CN111798664A - Illegal data identification method and device and electronic equipment - Google Patents

Illegal data identification method and device and electronic equipment Download PDF

Info

Publication number
CN111798664A
CN111798664A CN202010935815.4A CN202010935815A CN111798664A CN 111798664 A CN111798664 A CN 111798664A CN 202010935815 A CN202010935815 A CN 202010935815A CN 111798664 A CN111798664 A CN 111798664A
Authority
CN
China
Prior art keywords
traffic data
http
identification
sip
traffic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010935815.4A
Other languages
Chinese (zh)
Other versions
CN111798664B (en
Inventor
王洵
王开学
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Zhongke Tongda High New Technology Co Ltd
Original Assignee
Wuhan Zhongke Tongda High New Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Zhongke Tongda High New Technology Co Ltd filed Critical Wuhan Zhongke Tongda High New Technology Co Ltd
Priority to CN202010935815.4A priority Critical patent/CN111798664B/en
Publication of CN111798664A publication Critical patent/CN111798664A/en
Application granted granted Critical
Publication of CN111798664B publication Critical patent/CN111798664B/en
Priority to PCT/CN2021/074135 priority patent/WO2022052412A1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/0104Measuring and analyzing of parameters relative to traffic conditions
    • G08G1/0125Traffic data processing
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/017Detecting movement of traffic to be counted or controlled identifying vehicles
    • G08G1/0175Detecting movement of traffic to be counted or controlled identifying vehicles by photographing vehicles, e.g. when violating traffic rules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Abstract

The application provides an illegal data identification method, a device and electronic equipment, based on the method, a data server firstly receives an http traffic data calling request sent by a traffic police terminal, converts the http traffic data calling request into an sip traffic data calling request, synchronously processing the http state identification and the sip state identification corresponding to the two types of calling requests, sending the sip traffic data calling request to the target camera, then, the response content is called according to the returned sip traffic data, the identification content of the sip state identification and the http state identification is synchronously updated, when the identification content meets the preset condition, generating a corresponding http traffic data call response and returning the http traffic data call response to the traffic police terminal, then receiving the traffic data returned by the front-end camera and sending the traffic data to the identification equipment for illegal data identification, and illegal data are returned to the traffic police terminal, and the whole calling process can be completed by the traffic police terminal only on a web browser or a platform.

Description

Illegal data identification method and device and electronic equipment
Technical Field
The application relates to the field of intelligent traffic, in particular to an illegal data identification method and device and electronic equipment.
Background
When illegal behaviors in traffic data are identified, a data calling request needs to be initiated for a front-end camera, when most security cameras on the market call the traffic data, in order to simplify the data calling request process, traffic data calling signaling of the front-end camera is usually packaged into signaling in an SDK (Software Development Kit) format, and then an SDK is called by a traffic police system and is developed and manufactured by an external manufacturer, and the traffic data shot by the front-end camera can be acquired by personnel in a non-traffic police system, namely, some potential safety hazards exist in the data calling mode.
Therefore, the existing illegal data identification method has the technical problem of low safety, and needs to be improved.
Disclosure of Invention
The embodiment of the application provides a method for identifying illegal data by scheduling an external neural network based on an http protocol, which is used for improving the safety of a front-end camera traffic data calling process.
In order to solve the above technical problem, an embodiment of the present application provides the following technical solutions:
the application provides a method for identifying illegal data, the method for identifying illegal data is used for a smart traffic system based on an http protocol, the smart traffic system comprises a front-end camera, a data server, an identification device and a traffic police terminal, a neural network model runs in the identification device, the front-end camera is connected based on an sip protocol, the traffic police terminal is accessed based on the http protocol, the data server and the identification device are accessed based on the http protocol, the identification device is accessed based on the http protocol, the method for identifying illegal data is applied to the data server, and the method for identifying illegal data comprises the following steps:
receiving an http traffic data calling request sent by the traffic police terminal based on an http protocol, wherein the http traffic data calling request carries an identification device identifier, a terminal identifier and a target camera identifier;
generating an sip traffic data calling request corresponding to the http traffic data calling request according to the target camera identification, and generating an http state identification corresponding to the http traffic data calling request, wherein the sip state identification corresponding to the sip traffic data calling request synchronizes the identification contents of the http state identification and the sip state identification in real time, and the identification contents comprise a traffic data calling request overtime state and a traffic data calling request completion state;
sending the sip traffic data calling request to a target camera corresponding to the target camera identification based on an sip protocol, receiving an sip traffic data calling response returned by the target camera based on the sip protocol, and synchronously updating the identification contents of the sip state identification and the http state identification according to the content of the sip traffic data calling response;
when the identification content of the http state identification meets a preset condition, generating an http traffic data calling response corresponding to the http state identification, and returning the http traffic data calling response to the traffic police terminal based on an http protocol according to the terminal identification;
receiving traffic data sent by the target camera, and sending the traffic data to the identification equipment according to the identification equipment;
and receiving illegal data which is identified from the traffic data by the identification equipment based on the neural network model, and returning the illegal data to the traffic police terminal.
Simultaneously, this application embodiment still provides a device for recognizing illegal data, device for recognizing illegal data is used for wisdom traffic system based on the http protocol, wisdom traffic system includes front end camera, data server, identification equipment and traffic police terminal, it has the neural network model to operate in the identification equipment, the front end camera is connected based on the sip protocol data server, the traffic police terminal is based on the http protocol access data server with identification equipment, identification equipment is based on the http protocol access data server, device for recognizing illegal data sets up in the data server, device for recognizing illegal data includes:
the first receiving module is used for receiving an http traffic data calling request sent by the traffic police terminal based on an http protocol, wherein the http traffic data calling request carries an identification device identifier, a terminal identifier and a target camera identifier;
the first synchronization module is used for generating an sip traffic data calling request corresponding to the http traffic data calling request according to the target camera identification, and generating an http state identification corresponding to the http traffic data calling request, wherein the sip state identification corresponding to the sip traffic data calling request synchronizes identification contents of the http state identification and the sip state identification in real time, and the identification contents comprise a traffic data calling request overtime state and a traffic data calling request completion state;
the second synchronization module is used for sending the sip traffic data calling request to the target camera corresponding to the target camera identification based on an sip protocol, receiving an sip traffic data calling response returned by the target camera based on the sip protocol, and synchronously updating the identification contents of the sip state identification and the http state identification according to the content of the sip traffic data calling response;
the generating module is used for generating an http traffic data calling response corresponding to the http state identifier when the identifier content of the http state identifier meets a preset condition, and returning the http traffic data calling response to the traffic police terminal based on an http protocol according to the terminal identifier;
the second receiving module is used for receiving the traffic data sent by the target camera and sending the traffic data to the identification equipment according to the identification equipment identifier;
and the return module is used for receiving the illegal data which is identified by the identification equipment from the traffic data based on the neural network model and returning the illegal data to the traffic police terminal.
The application also provides an electronic device comprising a memory and a processor; the memory stores an application program, and the processor is configured to execute the application program in the memory to perform any one of the operations of the illegal data identification method.
Has the advantages that: the method and the device send out an http traffic data calling request based on an http protocol, and convert the http traffic data calling request into an sip traffic data calling request which can be identified by a front-end camera, convert the sip traffic data calling response returned by the front-end camera into an http traffic data calling response and then return to a traffic police terminal, receive the traffic data returned by the front-end camera and send the traffic data to identification equipment for illegal data identification, and return illegal data to the traffic police terminal, the whole calling process traffic police terminal can be completed only on a web browser or a platform, and special SDK software does not need to be called, so that the safety is ensured, and the convenience for obtaining the traffic data is improved.
Drawings
The technical solution and other advantages of the present application will become apparent from the detailed description of the embodiments of the present application with reference to the accompanying drawings.
Fig. 1 is a schematic view of a scenario of an illegal data identification system according to an embodiment of the present application.
Fig. 2 is a schematic flowchart of an illegal data identification method according to an embodiment of the present application.
Fig. 3 is a schematic diagram of a first model of a process from sending a traffic data call request to receiving a traffic data call response in an embodiment of the present application.
Fig. 4 is a schematic diagram of a second model of a process from sending a traffic data call request to receiving a traffic data call response in the embodiment of the present application.
Fig. 5 is a schematic diagram of a third model of a process from sending a traffic data call request to receiving a traffic data call response in the embodiment of the present application.
Fig. 6 is a schematic view of a first page of a traffic police terminal in the illegal data identification method according to the embodiment of the present application.
Fig. 7 is a schematic diagram of a second page of a traffic police terminal in the illegal data identification method according to the embodiment of the present application.
Fig. 8 is a schematic structural diagram of an illegal data identification device according to an embodiment of the present application.
Fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the embodiment of the present application, the intelligent traffic system is an integrated network system that is constructed by comprehensively applying technologies such as audio/video monitoring, communication, computer network, system integration, etc. and has functions of information acquisition, transmission, exchange, control, display, storage, processing, etc. and can realize interconnection, intercommunication, and mutual control between different devices and systems in the traffic field for the purpose of maintaining national security and social stability and preventing and fighting against illegal criminal activities. The intelligent traffic system comprises a front-end camera, a data server, identification equipment and a traffic police terminal, wherein a neural network model runs in the identification equipment, the front-end camera is connected with the data server based on an sip protocol, the traffic police terminal is accessed into the data server and the identification equipment based on an http protocol, and the identification equipment is accessed into the data server based on the http protocol.
In the embodiment of the application, the front-end camera refers to a camera which is installed in a monitoring site in an intelligent traffic system and is used for information acquisition, encoding, processing, storage, transmission and safety control.
In the embodiment of the present application, the traffic police terminal refers to a client device registered and authorized by the intelligent transportation system and having an operation requirement on data and devices in the system, and may specifically include a client for traffic police and a client for developers.
In the embodiment of the application, the identification device is a device which operates with a neural network model and can identify illegal data by calling the neural network model, the device and the data server are mutually independent, and the identification device is only required to be independently updated when the system is updated, and the data server is not required to be comprehensively updated.
In the embodiment of the present application, the neural network model refers to an artificial neural network structure having a hierarchical structure, which includes an input layer, an output layer, and an intermediate layer (also called a hidden layer). In a neural network model, the number of nodes of an input layer and an output layer is often fixed, an intermediate layer can be freely designated, the topology and the arrows in a neural network structure diagram represent the flow direction of data in a prediction process, the key in the structure diagram is the connection among neurons, and each connecting line corresponds to a different weight (the value of which is called a weight), which is obtained by training. The neural network model is trained for multiple times based on the preprocessed training samples, and classification and identification of illegal data can be realized. After the traffic data are input into the trained neural network model, the traffic data enter the intermediate layer after feature extraction is carried out on the input layer, a series of complex operations such as convolution, pooling, regression processing and the like are carried out on the intermediate layer, various illegal behaviors can be identified, and corresponding illegal data are output by the output layer.
In the embodiment of the present application, the traffic data refers to data, such as vehicle information, pedestrian information, and operation parameters of vehicles and pedestrians, in a monitoring location, which are captured by a front-end camera, and is usually visual data such as video or image, where the vehicle information may include a brand, a model, a color, license plate number information, and the like of the vehicle, and the pedestrian information may include a gender, a height, clothing, a hairstyle, and the like of the pedestrian.
The embodiment of the application provides an http protocol-based illegal data identification method and device for an intelligent traffic system and electronic equipment. The illegal data identification device can be integrated in electronic equipment, and the electronic equipment can be a server or a terminal and other equipment.
Referring to fig. 1, fig. 1 is a schematic view of a scene of an illegal data identification system according to an embodiment of the present application, where the system may include terminals and servers, and the terminals, the servers, and the terminals and the servers are connected and communicated through the internet formed by various gateways, and the like, where the application scene includes a traffic police terminal 11, a data server 12, a front-end camera 13, and an identification device 14; wherein:
the traffic police terminal 11 and the recognition device 14 include, but are not limited to, a tablet Computer, a notebook Computer, a Personal Computer (PC), a mini processing box, or other devices;
the data server 12 comprises a local server and/or a remote server and the like;
the front-end camera 13 includes video and image capture equipment disposed at the monitoring site.
The traffic police terminal 11, the data server 12, the front-end camera 13 and the identification device 14 are located in a wireless network or a wired network, the front-end camera 13 is connected with the data server 12 based on an sip protocol, the traffic police terminal 11 is accessed into the data server 12 and the identification device 14 based on an http protocol, and the identification device 14 is accessed into the data server 12 based on the http protocol, so that data interaction among the four is realized, wherein:
the traffic police terminal 11 firstly obtains a communication address of the identification device 14 based on an http protocol, then generates an http traffic data call request, the request carries an identification device identifier, a terminal identifier and a target camera identifier, the data server 12 receives the http traffic data call request sent by the traffic police terminal 11 based on the http protocol, then generates a corresponding sip traffic data call request, synchronizes the identification contents of the http state identifier and the sip state identifier corresponding to the two in real time, selects the target camera from the front-end camera 13 based on the sip protocol and sends the sip traffic data call request to the target camera, receives a sip traffic data call response returned by the target camera based on the sip protocol, then synchronously updates the identification contents of the sip state identifier and the http state identifier according to the contents of the sip traffic data call response, and when the identification contents of the http state identifier meet the preset conditions, generating an http traffic data calling response corresponding to the http state identifier, returning the http traffic data calling response to the traffic police terminal 11 based on an http protocol, receiving traffic data sent by the target camera, sending the traffic data to the recognition device 14 according to the recognition device identifier, receiving illegal data recognized by the recognition device 14 from the traffic data based on the neural network model, and returning the illegal data to the traffic police terminal 11, so that the traffic police terminal 11 can recognize the illegal data.
It should be noted that the system scenario diagram shown in fig. 1 is only an example, and the server and the scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not form a limitation on the technical solution provided in the embodiment of the present application, and as a person having ordinary skill in the art knows, with the evolution of the system and the occurrence of a new service scenario, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems. The following are detailed below. It should be noted that the following description of the embodiments is not intended to limit the preferred order of the embodiments.
Referring to fig. 2, fig. 2 is a schematic flowchart of a method for identifying illegal data according to an embodiment of the present application, where the method includes:
s201: and receiving an http traffic data calling request sent by the traffic police terminal based on an http protocol, wherein the http traffic data calling request carries a terminal identifier, an identification equipment identifier and a target camera identifier.
The traffic police terminal sends an http traffic data calling request to the data server based on an http protocol, when the request is sent, a sender can be an internal person of a public security system and is used for obtaining traffic data of a monitored place to judge and process illegal behaviors, and the sender can also be a developer with access authority for video calling and is used for sending the traffic data calling request of the front-end camera and debugging calling parameters and related equipment according to traffic data calling response. The http traffic data calling request can be sent through a video monitoring platform which is developed independently, or can be sent directly through a web browser, and the corresponding traffic data calling response is received by a data server. The request under the http protocol is a one-way channel request from the traffic police terminal to the data server.
The http traffic data calling request carries a terminal identifier, an identification device identifier and a target camera identifier, wherein the terminal identifier comprises an IP address and a port of the traffic police terminal, the identification device identifier comprises an IP address and a port of the identification device, and the target camera identifier comprises an ID of the target camera.
S202: and generating an sip traffic data calling request corresponding to the http traffic data calling request according to the target camera identification, and generating an http state identification corresponding to the http traffic data calling request, an sip state identification corresponding to the sip traffic data calling request, synchronizing the identification contents of the http state identification and the sip state identification in real time, wherein the identification contents comprise a traffic data calling request overtime state and a traffic data calling request completion state.
After receiving the http traffic data calling request, determining a target camera from the front-end camera cluster information stored in the data server according to a target camera identification carried in the http traffic data calling request, acquiring an access address of the target camera, and generating a request head in the sip traffic data calling request according to the access address. And then, converting each calling command in the http traffic data calling request into a calling command under an sip protocol, generating the calling command into a message body in the sip traffic data calling request, and combining a request header and the message body to generate a corresponding sip traffic data calling request.
After the sip traffic data call request corresponding to the http traffic data call request is generated, corresponding http state identification and sip state identification are respectively generated for the http traffic data call request and the sip traffic data call request, wherein the identification contents of the two state identifications respectively comprise the starting time of the traffic data call request, the expiration time of the traffic data call request, the overtime state of the traffic data call request and the completion state of the traffic data call request. And synchronizing the identification contents of the http state identification and the sip state identification, namely, when the identification content of one of the http state identification and the sip state identification changes at any moment, the identification content of the other one of the http state identification and the sip state identification changes in the same way.
After the traffic data call request is sent out, a traffic data call response is usually returned within a short time, if the traffic data call request is not processed for some reasons, the traffic data call request not only occupies the memory of the data server and causes resource waste, but also the request sender can not respond late, and poor user experience is caused. Therefore, the identification content of the http state identification and the sip state identification comprises the starting time and the expiration time of the traffic data call requests, the starting time is used for marking the sending sequence of the traffic data call requests, the data server sequentially processes the traffic data call requests according to the starting time sequence of the traffic data call requests, the expiration time can be the time obtained by adding a preset time value to the starting time, when the traffic data invocation request does not reach the expiration time, if a traffic data invocation response is received, the traffic data call request complete status in the identification content may indicate that the traffic data call request is complete, if the traffic data invocation request has not yet had a traffic data invocation response after the expiration time has been reached, the traffic data invocation request timeout state in the identification content may indicate that the traffic data invocation request has timed out. By setting an expiration detection mechanism in the data server, the overtime state and the completion state of the traffic data call request can be notified to the request sender as soon as possible, so that the waste of processing resources can be avoided, and the user experience is improved.
S203: sending an sip traffic data calling request to a target camera corresponding to the target camera identification based on the sip protocol, receiving an sip traffic data calling response returned by the target camera based on the sip protocol, and synchronously updating the identification contents of the sip state identification and the http state identification according to the content of the sip traffic data calling response.
After the sip traffic data calling request is obtained, according to the identification of the target camera, a sip session is established between the data server and the target camera, the sip traffic data calling request is sent to the corresponding target camera, and the target camera processes the request after receiving the sip traffic data calling request.
After the target camera processes the sip traffic data calling request, sending a processing signaling to the data server through an sip session established between the target camera and the data server, generating an sip traffic data calling response according to the processing signaling, and then synchronously updating the identification contents of the sip state identification and the http state identification according to the content of the sip traffic data calling response. When the content of the sip traffic data calling response is that calling is completed, the identification content of the sip state identification and the identification content of the http state identification are both updated to be that the traffic data calling request is completed, and when the content of the sip traffic data calling response is that calling is overtime, the identification content of the sip state identification and the identification content of the http state identification are both updated to be that the traffic data calling request is overtime.
S204: and when the identification content of the http state identification meets a preset condition, generating an http traffic data calling response corresponding to the http state identification, and returning the http traffic data calling response to the traffic police terminal based on an http protocol according to the terminal identification.
After the identification content of the sip state identification and the http state identification is updated, if the identification content of the http state identification meets a preset condition, the data server generates a corresponding http traffic data call response, and the response content of the http traffic data call response is the same as the response content of the sip traffic data call response. And when the identification content of the http state identification is one of the finished traffic data calling request and the overtime traffic data calling request, generating an http traffic data calling response corresponding to the http state identification.
After generating the http traffic data call response, determining a traffic police terminal sending the http traffic data call request according to the terminal identifier, then establishing an http session between the data server and the traffic police terminal, returning the http traffic data call response to the traffic police terminal, and determining whether the traffic data can be acquired by the traffic police terminal based on the condition that the call is completed or overtime in the received traffic data call response.
When the calling is finished, the traffic police terminal can acquire the traffic data sent by the target camera in the next step, and when the calling is overtime, the traffic police terminal can send out the traffic data calling request again, or analyze the reason of the overtime, find out the reason of the overtime, and send out the traffic data calling request after the reason is solved.
S205: and receiving traffic data sent by the target camera, and sending the traffic data to the identification equipment according to the identification of the identification equipment.
When the call response is that the call is completed, the data server receives traffic data sent by the target camera, the traffic data is usually a media bare stream shot by the front-end camera, before the traffic data is sent, the traffic data needs to be encapsulated to form a data packet, for example, the data packet can be packaged into an RTP data packet, then the data packet is sent to the data server, and after the data packet is received by the data server, the data packet is sent to the identification device based on an http protocol according to the identification device identifier.
S206: and receiving illegal data which is identified from the traffic data by the identification equipment based on the neural network model, and returning the illegal data to the traffic police terminal.
And after receiving the traffic data, the identification equipment unpacks the traffic data, preprocesses the unpacked traffic data, such as removing some non-video data, interference data and the like, inputs the traffic data into a pre-trained neural network model, detects and tracks pedestrian targets and vehicle targets in each frame of image of the shot video, and determines the behavior track of the pedestrian targets and the vehicle targets. Then, the neural network model identifies the detected vehicle target to obtain attributes such as brand, vehicle type, license plate number, vehicle color and the like, and identifies the detected pedestrian target to obtain attributes such as gender, height, clothing, hairstyle and the like. After the detection, the attribute of the detected target may be stored in the identification device or the data server, so as to be used for performing a subsequent search query on the detected illegal target, thereby providing a basis for punishment. Then, the neural network model identifies the traffic signs of the road where the target is located, such as traffic signal lamps, traffic marking lines, speed limit boards and the like, and finally judges whether the traffic illegal behaviors exist in the target or not according to the detected information of the position where the target is located, the target behavior track, the target attribute, the traffic signs of the road where the target is located and the like. And after the traffic violation behaviors are identified, generating corresponding violation data, and returning the corresponding violation data to the traffic police terminal based on the http protocol. And the traffic police terminal determines whether to punish the illegal target based on relevant legal provisions according to the illegal data.
It can be known from the above method that the illegal data recognition method provided in the embodiments of the present application, first receives an http traffic data call request sent by a traffic police terminal based on an http protocol, where the http traffic data call request carries a terminal identifier, a recognition device identifier, and a target camera identifier, generates an sip traffic data call request corresponding to the http traffic data call request according to the target camera identifier, generates an http state identifier corresponding to the http traffic data call request, synchronizes an sip state identifier corresponding to the sip traffic data call request, and synchronizes the identifier contents of the http state identifier and the sip state identifier in real time, where the identifier contents include a traffic data call request timeout state and a traffic data call request completion state, then sends the sip traffic data call request to the target camera corresponding to the target camera identifier based on the sip protocol, receives an sip traffic data call response returned by the target camera based on the sip protocol, and calling the response content according to the sip traffic data, synchronously updating the identification content of the sip state identification and the http state identification, generating an http traffic data calling response corresponding to the http state identification when the identification content of the http state identification meets a preset condition, returning the http traffic data calling response to the traffic police terminal based on an http protocol according to the terminal identification, receiving the traffic data sent by the target camera, sending the traffic data to the identification equipment according to the identification equipment identification, and finally receiving illegal data identified by the identification equipment from the traffic data based on the neural network model and returning the illegal data to the traffic police terminal. The method and the device send out the http traffic data calling request based on the http protocol, and convert the http traffic data calling request into the sip traffic data calling request recognizable by the front-end camera, then convert the sip traffic data calling response returned by the front-end camera into the http traffic data calling response and then return the traffic police terminal, the whole calling process traffic police terminal can be completed only on a web browser or a platform, special SDK software does not need to be called, therefore, the safety is ensured, the http protocol is a general protocol, the operation is simple, the understanding is convenient, and the convenience of data calling is improved. In addition, adopt the neural network model of training to discern illegal data, for artifical recognition, improved recognition efficiency, and the recognition process is independent of outside the data server, when the system needs the upgrading, only need upgrade to identification equipment, and need not carry out whole upgrading to the data server that the data bulk is great, consequently improved upgrading efficiency, also reduced the cost of data maintenance.
As shown in fig. 3, the framework for sending a traffic data call request to receive a traffic data call response is divided into several modules, and the data server includes http-side processing logic 22, message synchronizer 23, and sip-side processing logic 24. The http traffic data call request 21 sent by the traffic police terminal based on the http protocol is firstly sent to the http side processing logic 22 for processing, and then sent to the message synchronizer 23 by the http side processing logic 22; the message synchronizer 23 converts the http traffic data call request into an sip traffic data call request, generates an http state identifier for the http traffic data call request, generates an sip state identifier for the sip traffic data call request, synchronizes the identifier contents of the http state identifier and the sip state identifier, and then sends the sip traffic data call request to the sip side processing logic 24 for processing; after the processing of the sip side processing logic 24 is completed, establishing an sip session with the target camera 25, sending an sip traffic data calling request to the target camera 25, and receiving an sip traffic data calling response returned to the sip side processing logic 24 by the target camera 25; the sip side processing logic 24 sends the sip traffic data call response to the message synchronizer 23, the message synchronizer 23 synchronously updates the identification content of the http state identification and the sip state identification according to the content of the sip traffic data call response, and generates an http traffic data call response 26 and sends the http traffic data call response 26 to the http side processing logic 22 when the identification content of the http state identification meets the preset condition; the http side processing logic 22 returns an http traffic data call response 26 to the traffic police terminal, and the traffic police terminal determines the processing state of the traffic data call request according to the http traffic data call response 26.
As shown in fig. 4 and fig. 5, the http side processing logic 22 includes an http service module 221, a request parser 222, a validity judgment 223, an http message manager 224, and an http timer status notification queue 225, and the sip side processing logic 24 includes an sip call manager 241, an sip message manager 242, a user agent client 243, a user agent server 244, and a front-end camera sip agent 245, and the method for recognizing illegal data according to the present application is specifically described below with reference to fig. 4 and fig. 5.
The traffic police terminal sends an http traffic data calling request 21 to the http side processing logic 22, and the http traffic data calling request 21 carries a terminal identifier, an identification device identifier and a target camera identifier. The terminal identification comprises an IP address and a port of a traffic police terminal, the data server determines which terminal the traffic data call response and the illegal data are to be sent to after receiving the traffic data call response and the illegal data according to the terminal identification, the target camera identification comprises an ID of a target camera, the data server determines that the target camera is specifically positioned at the xx road section xx road junction in the xx region according to the target camera identification so as to send an http traffic data call request 21 to the target camera, the identification equipment identification comprises the IP address and the port of identification equipment, the data server determines which identification equipment the traffic data sent by the subsequent target camera is to be forwarded according to the identification equipment identification, and the identification equipment identifies the traffic data such as the type of traffic law behaviors, the time of the traffic law violation behaviors, the information of the traffic law violation vehicles or pedestrians and the like according to the traffic behaviors of vehicles or pedestrians at the road junction in the traffic data, and returns to the traffic police terminal for further processing.
In the http side processing logic 22, the http traffic data invoking request 21 is received by the http service module 221, the http service module 221 includes an http gateway, and then the http traffic data invoking request 21 is transferred to the request parser 222. The request parser 222 parses each command parameter in the http traffic data invoking request 21, and then puts the http traffic data invoking request 21 into the http message manager 224. The http message manager 224 constantly handles the internal message cache while sending the newly incoming http traffic data call request 21 to the message synchronizer 23.
In an embodiment, before the step of placing the http traffic data invocation request 21 into the http message manager 224, the validity judgment 223 is further performed on the parsed http traffic data invocation request 21, which specifically includes: carrying out logic judgment on the http traffic data calling request 21 based on the traffic data calling request effective parameter set; and if the http traffic data call request 21 is legal, caching the http traffic data call request 21 into the http message manager 224, and if the http traffic data call request 21 is illegal, directly returning a termination request result to the traffic police terminal, wherein the termination request result is represented as an http traffic data call response 26 at the traffic police terminal. When the traffic police terminal sends out the http traffic data call request 21, the http traffic data call request 21 is sent out in a form of inputting a website on a web browser or a platform, the http traffic data call request 21 comprises parameters such as a terminal identifier, a target camera identifier and a call command, if the input of each identifier or call command is wrong, subsequent processing logic is affected, therefore, after analysis, firstly, a logic judgment is made on the http traffic data call request 21 based on a traffic data call request effective parameter set, the traffic data call request effective parameter set comprises types of effective parameters, specific parameter values, an arrangement sequence of each parameter and the like, if the valid parameter set is legal, the next step is carried out, the http traffic data call request 21 is cached in the http message manager 224, if the valid parameter set is illegal, a termination request result is directly returned to the traffic police terminal, and a specific error type can be further displayed, if the input is an invalid parameter or a corresponding target camera cannot be found, and the like, so that the http traffic data call request 21 can be adjusted and input again by the traffic police terminal.
In one embodiment, after the step of caching the http traffic data invocation request 21 to the http message manager 224, the method further comprises: judging whether the http traffic data calling request 21 has the same content as the http traffic data calling request entering in the previous preset time period or not; if the content is the same, the http traffic data invocation request 21 is removed from the http message manager 224, and if the content is different, the http traffic data invocation request 21 is sent to the message synchronizer 23. After the traffic police terminal sends the http traffic data call request 21, if no traffic data call response is received within an expected time, one or more refresh operations are usually performed, each refresh operation re-sends one traffic data call request 21, the content of each sent traffic data call request 21 is the same, and if the data server processes each request, resource waste is caused, so after the http traffic data call request 21 is cached in the http message manager 224, the http message manager 224 numbers the incoming requests in time sequence, such as No. 1, No. 2, No. 3, and the like, and each time a new http traffic data call request 21 is entered, the incoming requests are re-checked and judged.
Assuming that the number of the newly entered http traffic data invocation request 21 is n, the http message manager 224 first determines whether an n-1 th request enters within a preset time period from the time of the n-th request entering, where the preset time period may be set according to the sending behavior of the majority of request senders, for example, if the majority of request senders do not receive a response within 2 seconds after sending the request, the request senders may start to initiate a request again, and then 2 seconds may be used as the preset time period. If it is detected that no request n-1 is entered within the previous preset time period, the newly entered http traffic data call request may be directly sent to the message synchronizer 23. If an n-1 request is detected to enter in the previous preset time period, content duplication judgment is carried out on the n-1 request and the n request, when the contents are the same, the n request is a repeated request, the newly entered http traffic data calling request is removed from the http message manager 224, the n-1 request is continuously processed, when the contents are different, the n request is a new request, the newly entered http traffic data calling request is sent to the message synchronizer 23, and after the n-1 request is processed, the n request is continuously processed.
After receiving the http traffic data call request 21, the message synchronizer 23 generates an sip traffic data call request corresponding to the http traffic data call request according to the identification of the target camera. The data server stores cluster information of front-end cameras, the front-end cameras registered in the data server are all located in the cluster information, each front-end camera has a unique identifier, a target camera is determined from the cluster information of the front-end cameras according to the identifier of the target camera, an access address of the target camera is obtained, and a request head in a sip traffic data calling request can be generated according to the access address. Then, each call command in the http traffic data call request 21 is converted into a call command under the sip protocol, and then the call command is generated into a message body in the sip traffic data call request, and a request header and the message body are combined to generate a corresponding sip traffic data call request.
The message synchronizer 23 generates an http state identifier for the http traffic data call request 21, generates an sip state identifier for the sip traffic data call request, and synchronizes the identifier contents of the http state identifier and the sip state identifier in real time, wherein the identifier contents include a traffic data call request timeout state and a traffic data call request completion state. In the message synchronizer 23, the identification contents of the http state identification and the sip state identification are the same at any moment, and the synchronization operation is realized by a corresponding synchronization program.
For the http traffic data call request 21 newly entering the message synchronizer 23, after the steps of format conversion and identification synchronization are completed, the sip traffic data call request is sent to the sip side processing logic 24, and then the sip side processing logic 24 sends the sip traffic data call request to the target camera corresponding to the target camera identification based on the sip protocol. After the sending, the inside of the message synchronizer 23 may perform timeout and complete detection on the traffic data call request, if the sip side processing logic 24 has returned the sip traffic data call response, or if there is no sip illegal data recognition return after exceeding the maximum value of the response time, the message synchronizer 23 may generate a corresponding http traffic data call response 26, and place the http traffic data call response 26 in an http timer state notification queue 225, where the http timer state notification queue 225 notifies the http message manager 224 according to the sequence of response entering, and the http message manager 224 returns the http traffic data call response 26 to the traffic police terminal, so that the traffic police terminal may obtain the processing result of the traffic data call request.
In the sip side processing logic 24, the specific steps of the processing include: caching the sip traffic data call request into the sip message manager 242, and establishing a session with the front-end camera sip agent 245 based on the sip protocol; determining a target camera 25 from the front-end camera sip agent 245 according to the target camera identification; and sending the sip traffic data calling request to the target camera 25 based on the sip protocol.
The sip traffic data invoking request is first sent to the sip invoking management 241, and the sip invoking management 241 generates a unique identifier for the sip traffic data invoking request and then caches the unique identifier into the sip message manager 242. Then, the user agent client 243 checks from the sip message manager 242 whether a new traffic data call request arrives or whether the traffic data call request status is updated, and sends a different request to the front-end camera sip agent 245 according to the check result. When a new sip traffic data call request arrives at the sip message manager 242, the user agent client 243 calls its own proxy mode, establishes a session with the front-end camera sip proxy 245 based on the sip protocol, and sends an Invite request, after the front-end camera sip proxy 245 receives the Invite request, the front-end camera sip proxy 245 determines the target camera 25 from the front-end camera sip proxy 245 according to the target camera identifier, and then the front-end camera sip proxy 245 sends the sip traffic data call request to the target camera 25. When it is checked that the state of the traffic data call request is updated in the sip message manager 242, if the request is terminated, a corresponding processing request is sent to the front-end camera sip proxy 245 according to the updated state.
Then, the sip-side processing logic 24 receives the sip traffic data call response returned by the target camera 25 based on the sip protocol, and synchronously updates the identification contents of the sip state identification and the http state identification according to the content of the sip traffic data call response.
In one embodiment, the steps specifically include: receiving a processing signaling returned by the target camera 25 to the sip message manager 242 based on the sip protocol; updating the identification content of the sip state identification corresponding to the sip traffic data calling request in the sip message manager 242 according to the processing signaling; when detecting that the identification content of the sip state identification is that the traffic data calling request is overtime or the traffic data calling request is finished, returning a sip traffic data calling response to the message synchronizer 23; and according to the content of the sip traffic data call response, synchronously updating the identification content of the sip state identification and the http state identification in the message synchronizer 23.
The processing signaling returned by the target camera 25 after processing the sip traffic data invocation request is received by the user agent 244, and the user agent 244 updates the identification content of the sip state identification corresponding to the sip traffic data invocation request in the sip message manager 242 according to the processing signaling. Specifically, when the processing signaling is 200 OK, indicating that the traffic data invocation request is completed, the user agent 244 matches the sip traffic data invocation request in the sip message manager 242, and updates the identification content of the corresponding sip status identifier to the completion of the traffic data invocation request. If the processing signaling is 408, which indicates that the traffic data invocation request has timed out, the user agent 244 will also match the sip traffic data invocation request in the sip message manager 242, and update the identification content of the sip status identifier corresponding to the sip traffic data invocation request to be timed out. In addition, the processing signaling return may also have other types, for example, 404 indicates that the user does not exist, 403 indicates prohibition, and the like, and the identification content of the corresponding sip state identifier is different after being updated according to the difference of the processing signaling.
When detecting that the identification content of the sip state identifier is that the traffic data call request is overtime or the traffic data call request is completed, generating and returning a sip traffic data call response to the message synchronizer 23, and then synchronously updating the identification content of the sip state identifier and the identification content of the http state identifier in the message synchronizer 23 according to the content of the sip traffic data call response, so that the identification content of the sip state identifier and the identification content of the http state identifier are updated to be that the traffic data call request is completed or the traffic data call request is overtime.
In one embodiment, the steps after returning the sip traffic data invocation response to the message synchronizer 23 include: the sip traffic data invocation request is removed from the sip message manager 242. At this point, the traffic data invocation request has been processed and a corresponding traffic data invocation response is generated, so that it is removed from the sip message manager 242, and the cache space of the sip message manager 242 can be released to facilitate the sip message manager 242 to process other request messages. In addition, after the removal, the data server can store a log related to the sip traffic data call response, classify a plurality of traffic data call responses within a certain period of time in the log, for example, classify according to the overtime and completed conditions of the traffic data call request, analyze the overtime condition, find the reason, facilitate the development personnel to perform BUG positioning and program debugging, and subsequently maintain and upgrade the system.
The message synchronizer 23 generates an http traffic data call response 26 corresponding to the http state identifier when the identifier content of the http state identifier meets a preset condition, where the preset condition is that the traffic data call request is completed or the traffic data call request is overtime. Specifically, when the identification content of the http state identification is that the traffic data call request is overtime, generating an http traffic data call response 26 that illegal data identification is overtime; and when the identification content of the http state identification is that the traffic data calling request is completed, generating an http traffic data calling response 26 with the illegal data identification completed.
And after generating the http traffic data call response 26, returning the http traffic data call response 26 to the traffic police terminal based on the http protocol according to the terminal identifier. The message synchronizer 23 determines which port of which client the traffic data call response should be sent to according to the terminal identifier, and then returns the http traffic data call response 26, and the traffic police terminal determines the processing result of the traffic data call request according to the content of the http traffic data call response 26.
In one embodiment, the steps after returning the http traffic data invocation response 26 to the traffic police terminal include: the http traffic data invocation request and the sip traffic data invocation request are removed from the message synchronizer 23. After removal, the internal space of the message synchronizer 23 is also released to facilitate the message synchronizer 23 to process other request messages.
After the traffic police terminal obtains the http traffic data call response 26, the target camera 25 packages the shot traffic data and sends the packaged traffic data to the data server, and then the data server sends the packaged traffic data to the identification device according to the identification device IP address and the port in the identification device identifier. After receiving the traffic data, the identification device unpacks the traffic data, preprocesses the unpacked traffic data, such as removing some non-video data, interference data and the like, inputs the traffic data into a pre-trained neural network model, and identifies illegal data by the neural network model.
The neural network model firstly detects and tracks the pedestrian target and the vehicle target in each frame of image of the video and determines the behavior track of the pedestrian target and the vehicle target. In order to reduce the influence of false detection and missed detection, the system can judge that a new target enters only when M continuous frames of the target are detected, and can consider that the target disappears only when N continuous frames of the target are not detected, wherein M and N are positive integers and can be set to different values according to parameters such as the type of the target, the driving speed and the like. Specifically, in the target tracking process, the historical position of each target is recorded, an initial motion trajectory of the target is formed, and the initial motion trajectory of the target is subjected to smooth filtering by adopting a kalman filter, so that a target behavior trajectory is obtained.
Then, the neural network model identifies the detected vehicle target to obtain attributes such as brand, vehicle type, license plate number, vehicle color and the like, and identifies the detected pedestrian target to obtain attributes such as gender, height, clothing, hairstyle and the like. After the detection, the attribute of the detected target may be stored in the identification device or the data server, so as to be used for performing a subsequent search query on the detected illegal target, thereby providing a basis for punishment.
Then, the neural network model identifies the traffic signs of the road where the target is located, such as traffic signal lamps, traffic marking lines, speed limit boards and the like, and then judges whether traffic illegal behaviors exist in the target or not according to the detected information of the position where the target is located, the target behavior track, the target attribute, the traffic signs of the road where the target is located and the like.
For example, when it is recognized that the traffic signal lamp is in a red light state and the traffic marking of the current road includes a stop line, it is determined whether the position of the target exceeds the stop line within 15 meters before and after the stop line, and if so, there is illegal behavior of running the red light. For another example, when the traffic markings of the current road include road type markings, such as pedestrian lanes, motor lanes, and non-motor lanes, and the target attribute is not matched with the type of the current road, illegal road occupation behaviors exist.
After the traffic violation of the target is identified, the identification equipment generates corresponding violation data, the violation data comprises information such as violation time, violation places, violation targets and violation types, and then the violation data is returned to the data server based on the http protocol, and the data server returns the violation data to the traffic police terminal. And the traffic police terminal determines whether to punish the illegal target based on relevant legal provisions according to the illegal data.
In the embodiment of the application, illegal data are identified by using the identification equipment operated with the neural network model, and the identification efficiency of the neural network model is gradually increased after the neural network model is trained for multiple times. When the neural network model is trained, video data shot by a front-end camera needs to be acquired, all features of the video data are artificially labeled, the video data are input into the neural network model as a training sample for training, and the trained neural network model can have corresponding recognition capability when traffic data to be recognized are subsequently input.
In the training sample, the pedestrian target and the vehicle target are artificially labeled, and when traffic data is subsequently input, the trained neural network model can have the capacity of identifying the pedestrian target and the vehicle target. In the training sample, attributes of the pedestrian target and the vehicle target are labeled manually, and the trained neural network model can have the capability of identifying the attributes of the pedestrian target and the vehicle target. In the training sample, different labels are manually carried out on the pixels where the non-traffic marks are located and the pixels where the traffic marks are located, and the corresponding traffic mark types are labeled, so that the trained neural network model can have the capacity of identifying the traffic marks and the corresponding classes thereof. Through the three types of training, the neural network model can identify information such as the position of a target, a target behavior track, target attributes, traffic identification of a road where the target is located and the like according to input traffic data, so that understanding of a road traffic video is completed, and identification of illegal behaviors is achieved. In order to make the recognition effect of the neural network model better, training needs to be performed for enough times so that the recognition accuracy is not lower than a preset value.
According to the illegal data identification method, the http traffic data calling request is sent based on the http protocol and converted into the sip traffic data calling request which can be identified by the front-end camera, then the sip traffic data calling response returned by the front-end camera is converted into the http traffic data calling response and then returned to the traffic police terminal, the traffic police terminal can complete the whole calling process only on the web browser or the platform, and special SDK software does not need to be called, so that the safety is ensured, the http protocol is a general protocol, and the convenience of data calling is improved. In addition, adopt the neural network model of training to discern illegal data, for artifical recognition, improved recognition efficiency, and the recognition process is independent of outside the data server, when the system needs the upgrading, only need upgrade to identification equipment, and need not carry out whole upgrading to the data server that the data bulk is great, consequently improved upgrading efficiency, also reduced the cost of data maintenance.
As shown in fig. 6 and 7, in actual operation, the traffic police terminal inputs an http traffic data call request on the input frame 100 of the platform or the web browser shown in fig. 6 and sends the http traffic data call request, after receiving an http traffic data call response, the traffic data sent by the front-end camera is received by the data server, and is sent to the identification device for illegal data identification, and after identification, the illegal data is sent to the data server and is returned to the traffic police terminal, and the traffic police terminal can see, on the first display area 200 of the page shown in fig. 7, that the illegal data "a vehicle with a license plate number xxxxxx does not give way to a pedestrian at the xx intersection", and can also send the corresponding traffic data to the traffic police terminal, and display a video or an image corresponding to the illegal data in the second display area 300 of the page shown in fig. 7, so that the traffic police can confirm the illegal data conveniently.
On the basis of the method described in the foregoing embodiment, the embodiment will be further described from the perspective of an illegal data identification device, please refer to fig. 8, where fig. 8 specifically describes the illegal data identification device provided in the embodiment of the present application, which may include:
the first receiving module 110 is configured to receive an http traffic data call request sent by a traffic police terminal based on an http protocol, where the http traffic data call request carries an identification device identifier, a terminal identifier, and a target camera identifier;
the first synchronization module 120 is configured to generate an sip traffic data call request corresponding to the http traffic data call request according to the target camera identifier, generate an http state identifier corresponding to the http traffic data call request, synchronize identifier contents of the http state identifier and the sip state identifier in real time, where the identifier contents include a traffic data call request timeout state and a traffic data call request completion state;
the second synchronization module 130 is configured to send an sip traffic data call request to a target camera corresponding to the target camera identifier based on the sip protocol, receive an sip traffic data call response returned by the target camera based on the sip protocol, and update the identifier contents of the sip state identifier and the http state identifier synchronously according to the content of the sip traffic data call response;
the generating module 140 is configured to generate an http traffic data call response corresponding to the http state identifier when the identifier content of the http state identifier meets a preset condition, and return the http traffic data call response to the traffic police terminal based on the http protocol according to the terminal identifier;
the second receiving module 150 is configured to receive the traffic data sent by the target camera, and send the traffic data to the identification device according to the identification device identifier;
and the returning module 160 is used for receiving the illegal data which is identified by the identification device from the traffic data based on the neural network model and returning the illegal data to the traffic police terminal.
In an embodiment, the illegal data identification device further includes a logic judgment module, configured to perform logic judgment on the http traffic data call request based on the traffic data call request valid parameter set after the first receiving module 110 receives the http traffic data call request; and if the http traffic data calling request is legal, caching the http traffic data calling request to an http message manager, and if the http traffic data calling request is illegal, directly returning a termination request result to the traffic police terminal.
In one embodiment, the illegal data identification device further comprises a duplication checking module, wherein after the http traffic data calling request is cached to the http message manager, the duplication checking module is used for judging whether the http traffic data calling request has the same content with the http traffic data calling request entering in the previous preset time period; and if the contents are the same, removing the http traffic data calling request from the http message manager, and if the contents are different, sending the http traffic data calling request to the message synchronizer.
In an embodiment, the second synchronization module 130 specifically includes:
the cache submodule is used for caching the sip traffic data call request into the sip message manager and establishing a session with a front-end camera sip proxy based on an sip protocol;
the determining submodule is used for determining a target camera from the front-end camera sip agent according to the target camera identification;
and the sending submodule is used for sending the sip traffic data calling request to the target camera based on the sip protocol.
In an embodiment, the second synchronization module 130 specifically includes:
the receiving submodule is used for receiving a processing signaling returned to the sip message manager by the target camera based on the sip protocol;
the first updating submodule is used for updating the identification content of the sip state identification corresponding to the sip traffic data calling request in the sip message manager according to the processing signaling;
the return submodule is used for returning the sip traffic data calling response to the message synchronizer when the identification content of the sip state identification is detected to be overtime of the traffic data calling request or the traffic data calling request is completed;
and the second updating submodule is used for synchronously updating the identification contents of the sip state identification and the http state identification in the message synchronizer according to the content of the sip traffic data call response.
In an embodiment, the second updating sub-module is configured to, according to content of the sip traffic data call response, synchronously update the identification content of the sip state identifier and the http state identifier to that the traffic data call request has timed out or the traffic data call request has completed.
In one embodiment, the generating module 140 specifically includes one of the following sub-modules:
the overtime generation submodule is used for generating an overtime http traffic data calling response of illegal data identification when the identification content of the http state identification is that the traffic data calling request is overtime;
and the completion generation submodule is used for generating an http traffic data calling response which is completed by illegal data recognition when the identification content of the http state identification is that the traffic data calling request is completed.
In an embodiment, the illegal data identification device further comprises a removing module, configured to remove the http traffic data call request and the sip traffic data call request from the message synchronizer after the returning module 160 returns the http traffic data call response to the traffic police terminal.
Different from the prior art, the illegal data recognition device provided by the application sends out an http traffic data calling request based on an http protocol, converts the http traffic data calling request into an sip traffic data calling request which can be recognized by a front-end camera, converts the sip traffic data calling response returned by the front-end camera into an http traffic data calling response, returns the http traffic data calling response to a traffic police terminal, receives traffic data returned by the front-end camera, sends the http traffic data calling response to recognition equipment for illegal data recognition, and returns illegal data to the traffic police terminal. In addition, adopt the neural network model of training to discern illegal data, for artifical recognition, improved recognition efficiency, and the recognition process is independent of outside the data server, when the system needs the upgrading, only need upgrade to identification equipment, and need not carry out whole upgrading to the data server that the data bulk is great, consequently improved upgrading efficiency, also reduced the cost of data maintenance.
Accordingly, an electronic device may include, as shown in fig. 9, a Radio Frequency (RF) circuit 901, a memory 902 including one or more computer-readable storage media, an input unit 903, a display unit 904, a sensor 905, an audio circuit 906, a wireless fidelity (WiFi) module 907, a processor 908 including one or more processing cores, and a power supply 909. Those skilled in the art will appreciate that the server architecture shown in FIG. 9 does not constitute a limitation on the servers, and may include more or fewer components than shown, or some components in combination, or a different arrangement of components. Wherein:
RF circuit 901 may be used for receiving and transmitting signals during a message transmission or communication process, and in particular, for receiving downlink information from a base station and then processing the received downlink information by one or more processors 908; in addition, data relating to uplink is transmitted to the base station. The memory 902 may be used to store software programs and modules, and the processor 908 executes various functional applications and data processing by operating the software programs and modules stored in the memory 902. The input unit 903 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control.
The display unit 904 may be used to display information input by or provided to the user and various graphical user interfaces of the server, which may be made up of graphics, text, icons, video, and any combination thereof.
The server may also include at least one sensor 905, such as light sensors, motion sensors, and other sensors. The audio circuitry 906 includes speakers that can provide an audio interface between the user and the server.
WiFi belongs to short-distance wireless transmission technology, and the server can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 907, and provides wireless broadband internet access for the user. Although fig. 9 shows the WiFi module 907, it is understood that it does not belong to the essential constitution of the server, and may be omitted entirely as needed within the scope of not changing the essence of the application.
The processor 908 is the control center of the server, connects various parts of the entire handset using various interfaces and lines, and performs various functions of the server and processes data by running or executing software programs and/or modules stored in the memory 902 and calling data stored in the memory 902, thereby performing overall monitoring of the handset.
The server also includes a power supply 909 (such as a battery) that provides power to the various components, which may preferably be logically connected to the processor 908 via a power management system, such that the functions of managing charging, discharging, and power consumption are performed via the power management system.
Although not shown, the server may further include a camera, a bluetooth module, etc., which will not be described herein. Specifically, in this embodiment, the processor 908 in the server loads the executable file corresponding to the process of one or more application programs into the memory 902 according to the following instructions, and the processor 908 runs the application programs stored in the memory 902, so as to implement the following functions:
receiving an http traffic data calling request sent by a traffic police terminal based on an http protocol, wherein the http traffic data calling request carries a terminal identifier and a target camera identifier; generating a sip traffic data calling request corresponding to the http traffic data calling request according to the identification of the target camera; generating an http state identifier corresponding to the http traffic data calling request and an sip state identifier corresponding to the sip traffic data calling request, and synchronizing the identifier contents of the http state identifier and the sip state identifier in real time, wherein the identifier contents comprise a traffic data calling request overtime state and a traffic data calling request completion state; sending an sip traffic data calling request to a target camera corresponding to the target camera identification based on an sip protocol; receiving an sip traffic data call response returned by the target camera based on the sip protocol, and synchronously updating the identification contents of the sip state identification and the http state identification according to the content of the sip traffic data call response; when the identification content of the http state identification meets a preset condition, generating an http traffic data call response corresponding to the http state identification; and returning an http traffic data calling response to the traffic police terminal based on the http protocol according to the terminal identifier.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and parts that are not described in detail in a certain embodiment may refer to the above detailed description, and are not described herein again.
In an embodiment, the identification device provided by the present application may be used as a node in a blockchain system, and after the traffic data is processed by calling a neural network model, the illegal data is verified, and after the illegal data is verified, the illegal data is stored as a new block in the blockchain, so as to ensure that the illegal data is not tampered.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The block chain underlying platform can comprise processing modules such as user management, basic service, intelligent contract and operation monitoring. The user management module is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, the user management module supervises and audits the transaction condition of certain real identities and provides rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request after the effective request is identified in a consensus mode to the storage, for a new service request, the basic service firstly conducts interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and records and stores the service information; the intelligent contract module is responsible for registering and issuing contracts, triggering the contracts and executing the contracts, developers can define contract logics through a certain programming language, issue the contract logics to a block chain (contract registration), call keys or other event triggering and executing according to the logics of contract clauses, complete the contract logics and simultaneously provide the function of upgrading and canceling the contracts; the operation monitoring module is mainly responsible for deployment, configuration modification, contract setting, cloud adaptation in the product release process and visual output of real-time states in product operation, such as: alarm, monitoring network conditions, monitoring node equipment health status, and the like.
The platform product service layer provides basic capability and an implementation framework of typical application, and developers can complete block chain implementation of business logic based on the basic capability and the characteristics of the superposed business. The application service layer provides the application service based on the block chain scheme for the business participants to use.
The method, the device and the electronic equipment for identifying the illegal data of the intelligent traffic system based on the http protocol are introduced in detail, specific examples are applied in the text to explain the principle and the implementation mode of the application, and the description of the above embodiments is only used for helping to understand the technical scheme and the core idea of the application; those of ordinary skill in the art will understand that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications or substitutions do not depart from the spirit and scope of the present disclosure as defined by the appended claims.

Claims (10)

1. A illegal data identification method is characterized in that the illegal data identification method is used for a smart traffic system based on an http protocol, the smart traffic system comprises a front-end camera, a data server, identification equipment and a traffic police terminal, a neural network model runs in the identification equipment, the front-end camera is connected with the data server based on an sip protocol, the traffic police terminal is accessed into the data server and the identification equipment based on the http protocol, the identification equipment is accessed into the data server based on the http protocol, the illegal data identification method is applied to the data server, and the illegal data identification method comprises the following steps:
receiving an http traffic data calling request sent by the traffic police terminal based on an http protocol, wherein the http traffic data calling request carries an identification device identifier, a terminal identifier and a target camera identifier;
generating an sip traffic data calling request corresponding to the http traffic data calling request according to the target camera identification, and generating an http state identification corresponding to the http traffic data calling request, wherein the sip state identification corresponding to the sip traffic data calling request synchronizes the identification contents of the http state identification and the sip state identification in real time, and the identification contents comprise a traffic data calling request overtime state and a traffic data calling request completion state;
sending the sip traffic data calling request to a target camera corresponding to the target camera identification based on an sip protocol, receiving an sip traffic data calling response returned by the target camera based on the sip protocol, and synchronously updating the identification contents of the sip state identification and the http state identification according to the content of the sip traffic data calling response;
when the identification content of the http state identification meets a preset condition, generating an http traffic data calling response corresponding to the http state identification, and returning the http traffic data calling response to the traffic police terminal based on an http protocol according to the terminal identification;
receiving traffic data sent by the target camera, and sending the traffic data to the identification equipment according to the identification equipment;
and receiving illegal data which is identified from the traffic data by the identification equipment based on the neural network model, and returning the illegal data to the traffic police terminal.
2. The illegal data identification method according to claim 1, further comprising, before the step of generating a sip traffic data call request corresponding to the http traffic data call request according to the target camera identification, the steps of:
carrying out logic judgment on the http traffic data calling request based on the traffic data calling request effective parameter set;
and if the http traffic data calling request is legal, caching the http traffic data calling request to an http message manager, and if the http traffic data calling request is illegal, directly returning a termination request result to the traffic police terminal.
3. The method for illegal data identification according to claim 2, further comprising, after the step of caching the http traffic data call request to an http message manager:
judging whether the http traffic data calling request has the same content as the http traffic data calling request entering in the previous preset time period or not;
and if the contents are the same, removing the http traffic data calling request from the http message manager, and if the contents are different, sending the http traffic data calling request to a message synchronizer.
4. The illegal data identification method according to claim 1, wherein the step of sending the sip traffic data call request to the target camera identified by the target camera based on an sip protocol comprises:
caching the sip traffic data call request into a sip message manager, and establishing a session with a front-end camera sip proxy based on a sip protocol;
determining a target camera from the front-end camera sip agent according to the target camera identification;
and sending the sip traffic data calling request to the target camera based on a sip protocol.
5. The illegal data identification method according to claim 1, wherein the step of receiving an sip traffic data call response returned by the target camera based on an sip protocol, and synchronously updating the identification contents of the sip state identifier and the http state identifier according to the content of the sip traffic data call response comprises the steps of:
receiving a processing signaling returned to the sip message manager by the target camera based on the sip protocol;
updating the identification content of the sip state identification corresponding to the sip traffic data calling request in the sip message manager according to the processing signaling;
when detecting that the identification content of the sip state identification is that the traffic data calling request is overtime or the traffic data calling request is finished, returning a sip traffic data calling response to the message synchronizer;
and according to the content of the sip traffic data call response, synchronously updating the identification content of the sip state identification and the http state identification in the message synchronizer.
6. The illegal data recognition method according to claim 5, wherein the step of synchronously updating the identification contents of the sip state identifier and the http state identifier in the message synchronizer according to the content of the sip traffic data call response comprises:
and according to the content of the sip traffic data call response, synchronously updating the identification content of the sip state identification and the http state identification into that the traffic data call request is overtime or the traffic data call request is completed.
7. The illegal data identification method according to claim 5, wherein the step of generating an http traffic data call response corresponding to the http state identifier when the identifier content of the http state identifier satisfies a preset condition comprises one of the following manners:
when the identification content of the http state identification is that the traffic data calling request is overtime, generating an http traffic data calling response of illegal data identification overtime;
and when the identification content of the http state identification is that the traffic data calling request is completed, generating an http traffic data calling response of which illegal data identification is completed.
8. The illegal data recognition method according to claim 7, further comprising, after the step of returning the http traffic data call response to the traffic police terminal based on an http protocol according to the terminal identification, the steps of:
and removing the http traffic data call request and the sip traffic data call request from the message synchronizer.
9. The utility model provides a device for recognizing illegal data, its characterized in that, device for recognizing illegal data is used for wisdom traffic system based on the http protocol, wisdom traffic system includes front end camera, data server, identification equipment and traffic police terminal, it has neural network model to operate in the identification equipment, the front end camera is connected based on the sip protocol data server, the traffic police terminal inserts based on the http protocol data server with identification equipment, identification equipment inserts based on the http protocol data server, illegal data recognition device sets up in the data server, illegal data recognition device includes:
the first receiving module is used for receiving an http traffic data calling request sent by the traffic police terminal based on an http protocol, wherein the http traffic data calling request carries an identification device identifier, a terminal identifier and a target camera identifier;
the first synchronization module is used for generating an sip traffic data calling request corresponding to the http traffic data calling request according to the target camera identification, and generating an http state identification corresponding to the http traffic data calling request, wherein the sip state identification corresponding to the sip traffic data calling request synchronizes identification contents of the http state identification and the sip state identification in real time, and the identification contents comprise a traffic data calling request overtime state and a traffic data calling request completion state;
the second synchronization module is used for sending the sip traffic data calling request to the target camera corresponding to the target camera identification based on an sip protocol, receiving an sip traffic data calling response returned by the target camera based on the sip protocol, and synchronously updating the identification contents of the sip state identification and the http state identification according to the content of the sip traffic data calling response;
the generating module is used for generating an http traffic data calling response corresponding to the http state identifier when the identifier content of the http state identifier meets a preset condition, and returning the http traffic data calling response to the traffic police terminal based on an http protocol according to the terminal identifier;
the second receiving module is used for receiving the traffic data sent by the target camera and sending the traffic data to the identification equipment according to the identification equipment identifier;
and the return module is used for receiving the illegal data which is identified by the identification equipment from the traffic data based on the neural network model and returning the illegal data to the traffic police terminal.
10. An electronic device comprising a memory and a processor; the memory stores an application program, and the processor is configured to execute the application program in the memory to perform the operations of the illegal data identification method according to any one of claims 1 to 8.
CN202010935815.4A 2020-09-08 2020-09-08 Illegal data identification method and device and electronic equipment Active CN111798664B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010935815.4A CN111798664B (en) 2020-09-08 2020-09-08 Illegal data identification method and device and electronic equipment
PCT/CN2021/074135 WO2022052412A1 (en) 2020-09-08 2021-01-28 Violation data identification method and apparatus, and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010935815.4A CN111798664B (en) 2020-09-08 2020-09-08 Illegal data identification method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN111798664A true CN111798664A (en) 2020-10-20
CN111798664B CN111798664B (en) 2020-11-24

Family

ID=72834256

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010935815.4A Active CN111798664B (en) 2020-09-08 2020-09-08 Illegal data identification method and device and electronic equipment

Country Status (2)

Country Link
CN (1) CN111798664B (en)
WO (1) WO2022052412A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112380993A (en) * 2020-11-12 2021-02-19 青岛以萨数据技术有限公司 Intelligent illegal behavior detection system and method based on target real-time tracking information
CN112446334A (en) * 2020-12-02 2021-03-05 福建亿安智能技术有限公司 Method and system for recognizing illegal behaviors of non-motor vehicle
CN113347158A (en) * 2021-05-17 2021-09-03 武汉中科通达高新技术股份有限公司 Streaming media data receiving and transmitting method and device and electronic equipment
WO2022052412A1 (en) * 2020-09-08 2022-03-17 武汉中科通达高新技术股份有限公司 Violation data identification method and apparatus, and electronic device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725804A (en) * 2004-07-21 2006-01-25 上海高德威智能交通系统有限公司 Intelligent camera with traffic monitoring special function and intelligent shooting method thereof
CN104038731A (en) * 2014-05-15 2014-09-10 塔里木大学 Mobile-internet real-time video monitoring system
US20140333713A1 (en) * 2012-12-14 2014-11-13 Biscotti Inc. Video Calling and Conferencing Addressing
CN104952247A (en) * 2015-06-06 2015-09-30 刘剑 Congestion level analysis platform based on double communication data
CN105610843A (en) * 2015-12-31 2016-05-25 广东顺德中山大学卡内基梅隆大学国际联合研究院 Remote camera image real-time sharing method and system
CN110661891A (en) * 2019-12-02 2020-01-07 武汉中科通达高新技术股份有限公司 Cross-network file instant transmission method and system based on unidirectional network
CN110730222A (en) * 2019-09-27 2020-01-24 深圳市大拿科技有限公司 Remote camera shooting presentation method
JP2020065200A (en) * 2018-10-18 2020-04-23 パナソニックi−PROセンシングソリューションズ株式会社 Detection system of vehicle and the like and detection method of vehicle and the like

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155001B (en) * 2006-09-28 2011-12-07 华为技术有限公司 Monitoring source service implementing method, monitoring system and front end unit metadata server
CN101212661A (en) * 2006-12-30 2008-07-02 上海贝尔阿尔卡特股份有限公司 Method for controlling media stream transmission between customer premise equipment and video sever
US20170279924A1 (en) * 2016-03-27 2017-09-28 International Business Machines Corporation Cancellation management with respect to a web application
CN107784838A (en) * 2016-08-30 2018-03-09 杭州海康威视系统技术有限公司 A kind of traffic offence dynamic identifying method and system
US10771589B1 (en) * 2019-04-30 2020-09-08 Slack Technologies, Inc. Systems and methods for initiating processing actions utilizing automatically generated data of a group-based communication system
CN111798664B (en) * 2020-09-08 2020-11-24 武汉中科通达高新技术股份有限公司 Illegal data identification method and device and electronic equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725804A (en) * 2004-07-21 2006-01-25 上海高德威智能交通系统有限公司 Intelligent camera with traffic monitoring special function and intelligent shooting method thereof
US20140333713A1 (en) * 2012-12-14 2014-11-13 Biscotti Inc. Video Calling and Conferencing Addressing
CN104038731A (en) * 2014-05-15 2014-09-10 塔里木大学 Mobile-internet real-time video monitoring system
CN104952247A (en) * 2015-06-06 2015-09-30 刘剑 Congestion level analysis platform based on double communication data
CN105610843A (en) * 2015-12-31 2016-05-25 广东顺德中山大学卡内基梅隆大学国际联合研究院 Remote camera image real-time sharing method and system
JP2020065200A (en) * 2018-10-18 2020-04-23 パナソニックi−PROセンシングソリューションズ株式会社 Detection system of vehicle and the like and detection method of vehicle and the like
CN110730222A (en) * 2019-09-27 2020-01-24 深圳市大拿科技有限公司 Remote camera shooting presentation method
CN110661891A (en) * 2019-12-02 2020-01-07 武汉中科通达高新技术股份有限公司 Cross-network file instant transmission method and system based on unidirectional network

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022052412A1 (en) * 2020-09-08 2022-03-17 武汉中科通达高新技术股份有限公司 Violation data identification method and apparatus, and electronic device
CN112380993A (en) * 2020-11-12 2021-02-19 青岛以萨数据技术有限公司 Intelligent illegal behavior detection system and method based on target real-time tracking information
CN112446334A (en) * 2020-12-02 2021-03-05 福建亿安智能技术有限公司 Method and system for recognizing illegal behaviors of non-motor vehicle
CN113347158A (en) * 2021-05-17 2021-09-03 武汉中科通达高新技术股份有限公司 Streaming media data receiving and transmitting method and device and electronic equipment

Also Published As

Publication number Publication date
WO2022052412A1 (en) 2022-03-17
CN111798664B (en) 2020-11-24

Similar Documents

Publication Publication Date Title
CN111798664B (en) Illegal data identification method and device and electronic equipment
US11659308B2 (en) Intelligent gas meter for internet of things (IOT) system
WO2019128028A1 (en) Road traffic data recording method and vehicle-mounted device
CN110189524A (en) A kind of active violation recognition methods, system and electronic equipment violating the regulations
CN111800521A (en) Front-end equipment control method and device
CN109214326A (en) A kind of information processing method, device and system
CN103974032A (en) Monitoring and management system of security equipment
CN112201046B (en) Illegal data identification method and device and electronic equipment
CN112202786B (en) Illegal data identification method and device and electronic equipment
CN112188245B (en) Front-end camera real-time video-on-demand method and device and electronic equipment
CN112163538A (en) Illegal data identification method and device and electronic equipment
CN114885012A (en) System access method and system of Internet of things platform
KR102385702B1 (en) Data analysis service method and data analysis service system using the method
CN112188243B (en) Front-end camera real-time video-on-demand method and device and electronic equipment
CN112187810A (en) Front-end equipment control method and device
CN112188242B (en) Front-end camera real-time video-on-demand method and device and electronic equipment
CN111489276A (en) Personnel management method and related device
CN111935316A (en) Method and device for acquiring front-end equipment catalog
CN106162059A (en) A kind of video monitoring alarm method and system
CN111181996B (en) Code detection image implementation method and system based on distributed multi-connection architecture
CN114125502B (en) Video stream management method and device
CN112291207B (en) Method and device for acquiring front-end equipment catalog
CN112188244A (en) Front-end camera real-time video-on-demand method and device and electronic equipment
CN112291210B (en) Method and device for acquiring front-end equipment catalog
KR101337057B1 (en) M2m gateway, method, and recording medium for processing video data based on m2m

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant