CN116797429A - Comprehensive security management method, platform, equipment and computer readable storage medium - Google Patents

Comprehensive security management method, platform, equipment and computer readable storage medium Download PDF

Info

Publication number
CN116797429A
CN116797429A CN202310636768.7A CN202310636768A CN116797429A CN 116797429 A CN116797429 A CN 116797429A CN 202310636768 A CN202310636768 A CN 202310636768A CN 116797429 A CN116797429 A CN 116797429A
Authority
CN
China
Prior art keywords
monitoring
abnormal
abnormal event
image
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310636768.7A
Other languages
Chinese (zh)
Inventor
吴世乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ruitai Xingcheng Engineering Technology Co ltd
Original Assignee
Beijing Ruitai Xingcheng Engineering Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ruitai Xingcheng Engineering Technology Co ltd filed Critical Beijing Ruitai Xingcheng Engineering Technology Co ltd
Priority to CN202310636768.7A priority Critical patent/CN116797429A/en
Publication of CN116797429A publication Critical patent/CN116797429A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Educational Administration (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Alarm Systems (AREA)

Abstract

The application relates to a comprehensive security management method, a platform, equipment and a computer readable storage medium, belonging to the field of security technology, wherein the method comprises the following steps: acquiring monitoring information in real time; judging whether the monitoring information contains an abnormal event or not; if yes, generating alarm information based on the abnormal event; and sending the alarm information to a mobile terminal corresponding to the staff. The application has the effect of improving the security control.

Description

Comprehensive security management method, platform, equipment and computer readable storage medium
Technical Field
The present application relates to the field of security technologies, and in particular, to a comprehensive security management method, a platform, a device, and a computer readable storage medium.
Background
Security, which may be understood as an acronym "security" is danger-free, is neither invasive nor accident-free, is preparation or abstaining, and is ready to cope with an attack or avoid a victim, and is preparation and protection.
At present, videos acquired by monitoring equipment need to be transmitted and displayed in real time, workers need to stare at the watch for a long time to detect whether abnormal behaviors exist in monitoring pictures, but workers are difficult to ensure high-efficiency and accurate monitoring in twenty-four hours, so that abnormal behaviors cannot be found in time, and further the security protection management and control effect is poor.
Disclosure of Invention
In order to improve security control effects, the application provides a comprehensive security management method, a platform, equipment and a computer readable storage medium.
In a first aspect, the present application provides a comprehensive security management method, which adopts the following technical scheme:
a comprehensive security management method comprises the following steps:
acquiring monitoring information in real time;
judging whether the monitoring information contains an abnormal event or not;
if yes, generating alarm information based on the abnormal event;
and sending the alarm information to a mobile terminal corresponding to the staff.
Through adopting above-mentioned technical scheme, when obtaining monitoring information, automatic analysis is carried out to monitoring information, exist the unusual event in monitoring information, in time generate alarm information, and send the mobile terminal that the staff corresponds with the alarm information, so that the staff obtains the unusual event fast, look at for a long time for the staff, detect the mode of monitoring whether there is unusual action in the monitor picture with this, need not the staff and attend to the analysis of monitoring information, not only can reduce the input of manpower, can also increase the accuracy of the unusual event discernment in the monitoring information, be convenient for in time discover the unusual event, and then improve security protection management and control effect.
Optionally, the determining whether the monitoring information includes an abnormal event includes:
determining a monitoring scene based on the monitoring information;
determining an abnormal event based on the monitored scene;
analyzing the monitoring information to obtain an analysis result;
and when the analysis result is matched with the abnormal event, judging that the monitoring information contains the abnormal event.
By adopting the technical scheme, the abnormal event is determined through the monitoring scenes, the analysis result of the monitoring information is compared with the abnormal event, so that whether the abnormal event exists in the monitoring information is determined, and as each monitoring scene corresponds to the corresponding abnormal event, whether the abnormal event exists in the monitoring information can be rapidly determined by comparing the analysis result of the monitoring scene pair with the corresponding abnormal event, and the analysis efficiency of the abnormal event is greatly improved.
Optionally, the monitoring information includes a monitoring video; the analyzing the monitoring information comprises the following steps:
counting the occurrence times of abnormal events of each monitoring scene in a preset time period;
sequencing the monitoring scenes based on the occurrence times to obtain a sequence table;
determining an image interception period of each monitoring scene to the monitoring video based on the sequence table;
inputting the intercepted image into an image recognition model for recognition to obtain the analysis result.
By adopting the technical scheme, the monitoring scenes are ordered according to the occurrence times of the abnormal events, the image intercepting period is determined according to the sequence table, the intercepted images in the monitoring video are intercepted according to the image intercepting period, and the intercepted images are input into the image recognition model for recognition, so that the abnormal events in the monitoring video can be rapidly determined, and the abnormal events can be processed by staff in time.
Optionally, before the sending the alarm information to the mobile terminal corresponding to the staff, the method further includes:
acquiring an abnormal time corresponding to an abnormal event and a first abnormal image;
determining a collation time period based on the anomaly time;
acquiring a monitoring video segment corresponding to the proofreading time period;
intercepting a plurality of correction images in the monitoring video segment;
calculating the similarity value between each collated image and the first abnormal image, and counting the first total number of all the similarity values;
calculating a second total number of the similarity values within a preset range;
calculating a ratio of the second total to the first total;
and when the ratio is not in the range of the preset ratio, changing the abnormal event into normal information.
By adopting the technical scheme, the reliability of the determination result of the abnormal event can be increased by intercepting a plurality of long proofreading images through monitoring video clips in a monitoring time period, calculating the similarity value before the proofreading images and the abnormal images and calculating the ratio of the second total number to the first total number.
Optionally, the method further comprises:
acquiring a display area of the monitoring information, wherein the display area comprises an abnormal event display area;
acquiring a monitoring video corresponding to an abnormal event, and intercepting a second abnormal image corresponding to the abnormal event;
associating the second abnormal image with the monitoring video;
and displaying the second abnormal image in the abnormal event display area.
Through adopting above-mentioned technical scheme, the staff can observe the unusual event through the second unusual image directly perceivedly, can know the development progress of unusual event through the surveillance video, and the staff of being convenient for handles.
Optionally, before the displaying the second abnormal image in the abnormal event display area, the method further includes:
acquiring an abnormal region corresponding to the abnormal event; marking the abnormal region on a map;
and associating the marked map with the second abnormal image.
By adopting the technical scheme, the area where the abnormal event is located can be rapidly determined through the map, so that workers can go to the site in time to solve the problem.
Optionally, the display area further includes a general event display area, and the method further includes:
acquiring historical search data of a worker on a monitoring video, wherein the historical search data comprises a monitoring scene, search time and search frequency;
determining display rules of the monitoring videos based on the monitoring scenes, the searching time and the searching frequency, wherein the display rules comprise the display quantity and the size of each monitoring video display area;
and displaying the monitoring video based on the display rule.
Through adopting above-mentioned technical scheme, confirm through monitoring scene, search time and search frequency and show the rule, show the monitoring video based on showing the rule, make the monitoring video that the show area shows more accord with staff's custom, improve staff's viewing efficiency to monitoring video.
In a second aspect, the application provides a comprehensive security management platform, which adopts the following technical scheme:
an integrated security management platform, comprising:
the acquisition module is used for acquiring the monitoring information in real time;
the judging module is used for judging whether the monitoring information contains an abnormal event or not; if yes, generating alarm information based on the abnormal event;
the sending module is used for sending the alarm information to the mobile terminal corresponding to the staff member
Through adopting above-mentioned technical scheme, when obtaining monitoring information, automatic analysis is carried out to monitoring information, exist the unusual event in monitoring information, in time generate alarm information, and send the mobile terminal that the staff corresponds with the alarm information, so that the staff obtains the unusual event fast, look at for a long time for the staff, detect the mode of monitoring whether there is unusual action in the monitor picture with this, need not the staff and attend to the analysis of monitoring information, not only can reduce the input of manpower, can also increase the accuracy of the unusual event discernment in the monitoring information, be convenient for in time discover the unusual event, and then improve security protection management and control effect.
In a third aspect, the present application provides an electronic device, which adopts the following technical scheme:
an electronic device comprising a processor and a memory, the processor coupled with the memory;
the processor is configured to execute a computer program stored in the memory to cause the electronic device to perform the method according to any one of the first aspects.
In a fourth aspect, the present application provides a computer readable storage medium, which adopts the following technical scheme:
a computer readable storage medium comprising a computer program or instructions which, when run on a computer, cause the computer to perform the method of any of the first aspects.
Drawings
Fig. 1 is a schematic flow chart of a comprehensive security management method according to an embodiment of the present application.
Fig. 2 is a block diagram of a comprehensive security management platform according to an embodiment of the present application.
Fig. 3 is a block diagram of an electronic device embodying an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the accompanying drawings.
The present embodiment is only for explanation of the present application and is not to be construed as limiting the present application, and modifications to the present embodiment, which may not creatively contribute to the present application as required by those skilled in the art after reading the present specification, are all protected by patent laws within the scope of claims of the present application.
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In addition, the term "and/or" herein is merely an association relationship describing an association object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist together, and B exists alone. In this context, unless otherwise specified, the term "/" generally indicates that the associated object is an "or" relationship.
Embodiments of the application are described in further detail below with reference to the drawings.
The embodiment of the application provides a comprehensive security management method which can be executed by electronic equipment, wherein the electronic equipment can be a server or terminal equipment, the server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, and a cloud server for providing cloud computing service. The terminal device may be, but is not limited to, a smart phone, a tablet computer, a desktop computer, etc.
As shown in fig. 1, a comprehensive security management method is described as follows (steps S101 to S104):
step S101, monitoring information is obtained in real time;
the monitoring information may be a monitoring video, or may be information that indicates illegal entry or attempts to illegally enter a fortification area (including deliberately triggering an emergency alarm device when subjective judgment faces hijacking, robbery or other crisis conditions) by using a sensor technology and an electronic information technology, and in this embodiment, the monitoring video is mainly described as an example.
The electronic equipment acquires the monitoring video shot by the monitoring equipment, wherein the monitoring equipment can adopt a high-definition network camera, and a high-definition monitoring picture is acquired through the high-definition network camera, so that the original monitoring appearance can be clearly presented.
In this embodiment, each monitoring device is assigned an IP address, and a unified TCP/IP protocol is used to perform image, sound, and data acquisition and transmission. When the monitoring equipment is added, only the IP address is added, and the added IP address is bound with newly added equipment, and because the network digital video monitoring adopts network digital transmission signals, the limitation of cable length and signal attenuation is avoided, and the network is not limited by the geographical area, the monitoring layout of a wider area can be realized.
And uploading the shot monitoring video to the electronic equipment by the monitoring equipment in real time, and acquiring the monitoring video uploaded by the monitoring equipment by the electronic equipment in real time.
In this embodiment, the monitoring information may be monitoring information in urban road traffic monitoring, highway monitoring, social security monitoring and other security fields, or the electronic device may also be in docking with an access control system and an intercom system, so as to implement security management in multiple fields.
Step S102, judging whether the monitoring information contains an abnormal event or not; if yes, go to step S103;
specifically, a monitoring scene is determined based on the monitoring information; determining anomaly information based on the monitored scene; analyzing the monitoring information to obtain an analysis result; and when the analysis result is matched with the abnormal information, judging that the monitoring information contains the abnormal information.
In this embodiment, the IP address of the monitoring device corresponding to the monitoring information may be obtained through the monitoring information, the location of the monitoring device may be known through the IP address, and the monitoring scene of the monitoring information may be determined through the location of the monitoring device office.
For example, when the monitoring is set at a position on a highway road, the monitoring scene is traffic monitoring; when the position of the monitoring equipment is in a cell, the monitoring scene is cell monitoring; when the monitoring equipment is in the factory, the monitoring scene is factory monitoring.
Wherein the analysis of the monitoring information includes the following:
specifically, counting the occurrence times of abnormal events of each monitoring scene in a preset time period; sequencing the monitoring scenes based on the occurrence times to obtain a sequence table; determining an image intercepting period of each monitoring scene to the monitoring video based on the sequence table; inputting the intercepted image into an image recognition model for recognition to obtain an analysis result.
Each monitoring scene corresponds to a corresponding abnormal event. For example, for traffic scenarios, there are mainly problems of vehicle overspeed, vehicle reverse running and car accidents, then the abnormal event is that the vehicle is reversed running, vehicle overspeed and car accidents, and for some factory scenarios, some factory areas can require staff to wear safety helmets, then the abnormal event is that staff is not wearing safety helmets.
Each monitoring scene corresponds to an initial image capturing period, the initial image capturing period can be 10s, the occurrence times of the root abnormal events are used for adjusting the initial image capturing period, so that the abnormal events existing in the monitoring video can be rapidly identified, and workers can process the abnormal events in time.
In this embodiment, when an abnormal event exists in the monitoring information, the electronic device obtains a monitoring scenario corresponding to the abnormal event, first, adds one to the number of occurrences of the abnormal event in the corresponding scenario in the database, then obtains the number of occurrences of the abnormal event in each monitoring scenario, and ranks the monitoring scenarios based on the number of occurrences of the abnormal event, where the ranking manner may be that the ranking of the monitoring scenario of the abnormal event in the sequence table and the ranking total number are ranked according to the number of occurrences of the abnormal event from large to small, calculates a ratio of the ranking of the monitoring scenario of the abnormal event in the ranking total number in the sequence table, for example, the ranking of the monitoring scenario of the abnormal event in the sequence table is 5, the ranking total number is 100, at this time the ratio is 1/20, and determines an adjustment value of the initial image capturing period according to the ratio.
Wherein each adjustment value corresponds to a range of duty cycles. For example, when the adjustment value is 1, the duty ratio is in the range of 1/20 to 1/10, for example, when the adjustment value is 2, the duty ratio is in the range of 1/10 to 1/5; each adjusting value and the duty ratio range are preset in advance; when the duty ratio meets the corresponding duty ratio range, subtracting the corresponding adjusting value from the initial image intercepting period to obtain the image intercepting period.
In this embodiment, when the electronic device acquires an image capturing period, capturing an image in a monitoring video corresponding to an abnormal event based on the image capturing period, and inputting the captured image into an image recognition model by the electronic device to obtain a recognition result, wherein the recognition result is an analysis result, and the image recognition model may be a neural network model for image recognition; when the identification result is consistent with the abnormal event corresponding to the monitoring scene, the analysis result can be determined to be matched with the abnormal event, and the abnormal event is judged to be contained in the monitoring information.
Specifically, the intercepted image can be input into a neural network model to identify a human face, the human face is compared with the human face in the blacklist, and when the human face is consistent with the human face in the blacklist, alarm information is sent to staff or related departments; the intercepted images can be input into the neural network model to identify whether fire disaster happens, the neural network model can be utilized to analyze the colors and the brightness of a plurality of intercepted images so as to determine whether fire disaster happens and the area where the fire disaster is located, when a fire disaster exists, alarm information is generated in time and sent to a mobile terminal corresponding to a worker, wherein the intercepted images are required to be sequenced according to time, and are sequentially identified according to the time sequence.
Step S103, generating alarm information based on the abnormal event;
in this embodiment, the alarm information is generated according to the monitoring video of the abnormal event, the first abnormal image, the abnormal region, and the number of abnormalities.
Before sending the alarm information to the mobile terminal corresponding to the staff, the method further comprises the following steps:
specifically, acquiring an abnormal time and a first abnormal image corresponding to an abnormal event; determining a collation time period based on the anomaly time; acquiring a monitoring video segment corresponding to a proofreading time period; intercepting a plurality of proofreading images in a monitored video segment; calculating the similarity value between each proofreading image and the first abnormal image, and counting the first total number of all the similarity values; calculating a second total number of similarity values within a preset range; calculating a ratio of the second total to the first total; and when the ratio is not in the preset ratio range, changing the abnormal event into normal information.
In this embodiment, in order to reduce occurrence of error warning information, an abnormal event needs to be checked, so an electronic device needs to obtain an abnormal time and an abnormal image corresponding to the abnormal event, and a plurality of check time periods are selected through the abnormal time, for example, the abnormal time is 8:00, then the check time periods may be 8:00-8:01 and 8:02-8:02, and a monitoring video segment in the check time period is intercepted, where an image intercepting period for intercepting a calibration image may be consistent with an image intercepting period for determining each monitoring scene to the monitoring video based on a sequence table.
In the present embodiment, the correction image and the abnormal image may be input into the image recognition model, and the similarity value of the abnormal image and the correction image may be calculated. Counting a first total number of all similarity values; calculating a second total number of similarity values within a preset range; calculating a ratio of the second total to the first total; when the ratio is not in the preset ratio range, the abnormal event is changed into the common event, wherein the preset range can be 0-5%, and the preset ratio range can be 0-1/10.
Step S104, the alarm information is sent to the mobile terminal corresponding to the staff.
In this embodiment, the alarm information is sent to the mobile terminal of the staff member of the monitoring scene corresponding to the abnormal event.
Before sending the alarm information to the mobile terminal of the worker, the attendance information of the worker needs to be acquired, the current on-duty worker can be determined through the attendance information, and the alarm information is sent to the mobile terminal of the on-duty worker.
In this embodiment, the monitoring information may also be displayed on a television wall or on a mobile terminal in real time, and in this embodiment, the television wall is taken as an example for illustration.
Specifically, a display area of monitoring information is obtained, wherein the display area comprises an abnormal event display area; acquiring a monitoring video corresponding to an abnormal event, and intercepting a second abnormal image corresponding to the abnormal event; associating the second abnormal image with the monitoring video; and displaying the second abnormal image in the abnormal event display area.
In this embodiment, the display area of the tv wall is divided into a normal event display area and an abnormal event display area, when the electronic device acquires an abnormal event, a monitoring video corresponding to the abnormal event and a first abnormal image are acquired, the first abnormal image and corresponding monitoring information are associated, the association mode may be a hyperlink, the first abnormal image is displayed in the abnormal event display area, and when the abnormal image in the abnormal event display area is too many, the first abnormal image may be enlarged or reduced according to the risk level of the abnormal event, so as to ensure that each first abnormal image can be displayed in the abnormal event display area.
Specifically, when the abnormal event is solved, the corresponding abnormal image can be deleted in the abnormal area, or each abnormal image has a display valid period, and when the display valid period is exceeded, the corresponding abnormal image is automatically deleted, wherein the display valid period can be determined according to the danger level of the abnormal event.
In order to facilitate the staff to enter the abnormal region for working, the method further comprises the following steps before the image information is displayed in the abnormal event display region:
specifically, before the second abnormal image is displayed in the abnormal event display area, the method further includes: acquiring an abnormal region corresponding to the abnormal event; marking the abnormal region on the map; and associating the marked map with the second abnormal image.
In this embodiment, when the electronic device obtains the abnormal event, the IP address of the monitoring device corresponding to the abnormal event is obtained, the abnormal area where the abnormal event is located is queried through the IP address, and the abnormal area is marked on the map, where the marking mode may be circling, marking may be performed by using different colors, and flashing may be performed for the marking of the abnormal area, which is not particularly limited.
The electronic device associates the marked map with the corresponding abnormal image, and the association manner may be a hyperlink, which is not specifically limited in this embodiment.
When a worker clicks the abnormal image through a keyboard, a mouse and the like, the monitoring video can be played, a marked map can be obtained, the area of the abnormal event can be quickly known through the map, and the worker can conveniently arrive at the scene in time to solve the problem.
In this embodiment, a worker may search for monitoring video information at any time, and may adjust a display rule for the monitoring video according to the history search data.
Specifically, historical search data of a worker on a monitoring video is obtained, wherein the historical search data comprises a monitoring scene, search time and search frequency; determining display rules of the monitoring videos based on the monitoring scenes, the searching time and the searching frequency, wherein the display rules comprise the display quantity and the size of each monitoring video display area; and displaying the monitoring video based on the display rule.
In this embodiment, when the frequency of searching a certain monitoring scene by a worker is more, the worker proves that the worker is interested in comparing the monitoring videos of the monitoring scene, wherein a threshold value can be determined for the searching frequency, the threshold value can be 5 times, and when the searching frequency exceeds 5 times, the searching frequency is considered to be more.
The electronic equipment determines whether the search of the monitoring scene and the search time have correlation according to the search time of each monitoring scene, and when the correlation exists, the display area corresponding to a certain type of monitoring scene is enlarged based on the search time, so that the monitoring scene is convenient for the staff to check.
The method for judging whether the correlation exists between the searching of the monitoring scene and the searching time may be as follows: the search time is divided into a plurality of time groups, wherein two hours may be one time group, for example 1: 00-3: 00 is a time packet; when a plurality of search times of a certain monitoring scene are concentrated in one time group, judging that the search of the monitoring scene has relevance with the search time; for example, when the number of searches of a certain monitoring scene on a certain time group is greater than a preset number of times threshold, the number of searches of the monitoring scene is considered to be concentrated on one time group, and the preset number of times threshold may be 4/5.
Fig. 2 is a block diagram of a comprehensive security management platform 200 according to the present application. As shown in fig. 2, the integrated security management platform 200 mainly includes:
an acquisition module 201, configured to acquire monitoring information in real time;
a judging module 202, configured to judge whether the monitoring information includes an abnormal event; if yes, generating alarm information based on the abnormal event;
and the sending module 203 is configured to send the alarm information to a mobile terminal corresponding to the staff.
As an optional implementation manner of this embodiment, the determining module 202 includes:
the first determining submodule is used for determining a monitoring scene based on the monitoring information;
a second determination submodule for determining an abnormal event based on the monitoring scene;
the analysis sub-module is used for analyzing the monitoring information to obtain an analysis result;
and the judging sub-module is used for judging that the monitoring information contains the abnormal event when the analysis result is matched with the abnormal event.
As an alternative implementation manner of this embodiment, the analysis submodule further includes:
the statistics sub-module is used for counting the occurrence times of the abnormal events of each monitoring scene in a preset time period;
the sequencing sub-module is used for sequencing the monitoring scenes based on the occurrence times to obtain a sequence table;
the period sub-determining module is used for determining the image intercepting period of each monitoring scene to the monitoring video based on the sequence table;
and the recognition sub-module is used for inputting the intercepted image into the image recognition model for recognition to obtain an analysis result.
As an optional implementation manner of this embodiment, the comprehensive security management platform 200 further includes:
the abnormal acquisition module is used for acquiring abnormal time and a first abnormal image corresponding to an abnormal event before sending the alarm information to the mobile terminal corresponding to the staff;
the time period determining module is used for determining a correction time period based on the abnormal time;
the segment acquisition module is used for acquiring a monitoring video segment corresponding to the correction time period;
the intercepting module is used for intercepting a plurality of proofreading images in the monitoring video clip;
the first calculation module is used for calculating the similarity value between each proofreading image and the first abnormal image and counting the first total number of all the similarity values;
the second calculation module is used for calculating a second total number of the similarity values within a preset range;
a third calculation module for calculating a ratio of the second total to the first total;
and the changing module is used for changing the abnormal event into normal information when the ratio is not in the range of the preset ratio.
As an optional implementation manner of this embodiment, the comprehensive security management platform 200 further includes:
the area acquisition module is used for acquiring a display area of the monitoring information, wherein the display area comprises an abnormal event display area;
the acquisition and interception module is used for acquiring a monitoring video corresponding to the abnormal event and intercepting a second abnormal image corresponding to the abnormal event;
the first association module is used for associating the second abnormal image with the monitoring video;
the first display module is used for displaying the second abnormal image in the abnormal event display area.
As an optional implementation manner of this embodiment, the comprehensive security management platform 200 further includes:
the acquiring and labeling module is used for acquiring an abnormal region corresponding to the abnormal event before the image information is displayed in the abnormal event display region; marking the abnormal region on the map;
and the second association module is used for associating the marked map with the second abnormal image.
As an optional implementation manner of this embodiment, the comprehensive security management platform 200 further includes:
the data acquisition module is used for acquiring historical search data of a user on the monitoring video, wherein the historical search data comprises a monitoring scene, search time and search frequency;
the rule determining module is used for determining display rules of the monitoring videos based on the monitoring scenes, the searching time and the searching frequency, wherein the display rules comprise the display quantity and the size of each monitoring video display area;
and the second display module is used for displaying the monitoring video based on the display rule.
The functional modules in the embodiment of the application can be integrated together to form an independent part, or each module can exist independently, or two or more modules can be integrated to form an independent part. The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored on a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing an electronic device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of an integrated security management method of the various embodiments of the present application.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described system, apparatus and module may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
Fig. 3 is a block diagram of an electronic device 300 according to an embodiment of the present application. As shown in fig. 3, the electronic device 300 includes a memory 301, a processor 302, and a communication bus 303; the memory 301 and the processor 302 are connected by a communication bus 303. The memory 301 stores therein a comprehensive security management method that can be loaded and executed by the processor 302 as provided in the above-described embodiment.
Memory 301 may be used to store instructions, programs, code sets, or instruction sets. The memory 401 may include a storage program area and a storage data area, wherein the storage program area may store instructions for implementing an operating system, instructions for at least one function, instructions for implementing an integrated security management method provided in the above embodiment, and the like; the storage data area may store data and the like involved in the comprehensive security management method provided by the above embodiment.
Processor 302 may include one or more processing cores. The processor 302 performs the various functions of the present application and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 301, invoking data stored in the memory 301. The processor 302 may be at least one of an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a digital signal processor (Digital Signal Processor, DSP), a digital signal processing device (Digital Signal Processing Device, DSPD), a programmable logic device (Programmable Logic Device, PLD), a field programmable gate array (Field Programmable Gate Array, FPGA), a central processing unit (Central Processing Unit, CPU), a controller, a microcontroller, and a microprocessor. It will be appreciated that the electronics for implementing the functions of the processor 302 described above may be other for different devices, and embodiments of the present application are not particularly limited.
Communication bus 303 may include a path to transfer information between the components. The communication bus 403 may be a PCI (Peripheral Component Interconnect, peripheral component interconnect standard) bus or an EISA (Extended Industry Standard Architecture ) bus, or the like. The communication bus 303 may be classified into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one double arrow is shown in FIG. 3, but not only one bus or one type of bus.
An embodiment of the present application provides a computer-readable storage medium storing a computer program capable of being loaded by a processor and executing a comprehensive security management method as provided in the above embodiment.
In this embodiment, the computer-readable storage medium may be a tangible device that holds and stores instructions for use by the instruction execution device. The computer readable storage medium may be, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any combination of the preceding. In particular, the computer readable storage medium may be a portable computer disk, hard disk, USB flash disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), podium random access memory (SRAM), portable compact disc read-only memory (CD-ROM), digital Versatile Disk (DVD), memory stick, floppy disk, optical disk, magnetic disk, mechanical coding device, and any combination of the foregoing.
The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
The above description is only illustrative of the preferred embodiments of the present application and of the principles of the technology employed. It will be appreciated by persons skilled in the art that the scope of the application is not limited to the specific combinations of the features described above, but also covers other embodiments which may be formed by any combination of the features described above or their equivalents without departing from the spirit of the application. Such as the above-mentioned features and the technical features having similar functions (but not limited to) applied for in the present application are replaced with each other.

Claims (10)

1. The comprehensive security management method is characterized by comprising the following steps of:
acquiring monitoring information in real time;
judging whether the monitoring information contains an abnormal event or not;
if yes, generating alarm information based on the abnormal event;
and sending the alarm information to a mobile terminal corresponding to the staff.
2. The method of claim 1, wherein determining whether the monitoring information includes an abnormal event comprises:
determining a monitoring scene based on the monitoring information;
determining an abnormal event based on the monitored scene;
analyzing the monitoring information to obtain an analysis result;
and when the analysis result is matched with the abnormal event, judging that the monitoring information contains the abnormal event.
3. The method of claim 2, wherein the monitoring information comprises a monitoring video; the analyzing the monitoring information comprises the following steps:
counting the occurrence times of abnormal events of each monitoring scene in a preset time period;
sequencing the monitoring scenes based on the occurrence times to obtain a sequence table;
determining an image interception period of each monitoring scene to the monitoring video based on the sequence table;
inputting the intercepted image into an image recognition model for recognition to obtain the analysis result.
4. A method according to claim 1 or 3, further comprising, before said sending said alert information to a mobile terminal corresponding to a staff member:
acquiring an abnormal time corresponding to an abnormal event and a first abnormal image;
determining a collation time period based on the anomaly time;
acquiring a monitoring video segment corresponding to the proofreading time period;
intercepting a plurality of correction images in the monitoring video segment;
calculating the similarity value between each collated image and the first abnormal image, and counting the first total number of all the similarity values;
calculating a second total number of the similarity values within a preset range;
calculating a ratio of the second total to the first total;
and when the ratio is not in the range of the preset ratio, changing the abnormal event into normal information.
5. The method according to claim 1, wherein the method further comprises:
acquiring a display area of the monitoring information, wherein the display area comprises an abnormal event display area;
acquiring a monitoring video corresponding to an abnormal event, and intercepting a second abnormal image corresponding to the abnormal event;
associating the second abnormal image with the monitoring video;
and displaying the second abnormal image in the abnormal event display area.
6. The method of claim 5, further comprising, prior to said displaying said second anomaly image in said anomaly event presentation area:
acquiring an abnormal region corresponding to the abnormal event; marking the abnormal region on a map;
and associating the marked map with the second abnormal image.
7. The method of claim 6, wherein the presentation area further comprises a general event presentation area, the method further comprising:
acquiring historical search data of a worker on a monitoring video, wherein the historical search data comprises a monitoring scene, search time and search frequency;
determining display rules of the monitoring videos based on the monitoring scenes, the searching time and the searching frequency, wherein the display rules comprise the display quantity and the size of each monitoring video display area;
and displaying the monitoring video based on the display rule.
8. An integrated security management platform, comprising:
the acquisition module is used for acquiring the monitoring information in real time;
the judging module is used for judging whether the monitoring information contains an abnormal event or not; if yes, generating alarm information based on the abnormal event;
and the sending module is used for sending the alarm information to the mobile terminal corresponding to the staff.
9. An electronic device comprising a processor and a memory, the processor coupled to the memory;
the processor is configured to execute a computer program stored in the memory to cause the electronic device to perform the method of any one of claims 1 to 7.
10. A computer readable storage medium comprising a computer program or instructions which, when run on a computer, cause the computer to perform the method of any of claims 1 to 7.
CN202310636768.7A 2023-05-31 2023-05-31 Comprehensive security management method, platform, equipment and computer readable storage medium Pending CN116797429A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310636768.7A CN116797429A (en) 2023-05-31 2023-05-31 Comprehensive security management method, platform, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310636768.7A CN116797429A (en) 2023-05-31 2023-05-31 Comprehensive security management method, platform, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN116797429A true CN116797429A (en) 2023-09-22

Family

ID=88047348

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310636768.7A Pending CN116797429A (en) 2023-05-31 2023-05-31 Comprehensive security management method, platform, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN116797429A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113034826A (en) * 2021-03-10 2021-06-25 深圳市兴海物联科技有限公司 Video-based abnormal event warning method and system, equipment and storage medium thereof
CN113065026A (en) * 2021-04-15 2021-07-02 上海交通大学 Intelligent abnormal event detection system, method and medium based on security micro-service architecture
CN113093578A (en) * 2021-04-09 2021-07-09 上海商汤智能科技有限公司 Control method and device, electronic equipment and storage medium
CN113129475A (en) * 2021-03-30 2021-07-16 广州小鹏汽车科技有限公司 Monitoring method and device and vehicle
CN113903141A (en) * 2021-11-18 2022-01-07 贵州电网有限责任公司 Scene abnormal event identification, analysis and alarm system for transformer substation and distribution room and outdoor transformer
CN114550076A (en) * 2021-10-19 2022-05-27 深圳市中博科创信息技术有限公司 Method, device and equipment for monitoring area abnormal behaviors and storage medium
CN114913663A (en) * 2021-02-08 2022-08-16 腾讯科技(深圳)有限公司 Anomaly detection method and device, computer equipment and storage medium
CN115909161A (en) * 2022-11-28 2023-04-04 浙江力石科技股份有限公司 Monitoring information integration method and system for intelligent scenic spot
CN115965894A (en) * 2022-12-28 2023-04-14 深圳云天励飞技术股份有限公司 Patrol robot control method and device, electronic equipment and storage medium
CN116155694A (en) * 2023-04-04 2023-05-23 深圳中正信息科技有限公司 Method and device for managing internet of things equipment and readable storage medium
CN116170566A (en) * 2023-02-02 2023-05-26 深圳市前海逸云科技有限公司 Intelligent building monitoring management method and device, electronic equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114913663A (en) * 2021-02-08 2022-08-16 腾讯科技(深圳)有限公司 Anomaly detection method and device, computer equipment and storage medium
CN113034826A (en) * 2021-03-10 2021-06-25 深圳市兴海物联科技有限公司 Video-based abnormal event warning method and system, equipment and storage medium thereof
CN113129475A (en) * 2021-03-30 2021-07-16 广州小鹏汽车科技有限公司 Monitoring method and device and vehicle
CN113093578A (en) * 2021-04-09 2021-07-09 上海商汤智能科技有限公司 Control method and device, electronic equipment and storage medium
CN113065026A (en) * 2021-04-15 2021-07-02 上海交通大学 Intelligent abnormal event detection system, method and medium based on security micro-service architecture
CN114550076A (en) * 2021-10-19 2022-05-27 深圳市中博科创信息技术有限公司 Method, device and equipment for monitoring area abnormal behaviors and storage medium
CN113903141A (en) * 2021-11-18 2022-01-07 贵州电网有限责任公司 Scene abnormal event identification, analysis and alarm system for transformer substation and distribution room and outdoor transformer
CN115909161A (en) * 2022-11-28 2023-04-04 浙江力石科技股份有限公司 Monitoring information integration method and system for intelligent scenic spot
CN115965894A (en) * 2022-12-28 2023-04-14 深圳云天励飞技术股份有限公司 Patrol robot control method and device, electronic equipment and storage medium
CN116170566A (en) * 2023-02-02 2023-05-26 深圳市前海逸云科技有限公司 Intelligent building monitoring management method and device, electronic equipment and storage medium
CN116155694A (en) * 2023-04-04 2023-05-23 深圳中正信息科技有限公司 Method and device for managing internet of things equipment and readable storage medium

Similar Documents

Publication Publication Date Title
CN110659391A (en) Video detection method and device
US20240144299A1 (en) Realtime Busyness for Places
CN111414828B (en) Abnormal aggregation identification method and device
CN111191507A (en) Safety early warning analysis method and system for smart community
CN112017323A (en) Patrol alarm method and device, readable storage medium and terminal equipment
CN110717358A (en) Visitor number counting method and device, electronic equipment and storage medium
CN111178241A (en) Intelligent monitoring system and method based on video analysis
CN115103157A (en) Video analysis method and device based on edge cloud cooperation, electronic equipment and medium
CN111401239B (en) Video analysis method, device, system, equipment and storage medium
CN113673311A (en) Traffic abnormal event detection method, equipment and computer storage medium
CN115880631A (en) Power distribution station fault identification system, method and medium
CN111860187A (en) High-precision worn mask identification method and system
CN108288025A (en) A kind of car video monitoring method, device and equipment
CN110895663B (en) Two-wheel vehicle identification method and device, electronic equipment and monitoring system
CN110505438B (en) Queuing data acquisition method and camera
CN116797993B (en) Monitoring method, system, medium and equipment based on intelligent community scene
CN116797429A (en) Comprehensive security management method, platform, equipment and computer readable storage medium
CN110751125A (en) Wearing detection method and device
CN111102987B (en) Rescue vehicle tracking method, device, server and medium
CN114373209A (en) Video-based face recognition method and device, electronic equipment and storage medium
CN111382626B (en) Method, device and equipment for detecting illegal image in video and storage medium
CN113468948A (en) View data based security and protection control method, module, equipment and storage medium
CN112241671A (en) Personnel identity identification method, device and system
CN112991655B (en) Method and device for dynamically adjusting monitoring camera set
CN113129532B (en) Stranger early warning method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination