CN108337464A - The classification method for down loading of monitor video - Google Patents

The classification method for down loading of monitor video Download PDF

Info

Publication number
CN108337464A
CN108337464A CN201810051220.5A CN201810051220A CN108337464A CN 108337464 A CN108337464 A CN 108337464A CN 201810051220 A CN201810051220 A CN 201810051220A CN 108337464 A CN108337464 A CN 108337464A
Authority
CN
China
Prior art keywords
video
classification method
down loading
mobile object
dangerous
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810051220.5A
Other languages
Chinese (zh)
Inventor
余晓瑜
谢文娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Aiyouwei Software Development Co Ltd
Original Assignee
Shanghai Aiyouwei Software Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Aiyouwei Software Development Co Ltd filed Critical Shanghai Aiyouwei Software Development Co Ltd
Priority to CN201810051220.5A priority Critical patent/CN108337464A/en
Publication of CN108337464A publication Critical patent/CN108337464A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/71Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

This application provides a kind of classification method for down loading of monitor video, are related to intelligent terminal technical field, and this method includes:Obtain monitoring video information;Content recognition is carried out to video information, and dangerous grading is carried out according to recognition result;It is graded according to danger, video information is divided into several video clips;The video clip of different dangerous gradings uses different downloads and storage scheme.Compared to the prior art, the classification method for down loading of monitor video provided by the present application, video information is divided into several video clips according to danger grading, using different downloads and storage scheme, on the one hand memory space can be saved, the mobile terminals such as mobile phone, tablet computer is enable preferentially to download crucial video information;On the other hand, in the event of an accident, it can be quickly found out required segment according to danger grading, improves efficiency.

Description

The classification method for down loading of monitor video
Technical field
This application involves field of terminal technology, more particularly, to a kind of classification method for down loading of monitor video.
Background technology
Popular instantly in smart home, many users can install camera at home in view of property safety, but image Head all weather operations, the video file of generation are on a grand scale, and occupy the spaces such as high in the clouds, hard disk.When realized property is by encroaching on When, it adjusts monitor video that can also expend user's a large amount of time, if the hard drive space carried at that time is smaller, and is sent out apart from crime When having long period of time when raw, it is possible to which crime video recording expired deletion at that time can not be used as evidence.
Invention content
The application's is designed to provide a kind of classification method for down loading of monitor video, can be according to content by video data Classification, the download of the video data use of different stage and storage scheme are different, to save memory space, and improve video and transfer Efficiency.
To achieve the above object, the classification method for down loading of monitor video provided by the present application, including:
Obtain monitoring video information;
Content recognition is carried out to video information, and dangerous grading is carried out according to recognition result;
It is graded according to danger, video information is divided into several video clips;
The video clip of different dangerous gradings uses different downloads and storage scheme.
In the above-mentioned technical solutions, described to include to video information progress content recognition:
Judge to whether there is mobile object in video information;
If there is no mobile object, then it is judged as that dangerous grading is low;If there is mobile object, then it is judged as that danger is commented Grade is high.
In the above-mentioned technical solutions, described to further include to video information progress content recognition:
When there are mobile object, recognition of face is carried out to mobile object;
According to face recognition result, danger classes is judged.
In the above-mentioned technical solutions, according to face recognition result, judge that danger classes refers to:
According to face recognition result, when judging that mobile object is in white list, then danger classes is low;
When judging that mobile object is in blacklist, then danger classes is high;
When can not judge that mobile object is whether in white and black list, then danger classes is medium.
In the above-mentioned technical solutions, the blacklist and white list are set by the user;
The blacklist can also obtain the data in internet wanted circular system.
In the above-mentioned technical solutions, for there are the video clips of mobile object, with the image of the mobile object identified Icon as the video clip.
In the above-mentioned technical solutions, the video clip of different dangerous gradings is at least wrapped using different downloads and storage scheme It includes:
The high video clip of the danger classes video clip holding time lower than danger classes is long;
The video clip of different dangerous gradings is downloaded and is stored to different files.
In the above-mentioned technical solutions, in memory space inadequate, it is automatically deleted the low video clip of the danger classes of storage; Or do not download the low video clip of danger classes.
In the above-mentioned technical solutions, the video clip of different dangerous gradings includes using different downloads and storage scheme:
The video clip of different dangerous gradings is downloaded and is stored to different files, periodic cleaning is endangered for storing The file of the lower video clip of danger grading.
In the above-mentioned technical solutions, monitoring video information is obtained by multiple cameras;In dangerous ranking process, meeting In conjunction with the source of video information.
Compared to the prior art, the classification method for down loading of monitor video provided by the present application, by video information according to danger Property grading be divided into several video clips, using different downloads and storage scheme, on the one hand can save memory space, make hand The mobile terminals such as machine, tablet computer can preferentially download crucial video information;It on the other hand, in the event of an accident, can basis Danger grading is quickly found out required segment, improves efficiency.
The additional aspect and advantage of the application will become apparent in following description section, or the practice for passing through the application Recognize.
Description of the drawings
It, below will be to specific in order to illustrate more clearly of the application specific implementation mode or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art are briefly described, it should be apparent that, in being described below Attached drawing is some embodiments of the application, for those of ordinary skill in the art, before not making the creative labor It puts, other drawings may also be obtained based on these drawings.
Fig. 1 is the illustrative diagram of the Environment System provided according to some embodiments of the present application.
Fig. 2 is the exemplary cell schematic diagram of electronic functionalities configuration shown in FIG. 1
Fig. 3 is the exemplary flow of the classification method for down loading of the monitor video provided according to some embodiments of the present application Figure.
Fig. 4 is the exemplary process diagram of the method for the dangerous grading provided according to some embodiments of the present application.
Specific implementation mode
It is described as having the right the application defined in requirement and its equivalent convenient for Integrated Understanding below with reference to attached drawing Various embodiments.These embodiments include various specific details in order to understand, but these are considered only as illustratively.Cause This, it will be appreciated by those skilled in the art that carrying out variations and modifications without departing from this to various embodiments described here The scope and spirit of application.In addition, briefly and to be explicitly described the application, the application will be omitted to known function and structure Description.
The term and phrase used in following description and claims is not limited to literal meaning, and being merely can Understand and consistently understands the application.Therefore, for those skilled in the art, it will be understood that provide to the various implementations of the application The description of example is only the purpose to illustrate, rather than limits appended claims and its application of Equivalent definitions.
Below in conjunction with the attached drawing in the application some embodiments, technical solutions in the embodiments of the present application carries out clear Chu is fully described by, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments. Based on the embodiment in the application, obtained by those of ordinary skill in the art without making creative efforts all Other embodiment shall fall in the protection scope of this application.
It should be noted that the term used in the embodiment of the present application is the mesh for being only in description specific embodiment , it is not intended to be limiting the application." one " of the embodiment of the present application and singulative used in the attached claims, "one", "an", " described " and "the" be also intended to including most forms, unless context clearly shows that other meanings.Also It should be appreciated that term "and/or" used herein refer to and include one or more mutually bindings list items purposes it is any or All possible combinations.Express " first ", " second ", " first " and " second " is for modifying respective element without examining Worry sequence or importance are used only for distinguishing a kind of element and another element, without limiting respective element.
Terminal according to the application some embodiments can be electronic equipment, the electronic equipment may include smart mobile phone, PC (PC, such as tablet computer, desktop computer, notebook, net book, palm PC PDA), mobile phone, e-book Reader, portable media player (PMP), audio/video player (MP3/MP4), video camera, virtual reality device (VR) and the combination of one or more of wearable device etc..According to some embodiments of the present application, the wearable device Including type of attachment (such as wrist-watch, ring, bracelet, eyes or wear-type device (HMD)), integrated type (such as electronics clothes Dress), decorated type (such as pad skin, tatoo or built in electronic device) etc. one or more of combination.The application's In some embodiments, the electronic equipment can be flexible, be not limited to above equipment, or can be in above-mentioned various equipment One or more of combinations.In this application, term " user " may indicate that the people using electronic equipment or use electronic equipment Equipment (such as artificial intelligence electronic equipment).
The embodiment of the present application provides a kind of classification method for down loading of monitor video.For the ease of understanding that the application is implemented Example, is described in detail the embodiment of the present application below with reference to attached drawing.
Fig. 1 is the illustrative diagram of the Environment System 100 provided according to some embodiments of the present application.Such as Fig. 1 Shown, Environment System 100 may include electronic equipment 110, network 120 and server 130 etc..Electronic equipment 110 can be with Including bus 111, processor 112, memory 113, input/output module 114, display 115, communication module 116 and physics Key 117 etc..In some embodiments of the present application, electronic equipment 110 can be omitted one or more elements, or can be into one Step includes one or more other elements.
Bus 111 may include circuit.The circuit can be with one or more element (examples in interconnection electronics 110 Such as, bus 111, processor 112, memory 113, input/output module 114, display 115 and communication module 116).It is described Circuit can also realize communication (for example, obtaining and/or sending number between one or more elements in electronic equipment 110 According to).
Processor 112 may include one or more coprocessors (Co-processor), application processor (AP, Application Processor) and communication processor (Communication Processot).As an example, processor 112 can execute the control and/or data processing with one or more elements of electronic equipment 110.
Memory 113 can store data.The data may include other with one or more of electronic equipment 110 The relevant instruction of element or data.For example, the data may include the initial data before the processing of processor 112, intermediate data And/or treated data.Specifically, memory 113 can store photo, image, iris information etc..Memory 113 can To include impermanent memory memory and/or permanent memory memory.
According to some embodiments of the present application, memory 113 can store software and/or program.Described program can wrap It includes kernel, middleware, Application Programming Interface (API, Application Programming Interface) and/or applies journey Sequence.At least part of the kernel, the middleware or the Application Programming Interface may include operating system (OS, Operating System).As an example, the kernel can be controlled or be managed for executing other programs (for example, intermediate Part, Application Programming Interface and application program) in realize operation or function system resource (for example, bus 111, processor 112, memory 113 etc.).In addition, the kernel can provide interface.The interface can by the middleware, described answer One or more elements of electronic equipment 110 are accessed to control or manage system resource with programming interface or the application program.
The middleware can be as the middle layer of data transmission.The data transmission can allow Application Programming Interface or Application program exchanges data with the kernel communication.As an example, the middleware can be handled from the application program One or more task requests of acquisition.For example, the middleware can distribute electronic equipment to one or more application program The priority of 110 system resource (for example, bus 111, processor 112, memory 113 etc.), and processing it is one or Multiple tasks are asked.The Application Programming Interface can be the application program for controlling from the kernel or the middleware The interface of function is provided.The Application Programming Interface can also include one or more interfaces or function.The function can be used In security control, communication control, document control, window control, text control, image procossing, signal processing etc..
What input/output module 114 can be inputted to the transmission of the other elements of electronic equipment 110 from user or external equipment Instruction or data.Input/output module 114 can also be defeated by the instruction or data that are obtained from the other elements of electronic equipment 110 Go out to user or external equipment.
Display 115 can show content.The content can to user show various types (for example, text, image, Video, icon and/or symbol).Display 115 may include liquid crystal display (LCD, Liquid Crystal Display), Light emitting diode (LED, Light-Emitting Diode) display, Organic Light Emitting Diode (OLED, Organic Light Emitting Diode) display, Micro Electro Mechanical System (MEMS, Micro Electro Mechanical Systems) display Device or electric paper display etc. or several combinations.Display 115 may include touch screen.In some embodiments, display 115 can show virtual key.The touch screen can obtain the input of the virtual key.Display 115 can be touched by described It touches screen and obtains input.The input may include touch input, gesture input, action input, close input, electronic pen or user The input of body part.
Communication module 116 can configure the communication between equipment.In some embodiments, network environment 100 can be into one Step includes electronic equipment 140.As an example, the communication between the equipment may include electronic equipment 110 and other equipment (example Such as, server 130 or electronic equipment 140) between communication.For example, communication module 116 can by radio communication or cable modem Letter is connected to network 120, is communicated with other equipment (for example, server 130 or electronic equipment 140) realization.
The wireless communication may include microwave communication and/or satellite communication etc..The wireless communication may include honeycomb Communication is (for example, global mobile communication (GSM, Global System for Mobile Communications), CDMA (CDMA, Code Division Multiple Access), 3G (Third Generation) Moblie (3G, The 3rd Generation Telecommunication), forth generation mobile communication (4G), the 5th third-generation mobile communication (5G)), Long Term Evolution (LTE, Long Term Evolution), Long Term Evolution upgrade version (LTE-A, LTE-Advanced), wideband code division multiple access (WCDMA, Wideband Code Division Multiple Access), Universal Mobile Communication System (UMTS, Universal Mobile Telecommunications System), WiMAX (WiBro, Wireless ) etc. or several combinations Broadband.According to some embodiments of the present application, the wireless communication may include wireless local Net (WiFi, Wireless Fidelity), bluetooth, low-power consumption bluetooth (BLE, Bluetooth Low Energy), ZigBee protocol (ZigBee), near-field communication (NFC, Near Field Communication), magnetic safe transmission, radio frequency and body area network (BAN, Body Area Network) etc. or several combinations.According to some embodiments of the present application, the wire communication may include Global Navigation Satellite System (Glonass/GNSS, Global Navigation Satellite System), global positioning system System (GPS, Global Position System), Beidou navigation satellite system or Galileo (European Global Satellite Navigation System) Deng.The wire communication may include universal serial bus (USB, Universal Serial Bus), high-definition media interface (HDMI, High-Definition Multimedia Interface), proposed standard 232 (RS-232, Recommend Standard 232), and/or plain old telephone service (POTS, Plain Old Telephone Service) etc. in one Kind or several combinations.
Secondary or physical bond 117 can be used for user's interaction.Secondary or physical bond 117 may include one or more entity keys.In some realities It applies in example, user can be with the function of self-defined secondary or physical bond 117.
Network 120 may include communication network.The communication network may include computer network (for example, LAN (LAN, Local Area Network) or wide area network (WAN, Wide Area Network)), internet and/or telephone network Deng or several combinations.Network 120 can be to the other equipment in Environment System 100 (for example, electronic equipment 110, clothes Business device 130, electronic equipment 140 etc.) send information.
Server 130 can connect the other equipment in Environment System 100 (for example, electronic equipment by network 120 110, electronic equipment 140 etc.).
Electronic equipment 140 can be identical or different with electronic equipment 110 type.According to some embodiments of the present application, Some or all of execution operation can be in another equipment or multiple equipment (for example, electronic equipment 140 in electronic equipment 110 And/or server 130) in execute.In some embodiments, when electronic equipment 110 be automatically or in response to request execute it is a kind of or When multiple functions and/or service, electronic equipment 110 can ask other equipment (for example, electronic equipment 140 and/or server 130) it substitutes and executes function and/or service.In some embodiments, electronic equipment 110 is in addition to executing function or service, further Execute relative one or more functions.In some embodiments, other equipment is (for example, electronic equipment 140 and/or clothes Business device 130) requested function or other relevant one or more functions can be executed, implementing result can be sent to electricity Sub- equipment 110.Electronic equipment 110 can repeat result or be further processed implementing result, to provide requested function Or service.
It should be noted that the description for Environment System 100 above only for convenience of description can not be this Shen It please be limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on this system can Arbitrary combination can be carried out to each element, or constitute subsystem and connect with other elements under the premise of without departing substantially from the principle, To implementing the various modifications and variations of the above method and the progress of systematic difference field in form and details.For example, network environment System 100 may further include database.Suchlike deformation, within the protection domain of the application.
Fig. 2 is the exemplary cell block diagram of the electronic functionalities configuration provided according to some embodiments of the present application.Such as Shown in Fig. 2, processor 112 may include processing module 200, and the processing module 200 may include acquiring unit 210, analysis Unit 220, control unit 230.
According to some embodiments of the present application, acquiring unit 210 can obtain information.Described information may include but unlimited In word, picture, audio, video, action, gesture etc. or several combinations.In some embodiments, acquiring unit 210 can be with Input information is obtained by input/output module 114, the touch screen of display 115 and/or secondary or physical bond 117.
As an example, acquiring unit 210 can obtain monitoring video information, specifically, acquiring unit 210 by with take the photograph Video information is obtained as head connection.
According to some embodiments of the present application, analytic unit 220 at least can to information that acquiring unit 210 obtains and The information stored in electronic equipment is analyzed.In some embodiments, analytic unit 220 can to the video information of acquisition into Row analysis, such as whether can analyze wherein in mobile object.In some embodiments, analytic unit 220 can also be further It is commented according to analysis result carrying out danger in video clip.
According to some embodiments of the present application, control unit 230 can according to the analysis result of analytic unit 220, or The information control electronics that acquiring unit 210 obtains.The control electronics may include that control electronics 110 execute Action.
In some embodiments, control unit 230 grades to different danger according to the analysis result of analytic unit 220 Video clip uses different downloads and storage scheme.
It should be noted that the unit in processing module 200 is described above, it only for convenience of description, can not be this Application is limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on this system, Arbitrary combination may be carried out to each unit under the premise of without departing substantially from the principle, or constitute submodule and connect with other units It connects, the function to implementing above-mentioned module and unit carries out various modifications and variations in form and details.For example, electronic equipment 110 may further include sensor etc., and acquiring unit 210 can obtain information by sensor.In another example processing unit 220 may further include division subelement etc..Suchlike deformation, within the protection domain of the application.
Fig. 3 is the exemplary flow of the classification method for down loading of the monitor video provided according to some embodiments of the present application Figure.As shown in figure 3, flow 300 can be realized by processing module 200.
In the step 310, monitoring video information is obtained.
In some embodiments, monitor video can be directed to multiple cameras, i.e., multiple cameras directly with movement Terminal connects, and mobile terminal obtains the monitor video of camera shooting in real time or periodically, and does analyzing processing.
In some embodiments, monitor video derive from server or cloud disk, i.e., with network monitoring in the prior art System docking, network monitoring system in the prior art obtain and store monitor video;And mobile terminal is from network monitoring system In server or cloud disk in obtain monitor video.
In some embodiments, monitor video may be from other-end equipment or storage device, to realize to arbitrary Video data carries out classification processing.
In step 320, content recognition is carried out to video information, and dangerous grading is carried out according to recognition result.
Judge to regard according to default rule or big data analysis model using image recognition technology parsing video information There are the maximum probabilities of useful information for which segment in frequency information, and carry out dangerous grading to these segments according to probability.
The useful information refers to, and there are unconventional pictures in parsing video information, such as stranger enters, vehicle window is struck It is broken etc..
Specific danger ranking method, can refer to Fig. 4, is not discussed in detail herein.
In a step 330, it is graded according to danger, video information is divided into several video clips.
There is the terminal of unconventional picture in identification first, using starting point as basic point, deduces setting time forward as editing Starting point deduces setting time as editing stop backward using stop as basic point;Then utilize video clipping software to whole section of video Information carries out editing, obtains several video clips.
In step 340, the video clip of different dangerous gradings uses different downloads and storage scheme.
Using different downloads and storage scheme, basic mentality of designing is the video clip of different dangerous gradings:
Effective storage time of the high video clip of the danger classes video clip lower than danger classes, i.e. holding time It is long;It is preferential to download the high video clip of danger classes under the premise of limited storage space.
In addition, different downloads and storage scheme further includes downloading the video clip of different dangerous gradings and storing to not Same position.
In some embodiments, only when danger classes meets preset condition, the video clip can just be downloaded.Moreover, When memory space inadequate, it can be automatically deleted the lower video clip of danger classes, to ensure that the video clip of storage is most to have .
Fig. 4 is the exemplary process diagram of the method for the dangerous grading provided according to some embodiments of the present application.Such as Fig. 4 Shown, flow 400 can be realized by processing module 200.
In step 410, judge to whether there is mobile object in video information;
If there is no mobile object, then judge that danger is rated level-one;Level-one is the lowest level of dangerous grading, that is, is deposited It is minimum in dangerous information probability.Since there is no mobile object, the object in picture is static condition, including information it is minimum And it is fixed, the video clip value of the rank is minimum.
If there is mobile object, then continue step 420.
At step 420, recognition of face is carried out to mobile object and danger classes is judged according to face recognition result.
The multistage identification of row can be used in the identification of mobile object, for example, it is animal, people or other motive objects to first determine whether; When it is people to judge, identification is further carried out;Judge that people is owner, household, stranger, the suspect etc. especially marked.
Moreover, in storage, it can be using the image of mobile object as the icon of the video clip, needed for searching Video clip.
Recognition result may include three kinds, respectively as shown in step 430,440 and 450.
In step 430, according to face recognition result, when judging that mobile object is in white list, then judge dangerous grading For two level.
White list can independently be set by user, such as, it may include the household of user, friend, colleague and users to trust Neighbours etc..Also corresponding frequent contact can be transferred from the frequent contact of user terminal as white list to recommend.
In step 440, when judging that mobile object is in blacklist, then judge that danger is rated level Four.
Blacklist can independently be set by user, for example, user may be selected with the related personnel for oneself having the conflict of interest, have not The related personnel of good record makees in addition blacklist.It, will be in addition, blacklist can also obtain the data in internet wanted circular system The suspect escaped is added in blacklist.
In step 450, mobile object then judges that danger is rated three neither in white list nor when in blacklist Grade.
If whether None- identified mobile object is in blacklist or white list, the danger classes of the video clip is black Between list and white list.
It should be noted that the above embodiments are intended merely as example, the application is not limited to such example, but can To carry out various change.
It should be noted that in the present specification, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also include other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
Finally, it is to be noted that, it is above-mentioned it is a series of processing include not only with sequence described here in temporal sequence The processing of execution, and include the processing executed parallel or respectively rather than in chronological order.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with It is completed by the relevant hardware of computer program instructions, the program can be stored in a computer readable storage medium, The program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic disc, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) Deng.
Above disclosed is only some preferred embodiments of the application, and the right model of the application cannot be limited with this It encloses, those skilled in the art can understand all or part of the processes for realizing the above embodiment, and is wanted according to the application right Equivalent variations made by asking, still belong to the scope covered by the invention.

Claims (10)

1. a kind of classification method for down loading of monitor video, which is characterized in that including:
Obtain monitoring video information;
Content recognition is carried out to video information, and dangerous grading is carried out according to recognition result;
It is graded according to danger, video information is divided into several video clips;
The video clip of different dangerous gradings uses different downloads and storage scheme.
2. the classification method for down loading of monitor video according to claim 1, which is characterized in that described to be carried out to video information Content recognition includes:
Judge to whether there is mobile object in video information;
If there is no mobile object, then it is judged as that dangerous grading is low;If there is mobile object, then it is judged as dangerous grading It is high.
3. the classification method for down loading of monitor video according to claim 2, which is characterized in that described to be carried out to video information Content recognition further includes:
When there are mobile object, recognition of face is carried out to mobile object;
According to face recognition result, danger classes is judged.
4. the classification method for down loading of monitor video according to claim 3, which is characterized in that according to face recognition result, Judge that danger classes refers to:
According to face recognition result, when judging that mobile object is in white list, then danger classes is low;
When judging that mobile object is in blacklist, then danger classes is high;
When can not judge that mobile object is whether in white and black list, then danger classes is medium.
5. the classification method for down loading of monitor video according to claim 4, which is characterized in that
The blacklist and white list are set by the user;
The blacklist can also obtain the data in internet wanted circular system.
6. the classification method for down loading of monitor video according to claim 2, which is characterized in that
For there are the video clips of mobile object, using the image of the mobile object identified as the icon of the video clip.
7. the classification method for down loading of monitor video according to claim 1, which is characterized in that the video of different dangerous gradings Segment is included at least using different downloads and storage scheme:
The high video clip of the danger classes video clip holding time lower than danger classes is long;
The video clip of different dangerous gradings is downloaded and is stored to different files.
8. the classification method for down loading of monitor video according to claim 1 or claim 7, which is characterized in that in memory space inadequate When, it is automatically deleted the low video clip of the danger classes of storage;Or do not download the low video clip of danger classes.
9. the classification method for down loading of monitor video according to claim 1, which is characterized in that the video of different dangerous gradings Segment includes using different downloads and storage scheme:
The video clip of different dangerous gradings is downloaded and is stored to different files, periodic cleaning is commented for storage of hazardous The file of the lower video clip of grade.
10. the classification method for down loading of monitor video according to claim 1, which is characterized in that obtained by multiple cameras Take monitoring video information;It, can be in conjunction with the source of video information in dangerous ranking process.
CN201810051220.5A 2018-01-18 2018-01-18 The classification method for down loading of monitor video Pending CN108337464A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810051220.5A CN108337464A (en) 2018-01-18 2018-01-18 The classification method for down loading of monitor video

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810051220.5A CN108337464A (en) 2018-01-18 2018-01-18 The classification method for down loading of monitor video

Publications (1)

Publication Number Publication Date
CN108337464A true CN108337464A (en) 2018-07-27

Family

ID=62925356

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810051220.5A Pending CN108337464A (en) 2018-01-18 2018-01-18 The classification method for down loading of monitor video

Country Status (1)

Country Link
CN (1) CN108337464A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101763388A (en) * 2008-12-25 2010-06-30 北京中星微电子有限公司 Method for searching video, system therefor and device therefor as well as video storing method and system thereof
CN103888725A (en) * 2014-03-04 2014-06-25 深圳信息职业技术学院 Safe monitoring method and system
US20160286145A1 (en) * 2015-03-24 2016-09-29 Semiconductor Components Industries, Llc Imaging systems and methods for transient signal integrity verification
CN106060442A (en) * 2016-05-20 2016-10-26 浙江宇视科技有限公司 Video storage method, device and system
US20170208349A1 (en) * 2008-03-03 2017-07-20 Avigilon Analytics Corporation Content-aware computer networking devices with video analytics for reducing video storage and video communication bandwidth requirements of a video surveillance network camera system
CN107222639A (en) * 2017-07-07 2017-09-29 上海爱优威软件开发有限公司 User security is reminded to use the method and system of mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170208349A1 (en) * 2008-03-03 2017-07-20 Avigilon Analytics Corporation Content-aware computer networking devices with video analytics for reducing video storage and video communication bandwidth requirements of a video surveillance network camera system
CN101763388A (en) * 2008-12-25 2010-06-30 北京中星微电子有限公司 Method for searching video, system therefor and device therefor as well as video storing method and system thereof
CN103888725A (en) * 2014-03-04 2014-06-25 深圳信息职业技术学院 Safe monitoring method and system
US20160286145A1 (en) * 2015-03-24 2016-09-29 Semiconductor Components Industries, Llc Imaging systems and methods for transient signal integrity verification
CN106060442A (en) * 2016-05-20 2016-10-26 浙江宇视科技有限公司 Video storage method, device and system
CN107222639A (en) * 2017-07-07 2017-09-29 上海爱优威软件开发有限公司 User security is reminded to use the method and system of mobile terminal

Similar Documents

Publication Publication Date Title
US11138251B2 (en) System to customize and view permissions, features, notifications, and updates from a cluster of applications
CN108303903A (en) The control method and system of smart home
CN108040167A (en) The method that limiting terminal uses
CN109492412A (en) The encryption storage method and system of file
CN108228811A (en) Information recommendation method and system
CN107423100A (en) A kind of methods, devices and systems of terminal OTA firmware updatings
CN108009140A (en) A kind of end message edit methods and system
CN107315681A (en) Application program self-starting test system, medium and method
CN108921855A (en) Image processing method and system based on information
CN107341378A (en) For the method for the access right for setting application
CN107846508A (en) For the assisted memory method and system of forgetful crowd
CN109379431A (en) A kind of contact person information updating method, cloud server and terminal
CN109714479A (en) Conducive to the terminal control method and system improved efficiency
CN206908680U (en) Intelligent terminal with secure log function
CN108897479A (en) A kind of terminal touch control method and system
CN108337464A (en) The classification method for down loading of monitor video
CN108428455A (en) The acquisition method and system of vocal print feature
CN107613106A (en) Similar APP automatic selecting method and system
CN107395866A (en) Call automatic answering machine method
CN108093312A (en) Interactive approach and system based on barrage technology
CN107395900A (en) The multiple based reminding method of missed call
CN108021350A (en) A kind of terminal output volume method of adjustment and system
CN107957834A (en) With the associated terminal unlock method of weather
CN107623736A (en) A kind of equipment connection method and system
CN109413266A (en) It is a kind of based on the data back up method and terminal that fall detection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180727

WD01 Invention patent application deemed withdrawn after publication