CN107944433A - Security protection monitors method and security protection monitoring system - Google Patents

Security protection monitors method and security protection monitoring system Download PDF

Info

Publication number
CN107944433A
CN107944433A CN201711397562.4A CN201711397562A CN107944433A CN 107944433 A CN107944433 A CN 107944433A CN 201711397562 A CN201711397562 A CN 201711397562A CN 107944433 A CN107944433 A CN 107944433A
Authority
CN
China
Prior art keywords
data
security protection
filing
protection monitoring
shooting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711397562.4A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
High Domain (beijing) Intelligent Technology Research Institute Co Ltd
Original Assignee
High Domain (beijing) Intelligent Technology Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by High Domain (beijing) Intelligent Technology Research Institute Co Ltd filed Critical High Domain (beijing) Intelligent Technology Research Institute Co Ltd
Priority to CN201711397562.4A priority Critical patent/CN107944433A/en
Publication of CN107944433A publication Critical patent/CN107944433A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/23Clustering techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/94Hardware or software architectures specially adapted for image or video understanding
    • G06V10/95Hardware or software architectures specially adapted for image or video understanding structured as a network, e.g. client-server architectures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Evolutionary Computation (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Alarm Systems (AREA)
  • Image Processing (AREA)

Abstract

Disclose a kind of the security protection monitoring method and security protection monitoring system of distributed shooting centralized processing, in multiple default place distributed arrangement face recognition devices, each face recognition device collection and identification facial image, each face recognition device is handled to obtain the filing data based on identification object using identifying that object carries out facial image filing as target, the filing data upload to cloud server by preset format, and cloud server is to the filing data clusters analysis.

Description

Security protection monitors method and security protection monitoring system
Technical field
The invention belongs to technical field of security and protection, and method is monitored more particularly to a kind of security protection of distributed shooting centralized processing With security protection monitoring system.
Background technology
At present, face recognition technology is increasingly becoming one kind with the maturation of camera, algorithm, data volume etc. condition Bottom application tool class technology, is constantly popularized.
But push face recognition technology application one of universalness to premise is that with opening and shares Data platform, allows enough identification scenes and brings this platform into seek unity of standard and get off.
In simple terms, using pursue and capture an escaped prisoner, hit abduct, searching person and object as target application scenarios, with the proviso that identification system System, especially face identification system must have enough data sources.
The Skynet system that present public opinion is propagandized, due to the cost for being related to arranging camera, the policy in each city pushes away Into dynamics, the difference factor such as people's acceptance level, in fact, being still difficult to realize commercialization.
The application is directed to a kind of business model innovation implemented from data acquisition end to improve above-mentioned present situation.
By extensive, inexpensive or even free mode, camera is configured to fixed-site, and configures unified data Processing and upload platform, so as in a wide range of rapid advantage for obtaining data acquisition.
The fixed-site includes the larger life nodes of flow of the people such as Mini Supermarkets, coffee bar, bar, cigarette and wine shop, Internet bar, The camera and its monitoring system that above-mentioned low cost even provides free, can not only help these fixed-sites to realize bursting tube Reason, moreover it is possible to by unified data processing form and port, realize big data collection and utilize, with carrying for data acquisition amount Rise, which can provide commercial applications and business data analysis in itself, can help to realize to floor activity crowd's Service, including advertising, interest analysis etc..
It is in short, existing as follows on technical scheme technical problem to be solved, its specific requirements:
1. fixed-site arranges security protection camera, and possesses unified data processing port and outlet
Need voluntarily to configure the mode of anti-theft image pick-up head compared to traditional small StoreFront, small paving, small-sized management place and Speech, present applicant proposes the family place even agreed in such fixed management place by kinsfolk, is freely installed for it The way of security protection camera, and unified face recognition technology and classification, archiving method are used for such security protection camera, Data are uploaded into cloud server by preset format, it is achieved thereby that the high value for being lost in data utilizes.
2. cloud server is managed collectively the data from distributed security camera
Cloud server can be according to the characteristics of the fixation management place that camera is installed, come pair for setting it to be identified The characteristic and feature of elephant, so that recognition accuracy is further increased, and based on the number from substantial amounts of distributed camera According to cloud server can realize the cluster analysis of data in certain area or a certain range, be found from data mining To new value.
3. the camera arrangement realized based on data sharing principle
Arrange that camera is used as security protection supervision equipment for user by the cost well below psychological expectation of customer price, use Family itself can obtain the controlled security protection monitoring system of a set of authority, and safety-protection system developer can pass through large-scale data Realize the application value of bigger, each side can therefrom benefit.
The content of the invention
For problems of the prior art, the present invention provides a kind of security protection monitoring side of distributed shooting centralized processing Method and security protection monitoring system, it is acquired and is identified by distributed arrangement face recognition device, is then based on identification object Filing processing is carried out, cloud server is uniformly sent to and is uniformly processed, memory space is saved, improves the image of shooting The service efficiency of data and not invasion of privacy, can provide the data service of high quality with low cost.
The purpose of the present invention is be achieved by the following technical programs:
An aspect of of the present present invention, a kind of security protection monitoring method of distributed shooting centralized processing include the following steps:
In multiple default place distributed arrangement face recognition devices, each face recognition device collection and identification face figure Picture, each face recognition device are handled to obtain returning based on identification object using identifying that object carries out facial image filing as target File data, the filing data upload to cloud server by preset format, and cloud server is to the filing data clusters Analysis.
In a kind of security protection monitoring method of distributed shooting centralized processing, the preset format includes identification pair Attribute data, face recognition device attribute data, face recognition device shooting time data and/or the default place attribute number of elephant According to.
In a kind of security protection monitoring method of distributed shooting centralized processing, identifying the attribute data of object includes Gender, behavioral data and/or clothing appearance data.
In a kind of security protection monitoring method of distributed shooting centralized processing, default place attribute data includes field Institute's title, location type and/or place business hours.
In a kind of security protection monitoring method of distributed shooting centralized processing, the filing data obtain local use Family uploads cloud server after authorizing, the filing data upload to cloud server by default port.
In a kind of security protection monitoring method of distributed shooting centralized processing, the filing data are stored in face Identification equipment or local memory device.
In a kind of security protection monitoring method of distributed shooting centralized processing, the filing data periodically upload cloud Server is held, the filing data upload to cloud server by default port.
In a kind of described security protection monitoring method of distributed shooting centralized processing, by predetermined filing data it is independent on Cloud server is passed, cloud server analyzes the predetermined filing data clusters.
In a kind of security protection monitoring method of distributed shooting centralized processing, cloud server is based on recognition of face The place that equipment is installed sets the attribute data of the identification object.
In a kind of security protection monitoring method of distributed shooting centralized processing, face recognition device collection and identification Meet the facial image of preset condition, the preset condition includes identification angle, recognition of face integrity degree and/or environmental light intensity.
In a kind of security protection monitoring method of distributed shooting centralized processing, return described in the storage of security protection monitoring system File data is to replace the facial image of shooting.
According to another aspect of the present invention, a kind of security protection prison for the security protection monitoring method for implementing distributed shooting centralized processing Viewing system includes face recognition device and cloud server of the distributed arrangement in multiple default places, and face recognition device includes File the archiver handled to identify that object carries out facial image as target, cloud server is included to filing data clusters analysis Cluster device.
In the security protection monitoring system, cloud server includes processor, hard disk, memory, bus and is used for and people Face identification equipment is with the communication port of unified form interaction.
According to another aspect of the invention, a kind of application of cloth shooting centralized processing, it is distributed in multiple default places Arrange face recognition device, each face recognition device is handled to obtain base to identify that object carries out facial image filing as target In the filing data of identification object, the filing data share to cloud server by preset format, and cloud server is based on Predetermined scene carries out cluster analysis.
Compared with prior art, the present invention has technique effect beneficial below:
In the prior art, the occupied space of prior art real-time recording is larger, so as to preserve data time cycle It is limited, can not meets that the needs of later inquiring about, video are usual only for untreated asperity data after some long-times Can manually it analyze or manual identified, service efficiency is low, and can not carry out data analysis.Do not invent and pass through distributed arrangement Face recognition device is acquired and identifies, is then based on identification object and carries out filing processing, is uniformly sent to cloud server Be uniformly processed, save memory space, improve shooting view data service efficiency and not invasion of privacy, can be with Low cost provides the data service of high quality.
Described above is only the general introduction of technical solution of the present invention, in order to cause the technological means of the present invention clearer Understand, reach the degree that those skilled in the art can be practiced according to the content of specification, and in order to allow the present invention Above and other objects, features and advantages can become apparent, below with the present invention embodiment illustrate Explanation.
Brief description of the drawings
By reading the detailed description hereafter in preferred embodiment, the advantages of present invention is various other and benefit It will be clear understanding for those of ordinary skill in the art.Figure of description is only used for showing the purpose of preferred embodiment, And it is not considered as limitation of the present invention.It should be evident that drawings discussed below is only some embodiments of the present invention, For those of ordinary skill in the art, without creative efforts, can also be obtained according to these attached drawings Other attached drawings.
In the accompanying drawings:
Fig. 1 is that the step of security protection of the distributed shooting centralized processing of one embodiment of the present of invention monitors method is illustrated Figure;
Fig. 2 is the structure diagram of the security protection monitoring system of one embodiment of the present of invention.
The present invention is further explained below in conjunction with drawings and examples.
Embodiment
The specific embodiment of the present invention is more fully described below with reference to accompanying drawings.Although show the present invention's in attached drawing Specific embodiment, it being understood, however, that may be realized in various forms the present invention without should be limited by embodiments set forth here System.Conversely, there is provided these embodiments are to be able to be best understood from the present invention, and can be complete by the scope of the present invention Be communicated to those skilled in the art.
It should be noted that some vocabulary has been used to censure specific components among specification and claim.Ability Field technique personnel it would be appreciated that, technical staff may call same component with different nouns.This specification and right It is required that not in a manner of the difference of noun is used as and distinguishes component, but differentiation is used as with the difference of component functionally Criterion."comprising" or " comprising " as mentioned in working as in specification in the whole text and claim are an open language, therefore should be solved It is interpreted into " including but not limited to ".Specification subsequent descriptions for implement the present invention better embodiment, so it is described description be with For the purpose of the rule of specification, the scope of the present invention is not limited to.Protection scope of the present invention, which is worked as, regards appended right It is required that subject to institute's defender.
For ease of the understanding to the embodiment of the present invention, done further by taking several specific embodiments as an example below in conjunction with attached drawing Explanation, and each attached drawing does not form the restriction to the embodiment of the present invention.
Fig. 1 is that the step of security protection of the distributed shooting centralized processing of one embodiment of the present of invention monitors method is illustrated Figure, the security protection monitoring method of distribution shooting centralized processing include the following steps:
Security protection monitoring system is in multiple default place distributed arrangement face recognition devices, each face recognition device collection With identification facial image, each face recognition device is handled to be based on using identifying that object carries out facial image filing as target Identify the filing data of object, the filing data upload to cloud server by preset format, and cloud server is to described File data clusters analysis.
The security protection monitoring system based on camera of the prior art, is typically arranged in including one or more camera In the predeterminated position of some fixed-site, then by real-time video transmission and display system, in one or several monitoring dresses Put, while display or timesharing show the content taken by these cameras.For the content that these are photographed, the security protection Monitoring system usually backs up in the preset memory of system within a certain period of time, is called or is reviewed with standby user.Consider It is larger to storage occupied space, when after one section of long period, meeting be deleted less standby using possibility successively according to the time Part video recording.
Above-mentioned implementation is although fairly simple, but since the occupied space of real-time recording is larger, institute is so as to preserve The time cycle of data is limited, usually in the time range of 1 week to 3 months or so it is also possible to inquire Backup Data, Time, more usually data just no longer saved long.For later the demand of inquiry can not meet after some long-times.In addition, these Video is untreated asperity data, when to remove to find object interested from these data, is typically only capable to depend on people Work point is analysed or manual identified.Manual analysis will find the relevant informations such as reliable time, place, manual identified and then lean on not Interruption browses whole video data.These occupation modes will all cause not convenient.
The security protection monitoring method of the distributed shooting centralized processing of the present invention proposes further improvement of existing technologies. One is to the people to get off captured by multiple cameras of security protection monitoring system, recognition of face is carried out, and according to recognition of face As a result, establish archives for the object, and by the corresponding face recognition result of the archives, according to situation about constantly gathering afterwards, Filing is recorded.In one embodiment, by taking some cigarette and wine shop as an example, when the camera in security protection monitoring system collects During one face in accordance with preset condition, these usual preset conditions include that illumination is suitable, angle is suitable, blocks less, photo picture Plain rate enough etc. condition, this face is defined as user's first 1.And the relevant information that this is recognized to the user's first is returned Shelves, these relevant informations can include the position of acquisition camera, time, the gender of user judge according to identification situation, clothing Feature whether there is cap, mask, dressing colour system etc..When acquisition time is sufficiently long, the accumulation of the user's quantity is likely to be breached first The rank of 5000- first 10000, while the multiple filing result for same customer wherein also occurs.Such as above-mentioned first 1 Number, the filing that may can have the customer to occur in the purchase cigarette district of cigarette and wine shop at night in afternoon on every Wendesdays, on every Fridays records.So Record due to being not related to the privacy informations such as the name of the customer, occupation, identity, do not injure the interests of customer, But for such data future, there may be great application value.
Further, since employ the operation filed to recognition result, the feature of this identification object can be with some The relatively good face of shooting is opened to represent identity, is represented data acquisition content with action message, user property, is greatly simplified The cost of data storage, and also so that data have obtained preliminary screening and processing.Overcome what is proposed before completely, security protection The shortcomings that storage pressure is big caused by monitoring system only simply retains video data, and data are inconvenient for use.
The second is the video content collected for multiple cameras of security protection monitoring system carried out recognition of face and Data after filing processing, can periodically upload to and be arranged at cloud server to file arrangement, in case big data analysis uses. The data of servers archive beyond the clouds, not only include in above-mentioned fixed management place collection, are defined according to preset rules Form, such as:Outside user name such as first 1, gender, camera position, time information, above-mentioned fixation can also be included The relevant information of management place, such as:Place title, location type, place business hours etc..So from multiple fixed operation fields File the big data got, due to have passed through the processing of unified form in advance, by the application value with bigger and improve Service efficiency.
In another embodiment of the present invention, enumerate one embodiment from another angle and confirm above-mentioned value.It is in The porch entrance and kitchen entrance in front yard have been respectively arranged security protection camera system, which works according to above-mentioned principle. Since family's privacy is more demanding, under the pre-setting of the system, the object which is identified only is stored in this Ground, is subject to the monitor closely of household operation personnel, so as to avoid information-leakage.It is appreciated that since shooting kitty may Occur and the number of activity be limited, the home cinema head even across the data acquisition of 3 months, may also can only successful collection arrive The object of 40 or so, including information such as family fixed member, the short-term member of family, visitors.Not to cloud service In the case that device is sent, the recognition result of the system can help kinsfolk to do some activity analyses or enjoyment analysis.So And, it is assumed that when old man or child in kinsfolk wander away, kinsfolk can select rapidly to image above-mentioned security protection The object information collected in head system is sent to cloud server, is believed by cloud server according to the object sent Breath, is compared under targetedly camera resource, so as to be hopeful that the member that wanders away can be found.It is appreciated that this Although when Household security system be not able to tell that the information such as the name of this missing member of cloud server, identity, by In providing reliable facial recognition data, cloud server can obtain the camera of numerous occasions from it and go in real time Search and compare face recognition result, if cloud server control camera include at the train station, airport, long-distance vapour Restaurant, coffee-house, the camera of rest area near the ground such as station, then would be possible to abducted kinsfolk is such as small Child finds;If it is included in storefront, the bus stop field such as StoreFront, cafe nearby in the camera of cloud server control Camera, then would be possible to find missing kinsfolk such as old man.And due to the operation of the system All the time the identity information of kinsfolk is not revealed, and can be urgent also without cumbersome enrollment process of reporting a case to the security authorities and put on record In the case of kinsfolk's positioning searching provide one hope.
In addition, for converging in daily routines, look for people, go astray from the group after give for change, scene, the present invention such as recall after lost article and all carry A possibility is supplied.Net can be realized by the mobile equipment such as mobile phone in household safety-protection camera system and household operation personnel In the case that network controls, the demand realizes that process can fully achieve intelligent, long-range, it would be possible to produces more applied fields Scape.
Likewise, since what is stored in the security protection camera system is only the filing data based on identification object, without It is related to the actual information of object, then more privacy leakages will not be caused.Such as although in household safety-protection camera system In system, object may often be worn arbitrarily, or even compare exposure, but due to identifying that what is filed is only the recognition of face knot of object Fruit and archives, so when transferring these information, can't cause to perplex.With the lifting of degree of recognition, one family is wanted Confirm whether oneself member has gone to friend house to visit, can not only be confirmed by direct-dial telephone, can also be not desired to implement phone When confirmation, by the present invention method and system can realize, as long as the two families all installed it is of the present invention Security protection camera system, and all Object identifying authority has been opened to cloud server, then cloud server can be complete rapidly Into this contrast, and system cost is very cheap.
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, institute Stating preset format includes attribute data, face recognition device attribute data, the face recognition device shooting time number of identification object According to and/or default place attribute data.Position data of the face recognition device attribute data for example including face recognition device and/ Or environmental data, environmental data such as ambient light, illumination light, shooting angle, indoor and outdoor surroundings etc..It is typically include normal illumination At the access to elevators in market under environment, or exhibition detector gate under normal illumination environment.Under such environment, due to being room It is interior, so the cover material such as usually identified object has higher probability to uncap, mask;Since ambient light is normal, so can Brightness when ensureing to take pictures, while the possibility of the sunglasses of the outdoor wearing of object excision is higher;Due in channel position, It is so higher by the possibility of the passage;Since passage is more narrow, so the identification object passed through at the same time will not be too many;By In similar elevator or the passage of detector gate, so object has higher possible positive face towards front direction of travel.The present invention's In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing, face recognition device attribute data Such as resolution ratio, clarity, signal-to-noise ratio and/or white balance parameter including face recognition device.Face recognition device attribute number Angle, recognition of face integrity degree and/or environmental light intensity are identified according to may also include.
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, know The attribute data of other object includes gender, behavioral data and/or clothing appearance data.Clothing appearance data are for example including dress ornament face Color, clothing type and/or hair style type etc..
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, in advance If place attribute data includes place title, location type and/or place business hours.
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, institute State filing data and cloud server is uploaded to by default port.
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, cloud End server sets the attribute data of the identification object based on the place that face recognition device is installed.
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, people Face identification equipment gathers and identifies the facial image for meeting preset condition, and the preset condition includes identification angle, recognition of face Integrity degree and/or environmental light intensity.
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, institute State filing data and periodically upload cloud server.
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, institute State filing data and be stored in face recognition device or local memory device.
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, institute State after filing data obtain local user's mandate and upload cloud server, the filing data upload to high in the clouds by default port Server.The security of data can so be lifted, for local user, without using when, privacy will not be caused to let out For dew, it is necessary to when use, cloud server can just be sent by being authorized by local user.
, will in a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention Predetermined filing data individually upload cloud server, and cloud server analyzes the predetermined filing data clusters.At this In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of invention, security protection monitoring system is deposited The filing data are stored up to replace the facial image of shooting.
In one embodiment, face recognition device of the invention has the ability to carry out filing processing for identification data.With Exemplified by the vehicle identification of highway, in expressway access, crucial current mouth, each outlet, a certain spy can be accurately obtained Determine the current data of vehicle, which includes the time that vehicle passes through the locality, profile vehicle photo etc..If Can will be identifying every time as a result, once confirm it is errorless after, all classification put in order with the relevant recognition result of the Vehicle Object, Then it is capable of the account of the history of one object of fast reaction.
In the prior art, do not regarded completely based on one generally only using identifying that object does filing processing as target Frequency record is preserved, and the holding time is often a shorter time.So a common example is, it is multiple when needing When interrogating and examining the situation for asking some object, a feasible method, often goes to infer that the object may be at which according to existing clue Which position a period appears in, and then goes to look back this section of video content by way of manually investigating.Such mode was both held Object easily is can not find, and it is neither possible to realizing instantaneity, is often taken very long.
In one embodiment, by the filing based on identification object, and position, recognition time, knowledge will be identified accordingly The all filings of the information such as other remarks are handled.
The people of the present invention files data, can realize that substantial amounts of derivative purposes, such as the movable floor manager need to seek When looking for site of activity welcome guest, which may be in the bad dressing room of certain signal of communication, at this time, can be rapid The recognition result archive information based on the welcome guest is transferred, judges historical activity information of the welcome guest in museum, according to its work Dynamic rail mark is inferred to the position at the most possible place of the welcome guest.In above-mentioned example, director, welcome guest etc. are to recognize in advance with identity The object of information is demonstrate,proved, system has the certification object of identity according to these, to do 1 comparison than N, then files its recognition result Into system, in case follow-up use.In fact, it can also be come for the object without clear and definite identity by way of newly-built archives Implement filing.For example system puts in order the user's identification object new when shooting obtains a new user to entrance for the first time In customer data base, then in whole active procedure, the recognition result of the user is constantly photographed, and the knowledge of enriching constantly The historical activity information of other object.It is useful in that, effectively help system user can do scene investigation.So-called scene investigation, For example guess including identity.Object of one frequent activities near activity working space, it may be possible to which one does not arrange showing for identity The movable support staff in field;Object of one frequent activities near entrance a, it may be possible to ox;It is more believable having In the case of identifying object filing archives, many scene investigations and analysis can be made based on the archives, and this scene is arranged It is close to instantaneity to look into the result of analysis feedback.
Fig. 2 is the structure diagram of the security protection monitoring system of one embodiment of the present of invention, and one kind implements distributed shooting The security protection monitoring system of the security protection monitoring method of centralized processing is set including recognition of face of the distributed arrangement in multiple default places Standby 1 and cloud server 2, face recognition device include filing the archiver handled to identify that object carries out facial image as target 3, cloud server 2 includes the cluster device 4 to filing data clusters analysis.
The security protection monitoring system that distribution camera as described above is formed with cloud server passes through free or low cost Shared camera arrangement mode, rapidly arrange enough distributed camera safety-protection system in different zones.Due to taking the photograph As the cost of head, safety-protection system software all can drastically decline with the rising of amount of purchase, its average unit cost.And distribution shooting Head safety-protection system installs more, can to realize effective application scenarios in a urban area or an extensive area Just more, security protection monitoring system is included based on being internally integrated the application of data with being obtained by distributed camera safety defense monitoring system The application for the data come, and the combination of two kinds of applications.The application for being internally integrated data is usually to have a figure in internal system As database, system acquisition to recognition of face object be constantly compared with internal image data base, so as to be thought The result wanted.Briefly, such as, internal system is integrated with the database or runaway convict's database of a working employee, then As long as the human face photo of system acquisition target, is then compared relative to interior data storehouse, with regard to that can judge whether be this Department employee and let pass, also either determine whether runaway convict and dispose and arrest.It can be obtained largely by safety defense monitoring system Object data and filing be formed as a new database.In the present invention, these a large amount of object datas obtained may It not can determine that its identity or specific object, be only as user's first 1 like what is referred in the above-described embodiments Numbering, but be only face recognition result based on this object and the typical facial photo of the object collected, also can Implement recognition of face contrast similarly to the prior art, so as to complete the concrete scene applications such as the search to the user's first 1.And And in the present invention in the case where that need not confirm identity, it can complete to monitor the whereabouts of the user's first 1, need to verify When identity, the verification of identity can be completed by other means naturally, this verification include obtaining with system other Image data base with identity is compared, it might even be possible to arranges possible insider to point out.
The present invention security protection monitoring system preferred embodiment in, cloud server include processor, hard disk, memory, Bus and the communication port for being interacted with face recognition device 1 with unified form.
In one embodiment, cloud server 2 includes general cloud server, digital signal cloud server, special Integrated circuit ASIC or on-site programmable gate array FPGA.
In one embodiment, the cloud server 2 includes memory, and the memory includes one or more read-only Memory ROM, random access memory ram, flash memory or Electrical Erasable programmable read only memory EEPROM.
According to another aspect of the invention, a kind of application of cloth shooting centralized processing, it is distributed in multiple default places Arrange face recognition device, each face recognition device is handled to obtain base to identify that object carries out facial image filing as target In the filing data of identification object, the filing data share to cloud server by preset format, and cloud server is based on Predetermined scene carries out cluster analysis.
According to the specific embodiment of the application, in one scenario, be exactly such as stay at home, the security protection camera in shop It is common distributed camera in fact, the day net camera for the public safety that then public security system is arranged in street corner is exactly special need The camera asked, so the collection information of common distribution camera, may not usually upload, but it is in need when, can With the sample that will wherein collect, Skynet system is shared with, then requires Skynet system help to retrieve and applied analysis.
In the scene previously with regard to activity, for cloud server according to the needs for finding director, cloud server is based on should Activity scene carries out the cluster analysis of the identification such as director, performer.
Although embodiment of the present invention is described above in association with attached drawing, the invention is not limited in above-mentioned Specific embodiments and applications field, above-mentioned specific embodiment are only schematical, directiveness, rather than restricted 's.Those of ordinary skill in the art are under the enlightenment of this specification and in the scope for not departing from the claims in the present invention and being protected In the case of, the form of many kinds can also be made, these belong to the row of protection of the invention.

Claims (10)

1. a kind of security protection monitoring method of distributed shooting centralized processing, it includes the following steps:
In multiple default place distributed arrangement face recognition devices, each face recognition device collection and identification facial image, Each face recognition device is handled to obtain the filing based on identification object using identifying that object carries out facial image filing as target Data, the filing data upload to cloud server by preset format, and cloud server is to the filing data clusters point Analysis.
A kind of 2. security protection monitoring method of distributed shooting centralized processing according to claim 1, it is characterised in that:It is described Preset format includes the attribute data, face recognition device attribute data, face recognition device shooting time data of identification object And/or default place attribute data, identifying the attribute data of object includes gender, behavioral data and/or clothing appearance data, in advance If place attribute data includes place title, location type and/or place business hours.
A kind of 3. security protection monitoring method of distributed shooting centralized processing according to claim 1, it is characterised in that:It is described Filing data are stored in face recognition device or local memory device.
A kind of 4. security protection monitoring method of distributed shooting centralized processing according to claim 1, it is characterised in that:It is described Filing data obtain and cloud server are uploaded after local user authorizes, and the filing data upload to high in the clouds by default port and take Business device.
A kind of 5. security protection monitoring method of distributed shooting centralized processing according to claim 1, it is characterised in that:Will be pre- Fixed filing data individually upload cloud server, and cloud server analyzes the predetermined filing data clusters.
A kind of 6. security protection monitoring method of distributed shooting centralized processing according to claim 2, it is characterised in that:High in the clouds Server sets the attribute data of the identification object based on the place that face recognition device is installed.
A kind of 7. security protection monitoring method of distributed shooting centralized processing according to claim 1, it is characterised in that:Face Identification equipment gathers and identifies the facial image for meeting preset condition, and the preset condition includes identifying that angle, recognition of face are complete Whole degree and/or environmental light intensity.
A kind of 8. security protection monitoring method of distributed shooting centralized processing according to claim 1, it is characterised in that:Security protection Monitoring system storage is described to file data to replace the facial image of shooting.
A kind of 9. security protection monitoring system for the security protection monitoring method for implementing the distributed shooting centralized processings of any one of claim 1-8 System, it is characterised in that security protection monitoring system includes distributed arrangement in the face recognition device (1) in multiple default places and high in the clouds Server (2), face recognition device include filing the archiver (3) handled, cloud to identify that object carries out facial image as target Server (2) is held to include the cluster device (4) to filing data clusters analysis.
10. a kind of application of cloth shooting centralized processing, it is characterised in that in multiple default place distributed arrangement recognitions of face Equipment, each face recognition device are handled to obtain based on identification object using identifying that object carries out facial image filing as target File data, the filing data share to cloud server by preset format, and cloud server is carried out based on predetermined scene Cluster analysis.
CN201711397562.4A 2017-12-21 2017-12-21 Security protection monitors method and security protection monitoring system Pending CN107944433A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711397562.4A CN107944433A (en) 2017-12-21 2017-12-21 Security protection monitors method and security protection monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711397562.4A CN107944433A (en) 2017-12-21 2017-12-21 Security protection monitors method and security protection monitoring system

Publications (1)

Publication Number Publication Date
CN107944433A true CN107944433A (en) 2018-04-20

Family

ID=61942112

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711397562.4A Pending CN107944433A (en) 2017-12-21 2017-12-21 Security protection monitors method and security protection monitoring system

Country Status (1)

Country Link
CN (1) CN107944433A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108717210A (en) * 2018-07-12 2018-10-30 青岛陶知电子科技有限公司 A kind of intelligence dangerous goods detection gate equipment and remote intelligent control system
CN109118413A (en) * 2018-08-21 2019-01-01 北京深瞐科技有限公司 Urban activity demographics method and device thereof, computer-readable medium
CN109710780A (en) * 2018-12-28 2019-05-03 上海依图网络科技有限公司 A kind of archiving method and device
CN109740003A (en) * 2018-12-28 2019-05-10 上海依图网络科技有限公司 A kind of archiving method and device
CN109800664A (en) * 2018-12-28 2019-05-24 上海依图网络科技有限公司 A kind of method and device of determining passerby track
CN109800329A (en) * 2018-12-28 2019-05-24 上海依图网络科技有限公司 A kind of monitoring method and device
CN110390031A (en) * 2019-06-28 2019-10-29 深圳市商汤科技有限公司 Information processing method and device, vision facilities and storage medium
CN110602453A (en) * 2019-09-09 2019-12-20 金鹏电子信息机器有限公司 Internet of things big data intelligent video security monitoring system
CN110688912A (en) * 2019-09-09 2020-01-14 南昌大学 IPv6 cloud interconnection-based online face search positioning system and method
CN110805845A (en) * 2019-11-07 2020-02-18 毛春根 Corridor sound control lamp
CN110863678A (en) * 2019-11-07 2020-03-06 毛春根 Bus station platform
CN111263126A (en) * 2020-03-31 2020-06-09 陈小河 Video intelligent identification and information push precaution management system

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108717210A (en) * 2018-07-12 2018-10-30 青岛陶知电子科技有限公司 A kind of intelligence dangerous goods detection gate equipment and remote intelligent control system
CN109118413A (en) * 2018-08-21 2019-01-01 北京深瞐科技有限公司 Urban activity demographics method and device thereof, computer-readable medium
CN109710780B (en) * 2018-12-28 2022-03-15 上海依图网络科技有限公司 Archiving method and device
CN109710780A (en) * 2018-12-28 2019-05-03 上海依图网络科技有限公司 A kind of archiving method and device
CN109740003A (en) * 2018-12-28 2019-05-10 上海依图网络科技有限公司 A kind of archiving method and device
CN109800664A (en) * 2018-12-28 2019-05-24 上海依图网络科技有限公司 A kind of method and device of determining passerby track
CN109800329A (en) * 2018-12-28 2019-05-24 上海依图网络科技有限公司 A kind of monitoring method and device
CN109800664B (en) * 2018-12-28 2024-01-12 上海依图网络科技有限公司 Method and device for determining passersby track
CN109740003B (en) * 2018-12-28 2024-01-09 上海依图网络科技有限公司 Filing method and device
CN110390031A (en) * 2019-06-28 2019-10-29 深圳市商汤科技有限公司 Information processing method and device, vision facilities and storage medium
CN110688912A (en) * 2019-09-09 2020-01-14 南昌大学 IPv6 cloud interconnection-based online face search positioning system and method
CN110602453A (en) * 2019-09-09 2019-12-20 金鹏电子信息机器有限公司 Internet of things big data intelligent video security monitoring system
CN110863678A (en) * 2019-11-07 2020-03-06 毛春根 Bus station platform
CN110805845A (en) * 2019-11-07 2020-02-18 毛春根 Corridor sound control lamp
CN111263126A (en) * 2020-03-31 2020-06-09 陈小河 Video intelligent identification and information push precaution management system

Similar Documents

Publication Publication Date Title
CN107944433A (en) Security protection monitors method and security protection monitoring system
US11721186B2 (en) Systems and methods for categorizing motion events
US11587320B2 (en) Methods and systems for person detection in a video feed
US10192415B2 (en) Methods and systems for providing intelligent alerts for events
US11062580B2 (en) Methods and systems for updating an event timeline with event indicators
US10957171B2 (en) Methods and systems for providing event alerts
US20210125475A1 (en) Methods and devices for presenting video information
US11011035B2 (en) Methods and systems for detecting persons in a smart home environment
US9489580B2 (en) Method and system for cluster-based video monitoring and event categorization
US7814061B2 (en) Method for preserving privacy with image capture
US20120207356A1 (en) Targeted content acquisition using image analysis
US9626365B2 (en) Content clustering system and method
CN108351965A (en) The user interface of video frequency abstract
CN115966313A (en) Integrated management platform based on face recognition
US10755414B2 (en) Detecting and monitoring a user's photographs for health issues
CN113625603B (en) Security monitoring management system and method based on big data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180420