the specific implementation process may refer to the description of the method embodiment, which is not described herein again.
EXAMPLE five
Based on the same concept, the embodiment of the invention also provides a system for discovering people with abnormal behaviors in the internet bar, which comprises a snapshot machine arranged at the entrance and the exit of the internet bar, identity verification equipment, an internet bar system and a big data analysis device, wherein the snapshot image of the snapshot machine is uploaded to the big data analysis device, information collected by the identity verification equipment is uploaded to the internet bar system and then uploaded to the big data analysis device by the internet bar system, and the internet bar system also uploads the information related to internet surfing recorded by the internet bar system to the big data analysis device. Wherein, the big data analysis device adopts two or three big data analysis devices.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. A method for discovering people with abnormal behaviors in an Internet bar, which is characterized by comprising the following steps:
acquiring a face snapshot image of a person entering and exiting the internet bar, which is acquired and uploaded by a snapshot machine arranged at an entrance and an exit of the internet bar, and generating an entrance and exit record of the internet bar;
acquiring the people's identity verification information which is acquired by the identity verification equipment of the internet bar and uploaded by the internet bar system and contains the human face photo and the identity card number, and generating a people's identity verification record;
acquiring Internet surfing information which is uploaded by an Internet bar system and contains an identity card number and Internet surfing data, and generating an on-computer record;
the person certificate checking record and the computer record are associated through the identity card number;
the Internet bar access record and the personal authentication check record are associated through portrait comparison;
and judging the personnel meeting the preset strategy as abnormal personnel according to the two correlation results.
2. The method of claim 1, wherein said generating an internet cafe entry record comprises:
establishing personnel files for the face snapshot image, allocating a virtual ID to each personnel file, and generating a log record of the personnel entering or leaving the internet bar;
through the portrait comparison, merge the log record of entering and leaving the internet bar of every personnel into an internet bar access record, the internet bar access record includes: the virtual ID of the person, the code of the internet bar, the snapshot image when entering the internet bar, the time when entering the internet bar, the snapshot image when leaving the internet bar and the time when leaving the internet bar.
3. The method of claim 1, wherein the boarding record comprises an identification number, a person name, an internet caf code, a boarding time, and a disembarking time.
4. The method according to claim 1, wherein the determining, according to the two correlation results, the person who meets the preset policy as an abnormal person includes:
if the Internet bar access record exists, and the associated witness verification record and the Internet access record do not exist, determining that the person corresponding to the Internet bar access record is an abnormal person;
if the Internet bar access record exists, the associated people certificate verification record exists, and the associated computer-operating record does not exist, determining that the person corresponding to the Internet bar access record is an abnormal person;
and if the Internet bar access record exists, the associated people certificate verification record and the associated computer-operating record exist, but the time difference between the computer-operating time period determined by the computer-operating record and the access time period determined by the Internet bar access record exceeds a preset threshold value, determining that the person corresponding to the Internet bar access record is an abnormal person.
5. A big data analysis device for discovering abnormal behavior personnel of an Internet bar, which is characterized by comprising:
the system comprises an Internet bar access record generation module, a storage module and a display module, wherein the Internet bar access record generation module is used for acquiring a face snapshot image of a person who enters and exits an Internet bar and is acquired and uploaded by a snapshot machine arranged at an access of the Internet bar and generating an Internet bar access record;
the system comprises a people's identity verification record generating module, a people's identity verification record generating module and a people's identity verification record generating module, wherein the people's identity verification record generating module is used for acquiring people's identity verification information which is uploaded by an internet bar system and contains a human face photo and an identity card number and generating people's identity verification records;
the computer-operated record generating module is used for acquiring the Internet surfing information which is uploaded by the Internet bar system and contains the identity card number and the Internet surfing data, and generating computer-operated records;
the first correlation module is used for correlating the person certificate verification record and the computer record with the identity card number;
the second correlation module is used for correlating the Internet bar access record with the personal authentication check record through portrait comparison;
and the abnormity judgment module is used for judging the personnel meeting the preset strategy as abnormal personnel according to the two correlation results.
6. The apparatus according to claim 5, wherein the internet cafe access record generating module is specifically configured to create person profiles for face-captured images, assign a virtual ID to each person profile, generate log records of the person entering or leaving the internet cafe, and combine the log records of the person entering and leaving the internet cafe into an internet cafe access record by comparing the images, and the internet cafe access record includes: the virtual ID of the person, the code of the internet bar, the snapshot image when entering the internet bar, the time when entering the internet bar, the snapshot image when leaving the internet bar and the time when leaving the internet bar.
7. The apparatus according to claim 5, wherein the abnormality determination module is specifically configured to determine that a person corresponding to the internet cafe access record is an abnormal person when it is analyzed that the internet cafe access record exists and the associated person identification verification record and the internet access record do not exist;
when the fact that the Internet bar access record exists, the associated person certificate verification record exists and the associated computer-on record does not exist is analyzed, the person corresponding to the Internet bar access record is judged to be an abnormal person;
and when the fact that the Internet bar access record exists, the correlated witness verification record and the correlated machine-operating record exist is analyzed, and the time difference between the machine-operating time period determined by the machine-operating record and the access time period determined by the Internet bar access record exceeds a preset threshold value, determining that the person corresponding to the Internet bar access record is an abnormal person.
8. Big data analysis device for discovering people of internet cafes behaving abnormally, comprising a processor and a memory, said memory storing a computer program which, when executed by the processor, carries out the steps of the method according to any one of claims 1 to 4.
9. The utility model provides a discover system of unusual action personnel of internet bar which characterized in that, is including arranging snapshot machine, identity verification equipment, internet bar system and big data analysis device at the access & exit of internet bar, wherein: the big data analysis device adopts the big data analysis device according to any one of claims 5 to 7, or the big data analysis device adopts the big data analysis device according to claim 8.
10. A computer-readable storage medium, characterized in that a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1-4.
CN201911236490.4A 2019-12-05 2019-12-05 Method, device, system and storage medium for discovering abnormal behavior personnel of internet bar Active CN111212262B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911236490.4A CN111212262B (en) 2019-12-05 2019-12-05 Method, device, system and storage medium for discovering abnormal behavior personnel of internet bar

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911236490.4A CN111212262B (en) 2019-12-05 2019-12-05 Method, device, system and storage medium for discovering abnormal behavior personnel of internet bar

Publications (2)

Publication Number Publication Date
CN111212262A true CN111212262A (en) 2020-05-29
CN111212262B CN111212262B (en) 2021-02-12

Family

ID=70786377

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911236490.4A Active CN111212262B (en) 2019-12-05 2019-12-05 Method, device, system and storage medium for discovering abnormal behavior personnel of internet bar

Country Status (1)

Country Link
CN (1) CN111212262B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2854709Y (en) * 2005-12-01 2007-01-03 江苏中科梦兰电子科技有限公司 True name management device for network bar
US20070098172A1 (en) * 2002-07-16 2007-05-03 Levy Kenneth L Digital Watermarking Applications
CN101005611A (en) * 2006-12-31 2007-07-25 深圳市中科新业信息科技发展有限公司 Net bar video frequency monitor and real name shooting method, system and device
CN101404107A (en) * 2008-11-19 2009-04-08 公安部第三研究所 Internet bar monitoring and warning system based on human face recognition technology
US20110202427A1 (en) * 2010-02-17 2011-08-18 Carlos Garcia Jurado Suarez Device-Pairing by Reading an Address Provided in Device-Readable Form
KR20110092587A (en) * 2010-02-09 2011-08-18 유태영 The apparatus of 3d-pc room with head mounted display
CN102394783A (en) * 2011-11-18 2012-03-28 西安佳迅科技有限公司 Remote network monitoring method
CN108664846A (en) * 2017-03-29 2018-10-16 杰创智能科技股份有限公司 A kind of Internet bar management system and management method based on recognition of face
CN108681720A (en) * 2018-05-21 2018-10-19 中兴智能视觉大数据技术(湖北)有限公司 A kind of testimony of a witness veritification management system and method
CN110163120A (en) * 2019-04-30 2019-08-23 厦门一通灵信息科技有限公司 A kind of Internet bar's system of real name application system based on recognition of face

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070098172A1 (en) * 2002-07-16 2007-05-03 Levy Kenneth L Digital Watermarking Applications
CN2854709Y (en) * 2005-12-01 2007-01-03 江苏中科梦兰电子科技有限公司 True name management device for network bar
CN101005611A (en) * 2006-12-31 2007-07-25 深圳市中科新业信息科技发展有限公司 Net bar video frequency monitor and real name shooting method, system and device
CN101404107A (en) * 2008-11-19 2009-04-08 公安部第三研究所 Internet bar monitoring and warning system based on human face recognition technology
KR20110092587A (en) * 2010-02-09 2011-08-18 유태영 The apparatus of 3d-pc room with head mounted display
US20110202427A1 (en) * 2010-02-17 2011-08-18 Carlos Garcia Jurado Suarez Device-Pairing by Reading an Address Provided in Device-Readable Form
CN102394783A (en) * 2011-11-18 2012-03-28 西安佳迅科技有限公司 Remote network monitoring method
CN108664846A (en) * 2017-03-29 2018-10-16 杰创智能科技股份有限公司 A kind of Internet bar management system and management method based on recognition of face
CN108681720A (en) * 2018-05-21 2018-10-19 中兴智能视觉大数据技术(湖北)有限公司 A kind of testimony of a witness veritification management system and method
CN110163120A (en) * 2019-04-30 2019-08-23 厦门一通灵信息科技有限公司 A kind of Internet bar's system of real name application system based on recognition of face

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
卢怀农: "嫌疑人物品信息智能采集方法研究", 《警察技术》 *

Also Published As

Publication number Publication date
CN111212262B (en) 2021-02-12

Similar Documents

Publication Publication Date Title
CN105261105B (en) Safety door inhibition method
US8516586B1 (en) Classification of unknown computer network traffic
US20110050876A1 (en) Method and apparatus for detecting behavior in a monitoring system
US20040064453A1 (en) Large-scale hierarchical identification and verification for secured ingress and egress using biometrics
CN109951436B (en) Trusted terminal verification method and device
RU2622883C2 (en) System and method for managing access to personal data
CN104240342A (en) Access control method and device
CN102999716A (en) virtual machine monitoring system and method
CA3195818A1 (en) Intelligent gallery management for biometrics
WO2019134548A1 (en) Identity recognition method, apparatus and system
CN112507314B (en) Client identity verification method, device, electronic equipment and storage medium
CN111212262B (en) Method, device, system and storage medium for discovering abnormal behavior personnel of internet bar
CN209435252U (en) A kind of backup verifying network system
CN101702168A (en) Method for inquiring information based on key information of the second generation identity card
CN111241566A (en) Policy management method, electronic device, computer device, and storage medium
CN112669501B (en) Access control method, device and computer readable storage medium
CN114299653A (en) Identity authentication method, device, system and storage medium
CN111241139B (en) Data statistical method, device, computer equipment and storage medium
KR102069567B1 (en) Structured Cabling System Using Biometric Authentication
CN113923036A (en) Block chain information management method and device of continuous immune safety system
US20180114005A1 (en) System and method for managing identity information stored in a cloud server
CN106157412A (en) A kind of personnel's access system and method
CN110969738A (en) Control system and method of intelligent security entrance guard based on 5G architecture
CN103886660A (en) Network finger vein access control system and control method thereof
US10558784B2 (en) Time and motion data fusion for determining and remedying issues based on physical presence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant