CN109327328A - Monitoring and managing method, device, system, cloud server and storage medium - Google Patents

Monitoring and managing method, device, system, cloud server and storage medium Download PDF

Info

Publication number
CN109327328A
CN109327328A CN201810982884.3A CN201810982884A CN109327328A CN 109327328 A CN109327328 A CN 109327328A CN 201810982884 A CN201810982884 A CN 201810982884A CN 109327328 A CN109327328 A CN 109327328A
Authority
CN
China
Prior art keywords
monitoring information
monitoring
information
suspicious
anomalous event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810982884.3A
Other languages
Chinese (zh)
Inventor
廉士国
刘兆祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cloudminds Shenzhen Robotics Systems Co Ltd
Cloudminds Inc
Original Assignee
Cloudminds Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cloudminds Inc filed Critical Cloudminds Inc
Priority to CN201810982884.3A priority Critical patent/CN109327328A/en
Publication of CN109327328A publication Critical patent/CN109327328A/en
Priority to PCT/CN2019/083942 priority patent/WO2020042637A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Abstract

This disclosure relates to a kind of monitoring and managing method, device, system, cloud server and storage medium, for realizing to the supervision of application services and the automatic evidence-collectings of anomalous event such as nets about vehicle, family's monitoring, online live streaming platform.The method is applied to cloud server, the described method includes: receiving the suspicious monitoring information that monitoring client is sent, the suspicious monitoring information is that the monitoring client identifies that the obtained monitoring information with anomalous event, the list feature identification model are obtained using the single features in monitoring information as training sample training based on single feature identification model from collected monitoring information;The suspicious monitoring information is inputted into multiple features fusion model, obtains the recognition result of anomalous event, the multiple features fusion model is to obtain using the anomalous event label of multiple features and the monitoring information in monitoring information as training sample to training.

Description

Monitoring and managing method, device, system, cloud server and storage medium
Technical field
This disclosure relates to field of artificial intelligence, and in particular, to a kind of monitoring and managing method, device, system, cloud service Device and storage medium.
Background technique
With the continuous development of internet technique, the application services such as net about vehicle, online live streaming platform are come into being, at this It is possible that violence, quarrelling, relating to all kinds of unlawful practices such as yellow, vulgar during the operation of a little application services.However, mesh It is preceding the operation process of these application services not to be supervised, cause all kinds of delinquent events to emerge one after another.
Summary of the invention
Purpose of this disclosure is to provide a kind of monitoring and managing method, device, system, cloud server and storage mediums, for real Now to the supervision of application services and the automatic evidence-collectings of anomalous event such as nets about vehicle, family's monitoring, online live streaming platform.
To achieve the goals above, disclosure first aspect provides a kind of monitoring and managing method, is applied to cloud server, described Method includes:
The suspicious monitoring information that monitoring client is sent is received, the suspicious monitoring information is that the monitoring client is based on single feature knowledge Other model identifies the obtained monitoring information with anomalous event, the list feature identification model from collected monitoring information It is to be obtained using the single features in monitoring information as training sample training;
The suspicious monitoring information is inputted into multiple features fusion model, obtains the recognition result of anomalous event, it is described mostly special Levying Fusion Model is using the anomalous event label of multiple features and the monitoring information in monitoring information as training sample Training is obtained.
Disclosure second aspect provides a kind of maintenance device, is applied to cloud server, and described device includes:
First receiving module is configured as receiving the suspicious monitoring information that monitoring client is sent, and the suspicious monitoring information is The monitoring client identifies the obtained monitoring with anomalous event based on single feature identification model from collected monitoring information Information, the list feature identification model are obtained using the single features in monitoring information as training sample training;
Identification module is configured as the suspicious monitoring information input multiple features fusion model obtaining anomalous event Recognition result, the multiple features fusion model are the anomalous events using multiple features and the monitoring information in monitoring information Label obtains training as training sample.
The disclosure third aspect provides a kind of computer readable storage medium, is stored thereon with computer program, the program The step of disclosure first aspect the method is realized when being executed by processor.
Disclosure fourth aspect provides a kind of cloud server, comprising:
Memory is stored thereon with computer program;
Processor, for executing the computer program in the memory, to realize described in disclosure first aspect The step of method.
The 5th aspect of the disclosure provides a kind of supervisory systems, takes including cloud described in monitoring client and disclosure fourth aspect Business device.
By adopting the above technical scheme, it at least can achieve following technical effect:
By receiving the suspicious monitoring information of monitoring client transmission and suspicious monitoring information being inputted multiple features fusion model, obtain To the recognition result of anomalous event, may be implemented supervision to application services such as nets about vehicle, family's monitoring, online live streaming platform and The automatic evidence-collecting of anomalous event reduces the probability that anomalous event occurs.Secondly, being carried out by monitoring information of the monitoring client to acquisition The suspicious monitoring information that identification obtains simultaneously is sent to cloud server by preliminary identification, by cloud server to suspicious monitoring information It is further identified, on the one hand can reduce the operand of monitoring client, and then reduce the bandwidth of monitoring client, it on the other hand can be with The accuracy and reliability for improving anomalous event recognition result reduces the false alarm rate of anomalous event, and then reduces human cost.
Other feature and advantage of the disclosure will the following detailed description will be given in the detailed implementation section.
Detailed description of the invention
In order to illustrate more clearly of the embodiment of the present disclosure or technical solution in the prior art, embodiment will be described below Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is some realities of the disclosure Example is applied, it for those of ordinary skill in the art, without creative efforts, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is the block diagram according to a kind of supervisory systems shown in one exemplary embodiment of the disclosure;
Fig. 2 is the flow chart according to a kind of monitoring and managing method shown in one exemplary embodiment of the disclosure;
Fig. 3 is a kind of flow chart of monitoring and managing method shown according to disclosure another exemplary embodiment;
Fig. 4 is the block diagram according to a kind of maintenance device shown in one exemplary embodiment of the disclosure;
Fig. 5 is a kind of block diagram of maintenance device shown according to disclosure another exemplary embodiment;
Fig. 6 is the structural schematic diagram according to a kind of cloud server shown in one exemplary embodiment of the disclosure.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present disclosure clearer, below in conjunction with the embodiment of the present disclosure In attached drawing, the technical solution in the embodiment of the present disclosure is clearly and completely described, it is clear that described embodiment is Disclosure a part of the embodiment, instead of all the embodiments.Based on the embodiment in the disclosure, those of ordinary skill in the art Every other embodiment obtained without creative efforts belongs to the range of disclosure protection.
It should be noted that the specification and claims of the disclosure and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, and describes specific sequence or precedence without being interpreted as.
The embodiment of the present disclosure provides a kind of supervisory systems, as shown in Figure 1, the supervisory systems 100 may include: to be located at now The monitoring client 110 and cloud server 120 of field.Monitoring client 110 can be to have merged information collection and the intelligence of information processing is set It is standby, it may include information collecting device 111 and information processing unit 112.Information collecting device 111 will after acquiring monitoring information Monitoring information is sent to information processing unit 112 and is identified, tentatively judge whether there is anomalous event (such as violence, rape, Quarrel, relate to yellow, vulgar etc.), and obtained suspicious monitoring information (i.e. with the monitoring information of anomalous event) will be identified by having The mode of line (such as cable, cable) or wireless (such as WiFi, bluetooth) are sent to cloud server 120.Cloud server 120 It is further identified according to the suspicious monitoring information received, obtains the recognition result of anomalous event (for example including monitoring client 110 with the presence or absence of anomalous event and there are which kind of anomalous events).
Wherein, information collecting device 111 can include but is not limited to microphone, camera, GPS positioning components, inertia survey Sensors such as unit (Inertial Measurement Unite, IMU) etc. are measured, correspondingly, collected monitoring information can be with Including but not limited to: voice messaging, image information, the movement state information of text information, the location information of vehicle and vehicle Deng.
Information processing unit 112 is built-in with single feature identification model, which is using in monitoring information Single features obtained as training sample training.Correspondingly, information processing unit 112 can identify mould based on the list feature Type is identified from collected monitoring information obtains suspicious monitoring information.Specifically, which may include needle To the feature extraction network and classifier of each feature, information processing unit 112 can use each feature extraction network from monitoring Corresponding feature is extracted in information and is classified using corresponding classifier to this feature, tentatively judges that there is abnormal thing The suspicious monitoring information of part.For example, if identifying it according to single feature identification model, there are abnormal sound (examples for voice messaging Such as shriek), only have vehicle-mounted sound (i.e. microphone in abnormal keyword (such as " releasing me ", " help ") and voice messaging At least one of it is blocked) these three situations, then it is believed that the voice messaging is suspicious monitoring information;For image information, If recognizing dangerous article (such as knife, rifle etc.), image information in image information according to single feature identification model to show to supervise It controls end and strenuous exercise and image information occurs as in abnormal image (such as image of non-monitored object) these three situations At least one, the then it is believed that image information is suspicious monitoring information;For text information, if being known according to single feature identification model Being clipped to includes illegal text (such as violence, relate to the texts such as yellow, vulgar) in text information, then it is believed that text information is suspicious Text information.
Cloud server 120 is built-in with multiple features fusion model, and the multiple features fusion model is using in monitoring information The anomalous event label of multiple features and the monitoring information obtains training as training sample.Cloud server 120 exists After the suspicious monitoring information for receiving the transmission of information processing unit 112, suspicious monitoring information can be inputted to preset multiple features In Fusion Model, the recognition result of anomalous event is obtained.Specifically, which may include for each feature Feature extraction network, multimodality fusion network and classifier for all features extracted, cloud server 120 can benefit Multiple features are extracted from suspicious monitoring information with each feature extraction network, using multimodality fusion network by multiple features into Row fusion obtains feature vector, and feature vector is sent into classifier and carries out Classification and Identification, obtains the identification knot of anomalous event Fruit.
By the embodiment of the present disclosure provide supervisory systems, may be implemented to net about vehicle, family monitoring, platform is broadcast live online The supervision of equal application services and the automatic evidence-collecting of anomalous event, reduce the probability that anomalous event occurs.Secondly, passing through monitoring client pair The monitoring information of acquisition is tentatively identified and the suspicious monitoring information that identification obtains is sent to cloud server, is taken by cloud Business device further identifies suspicious monitoring information using multiple features fusion model, on the one hand can reduce the operation of monitoring client Amount, and then the bandwidth of monitoring client is reduced, the accuracy and reliability of anomalous event recognition result on the other hand can be improved, in turn The false alarm rate of anomalous event is reduced, human cost is reduced.
In another embodiment, if recognition result shows monitoring client 110, there are anomalous event, cloud servers 120 Suspicious monitoring information can be sent to destination 200 (for example, remote supervisory and control(ling) equipment, the portable movement of target user are eventually End etc.), which is shown with indicative purpose end 200, so that target user is further according to the suspicious monitoring information Monitoring client 110 is identified with the presence or absence of anomalous event and inputs manual identified result to destination 200 and is confirming monitoring client 110 There are take appropriate measures when anomalous event (such as alarms).Wherein, target user can include but is not limited to monitoring personnel, Network police, contact staff of application service etc..In this way, by monitoring client, cloud server and artificial three-level recognition mechanism, it can Further to promote the accuracy and reliability of anomalous event recognition result, anomalous event false alarm rate is reduced, to reduce artificial Cost.Further, since destination only shows the suspicious monitoring information after monitoring client screens, all adopt is shown compared to destination The monitoring information of collection can guarantee the privacy of monitored object to a certain extent, realize monitoring client bandwidth, be monitored object Optimization compromise between privacy and anomalous event discrimination.
Further, cloud server 120 can also receive the artificial knowledge to suspicious monitoring information of the transmission of destination 200 Not as a result, and training sample pair is generated according to suspicious monitoring information and manual identified result, it is more to updating using the training sample Fusion Features model promotes multiple features fusion model according to suspicious prison to optimize and be promoted the performance of the multiple features fusion model The accuracy and reliability of the recognition result of control information output reaches labor-saving to reduce the false alarm rate of anomalous event Purpose.Meanwhile as training sample increases quantity, by constantly updating and optimizing, multiple features fusion model can be made more It adds kind.
Further, the manual identified result received can be also sent to the information of monitoring client 110 by cloud server 120 Processing unit 112 generates training according to collected monitoring information and corresponding manual identified result by information processing unit 112 Sample to and using the training sample that generates to single feature identification model is updated, to optimize and be promoted the list feature identification model Performance, and then promote single feature identification model and the accuracy of suspicious monitoring information and reliable is exported according to collected monitoring information Property, to reduce the false alarm rate of anomalous event.Meanwhile increasing with training samples number can by constantly updating and optimizing So that single feature identification model is more perfect.
It is worth noting that the application scenarios of the embodiment of the present disclosure can include but is not limited to: the embodiment of the present disclosure is answered It can include but is not limited to scene: net about vehicle supervision, family's monitoring, online live streaming platform supervision etc..
In addition, being directed to different application scenarios, the monitoring information that monitoring client 110 acquires is different.For example, corresponding net about vehicle is supervised Pipe, monitoring client 110 can be set on vehicle, it is contemplated that rape, murder etc. anomalous events mostly occur in isolated area and Vehicle is in halted state mostly, thus the monitoring information that monitoring client 110 acquires may include: voice messaging, image information, vehicle Location information and vehicle movement state information;For platform supervision is broadcast live online, monitoring client 110 be can be set straight It broadcasts in client, it is contemplated that there is text during live streaming, thus the monitoring information that monitoring client 110 acquires may include: voice letter Breath, image information and text information.
It will be understood by those skilled in the art that the embodiment of the present disclosure is only with the above-mentioned application scenarios of exemplary illustration, but not It is to limit the application range of the embodiment of the present disclosure.
The embodiment of the present disclosure additionally provides a kind of monitoring and managing method, as shown in Fig. 2, this method may comprise steps of:
In the step s 21, the suspicious monitoring information that monitoring client is sent is received, suspicious monitoring information is that monitoring client is based on Dan Te Sign identification model identifies the obtained monitoring information with anomalous event from collected monitoring information.
Wherein, single feature identification model is obtained using the single features in monitoring information as training sample training.
According to the difference of application scenarios, monitoring information may include image information, voice messaging, text information, position letter One or more of breath and movement state information.Illustratively, by taking net about vehicle supervision scene as an example, it is contemplated that rape, murder Etc. anomalous events mostly occur in isolated area and vehicle is in halted state mostly, thus available monitoring information is removed Include image information and voice messaging, can also include the location information of vehicle and the movement state information of vehicle.With Line is broadcast live for platform supervision scene, it is contemplated that have a text during live streaming, it is available to monitoring information include image letter Breath and voice messaging, can also include text information.
It is worth noting that the tool that monitoring client is identified from collected monitoring information using single feature identification model There is the monitoring client in supervisory systems described in the process and any of the above-described a embodiment of the disclosure of the monitoring information of anomalous event Specific implementation it is similar, specifically refer to the above-mentioned description to monitoring client, in order to reduce redundancy, details are not described herein again.
In step S22, suspicious monitoring information is inputted into multiple features fusion model, obtains the recognition result of anomalous event.
Wherein, multiple features fusion model is the anomalous event using multiple features and the monitoring information in monitoring information Label obtains training as training sample.
Specifically, multiple features fusion model may include for the feature extraction network of each feature, for all extractions The multimodality fusion network and classifier that the multiple features of feature out are merged.After receiving suspicious information, it can use each A feature extraction network extracts multiple features from suspicious monitoring information, is melted multiple features using multimodality fusion network It closes, obtains feature vector, and feature vector is sent into classifier and carries out Classification and Identification, obtain the recognition result of anomalous event.
In embodiment of the disclosure, the recognition result of anomalous event may include monitoring client with the presence or absence of anomalous event (such as violence, rape, quarrel, relating to yellow, vulgar etc.) and there are which kind of anomalous events.
According to disclosure monitoring and managing method provided by the above embodiment, may be implemented to net about vehicle, family's monitoring, online live streaming The supervision of the application services such as platform and the automatic evidence-collecting of anomalous event reduce the probability that anomalous event occurs.Secondly, passing through monitoring End tentatively identifies the monitoring information of acquisition and the suspicious monitoring information that identification obtains is sent to cloud server, by cloud End server by utilizing multiple features fusion model further identifies suspicious monitoring information, on the one hand can reduce monitoring client Operand, and then the bandwidth of monitoring client is reduced, the accuracy and reliability of anomalous event recognition result on the other hand can be improved, And then the false alarm rate of anomalous event is reduced, reduce human cost.
In another embodiment, as shown in figure 3, above-mentioned monitoring and managing method can also include:
In step S23, if recognition result shows monitoring client, there are anomalous events, and suspicious monitoring information is sent to mesh End, suspicious monitoring information is shown with indicative purpose end.
Wherein, destination can include but is not limited to remote supervisory and control(ling) equipment, mobile terminal that target user carries etc., target User can for example including but be not limited to monitoring personnel, network police, the contact staff of application service etc..
If recognition result show monitoring client there are anomalous event, cloud server can also by suspicious monitoring information (such as Suspicious voice messaging, image information etc.) it is sent to destination, prison is further identified according to suspicious monitoring information by target user Controlling end whether there is anomalous event, so that in confirmation monitoring client, there are take appropriate measures when anomalous event (such as alarms).
As a result, by monitoring client, cloud server and artificial three-level recognition mechanism, anomalous event knowledge can be further promoted The accuracy and reliability of other result reduces anomalous event false alarm rate, to be further reduced cost of labor.Further, since mesh End only show the suspicious monitoring information after monitoring client screens, can compared to the monitoring information that destination shows all acquisitions To guarantee the privacy of monitored object to a certain extent, monitoring client bandwidth, the privacy of monitored object and abnormal thing are realized Optimization compromise between part discrimination.
In another embodiment, as shown in figure 3, above-mentioned monitoring and managing method can also include:
In step s 24, the manual identified result to suspicious monitoring information that destination is sent is received.
In step s 25, training sample pair is generated according to suspicious monitoring information and manual identified result.
In step S26, using the training sample to update multiple features fusion model.
Target user can also input to the manual identified of suspicious monitoring information in destination as a result, will be artificial by destination Recognition result is sent to cloud server.Cloud server is after receiving manual identified result, to suspicious monitoring information and right The manual identified result answered is labeled, and obtains training sample pair, and using the training sample to updating multiple features fusion model, To optimize and be promoted the performance of the multiple features fusion model, the knowledge that multiple features fusion model is exported according to suspicious monitoring information is promoted The accuracy and reliability of other result reaches labor-saving purpose to reduce the false alarm rate of anomalous event.Meanwhile with Training sample increases quantity, by constantly updating and optimizing, multiple features fusion model can be made more perfect.
In another embodiment, as shown in figure 3, above-mentioned monitoring and managing method can also include:
In step s 27, manual identified result is sent to monitoring client, manual identified result updates Dan Te for monitoring client Levy identification model.
The manual identified result received can also be sent to monitoring client by cloud server, by monitoring client according to collecting Monitoring information and corresponding manual identified result generate training sample to and using the training sample that generates to updating single feature Identification model to optimize and be promoted the performance of the list feature identification model, and then promotes single feature identification model according to collecting Monitoring information export the accuracy and reliability of suspicious monitoring information, to reduce the false alarm rate of anomalous event.Meanwhile with Training samples number increases, and by constantly updating and optimizing, single feature identification model can be made more perfect.
It is worth noting that for simple description, therefore, it is stated as a series of dynamic for above method embodiment It combines, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described.Secondly, this Field technical staff also should be aware of, and the embodiments described in the specification are all preferred embodiments, and related movement is simultaneously It is not necessarily necessary to the present invention.
The embodiment of the present disclosure also provides a kind of maintenance device, which can be applied to cloud server, as shown in figure 4, should Maintenance device 400 may include: the first receiving module 401 and identification module 402.
First receiving module 401 is configured as receiving the suspicious monitoring information that monitoring client is sent, the suspicious monitoring letter Breath is that the monitoring client identifies that is obtained has anomalous event based on single feature identification model from collected monitoring information Monitoring information, the list feature identification model are obtained using the single features in monitoring information as training sample training.
The identification module 402 is configured as the suspicious monitoring information input multiple features fusion model obtaining abnormal thing The recognition result of part, the multiple features fusion model are the exceptions using multiple features and the monitoring information in monitoring information Event tag obtains training as training sample.
In another embodiment, as shown in figure 5, described device 400 further include:
First sending module 403 is configured as showing that the monitoring client there are when anomalous event, is incited somebody to action in the recognition result The suspicious monitoring information is sent to destination, to indicate that the destination shows the suspicious monitoring information.
In another embodiment, as shown in figure 5, described device 400 further include:
Second receiving module 404, is configured as receiving that the destination sends to the artificial of the suspicious monitoring information Recognition result;
Generation module 405 is configured as generating training sample according to the suspicious monitoring information and the manual identified result This is right;
Update module 406 is configured as using the training sample to the update multiple features fusion model.
In another embodiment, as shown in figure 5, described device 400 further include:
Second sending module 407 is configured as the manual identified result being sent to the monitoring client, the artificial knowledge Other result updates single feature identification model for the monitoring client.
In another embodiment, the monitoring information includes image information, voice messaging, text information, location information And one or more of movement state information.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each function mould The division progress of block can according to need and for example, in practical application by above-mentioned function distribution by different functional modules It completes, i.e., the internal structure of device is divided into different functional modules, to complete all or part of the functions described above. The specific work process of foregoing description functional module, can refer to corresponding processes in the foregoing method embodiment, no longer superfluous herein It states.
By disclosure maintenance device provided by the above embodiment, may be implemented to net about vehicle, family's monitoring, online live streaming The supervision of the application services such as platform and the automatic evidence-collecting of anomalous event reduce the probability that anomalous event occurs.Secondly, passing through monitoring End tentatively identifies the monitoring information of acquisition and the suspicious monitoring information that identification obtains is sent to cloud server, by cloud End server by utilizing multiple features fusion model further identifies suspicious monitoring information, on the one hand can reduce monitoring client Operand, and then the bandwidth of monitoring client is reduced, the accuracy and reliability of anomalous event recognition result on the other hand can be improved, And then the false alarm rate of anomalous event is reduced, reduce human cost.
Secondly, show that suspicious monitoring information there are when anomalous event, is sent to destination by monitoring client in recognition result, with Indicative purpose end shows suspicious monitoring information, further identifies that monitoring client whether there is according to suspicious monitoring information by target user Anomalous event, can be into one by monitoring client, cloud server and artificial three-level recognition mechanism to take appropriate measures Step promotes the accuracy and reliability of anomalous event recognition result, reduces anomalous event false alarm rate, to be further reduced artificial Cost.Further, since destination only shows the suspicious monitoring information after monitoring client screens, all adopt is shown compared to destination The monitoring information of collection can guarantee the privacy of monitored object to a certain extent, realize monitoring client bandwidth, be monitored object Optimization compromise between privacy and anomalous event discrimination.
Further, multiple features fusion model is updated using the manual identified result received and suspicious monitoring information, it can To optimize and be promoted the performance of the multiple features fusion model, the knowledge that multiple features fusion model is exported according to suspicious monitoring information is promoted The accuracy and reliability of other result reaches labor-saving purpose to reduce the false alarm rate of anomalous event.Meanwhile with Training sample increases quantity, by constantly updating and optimizing, multiple features fusion model can be made more perfect.
Further, monitoring client is sent to by the manual identified result that will be received, manual identified is utilized by monitoring client As a result single feature identification model is updated, the performance of the list feature identification model can be optimized and be promoted, and then promotes single feature and knows Other model exports the accuracy and reliability of suspicious monitoring information according to collected monitoring information, to reduce anomalous event False alarm rate.Meanwhile increasing with training samples number can make single feature identification model more by constantly updating and optimizing It adds kind.
Fig. 6 is a kind of block diagram of cloud server 600 shown according to an exemplary embodiment.Referring to Fig. 6, cloud service Device 600 includes processor 622, and quantity can be one or more and memory 632, can be by processor 622 for storing The computer program of execution.The computer program stored in memory 632 may include that one or more each is right The module of Ying Yuyi group instruction.In addition, processor 622, which can be configured as, executes the computer program, to execute above-mentioned prison Pipe method.
In addition, cloud server 600 can also include power supply module 626 and communication component 650, which can To be configured as executing the power management of cloud server 600, which can be configured as realization cloud server 600 communication, for example, wired or wireless communication.In addition, the cloud server 600 can also include that input/output (I/O) connects Mouth 658.Cloud server 600 can be operated based on the operating system for being stored in memory 632, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM etc..
In a further exemplary embodiment, a kind of computer readable storage medium including program instruction is additionally provided, it should The step of above-mentioned monitoring and managing method is realized when program instruction is executed by processor.For example, the computer readable storage medium can be with For the above-mentioned memory 632 including program instruction, above procedure instruction can be executed by the processor 622 of cloud server 600 with Complete above-mentioned monitoring and managing method.
The preferred embodiment of the disclosure is described in detail in conjunction with attached drawing above, still, the disclosure is not limited to above-mentioned reality The detail in mode is applied, in the range of the technology design of the disclosure, a variety of letters can be carried out to the technical solution of the disclosure Monotropic type, these simple variants belong to the protection scope of the disclosure.
It is further to note that specific technical features described in the above specific embodiments, in not lance In the case where shield, it can be combined in any appropriate way.In order to avoid unnecessary repetition, the disclosure to it is various can No further explanation will be given for the combination of energy.
In addition, any combination can also be carried out between a variety of different embodiments of the disclosure, as long as it is without prejudice to originally Disclosed thought equally should be considered as disclosure disclosure of that.

Claims (13)

1. a kind of monitoring and managing method, which is characterized in that be applied to cloud server, which comprises
The suspicious monitoring information that monitoring client is sent is received, the suspicious monitoring information is that the monitoring client is based on single feature identification mould Type identifies the obtained monitoring information with anomalous event from collected monitoring information, and the list feature identification model is benefit The single features in monitoring information are used to obtain as training sample training;
The suspicious monitoring information is inputted into multiple features fusion model, obtains the recognition result of anomalous event, the multiple features melt Molding type is using the anomalous event label of multiple features and the monitoring information in monitoring information as training sample to instruction It gets.
2. the method according to claim 1, wherein the method also includes:
If the recognition result shows the monitoring client, there are anomalous events, and the suspicious monitoring information is sent to purpose End, to indicate that the destination shows the suspicious monitoring information.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
Receive the manual identified result to the suspicious monitoring information that the destination is sent;
Training sample pair is generated according to the suspicious monitoring information and the manual identified result;
Using the training sample to the update multiple features fusion model.
4. according to the method described in claim 2, it is characterized in that, the method also includes:
The manual identified result is sent to the monitoring client, the manual identified result is for described in monitoring client update Single feature identification model.
5. method according to any one of claims 1 to 4, which is characterized in that the monitoring information include image information, One or more of voice messaging, text information, location information and movement state information.
6. a kind of maintenance device, which is characterized in that be applied to cloud server, described device includes:
First receiving module is configured as receiving the suspicious monitoring information that monitoring client is sent, and the suspicious monitoring information is described Monitoring client identifies the obtained monitoring information with anomalous event based on single feature identification model from collected monitoring information, The list feature identification model is obtained using the single features in monitoring information as training sample training;
Identification module is configured as the suspicious monitoring information input multiple features fusion model obtaining the identification of anomalous event As a result, the multiple features fusion model is the anomalous event label using multiple features and the monitoring information in monitoring information Training is obtained as training sample.
7. device according to claim 6, which is characterized in that described device further include:
First sending module, be configured as the recognition result show the monitoring client there are when anomalous event, will described in can Doubtful monitoring information is sent to destination, to indicate that the destination shows the suspicious monitoring information.
8. device according to claim 7, which is characterized in that described device further include:
Second receiving module is configured as receiving the manual identified knot to the suspicious monitoring information that the destination is sent Fruit;
Generation module is configured as generating training sample pair according to the suspicious monitoring information and the manual identified result;
Update module is configured as using the training sample to the update multiple features fusion model.
9. device according to claim 7, which is characterized in that described device further include:
Second sending module is configured as the manual identified result being sent to the monitoring client, the manual identified result Single feature identification model is updated for the monitoring client.
10. the device according to any one of claim 6~9, which is characterized in that the monitoring information includes image letter One or more of breath, voice messaging, text information, location information and movement state information.
11. computer readable storage medium is stored thereon with computer program, which is characterized in that the program is executed by processor The step of any one of Shi Shixian Claims 1 to 5 the method.
12. a kind of cloud server characterized by comprising
Memory is stored thereon with computer program;
Processor, for executing the computer program in the memory, to realize any one of Claims 1 to 5 institute The step of stating method.
13. a kind of supervisory systems, which is characterized in that including cloud server described in monitoring client and claim 12.
CN201810982884.3A 2018-08-27 2018-08-27 Monitoring and managing method, device, system, cloud server and storage medium Pending CN109327328A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810982884.3A CN109327328A (en) 2018-08-27 2018-08-27 Monitoring and managing method, device, system, cloud server and storage medium
PCT/CN2019/083942 WO2020042637A1 (en) 2018-08-27 2019-04-23 Supervision method, apparatus and system, cloud server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810982884.3A CN109327328A (en) 2018-08-27 2018-08-27 Monitoring and managing method, device, system, cloud server and storage medium

Publications (1)

Publication Number Publication Date
CN109327328A true CN109327328A (en) 2019-02-12

Family

ID=65264455

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810982884.3A Pending CN109327328A (en) 2018-08-27 2018-08-27 Monitoring and managing method, device, system, cloud server and storage medium

Country Status (2)

Country Link
CN (1) CN109327328A (en)
WO (1) WO2020042637A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110222846A (en) * 2019-05-13 2019-09-10 中国科学院计算技术研究所 A kind of the information safety protection method and information security system of Internet terminal
WO2020042637A1 (en) * 2018-08-27 2020-03-05 深圳前海达闼云端智能科技有限公司 Supervision method, apparatus and system, cloud server and storage medium
CN110866543A (en) * 2019-10-18 2020-03-06 支付宝(杭州)信息技术有限公司 Picture detection and picture classification model training method and device
CN111786858A (en) * 2020-07-06 2020-10-16 三星(中国)半导体有限公司 Method for diagnosing abnormal data, user terminal equipment and cloud server
CN111858973A (en) * 2020-07-30 2020-10-30 北京达佳互联信息技术有限公司 Multimedia event information detection method, device, server and storage medium
CN113112724A (en) * 2021-03-19 2021-07-13 深圳市海吉星智慧城市科技有限公司 Oil tank truck anti-theft method based on machine learning
CN113103946A (en) * 2021-03-19 2021-07-13 深圳恩联科技有限公司 Oil tank truck anti-theft system based on machine learning

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102169544A (en) * 2011-04-18 2011-08-31 苏州市慧视通讯科技有限公司 Face-shielding detecting method based on multi-feature fusion
CN102592146A (en) * 2011-12-28 2012-07-18 浙江大学 Face detection and camera tripod control method applied to video monitoring
CN103020990A (en) * 2012-12-06 2013-04-03 华中科技大学 Moving object detecting method based on graphics processing unit (GPU)
CN104159071A (en) * 2014-07-11 2014-11-19 深圳瞭望通达科技有限公司 Intelligent target identification device, system and method based on cloud service
US20150164377A1 (en) * 2013-03-13 2015-06-18 Vaidhi Nathan System and method of body motion analytics recognition and alerting
CN204759452U (en) * 2015-07-09 2015-11-11 华南理工大学 Traffic conflagration detecting system based on many characteristics of video smog fuse
CN105205728A (en) * 2015-08-26 2015-12-30 国家电网公司 Audio and video integration detection method orienting electric power machine room monitoring

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9466009B2 (en) * 2013-12-09 2016-10-11 Nant Holdings Ip. Llc Feature density object classification, systems and methods
CN106407984B (en) * 2015-07-31 2020-09-11 腾讯科技(深圳)有限公司 Target object identification method and device
CN108259830B (en) * 2018-01-25 2019-08-23 深圳冠思大数据服务有限公司 Mouse based on Cloud Server suffers from intelligent monitor system and method
CN109327328A (en) * 2018-08-27 2019-02-12 深圳前海达闼云端智能科技有限公司 Monitoring and managing method, device, system, cloud server and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102169544A (en) * 2011-04-18 2011-08-31 苏州市慧视通讯科技有限公司 Face-shielding detecting method based on multi-feature fusion
CN102592146A (en) * 2011-12-28 2012-07-18 浙江大学 Face detection and camera tripod control method applied to video monitoring
CN103020990A (en) * 2012-12-06 2013-04-03 华中科技大学 Moving object detecting method based on graphics processing unit (GPU)
US20150164377A1 (en) * 2013-03-13 2015-06-18 Vaidhi Nathan System and method of body motion analytics recognition and alerting
CN104159071A (en) * 2014-07-11 2014-11-19 深圳瞭望通达科技有限公司 Intelligent target identification device, system and method based on cloud service
CN204759452U (en) * 2015-07-09 2015-11-11 华南理工大学 Traffic conflagration detecting system based on many characteristics of video smog fuse
CN105205728A (en) * 2015-08-26 2015-12-30 国家电网公司 Audio and video integration detection method orienting electric power machine room monitoring

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020042637A1 (en) * 2018-08-27 2020-03-05 深圳前海达闼云端智能科技有限公司 Supervision method, apparatus and system, cloud server and storage medium
CN110222846A (en) * 2019-05-13 2019-09-10 中国科学院计算技术研究所 A kind of the information safety protection method and information security system of Internet terminal
CN110222846B (en) * 2019-05-13 2021-07-20 中国科学院计算技术研究所 Information security method and information security system for internet terminal
CN110866543A (en) * 2019-10-18 2020-03-06 支付宝(杭州)信息技术有限公司 Picture detection and picture classification model training method and device
CN110866543B (en) * 2019-10-18 2022-07-15 支付宝(杭州)信息技术有限公司 Picture detection and picture classification model training method and device
CN111786858A (en) * 2020-07-06 2020-10-16 三星(中国)半导体有限公司 Method for diagnosing abnormal data, user terminal equipment and cloud server
CN111786858B (en) * 2020-07-06 2022-04-15 三星(中国)半导体有限公司 Method for diagnosing abnormal data, user terminal equipment and cloud server
CN111858973A (en) * 2020-07-30 2020-10-30 北京达佳互联信息技术有限公司 Multimedia event information detection method, device, server and storage medium
CN113112724A (en) * 2021-03-19 2021-07-13 深圳市海吉星智慧城市科技有限公司 Oil tank truck anti-theft method based on machine learning
CN113103946A (en) * 2021-03-19 2021-07-13 深圳恩联科技有限公司 Oil tank truck anti-theft system based on machine learning
CN113103946B (en) * 2021-03-19 2023-08-01 深圳恩联科技有限公司 Tank truck anti-theft system based on machine learning

Also Published As

Publication number Publication date
WO2020042637A1 (en) 2020-03-05

Similar Documents

Publication Publication Date Title
CN109327328A (en) Monitoring and managing method, device, system, cloud server and storage medium
US11328163B2 (en) Methods and apparatus for automated surveillance systems
US10812761B2 (en) Complex hardware-based system for video surveillance tracking
US8368754B2 (en) Video pattern recognition for automating emergency service incident awareness and response
EP3750100B1 (en) Device, system and method for generating an alert and an automatic search for a candidate subject
CN210691345U (en) Cloud intelligence safety inspection auxiliary system based on degree of depth learning
KR102384299B1 (en) Cctv camera device having assault detection function and method for detecting assault based on cctv image performed
CN109309808A (en) A kind of monitoring system and method based on recognition of face
CN107888887A (en) A kind of video monitoring method for early warning and system for monitoring gas pipeline damage from third-party
US9622048B2 (en) SNS based incident management
US20210360406A1 (en) Internet-of-things device classifier
CN111294561A (en) Video-based online patrol method, electronic device, storage medium and system
KR20170084657A (en) System and method for generating narrative report based on video recognition and event trancking
CN109978215B (en) Patrol management method and device
KR20180118979A (en) Method and apparatus for risk detection, prediction, and its correspondence for public safety based on multiple complex information
CN106097220A (en) A kind of prediction scheme sends method and device
CN113269039A (en) On-duty personnel behavior identification method and system
KR101548729B1 (en) Method for porviding safe return service
KR102344435B1 (en) Safety control service system unsing artifical intelligence
KR102228933B1 (en) Method for providing online to offline based crime prevention service offering private bodyguard for single family
US20210350116A1 (en) System and method for identifying persons-of-interest
CN105978999A (en) Alarm method and device
KR20200059643A (en) ATM security system based on image analyses and the method thereof
CN112699328A (en) Network point service data processing method, device, system, equipment and storage medium
US20210200826A1 (en) Appearance search for incident response

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190212