CN110706392A - Security platform test method and device, storage medium and server - Google Patents

Security platform test method and device, storage medium and server Download PDF

Info

Publication number
CN110706392A
CN110706392A CN201910971624.0A CN201910971624A CN110706392A CN 110706392 A CN110706392 A CN 110706392A CN 201910971624 A CN201910971624 A CN 201910971624A CN 110706392 A CN110706392 A CN 110706392A
Authority
CN
China
Prior art keywords
image
security platform
server
information
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910971624.0A
Other languages
Chinese (zh)
Other versions
CN110706392B (en
Inventor
沈邢琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Unisinsight Technology Co Ltd
Original Assignee
Chongqing Unisinsight Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Unisinsight Technology Co Ltd filed Critical Chongqing Unisinsight Technology Co Ltd
Priority to CN201910971624.0A priority Critical patent/CN110706392B/en
Publication of CN110706392A publication Critical patent/CN110706392A/en
Application granted granted Critical
Publication of CN110706392B publication Critical patent/CN110706392B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification

Abstract

The application provides a security platform test method, a security platform test device, a storage medium and a server. The method comprises the steps that a server acquires a pre-stored face image, and the face image capture in real face access control equipment is simulated; generating first information according to the face image and a face library through a server, and simulating face comparison in real face access control equipment; the face image and the first information are sent to the security platform through the server, interaction between real face access control equipment and the security platform is simulated, indexes needing to be monitored of the security platform are sent to the security platform through the server, the security platform generates a test result according to the face image and the receiving result of the first information, and compared with the method for testing the performance of the security platform by relying on the real face access control equipment, the method and the device do not need to purchase the real equipment, so that the test cost is lower, the real equipment does not need to be deployed in a complex environment, and the test flow is simpler.

Description

Security platform test method and device, storage medium and server
Technical Field
The application relates to the field of security platforms, in particular to a security platform testing method and device, a storage medium and a server.
Background
With the rapid development of intelligent security, face recognition access control becomes an indispensable part in security schemes, face recognition access control devices are required to be used in intelligent security projects such as buildings, hospitals and gardens, and the devices are generally managed in a unified manner through a security platform or an access control management system. When the access control equipment is very large in scale, certain performance test and load test are required to be carried out on the security platform or the access control management system, so that the background systems are ensured to meet the performance requirements in the aspects of access, management, control and the like of the access control equipment. If a real access control device is purchased to build a test environment, more capital cost is required to be invested, and a large amount of manpower and time cost are required to be spent on building and maintaining, so that how to quickly and effectively build a large amount of human face access control device test environments to test the performance load of a security platform and a management system in less cost investment is a problem to be solved at present.
Disclosure of Invention
The application aims to provide a security platform testing method, a security platform testing device, a security platform testing storage medium and a security platform testing server so as to solve the problems.
In order to achieve the above purpose, the embodiments of the present application employ the following technical solutions:
in a first aspect, an embodiment of the present application provides a security platform testing method, where the method is applied to a testing system, where the testing system includes a server and a security platform, and the method includes:
the server acquires a pre-stored face image; the face image carries identity information; the identity information is used for simulating the serial number of the face snapshot equipment;
the server generates first information according to the face image and a face library, wherein the first information represents whether the face library has an image similar to the face image or not;
the server sends the face image and the first information to the security platform;
and the security platform generates a test result according to the human face image and the receiving result of the first information.
In a second aspect, an embodiment of the present application provides a security platform testing method, where the method is applied to a server, and the server is in communication connection with a security platform, and the method includes:
acquiring a pre-stored face image; the face image carries identity information; the identity information is used for simulating the serial number of the face snapshot equipment;
generating first information according to the face image and a face library, wherein the first information represents whether an image similar to the face image exists in the face library or not;
sending the face image and the first information to a security platform; and enabling the security platform to generate a test result according to the human face image and the receiving result of the first information.
In a third aspect, an embodiment of the present application provides a security platform testing apparatus, where the method is applied to a server, the server is in communication connection with a security platform, and the apparatus includes:
the face image reading module is used for acquiring a pre-stored face image; the face image carries identity information; the identity information is used for simulating the serial number of the face snapshot equipment;
the face algorithm module is used for generating first information according to the face image and a face library, and the first information represents whether an image similar to the face image exists in the face library or not;
the network transceiving module is used for sending the face image and the first information to a security platform; and enabling the security platform to generate a test result according to the human face image and the receiving result of the first information.
In a fourth aspect, embodiments of the present application provide a storage medium having a computer program stored thereon, where the computer program is executed by a processor to implement the method as described above.
In a fifth aspect, an embodiment of the present application provides a server, where the server includes: a processor and memory for storing one or more programs; when executed by the processor, the one or more programs implement the methods as described above.
Compared with the prior art, the security platform testing method, the security platform testing device, the security platform testing storage medium and the security platform testing server provided by the embodiment of the application have the beneficial effects that: acquiring a pre-stored face image through a server, and simulating face image capture in real face access control equipment; generating first information according to the face image and a face library through a server, and simulating face comparison in real face access control equipment; the face image and the first information are sent to the security platform through the server, interaction between real face access control equipment and the security platform is simulated, indexes needing to be monitored of the security platform are sent to the security platform through the server, the security platform generates a test result according to the face image and the receiving result of the first information, and compared with the method for testing the performance of the security platform by relying on the real face access control equipment, the method and the device do not need to purchase the real equipment, so that the test cost is lower, the real equipment does not need to be deployed in a complex environment, and the test flow is simpler.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and it will be apparent to those skilled in the art that other related drawings can be obtained from the drawings without inventive effort.
FIG. 1 is a schematic diagram of an interaction of a test system according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a server according to an embodiment of the present application;
FIG. 3 is a schematic structural diagram of a security platform provided in an embodiment of the present application;
fig. 4 is a schematic flowchart of a security platform testing method provided in the embodiment of the present application;
fig. 5 is a schematic diagram illustrating the substeps of S106 according to an embodiment of the present application;
fig. 6 is a schematic flow chart of another security platform testing method provided in the embodiment of the present application;
fig. 7 is a schematic flowchart of another security platform testing method provided in the embodiment of the present application;
fig. 8 is a schematic diagram of an application container engine and a virtual IP according to an embodiment of the present application;
fig. 9 is a schematic diagram illustrating another substep of S106 according to an embodiment of the present disclosure;
fig. 10 is a schematic flowchart of another security platform testing method provided in the embodiment of the present application;
fig. 11 is a schematic diagram of a security platform testing device module provided in an embodiment of the present application.
In the figure: a server-1; a security platform-2; a first processor-10; a first memory-11; a first bus-12; a first communication interface-13; a second processor-20; a second memory-21; a second bus-22; a second communication interface-23; a face image reading module-301; a face algorithm module-302; a network transceiving module-303.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
In the description of the present application, it should be noted that the terms "upper", "lower", "inner", "outer", and the like indicate orientations or positional relationships based on orientations or positional relationships shown in the drawings or orientations or positional relationships conventionally found in use of products of the application, and are used only for convenience in describing the present application and for simplification of description, but do not indicate or imply that the referred devices or elements must have a specific orientation, be constructed in a specific orientation, and be operated, and thus should not be construed as limiting the present application.
In the description of the present application, it is also to be noted that, unless otherwise explicitly specified or limited, the terms "disposed" and "connected" are to be interpreted broadly, e.g., as being either fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
With the rapid development of intelligent security, face recognition access control becomes an indispensable part in security schemes, face recognition access control devices are required to be used in intelligent security projects such as buildings, hospitals and gardens, and the devices are generally managed in a unified manner through a security platform or an access control management system. When the access control equipment is very large in scale, certain performance test and load test are required to be carried out on the security platform or the access control management system, so that the background systems are ensured to meet the performance requirements in the aspects of access, management, control and the like of the access control equipment. If a real access control device is purchased to build a test environment, more capital cost is required to be invested, and a large amount of manpower and time cost are required to be spent on building and maintaining, so that how to quickly and effectively build a large amount of human face access control device test environments to test the performance load of a security platform and a management system in less cost investment is a problem to be solved at present.
In order to solve the above problem, an embodiment of the present application provides a test system, as shown in fig. 1, the test system includes a server 1 and a security platform 2. The server 1 and the security platform 2 are communicated through a wired or wireless network. A plurality of face simulation access control devices are configured in the server 1, and the face simulation access control devices are used for simulating real face access control devices.
Referring to fig. 2 and 3, fig. 2 shows a partial structure of the server 1, and fig. 3 shows a partial structure of the security platform 2.
The server 1 comprises a first processor 10, a first memory 11, a first bus 12 and a first communication interface 13. The first processor 10, the first memory 11 and the first communication interface 13 are connected by a first bus 12, the first processor 10 being configured to execute an executable module, such as a computer program, stored in the first memory 11.
The security platform 2 includes a second processor 20, a second memory 21, a second bus 22, and a second communication interface 23. The second processor 20, the second memory 21 and the second communication interface 23 are connected by a second bus 22, the second processor 20 being adapted to execute executable modules, such as computer programs, stored in the second memory 21.
The first processor 10 may be an integrated circuit chip having signal processing capabilities. In the implementation process, the steps of the security platform testing method executed by the server 1 may be completed by an integrated logic circuit of hardware in the first processor 10 or instructions in the form of software.
The second processor 20 may be an integrated circuit chip having signal processing capabilities. In the implementation process, the steps of the security platform testing method executed by the security platform 2 may be completed by an integrated logic circuit of hardware in the second processor 20 or an instruction in the form of software.
The first Processor 10 and the second Processor 20 may be general-purpose processors, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; the Integrated Circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component.
The first Memory 11 and the second Memory 21 may comprise a high-speed Random Access Memory (RAM) and may further comprise a non-volatile Memory (non-volatile Memory), such as at least one disk Memory.
The first bus 12 and the second bus 22 may be an ISA (Industry Standard architecture) bus, a PCI (peripheral Component interconnect) bus, or an EISA (extended Industry Standard architecture) bus, etc. Only one double-headed arrow is shown in fig. 2 and 3, but this does not indicate only one bus or one type of bus.
The first memory 11 and the second memory 21 are used to store programs, for example, the first memory 11 is used to store a program corresponding to a security platform testing device executed by the server 1, and the second memory 21 is used to store a program corresponding to a security platform testing device executed by the security platform 2. The security platform testing device comprises at least one software function module which can be stored in the first memory 11 and the second memory 21 in the form of software or firmware (firmware) or solidified in an Operating System (OS) of the server 1 and the security platform 2. After receiving the execution instruction, the first processor 10 and the second processor 20 execute the program to implement the security platform testing method.
The server 1 and the security platform 2 can communicate through the first communication interface 13 and the second communication interface 23. For example, the first processor 10 may send the face image to the second communication interface 23 through the first communication interface 13, so as to transmit the face image to the second processor 20, so as to realize the interaction between the server 1 and the security platform 2.
It should be understood that the structures shown in fig. 2 and 3 are only schematic structural diagrams of the server 1 and the security platform 2, and the server 1 may include more or less components than those shown in fig. 2, or have a different configuration than that shown in fig. 2. The security platform 2 may also include more or fewer components than shown in fig. 3, or have a different configuration than shown in fig. 3. The components shown in fig. 2 and 3 may be implemented in hardware, software, or a combination thereof.
The security platform testing method provided by the embodiment of the invention can be applied to the testing system shown in fig. 1, and the specific flow is shown in fig. 4:
s104, the server acquires a pre-stored face image; the face image carries identity information; the identity information is used for simulating the serial number of the face snapshot device.
Specifically, a face picture folder may be pre-divided in the first memory 11, and the face picture folder is used to pre-store a face image. The face image carries identity information for simulating the serial number of the face snapshot device. For example, the identity information is d2, that is, the face image is used to simulate an image captured by the face capture device with the number d 2. And S104 is used for simulating face image capture in real face access control equipment.
And S105, the server generates first information according to the face image and the face library, and the first information represents whether the face library has an image similar to the face image.
Specifically, the face library prestores standard images of a plurality of faces. Whether an image similar to the face image exists in the face library or not can be judged through traversal, and first information is generated according to the judgment result. And S105, the face comparison in the real face entrance guard equipment is simulated.
And S106, the server sends the face image and the first information to a security platform.
Specifically, the server 1 sends the face image and the first information to the second communication interface 23 through the first communication interface 13 to send to the security platform 2. And S106 is used for simulating interaction between the real face access control equipment and the security platform 2.
S201, the security platform generates a test result according to the face image and the receiving result of the first information.
Specifically, the test result includes that the security platform 2 receives the face image and the first information, the security platform 2 receives the face image or the first information, and the security platform 2 does not receive the face image and the first information. The staff at the 2 ends of the security platform can observe the test result. When one server 1 or a plurality of servers 1 respectively send the multipath human face images and the first information, the worker can know the performance of the security platform 2 by observing the test result of the security platform 2. For example, when N paths of face images and first information are input, the security platform 2 may completely receive the N paths of face images and the first information, and when the N paths of face images and the first information are input, part of the face images and the first information may be omitted from the security platform 2.
In summary, in the security platform testing method provided by the embodiment of the application, the server acquires the pre-stored face image, and the capturing of the face image in the real face access control device is simulated; generating first information according to the face image and a face library through a server, and simulating face comparison in real face access control equipment; the face image and the first information are sent to the security platform through the server, interaction between real face access control equipment and the security platform is simulated, indexes needing to be monitored of the security platform are sent to the security platform through the server, the security platform generates a test result according to the face image and the receiving result of the first information, and compared with the method for testing the performance of the security platform by relying on the real face access control equipment, the method and the device do not need to purchase the real equipment, so that the test cost is lower, the real equipment does not need to be deployed in a complex environment, and the test flow is simpler.
For the server in S104 to obtain the pre-stored face image, the embodiment of the present application further provides a possible implementation manner:
the server 1 sequentially obtains pre-stored face images according to a preset frequency so as to simulate a real face entrance guard device to continuously and uninterruptedly snapshot the face images.
Certainly, the server 1 may also obtain pre-stored face images in batch to simulate a real face access control device to capture a plurality of face images at the same time.
On the basis of fig. 4, as for the content in S106, a possible implementation manner is given in the embodiment of the present application, please refer to fig. 5, where S106 includes:
s106-1, the server encapsulates the face image and the first information into a first message according to a signaling model of interaction between the real face access control equipment and the security platform.
Specifically, a signaling model of interaction between the real face access control device and the security platform may be pre-stored in the signaling set folder in the first memory 11. In a possible implementation manner, the signaling set folder stores a plurality of different signaling models, and each signaling model corresponds to one type or face access control device produced by one manufacturer in comparison. Different signaling models can be selected according to the test requirements so as to simulate different manufacturers or different types of human face access control equipment. The first processor 10 encapsulates the face image and the first information into a first message according to the signaling model.
S106-2, the server sends the first message to a security platform.
Specifically, the server 1 may send the first message to the security platform 2 through the first communication interface 13 and the second communication interface 23.
In a possible implementation manner, the first packet further carries a timestamp and a number of the virtual door corresponding to the identity information. The first message carries a timestamp, so that the security platform 2 can know the capturing time (namely the timestamp) of the face image. The first message carries the serial number of the virtual door corresponding to the identity information, so that the corresponding relation between the face image and the virtual door is facilitated, and the first message is used for simulating the serial number information of the real door contained in the interaction between the real face access control equipment and the security platform 2.
By taking 003 sets of real human face access control equipment as an example, when a human nail passes through the No. 003 door, the No. 003 human face snapshot equipment corresponding to the No. 003 door acquires the human face image of the human nail. After the face image of the person A is obtained, 003 sets of real face access control equipment are used for comparing the face image of the person A. The 003 sets of real face access control equipment send the face image of the person A, the comparison result, the timestamp and the serial number of the No. 003 door to the security platform 2. Wherein the comparison result is compared with the first information. And when images similar to the human face image of the human nail exist in the human face library of the 003 sets of real human face entrance guard equipment, controlling the No. 003 door to be opened. The security platform 2 knows that the person a passes through the door No. 003 at a certain point of time (in accordance with the time stamp information), and whether the door No. 003 is open.
On the basis of fig. 4, regarding the setting of the face library, a possible scenario is further provided in the embodiment of the present application, please refer to fig. 6, where the security platform testing method further includes:
s103: and the server receives the face library sent by the security platform.
Specifically, the server 1 may send a face library downloading request to the security platform 2, after the security platform 2 receives the face library downloading request, the security platform 2 sends a corresponding face library to the server 1, and the server 1 receives the face library sent by the security platform 2.
In a possible implementation manner, when the security platform 2 does not support the download request, the corresponding face library in the security platform 2 may be imported into the server 1 by a worker.
On the basis of fig. 4, regarding how to configure a simulated face access control device, a possible manner is further provided in the embodiment of the present application, please refer to fig. 7, where the security platform testing method further includes:
and S101, configuring at least one simulated face access control device by the server according to the functions of the face access control device.
Specifically, at least one simulated face access control device is configured according to a configuration file input by a worker. The configuration file is used for realizing the function of real face access control equipment. Possibly, the simulated face access control device comprises a face image reading module, a face algorithm module and a network transceiving module. The face image reading module is configured to execute the above S104, the face algorithm module is configured to execute the above S105, and the network transceiver module is configured to execute the above S106.
S102, the server generates an application container engine according to the simulated human face access control device, the application container engine is provided with at least one virtual IP, and one virtual IP at least corresponds to one type of identity information.
Specifically, the application container engine may be docker. Referring to fig. 8, the application container engine has N virtual IPs, where N is an integer greater than or equal to 1. There may be many kinds of identity information of the face images pre-stored in the face image folder. Each kind of identity information corresponds to the serial number of one face grabbing device, namely each kind of identity information corresponds to one set of face access control device respectively. By setting corresponding virtual IP for each kind of identity information, when sending information to the security platform 2 through different virtual IPs, the security platform 2 of a plurality of different sets of human face entrance guard equipment boxes is simulated to send information, and the method is suitable for testing the performance index of the security platform 2.
Regarding the correspondence between the virtual IP and the identity information, in this embodiment, the correspondence may be: one kind of identity information corresponds to one virtual IP, or one kind of identity information corresponds to a plurality of virtual IPs, or a plurality of kinds of identity information corresponds to one virtual IP.
On the basis of fig. 7, for the content in S106, the embodiment of the present application further provides a possible implementation manner, please refer to fig. 9, where S106 further includes:
and S106-3, the server determines a virtual IP according to the identity information of the face image.
And S106-4, the server sends the face image and the first information to a security platform through the virtual IP.
Specifically, the virtual IP corresponds to the identity information of the face image, and the identity information corresponds to the number of the real face access control device. When the security platform 2 receives the face image and the first information sent through the virtual IP, the security platform is imitated to receive the face image and the first information sent by the corresponding real face access control equipment.
In one possible implementation, the server 1 sends the face image and the first information to the security platform 2 through a designated port (e.g., the first communication interface 13). When the security platform 2 receives the information sent by the non-specified port, the security platform 2 rejects and does not reply to the processing.
Of course, the security platform 2 may also send the instruction information to the server 1 through a designated port (e.g., the second communication interface 23). When the server 1 receives the information sent by the non-designated port, the server 1 rejects and does not reply to the processing. Meanwhile, staff at the end of the security platform 2 can observe whether the server 1 executes the instruction information or not so as to judge whether the instruction sending performance of the security platform 2 is normal or not.
Regarding to among the real people's face entrance guard equipment, after the face contrast is successful, need open corresponding door, this application embodiment still provides a possible scene:
and when the images similar to the human face images exist in the human face library, marking the virtual door corresponding to the identity information as an open state.
In a possible implementation manner, the current states of all the virtual doors can be displayed through a webpage, so that a user can observe whether the information received by the security platform 2 is consistent with the result actually executed by the server 1.
The embodiment of the present application provides a possible security platform testing method, which is applied to the server 1 shown in fig. 1 and 2, and please refer to fig. 10, the security platform testing method includes:
s104, acquiring a pre-stored face image; the face image carries identity information; the identity information is used for simulating the serial number of the face snapshot device.
And S105, generating first information according to the face image and the face library, wherein the first information represents whether the face library has an image similar to the face image.
And S106, sending the face image and the first information to a security platform, so that the security platform generates a test result according to the receiving result of the face image and the first information.
Possibly, S106 includes:
s106-1, the face image and the first information are packaged into a first message according to a signaling model of interaction between the real face access control equipment and the security platform.
S106-2, sending the first message to a security platform.
On the basis of fig. 10, regarding the setting of the face library, the embodiment of the present application further provides a possible scenario, and the security platform testing method further includes:
s103: and receiving the face library sent by the security platform.
On the basis of fig. 10, regarding how to configure a simulated face access control device, a possible manner is further provided in the embodiment of the present application, and the security platform testing method further includes:
s101, configuring at least one simulated face access control device according to the functions of the face access control device.
S102, generating an application container engine according to the simulated human face access control equipment, wherein the application container engine is provided with at least one virtual IP, and one virtual IP at least corresponds to one type of identity information.
On this basis, S106 may further include:
and S106-3, determining the virtual IP according to the identity information of the face image.
And S106-4, sending the face image and the first information to a security platform through a virtual IP.
Security platform 2 in the embodiment of the present application can also be an access control management system.
Referring to fig. 11, fig. 11 is a view of a security platform testing device according to an embodiment of the present application, and optionally, the security platform testing device is applied to the server 1 described above.
Security protection platform testing arrangement includes: a face image reading module 301, a face algorithm module 302 and a network transceiving module 303.
The face image reading module 301 is configured to obtain a pre-stored face image; the face image carries identity information; the identity information is used for simulating the serial number of the face snapshot device. Specifically, the face image reading module 301 may execute S104 described above.
The face algorithm module 302 is configured to generate first information according to the face image and the face library, where the first information indicates whether an image similar to the face image exists in the face library. Specifically, the face algorithm module 302 may execute the above S105.
The network transceiving module 303 is configured to send the face image and the first information to the security platform; so that the security platform generates a test result according to the human face image and the receiving result of the first information. Specifically, the network transceiver module 303 may perform S106 described above.
It should be noted that the security platform testing apparatus provided in this embodiment may execute the method flow executed by the server 1 in the above method flow embodiment, so as to achieve the corresponding technical effect. For the sake of brevity, the corresponding contents in the above embodiments may be referred to where not mentioned in this embodiment.
In a possible implementation manner, the security platform testing device further comprises a database module, and the database module is used for storing the corresponding relation between the identity information and the number of the virtual door, the corresponding relation between the identity information and the virtual IP, and the current opening and closing state of each virtual door.
The embodiment of the invention also provides a storage medium, wherein the storage medium stores computer instructions and programs, and the computer instructions and the programs execute the security platform testing method of the embodiment when being read and run. The storage medium may include memory, flash memory, registers, or a combination thereof, etc.
Next, a server 1 is provided, and referring to fig. 2, fig. 2 shows a partial structure of the server 1. The server 1 can realize the security platform test method; specifically, the server 1 includes: a first processor 10, a first memory 11, a first bus 12 and a first communication interface 13. The first processor 10 may be a CPU. The first memory 11 is used for storing one or more programs, and when the one or more programs are executed by the first processor 10, the security platform testing method of the above embodiment is executed.
In addition to the components that the server 1 may have in the figure, the server 1 may also comprise: batteries, various sensors, touch screens, radio frequency circuits, and the like. Alternatively, the server 1 may be a Linux service or a Windows server.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (10)

1. A security platform test method is applied to a test system, the test system comprises a server and a security platform, and the method comprises the following steps:
the server acquires a pre-stored face image; the face image carries identity information; the identity information is used for simulating the serial number of the face snapshot equipment;
the server generates first information according to the face image and a face library, wherein the first information represents whether the face library has an image similar to the face image or not;
the server sends the face image and the first information to the security platform;
and the security platform generates a test result according to the human face image and the receiving result of the first information.
2. The security platform testing method of claim 1, wherein the step of the server sending the facial image and the first information to the security platform comprises:
the server encapsulates the face image and the first information into a first message according to a signaling model of interaction between real face access control equipment and the security platform;
and the server sends the first message to the security platform.
3. The security platform testing method of claim 2, wherein the first message further carries a timestamp and a number of the virtual door corresponding to the identity information.
4. The security platform testing method of claim 1, wherein before the server obtains the pre-stored facial image, the method further comprises:
and the server receives the face library sent by the security platform.
5. The security platform testing method of claim 1, wherein prior to obtaining the pre-stored facial image, the method further comprises:
the server is configured with at least one simulated face access control device according to the functions of the face access control device;
and the server generates an application container engine according to the simulated human face access control equipment, wherein the application container engine is provided with at least one virtual IP, and one virtual IP at least corresponds to one type of identity information.
6. The security platform testing method of claim 5, wherein the step of the server sending the facial image and the first information to the security platform comprises:
the server determines the virtual IP according to the identity information of the face image;
and the server sends the face image and the first information to the security platform through the virtual IP.
7. A security platform testing method is characterized in that the method is applied to a server, the server is in communication connection with a security platform, and the method comprises the following steps:
acquiring a pre-stored face image; the face image carries identity information; the identity information is used for simulating the serial number of the face snapshot equipment;
generating first information according to the face image and a face library, wherein the first information represents whether an image similar to the face image exists in the face library or not;
sending the face image and the first information to a security platform; and enabling the security platform to generate a test result according to the human face image and the receiving result of the first information.
8. The utility model provides a security protection platform testing arrangement, its characterized in that, the device is applied to the server, the server is connected with security protection platform communication, the device includes:
the face image reading module is used for acquiring a pre-stored face image; the face image carries identity information; the identity information is used for simulating the serial number of the face snapshot equipment;
the face algorithm module is used for generating first information according to the face image and a face library, and the first information represents whether an image similar to the face image exists in the face library or not;
the network transceiving module is used for sending the face image and the first information to a security platform; and enabling the security platform to generate a test result according to the human face image and the receiving result of the first information.
9. A storage medium on which a computer program is stored which, when being executed by a processor, carries out the method as claimed in claim 7.
10. A server, comprising: a processor and memory for storing one or more programs; the one or more programs, when executed by the processor, implement the method of claim 7.
CN201910971624.0A 2019-10-14 2019-10-14 Security platform test method and device, storage medium and server Active CN110706392B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910971624.0A CN110706392B (en) 2019-10-14 2019-10-14 Security platform test method and device, storage medium and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910971624.0A CN110706392B (en) 2019-10-14 2019-10-14 Security platform test method and device, storage medium and server

Publications (2)

Publication Number Publication Date
CN110706392A true CN110706392A (en) 2020-01-17
CN110706392B CN110706392B (en) 2021-10-26

Family

ID=69198710

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910971624.0A Active CN110706392B (en) 2019-10-14 2019-10-14 Security platform test method and device, storage medium and server

Country Status (1)

Country Link
CN (1) CN110706392B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103401727A (en) * 2013-07-24 2013-11-20 佳都新太科技股份有限公司 Method, device and system for testing performance of streaming media server based on virtual DVR (digital video recorder)
CN103500475A (en) * 2013-09-02 2014-01-08 中安消技术有限公司 Office building access control system debugging method and system
US20150269375A1 (en) * 2010-04-30 2015-09-24 Bryan P. Chapman Multiface document
CN106780256A (en) * 2016-12-16 2017-05-31 北京华鼎新铭智能科技发展有限公司 A kind of comprehensive safeguard information management system
CN107730209A (en) * 2017-10-19 2018-02-23 方欣科技有限公司 One kind does tax real name based on docker cloud computing technologies and does tax method
CN108412334A (en) * 2018-03-01 2018-08-17 深圳科大兴星智能科技有限公司 Electronic foot is put handcuffs on and intelligent remote controls pressure system
CN108898717A (en) * 2018-06-29 2018-11-27 仁怀市云侠网络科技有限公司 A kind of intelligent safety defense monitoring system
CN109542630A (en) * 2019-01-29 2019-03-29 中国人民解放军火箭军工程大学 A kind of mobile communication net network function virtual platform based on container cloud
CN109828831A (en) * 2019-02-12 2019-05-31 成都考拉悠然科技有限公司 A kind of artificial intelligence cloud platform
CN110033542A (en) * 2019-04-12 2019-07-19 上海理工大学 A kind of access control system and method for face verification detection

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150269375A1 (en) * 2010-04-30 2015-09-24 Bryan P. Chapman Multiface document
CN103401727A (en) * 2013-07-24 2013-11-20 佳都新太科技股份有限公司 Method, device and system for testing performance of streaming media server based on virtual DVR (digital video recorder)
CN103500475A (en) * 2013-09-02 2014-01-08 中安消技术有限公司 Office building access control system debugging method and system
CN106780256A (en) * 2016-12-16 2017-05-31 北京华鼎新铭智能科技发展有限公司 A kind of comprehensive safeguard information management system
CN107730209A (en) * 2017-10-19 2018-02-23 方欣科技有限公司 One kind does tax real name based on docker cloud computing technologies and does tax method
CN108412334A (en) * 2018-03-01 2018-08-17 深圳科大兴星智能科技有限公司 Electronic foot is put handcuffs on and intelligent remote controls pressure system
CN108898717A (en) * 2018-06-29 2018-11-27 仁怀市云侠网络科技有限公司 A kind of intelligent safety defense monitoring system
CN109542630A (en) * 2019-01-29 2019-03-29 中国人民解放军火箭军工程大学 A kind of mobile communication net network function virtual platform based on container cloud
CN109828831A (en) * 2019-02-12 2019-05-31 成都考拉悠然科技有限公司 A kind of artificial intelligence cloud platform
CN110033542A (en) * 2019-04-12 2019-07-19 上海理工大学 A kind of access control system and method for face verification detection

Also Published As

Publication number Publication date
CN110706392B (en) 2021-10-26

Similar Documents

Publication Publication Date Title
US10255370B2 (en) Automated compliance checking through analysis of cloud infrastructure templates
US20110282642A1 (en) Network emulation in manual and automated testing tools
US20080168425A1 (en) Software testing techniques for stack-based environments
CN106776294B (en) Automatic android mobile phone testing method and system
CN107368410B (en) Performance test method and device of game engine, storage medium and electronic device
CN105389263A (en) Method, system and equipment for monitoring application software permissions
Mäkinen et al. ELIoT: Design of an emulated IoT platform
CN110706392B (en) Security platform test method and device, storage medium and server
CN110704847A (en) Vulnerability scanning method and related device
CN105706054B (en) The system and method verified and disposed for the application to programmable device
CN109254914A (en) Software development kit test method, system, computer installation and readable storage medium storing program for executing
CN112260879B (en) Method and device for determining running environment of equipment simulator and electronic equipment
CN105339974B (en) Analog sensor
JP2003022196A (en) Method for automatically executing test program in portable terminal
CN112235300A (en) Cloud virtual network vulnerability detection method, system and device and electronic equipment
CN110691011A (en) Monitoring platform test method and device, storage medium and server
CN108923974B (en) Internet of things asset fingerprint identification method and system
CN107145439B (en) Test request processing method and device
Shalaginov et al. Iot digital forensics readiness in the edge: A roadmap for acquiring digital evidences from intelligent smart applications
CN109495870A (en) The method and apparatus of bluetooth test
WO2014075471A1 (en) Integrated application generating system and method for internet of things terminal
CN108804399A (en) The method of calibration and device of list
CN112988608B (en) Data testing method and device, computer equipment and storage medium
CN111416755B (en) SONiC automatic test platform building method, device and system
US11102250B2 (en) Controlling behavior of an internet of things (IoT) automation system by identifying policy violations

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant