WO2018165863A1 - Data classification method and apparatus in safety and protection monitoring - Google Patents

Data classification method and apparatus in safety and protection monitoring Download PDF

Info

Publication number
WO2018165863A1
WO2018165863A1 PCT/CN2017/076636 CN2017076636W WO2018165863A1 WO 2018165863 A1 WO2018165863 A1 WO 2018165863A1 CN 2017076636 W CN2017076636 W CN 2017076636W WO 2018165863 A1 WO2018165863 A1 WO 2018165863A1
Authority
WO
WIPO (PCT)
Prior art keywords
avatar
avatar information
database
category
information
Prior art date
Application number
PCT/CN2017/076636
Other languages
French (fr)
Chinese (zh)
Inventor
张北江
胡君健
Original Assignee
华平智慧信息技术(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华平智慧信息技术(深圳)有限公司 filed Critical 华平智慧信息技术(深圳)有限公司
Priority to PCT/CN2017/076636 priority Critical patent/WO2018165863A1/en
Publication of WO2018165863A1 publication Critical patent/WO2018165863A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor

Definitions

  • the invention relates to the field of security, and in particular to a method and a device for classifying data in security monitoring.
  • the security monitoring system is a system that uses optical fibers, coaxial cables or microwaves to transmit video signals in its closed loop and from camera to image display and recording. It can reflect the monitored object in real time, image and reality. It can be used for long-term monitoring instead of manual in harsh environments and recorded by video recorder. At the same time, the alarm system equipment alarms for illegal intrusion.
  • a method for data classification in security monitoring is provided, which solves the inconvenience of the prior art when it is required to query a video file of big data.
  • a method for data classification in security monitoring comprising the steps of:
  • the monitoring system captures the first avatar information of the person in the video big data
  • the monitoring system compares the first avatar information with the existing avatar information in the avatar database
  • the video data including the first avatar information is classified into a security category
  • the video data corresponding to the first avatar information is classified into a category to be determined.
  • the method further includes:
  • the video data of the first avatar information is classified into a category to be determined.
  • the method further includes:
  • an apparatus for classifying data in security monitoring comprising:
  • a crawling unit configured to capture first avatar information of a character in the video big data
  • a processing unit configured to compare the first avatar information with the existing avatar information in the avatar database; if the first avatar information exists in the avatar database and occurs more than a set threshold, the method includes The video data of the first avatar information is classified into the security category; if the first avatar information does not exist in the avatar database, the video data corresponding to the first avatar information is classified into the to-be-determined category.
  • the processing unit is further configured to: if the first avatar information exists in the avatar database but the number of occurrences is less than a set threshold, classify the video data of the first avatar information to be determined. In the category.
  • the processing unit is configured to: when the first avatar information appears more than the set number of times, move all the video data corresponding to the first avatar information into the security category.
  • a third aspect provides a device for classifying data in security monitoring, the device comprising: a processor, a transceiver, a memory, and a bus, wherein the processor, the transceiver, and the memory are connected by using a bus;
  • a processor configured to capture first avatar information of a character in the video big data; compare the first avatar information with an existing avatar information in the avatar database; if the first avatar information exists in the avatar database If the number of occurrences is more than a set threshold, the video data including the first avatar information is classified into a security category; if the first avatar information does not exist in the avatar database, the first avatar information is The corresponding video data is classified into the category to be determined.
  • the processor is further configured to: if the first avatar information exists in the avatar database but the number of occurrences is less than a set threshold, classify the video data of the first avatar information to be determined. In the category.
  • the processor is configured to: when the first avatar information appears more than the set number of times, move all the video data corresponding to the first avatar information into the security category.
  • FIG. 1 is a schematic flowchart diagram of a method for data classification in security monitoring according to the present invention.
  • FIG. 2 is a schematic structural diagram of an apparatus for classifying data in security monitoring according to the present invention.
  • FIG. 3 is a schematic structural diagram of an apparatus for classifying data in security monitoring according to the present invention.
  • FIG. 1 is a method for data classification in security monitoring according to a first preferred embodiment of the present invention.
  • the method is implemented by a security system.
  • the method is as shown in FIG. 1 and includes the following steps:
  • Step S101 The monitoring system captures the first avatar information of the person in the video big data.
  • Step S102 The monitoring system compares the first avatar information with the existing avatar information in the avatar database.
  • Step S103 If the first avatar information exists in the avatar database and occurs more than a set threshold, the video data including the first avatar information is classified into a security category; If the information does not exist in the avatar database, the video data corresponding to the first avatar information is classified into a category to be determined.
  • the technical solution provided by the present invention can determine whether the data is to be confirmed according to the number of times the avatar data appears, because for big data, most of the data is known user data, and the data is safe at this time.
  • the data does not need to be searched at all, so it is necessary to distinguish between secure data and non-secure data, so it has the advantage of querying data.
  • the foregoing method may further include:
  • the video data of the first avatar information is classified into a category to be determined.
  • the foregoing method may further include:
  • FIG. 2 is a device for classifying data in security monitoring according to a second preferred embodiment of the present invention. As shown in FIG. 2, the device includes:
  • the capturing unit 201 is configured to capture first avatar information of a person in the video big data
  • the processing unit 202 is configured to compare the first avatar information with the existing avatar information in the avatar database; if the first avatar information exists in the avatar database and occurs more than a set threshold, the method includes The video data having the first avatar information is classified into the security category; if the first avatar information is not present in the avatar database, the video data corresponding to the first avatar information is classified into the to-be-determined category.
  • the processing unit 202 is further configured to: if the first avatar information exists in the avatar database but the number of occurrences is less than a set threshold, classify the video data of the first avatar information to be Determine the category.
  • the processing unit 202 is configured to: when the first avatar information appears more than the set number of times, move all the video data corresponding to the first avatar information into the security category.
  • the present invention also provides a device 30 for data classification in security monitoring, the device comprising: a processor 301, a transceiver 302, a memory 303 and a bus 304, wherein the processor, the transceiver, and the memory are connected by a bus;
  • the processor 301 is configured to capture first avatar information of a person in the video big data, and compare the first avatar information with existing avatar information in the avatar database; if the first avatar information exists in the avatar database If the number of occurrences is more than a set threshold, the video data including the first avatar information is classified into a security category; if the first avatar information does not exist in the avatar database, the first avatar is The video data corresponding to the information is classified into the category to be determined.
  • the processor 301 is further configured to: if the first avatar information exists in the avatar database but the number of occurrences is less than a set threshold, classify the video data of the first avatar information to be Determine the category.
  • the processor 301 is configured to: when the first avatar information appears more than the set number of times, move all the video data corresponding to the first avatar information into the security category.
  • Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
  • a storage medium may be any available media that can be accessed by a computer.
  • the computer readable medium may include random access memory (Random) Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium.
  • a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A data classification method and apparatus in safety and protection monitoring. The method comprises the following steps: a monitoring system captures first head portrait information of a figure in video big data (S101); the monitoring system compares the first head portrait information with existing head portrait information in a head portrait database (S102); and if the first head portrait information exists in the head portrait database and the number of times of the appearance is greater than a set threshold, classify video data comprising the first head portrait information into a safety category; and if the first head portrait information does not exist in the head portrait database, classify video data corresponding to the first head portrait information into a category to be determined (S103). The method has the advantage of allowing a data query to be convenient.

Description

安防监控中数据分类的方法及装置  Method and device for data classification in security monitoring 技术领域Technical field
本发明涉及安防领域,尤其涉及一种安防监控中数据分类的方法及装置。The invention relates to the field of security, and in particular to a method and a device for classifying data in security monitoring.
背景技术Background technique
安防监控系统是应用光纤、同轴电缆或微波在其闭合的环路内传输视频信号,并从摄像到图像显示和记录构成独立完整的系统。它能实时、形象、真实地反映被监控对象,它可以在恶劣的环境下代替人工进行长时间监视,通过录像机记录下来。同时报警系统设备对非法入侵进行报警。The security monitoring system is a system that uses optical fibers, coaxial cables or microwaves to transmit video signals in its closed loop and from camera to image display and recording. It can reflect the monitored object in real time, image and reality. It can be used for long-term monitoring instead of manual in harsh environments and recorded by video recorder. At the same time, the alarm system equipment alarms for illegal intrusion.
现有的安防监控在大数据没有分类,导致需要查询大数据的视频文件时不方便。Existing security monitoring is not classified in big data, which is inconvenient when it is necessary to query video files of big data.
技术问题technical problem
提供一种安防监控中数据分类的方法,其解决了现有技术需要查询大数据的视频文件时不方便的缺陷。A method for data classification in security monitoring is provided, which solves the inconvenience of the prior art when it is required to query a video file of big data.
技术解决方案Technical solution
一方面,提供一种安防监控中数据分类的方法,所述方法包括如下步骤:In one aspect, a method for data classification in security monitoring is provided, the method comprising the steps of:
监控系统抓取视频大数据中的人物的第一头像信息;The monitoring system captures the first avatar information of the person in the video big data;
监控系统将第一头像信息与头像数据库内已有的头像信息比对;The monitoring system compares the first avatar information with the existing avatar information in the avatar database;
如所述第一头像信息存在于所述头像数据库内且出现的次数多于设定阈值,则将包含有第一头像信息的视频数据分类到安全类别中;If the first avatar information exists in the avatar database and occurs more than a set threshold, the video data including the first avatar information is classified into a security category;
如所述第一头像信息不存在于所述头像数据库内,则将该第一头像信息对应的视频数据分类到待确定类别中。If the first avatar information does not exist in the avatar database, the video data corresponding to the first avatar information is classified into a category to be determined.
可选的,所述方法还包括:Optionally, the method further includes:
如所述第一头像信息存在于所述头像数据库内但出现的次数少于设定阈值,则将该第一头像信息的视频数据分类到待确定类别中。If the first avatar information exists in the avatar database but the number of occurrences is less than a set threshold, the video data of the first avatar information is classified into a category to be determined.
可选的,所述方法还包括:Optionally, the method further includes:
如所述第一头像信息出现的次数多于设定次数,则将第一头像信息对应的所有视频数据均移至安全类别中。If the first avatar information appears more than the set number of times, all the video data corresponding to the first avatar information is moved to the security category.
第二方面,提供一种安防监控中数据分类的装置,所述装置包括:In a second aspect, an apparatus for classifying data in security monitoring is provided, the apparatus comprising:
抓取单元,用于抓取视频大数据中的人物的第一头像信息;a crawling unit, configured to capture first avatar information of a character in the video big data;
处理单元,用于将第一头像信息与头像数据库内已有的头像信息比对;如所述第一头像信息存在于所述头像数据库内且出现的次数多于设定阈值,则将包含有第一头像信息的视频数据分类到安全类别中;如所述第一头像信息不存在于所述头像数据库内,则将该第一头像信息对应的视频数据分类到待确定类别中。a processing unit, configured to compare the first avatar information with the existing avatar information in the avatar database; if the first avatar information exists in the avatar database and occurs more than a set threshold, the method includes The video data of the first avatar information is classified into the security category; if the first avatar information does not exist in the avatar database, the video data corresponding to the first avatar information is classified into the to-be-determined category.
可选的,所述处理单元,还用于如所述第一头像信息存在于所述头像数据库内但出现的次数少于设定阈值,则将该第一头像信息的视频数据分类到待确定类别中。Optionally, the processing unit is further configured to: if the first avatar information exists in the avatar database but the number of occurrences is less than a set threshold, classify the video data of the first avatar information to be determined. In the category.
可选的,所述处理单元,用于如所述第一头像信息出现的次数多于设定次数,则将第一头像信息对应的所有视频数据均移至安全类别中。Optionally, the processing unit is configured to: when the first avatar information appears more than the set number of times, move all the video data corresponding to the first avatar information into the security category.
第三方面,提供一种安防监控中数据分类的设备,所述设备包括:处理器、收发器、存储器和总线,其中,处理器、收发器、存储器通过总线连接;A third aspect provides a device for classifying data in security monitoring, the device comprising: a processor, a transceiver, a memory, and a bus, wherein the processor, the transceiver, and the memory are connected by using a bus;
处理器,用于抓取视频大数据中的人物的第一头像信息;将第一头像信息与头像数据库内已有的头像信息比对;如所述第一头像信息存在于所述头像数据库内且出现的次数多于设定阈值,则将包含有第一头像信息的视频数据分类到安全类别中;如所述第一头像信息不存在于所述头像数据库内,则将该第一头像信息对应的视频数据分类到待确定类别中。a processor, configured to capture first avatar information of a character in the video big data; compare the first avatar information with an existing avatar information in the avatar database; if the first avatar information exists in the avatar database If the number of occurrences is more than a set threshold, the video data including the first avatar information is classified into a security category; if the first avatar information does not exist in the avatar database, the first avatar information is The corresponding video data is classified into the category to be determined.
可选的,所述处理器,还用于如所述第一头像信息存在于所述头像数据库内但出现的次数少于设定阈值,则将该第一头像信息的视频数据分类到待确定类别中。Optionally, the processor is further configured to: if the first avatar information exists in the avatar database but the number of occurrences is less than a set threshold, classify the video data of the first avatar information to be determined. In the category.
可选的,所述处理器,用于如所述第一头像信息出现的次数多于设定次数,则将第一头像信息对应的所有视频数据均移至安全类别中。Optionally, the processor is configured to: when the first avatar information appears more than the set number of times, move all the video data corresponding to the first avatar information into the security category.
有益效果Beneficial effect
本发明具体实施方式提供的技术方案具有查询数据方便的优点。The technical solution provided by the specific embodiments of the present invention has the advantage of convenient query data.
附图说明DRAWINGS
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below. Obviously, the drawings in the following description are only It is a certain embodiment of the present invention, and other drawings can be obtained from those skilled in the art without any creative work.
图1为本发明提供的一种安防监控中数据分类的方法的流程示意图。FIG. 1 is a schematic flowchart diagram of a method for data classification in security monitoring according to the present invention.
图2为本发明提供的一种安防监控中数据分类的装置的结构示意图。FIG. 2 is a schematic structural diagram of an apparatus for classifying data in security monitoring according to the present invention.
图3为本发明提供的一种安防监控中数据分类的装置的结构示意图。FIG. 3 is a schematic structural diagram of an apparatus for classifying data in security monitoring according to the present invention.
本发明的实施方式Embodiments of the invention
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, but not all embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
参阅图1,图1为本发明第一较佳实施方式提供的一种安防监控中数据分类的方法,该方法由安防系统实现,该方法如图1所示,包括如下步骤:Referring to FIG. 1 , FIG. 1 is a method for data classification in security monitoring according to a first preferred embodiment of the present invention. The method is implemented by a security system. The method is as shown in FIG. 1 and includes the following steps:
步骤S101、监控系统抓取视频大数据中的人物的第一头像信息。Step S101: The monitoring system captures the first avatar information of the person in the video big data.
步骤S102、监控系统将第一头像信息与头像数据库内已有的头像信息比对。Step S102: The monitoring system compares the first avatar information with the existing avatar information in the avatar database.
步骤S103、如所述第一头像信息存在于所述头像数据库内且出现的次数多于设定阈值,则将包含有第一头像信息的视频数据分类到安全类别中;如所述第一头像信息不存在于所述头像数据库内,则将该第一头像信息对应的视频数据分类到待确定类别中。Step S103: If the first avatar information exists in the avatar database and occurs more than a set threshold, the video data including the first avatar information is classified into a security category; If the information does not exist in the avatar database, the video data corresponding to the first avatar information is classified into a category to be determined.
本发明提供的技术方案能够依据头像数据出现的次数来确定是否为待确认的数据,因为对于大数据来说,大部分的数据均为已知的用户的数据,此时对这些数据均为安全的数据,基本不用查找,所以需要对安全数据以及非安全数据进行区分,所以其具有查询数据方便优点。The technical solution provided by the present invention can determine whether the data is to be confirmed according to the number of times the avatar data appears, because for big data, most of the data is known user data, and the data is safe at this time. The data does not need to be searched at all, so it is necessary to distinguish between secure data and non-secure data, so it has the advantage of querying data.
可选的,上述方法在步骤S103之后还可以包括:Optionally, after the step S103, the foregoing method may further include:
如所述第一头像信息存在于所述头像数据库内但出现的次数少于设定阈值,则将该第一头像信息的视频数据分类到待确定类别中。If the first avatar information exists in the avatar database but the number of occurrences is less than a set threshold, the video data of the first avatar information is classified into a category to be determined.
可选的,上述方法在步骤S103之后还可以包括:Optionally, after the step S103, the foregoing method may further include:
如所述第一头像信息出现的次数多于设定次数,则将第一头像信息对应的所有视频数据均移至安全类别中。If the first avatar information appears more than the set number of times, all the video data corresponding to the first avatar information is moved to the security category.
参阅图2,图2为本发明第二较佳实施方式提供的一种安防监控中数据分类的装置,该装置如图2所示,包括:Referring to FIG. 2, FIG. 2 is a device for classifying data in security monitoring according to a second preferred embodiment of the present invention. As shown in FIG. 2, the device includes:
抓取单元201,用于抓取视频大数据中的人物的第一头像信息;The capturing unit 201 is configured to capture first avatar information of a person in the video big data;
处理单元202,用于将第一头像信息与头像数据库内已有的头像信息比对;如所述第一头像信息存在于所述头像数据库内且出现的次数多于设定阈值,则将包含有第一头像信息的视频数据分类到安全类别中;如所述第一头像信息不存在于所述头像数据库内,则将该第一头像信息对应的视频数据分类到待确定类别中。The processing unit 202 is configured to compare the first avatar information with the existing avatar information in the avatar database; if the first avatar information exists in the avatar database and occurs more than a set threshold, the method includes The video data having the first avatar information is classified into the security category; if the first avatar information is not present in the avatar database, the video data corresponding to the first avatar information is classified into the to-be-determined category.
可选的,所述处理单元202,还用于如所述第一头像信息存在于所述头像数据库内但出现的次数少于设定阈值,则将该第一头像信息的视频数据分类到待确定类别中。Optionally, the processing unit 202 is further configured to: if the first avatar information exists in the avatar database but the number of occurrences is less than a set threshold, classify the video data of the first avatar information to be Determine the category.
可选的,所述处理单元202,用于如所述第一头像信息出现的次数多于设定次数,则将第一头像信息对应的所有视频数据均移至安全类别中。Optionally, the processing unit 202 is configured to: when the first avatar information appears more than the set number of times, move all the video data corresponding to the first avatar information into the security category.
本发明还提供一种安防监控中数据分类的设备30,所述设备包括:处理器301、收发器302、存储器303和总线304,其中,处理器、收发器、存储器通过总线连接;The present invention also provides a device 30 for data classification in security monitoring, the device comprising: a processor 301, a transceiver 302, a memory 303 and a bus 304, wherein the processor, the transceiver, and the memory are connected by a bus;
处理器301,用于抓取视频大数据中的人物的第一头像信息;将第一头像信息与头像数据库内已有的头像信息比对;如所述第一头像信息存在于所述头像数据库内且出现的次数多于设定阈值,则将包含有第一头像信息的视频数据分类到安全类别中;如所述第一头像信息不存在于所述头像数据库内,则将该第一头像信息对应的视频数据分类到待确定类别中。The processor 301 is configured to capture first avatar information of a person in the video big data, and compare the first avatar information with existing avatar information in the avatar database; if the first avatar information exists in the avatar database If the number of occurrences is more than a set threshold, the video data including the first avatar information is classified into a security category; if the first avatar information does not exist in the avatar database, the first avatar is The video data corresponding to the information is classified into the category to be determined.
可选的,所述处理器301,还用于如所述第一头像信息存在于所述头像数据库内但出现的次数少于设定阈值,则将该第一头像信息的视频数据分类到待确定类别中。Optionally, the processor 301 is further configured to: if the first avatar information exists in the avatar database but the number of occurrences is less than a set threshold, classify the video data of the first avatar information to be Determine the category.
可选的,所述处理器301,用于如所述第一头像信息出现的次数多于设定次数,则将第一头像信息对应的所有视频数据均移至安全类别中。Optionally, the processor 301 is configured to: when the first avatar information appears more than the set number of times, move all the video data corresponding to the first avatar information into the security category.
需要说明的是,对于前述的各方法实施方式或实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为根据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述实施方式或实施例均属于优选实施例,所涉及的动作和单元并不一定是本发明所必须的。It should be noted that, for the foregoing method embodiments or embodiments, for the sake of simple description, they are all expressed as a series of action combinations, but those skilled in the art should know that the present invention is not subject to the described action sequence. Limitations, as certain steps may be performed in other sequences or concurrently in accordance with the present invention. In the following, those skilled in the art should also understand that the embodiments or examples described in the specification are preferred embodiments, and the actions and units involved are not necessarily required by the present invention.
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。In the above embodiments, the descriptions of the various embodiments are different, and the details that are not detailed in a certain embodiment can be referred to the related descriptions of other embodiments.
本发明实施例方法中的步骤可以根据实际需要进行顺序调整、合并和删减。The steps in the method of the embodiment of the present invention may be sequentially adjusted, merged, and deleted according to actual needs.
本发明实施例装置中的单元可以根据实际需要进行合并、划分和删减。本领域的技术人员可以将本说明书中描述的不同实施例以及不同实施例的特征进行结合或组合。The units in the apparatus of the embodiment of the present invention may be combined, divided, and deleted according to actual needs. Those skilled in the art can combine or combine the different embodiments described in the specification and the features of the different embodiments.
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到本发明可以用硬件实现,或固件实现,或它们的组合方式来实现。当使用软件实现时,可以将上述功能存储在计算机可读介质中或作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是计算机能够存取的任何可用介质。以此为例但不限于:计算机可读介质可以包括随机存取存储器(Random Access Memory,RAM)、只读存储器(Read-Only Memory,ROM)、电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质。此外。任何连接可以适当的成为计算机可读介质。例如,如果软件是使用同轴电缆、光纤光缆、双绞线、数字用户线(Digital Subscriber Line,DSL)或者诸如红外线、无线电和微波之类的无线技术从网站、服务器或者其他远程源传输的,那么同轴电缆、光纤光缆、双绞线、DSL或者诸如红外线、无线和微波之类的无线技术包括在所属介质的定影中。如本发明所使用的,盘(Disk)和碟(disc)包括压缩光碟(CD)、激光碟、光碟、数字通用光碟(DVD)、软盘和蓝光光碟,其中盘通常磁性的复制数据,而碟则用激光来光学的复制数据。上面的组合也应当包括在计算机可读介质的保护范围之内。Through the description of the above embodiments, those skilled in the art can clearly understand that the present invention can be implemented in hardware, firmware implementation, or a combination thereof. When implemented in software, the functions described above may be stored in or transmitted as one or more instructions or code on a computer readable medium. Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another. A storage medium may be any available media that can be accessed by a computer. Taking this as an example, but not limited to: the computer readable medium may include random access memory (Random) Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium. For example, if the software is using coaxial cable, fiber optic cable, twisted pair, digital subscriber line (Digital Subscriber Line, DSL) or wireless technology such as infrared, radio and microwave transmission from a website, server or other remote source, then coaxial cable, fiber optic cable, twisted pair, DSL or such as infrared, wireless and microwave Wireless technology is included in the fixing of the associated medium. As used in the present invention, a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.
总之,以上所述仅为本发明技术方案的较佳实施例而已,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。 In summary, the above description is only a preferred embodiment of the technical solution of the present invention, and is not intended to limit the scope of the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Claims (9)

  1. 一种安防监控中数据分类的方法,其特征在于,所述方法包括如下步骤: A method for data classification in security monitoring, characterized in that the method comprises the following steps:
    监控系统抓取视频大数据中的人物的第一头像信息;The monitoring system captures the first avatar information of the person in the video big data;
    监控系统将第一头像信息与头像数据库内已有的头像信息比对;The monitoring system compares the first avatar information with the existing avatar information in the avatar database;
    如所述第一头像信息存在于所述头像数据库内且出现的次数多于设定阈值,则将包含有第一头像信息的视频数据分类到安全类别中;If the first avatar information exists in the avatar database and occurs more than a set threshold, the video data including the first avatar information is classified into a security category;
    如所述第一头像信息不存在于所述头像数据库内,则将该第一头像信息对应的视频数据分类到待确定类别中。If the first avatar information does not exist in the avatar database, the video data corresponding to the first avatar information is classified into a category to be determined.
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 further comprising:
    如所述第一头像信息存在于所述头像数据库内但出现的次数少于设定阈值,则将该第一头像信息的视频数据分类到待确定类别中。If the first avatar information exists in the avatar database but the number of occurrences is less than a set threshold, the video data of the first avatar information is classified into a category to be determined.
  3. 根据权利要求2所述的方法,其特征在于,所述方法还包括:The method of claim 2, wherein the method further comprises:
    如所述第一头像信息出现的次数多于设定次数,则将第一头像信息对应的所有视频数据均移至安全类别中。If the first avatar information appears more than the set number of times, all the video data corresponding to the first avatar information is moved to the security category.
  4. 一种安防监控中数据分类的装置,其特征在于,所述装置包括:A device for classifying data in security monitoring, characterized in that the device comprises:
    抓取单元,用于抓取视频大数据中的人物的第一头像信息;a crawling unit, configured to capture first avatar information of a character in the video big data;
    处理单元,用于将第一头像信息与头像数据库内已有的头像信息比对;如所述第一头像信息存在于所述头像数据库内且出现的次数多于设定阈值,则将包含有第一头像信息的视频数据分类到安全类别中;如所述第一头像信息不存在于所述头像数据库内,则将该第一头像信息对应的视频数据分类到待确定类别中。a processing unit, configured to compare the first avatar information with the existing avatar information in the avatar database; if the first avatar information exists in the avatar database and occurs more than a set threshold, the method includes The video data of the first avatar information is classified into the security category; if the first avatar information does not exist in the avatar database, the video data corresponding to the first avatar information is classified into the to-be-determined category.
  5. 根据权利要求4所述的装置,其特征在于,The device according to claim 4, characterized in that
    所述处理单元,还用于如所述第一头像信息存在于所述头像数据库内但出现的次数少于设定阈值,则将该第一头像信息的视频数据分类到待确定类别中。The processing unit is further configured to: if the first avatar information exists in the avatar database but the number of occurrences is less than a set threshold, classify the video data of the first avatar information into a category to be determined.
  6. 根据权利要求4所述的装置,其特征在于,The device according to claim 4, characterized in that
    所述处理单元,用于如所述第一头像信息出现的次数多于设定次数,则将第一头像信息对应的所有视频数据均移至安全类别中。The processing unit is configured to move all the video data corresponding to the first avatar information into the security category, if the first avatar information appears more than the set number of times.
  7. 一种安防监控中数据分类的设备,其特征在于,所述设备包括:处理器、收发器、存储器和总线,其中,处理器、收发器、存储器通过总线连接;An apparatus for classifying data in security monitoring, the device comprising: a processor, a transceiver, a memory, and a bus, wherein the processor, the transceiver, and the memory are connected by using a bus;
    处理器,用于抓取视频大数据中的人物的第一头像信息;将第一头像信息与头像数据库内已有的头像信息比对;如所述第一头像信息存在于所述头像数据库内且出现的次数多于设定阈值,则将包含有第一头像信息的视频数据分类到安全类别中;如所述第一头像信息不存在于所述头像数据库内,则将该第一头像信息对应的视频数据分类到待确定类别中。a processor, configured to capture first avatar information of a character in the video big data; compare the first avatar information with an existing avatar information in the avatar database; if the first avatar information exists in the avatar database If the number of occurrences is more than a set threshold, the video data including the first avatar information is classified into a security category; if the first avatar information does not exist in the avatar database, the first avatar information is The corresponding video data is classified into the category to be determined.
  8. 根据权利要求7所述的设备,其特征在于,The device according to claim 7, wherein
    所述处理器,还用于如所述第一头像信息存在于所述头像数据库内但出现的次数少于设定阈值,则将该第一头像信息的视频数据分类到待确定类别中。The processor is further configured to: if the first avatar information exists in the avatar database but the number of occurrences is less than a set threshold, classify the video data of the first avatar information into a category to be determined.
  9. 根据权利要求7所述的设备,其特征在于,The device according to claim 7, wherein
    所述处理器,用于如所述第一头像信息出现的次数多于设定次数,则将第一头像信息对应的所有视频数据均移至安全类别中。 The processor is configured to move all the video data corresponding to the first avatar information into the security category, if the first avatar information appears more than the set number of times.
PCT/CN2017/076636 2017-03-14 2017-03-14 Data classification method and apparatus in safety and protection monitoring WO2018165863A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/076636 WO2018165863A1 (en) 2017-03-14 2017-03-14 Data classification method and apparatus in safety and protection monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/076636 WO2018165863A1 (en) 2017-03-14 2017-03-14 Data classification method and apparatus in safety and protection monitoring

Publications (1)

Publication Number Publication Date
WO2018165863A1 true WO2018165863A1 (en) 2018-09-20

Family

ID=63523372

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/076636 WO2018165863A1 (en) 2017-03-14 2017-03-14 Data classification method and apparatus in safety and protection monitoring

Country Status (1)

Country Link
WO (1) WO2018165863A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050002561A1 (en) * 2003-07-02 2005-01-06 Lockheed Martin Corporation Scene analysis surveillance system
US20080080748A1 (en) * 2006-09-28 2008-04-03 Kabushiki Kaisha Toshiba Person recognition apparatus and person recognition method
CN104079877A (en) * 2014-06-24 2014-10-01 海信集团有限公司 Monitoring equipment and security monitoring method and system
CN105354902A (en) * 2015-11-10 2016-02-24 深圳市商汤科技有限公司 Security management method and system based on face identification
CN106294011A (en) * 2016-08-08 2017-01-04 马岩 The big date storage method of sort-type and system
CN106355154A (en) * 2016-08-31 2017-01-25 上海依图网络科技有限公司 Method for detecting frequent pedestrian passing in surveillance video

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050002561A1 (en) * 2003-07-02 2005-01-06 Lockheed Martin Corporation Scene analysis surveillance system
US20080080748A1 (en) * 2006-09-28 2008-04-03 Kabushiki Kaisha Toshiba Person recognition apparatus and person recognition method
CN104079877A (en) * 2014-06-24 2014-10-01 海信集团有限公司 Monitoring equipment and security monitoring method and system
CN105354902A (en) * 2015-11-10 2016-02-24 深圳市商汤科技有限公司 Security management method and system based on face identification
CN106294011A (en) * 2016-08-08 2017-01-04 马岩 The big date storage method of sort-type and system
CN106355154A (en) * 2016-08-31 2017-01-25 上海依图网络科技有限公司 Method for detecting frequent pedestrian passing in surveillance video

Similar Documents

Publication Publication Date Title
WO2018218806A1 (en) Terminal privacy protection method and system
WO2017117715A1 (en) Attendance method and system for monitoring system
WO2018165863A1 (en) Data classification method and apparatus in safety and protection monitoring
WO2018161339A1 (en) Application method and apparatus for big data searching in security monitoring
WO2018035663A1 (en) Infant detection method and system for internet of things quilt cover
WO2018148958A1 (en) Data transmission method and device for security protection and monitoring
WO2018152670A1 (en) Big data management method and device for security monitoring
WO2018152669A1 (en) Security control method and device for security monitoring
WO2018027557A1 (en) Wifi attendance record method and system in security
WO2018027702A1 (en) Method and system for file allocation over dual network channels for security and monitoring
WO2018148957A1 (en) Method and device for applying big data in security protection system
WO2018209646A1 (en) Smart household monitoring method and system
WO2018148956A1 (en) Cloud backup method and system for security protection and monitoring
WO2018027703A1 (en) Dual network channel security monitoring implementation method and system
WO2018161341A1 (en) Method and apparatus for implementing security monitoring on basis of cloud technology
WO2018027698A1 (en) Head portrait tracking method and system for security video conference
WO2018027697A1 (en) Method and system for applying audio target finding method in security video conference
WO2018027699A1 (en) Transmission method and system for security video conference in low network speed environment
WO2018027564A1 (en) Security-based split screen display method and system for video conference
WO2018027563A1 (en) Video conferencing video insertion and transmission method and system
WO2018040028A1 (en) Method and system for recognizing face in video
WO2018027570A1 (en) Method and system for transmitting video file of remote security video conference
WO2018027568A1 (en) Ultra high definition video transmission method and system for video conference in monitoring system
WO2018027700A1 (en) Transmission method and system for high-speed network environment
WO2018027567A1 (en) Whole-screen display method and system for security video conference

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17900955

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 31/01/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17900955

Country of ref document: EP

Kind code of ref document: A1