CN111818237A - Video monitoring analysis system and method - Google Patents

Video monitoring analysis system and method Download PDF

Info

Publication number
CN111818237A
CN111818237A CN202010707531.XA CN202010707531A CN111818237A CN 111818237 A CN111818237 A CN 111818237A CN 202010707531 A CN202010707531 A CN 202010707531A CN 111818237 A CN111818237 A CN 111818237A
Authority
CN
China
Prior art keywords
video
module
training
image data
management server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010707531.XA
Other languages
Chinese (zh)
Inventor
陈小兵
赵金玲
高青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Zhihan Technology Development Co.,Ltd.
Original Assignee
Nanjing Zhijin Science And Technology Innovation Service Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Zhijin Science And Technology Innovation Service Center filed Critical Nanjing Zhijin Science And Technology Innovation Service Center
Priority to CN202010707531.XA priority Critical patent/CN111818237A/en
Priority to PCT/CN2020/105183 priority patent/WO2022016573A1/en
Publication of CN111818237A publication Critical patent/CN111818237A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources

Abstract

The application discloses a video monitoring analysis system and a video monitoring analysis method, and relates to the technical field of video processing. The method comprises the following steps: the system comprises a management server, a training server and a plurality of video preprocessing terminals; the management server is used for controlling and managing the training server and the plurality of video preprocessing terminals; the training server is used for training the danger identification model by taking the image data as a training sample; the video preprocessing terminal is used for collecting image data of the monitoring point, analyzing the collected image data according to the danger identification model, feeding back an analysis result to the management server, and uploading the image data to the training server. The video monitoring and analyzing system has the advantages of high safety, high analyzing accuracy, improved accuracy and multiple functions.

Description

Video monitoring analysis system and method
Technical Field
The application relates to the technical field of video processing, in particular to a video monitoring analysis system and a video monitoring analysis method.
Background
With the development of pattern recognition technology, intelligent analysis technologies such as detection, recognition and tracking aiming at foreground targets in videos are widely applied to intelligent video monitoring systems. From an analog video monitoring system to a digital video monitoring system, and to a network video monitoring system which is popularized so far, the system is continuously applied to the fields of urban traffic management, public security monitoring, factory building supervision, district public security and the like, and the video monitoring system becomes an indispensable part in the current social life. Especially, with the rapid development of smart cities, smart traffic, smart communities and other fields in recent years, the development of intelligent video analysis technology is promoted.
Most of the existing video monitoring systems acquire video data from front-end equipment, then directly decode and display the video data, and record the decoded pictures into video files only in the background for archiving and later evidence obtaining, and meanwhile, monitoring staff need to continuously watch a screen in a monitoring room to prevent the abnormal events from being saved or stopped in time, but the staff always have fatigue or negligence and cannot find the events in the video in time, even the irretrievable consequences can be caused, so that the development of an intelligent video analysis system is promoted. The intelligent video analysis system directly analyzes the monitoring video pictures shot by the front end of the camera in real time, a user can set a warning area and a rule for triggering alarm according to requirements and purposes, the alarm is given after the analysis result meets the rule, the alarm can be found before things are about to happen or do not happen, effective prevention or prevention can be achieved, meanwhile, the image pictures are stored and kept for evidence obtaining, and the detailed information of the alarm is stored in a database so as to be inquired later. However, real-time intelligent analysis of videos consumes resources, and a video monitoring system usually has tens of or even more videos, so how to simultaneously perform real-time video analysis on a large number of monitored videos has great significance.
Disclosure of Invention
The application aims to provide a video monitoring analysis system and method, and the system and method have the advantages of high safety, high analysis accuracy, improved accuracy and multiple functions.
In order to achieve the above object, the present application discloses a video monitoring analysis system, comprising: the system comprises a management server, a training server and a plurality of video preprocessing terminals; the management server and the training server are respectively in communication connection with a plurality of video preprocessing terminals; the management server is used for controlling and managing the training server and the video preprocessing terminals; the training server is used for training a danger identification model by taking the image data as a training sample; the video preprocessing terminal is used for collecting image data of a monitoring point, analyzing the collected image data according to the danger identification model, feeding back an analysis result to the management server, and uploading the image data to the training server.
In a preferred embodiment of the present application, the video preprocessing terminal includes: the device comprises a camera, an analysis module and a video encryption module; the camera is in communication connection with the analysis module; the analysis module is in communication connection with the video encryption module; the camera is used for collecting image data of a monitoring point and sending the image data to the analysis module and the video encryption module; the analysis module is used for analyzing the image data according to the danger identification model and feeding back an analysis result to the management server; the video encryption module is used for encrypting the collected image data through a video key and transmitting the encrypted image data to the training server and the management server.
In a preferred embodiment of the present application, the management server includes: the system comprises a management module and a first video decryption module; the first video decryption module is in communication connection with a video encryption module in the video preprocessing terminal; the management module is used for managing the training server and the video preprocessing terminals, and executing a preset alarm processing flow when the analysis result fed back is dangerous; the camera is also used for storing and managing the image data of the camera; the first video decryption module is used for decrypting the video data from the video encryption module.
In a preferred embodiment of the present application, the training server includes: the training module and the second video decryption module; the second video decryption module is in communication connection with a video encryption module in the video preprocessing terminal; the training module is used for taking image data with dangerous analysis results as a training sample, training the training sample through a deep belief network, and updating and perfecting the dangerous recognition model; the second video decryption module is used for decrypting the video data from the video encryption module.
In a preferred embodiment of the present application, the video preprocessing terminal further includes a first authentication module and a first key agreement module; the management server also comprises a second authentication module and a second key negotiation module; the first authentication module and the second authentication module are used for realizing the authentication between the video preprocessing terminal and the management server through public keys; the first key negotiation module and the second key negotiation module are used for establishing key negotiation between the video preprocessing terminal and the management server through keys.
In a preferred embodiment of the present application, the training server further includes a third authentication module and a third key agreement module; the first authentication module and the third authentication module are used for realizing the authentication between the video preprocessing terminal and the training server through public keys; the first key negotiation module and the third key negotiation module are used for establishing key negotiation between the video preprocessing terminal and the management server through keys.
In a preferred embodiment of the present application, the video key is updatable.
The application also discloses a video monitoring analysis method, which comprises the following steps: acquiring image data of a monitoring point through a video preprocessing terminal; analyzing, identifying and judging the acquired image data according to a danger identification model: when the judgment result is normal, uploading the acquired image data to a management server and a training server; and when the judgment result is dangerous, feeding back an analysis result to the management server, executing a preset alarm processing flow by the management server, and uploading the acquired image data to the management server and the training server.
In a preferred embodiment of the present application, the video monitoring and analyzing method further includes: the authentication between the video preprocessing terminal and the management server and/or the training server is realized through a public key; and establishing key agreement between the video preprocessing terminal and the management server and/or the training server through the key.
In a preferred embodiment of the present application, the video monitoring and analyzing method further includes: encrypting the acquired image data through a video key; and uploading the encrypted image data to a management server and a training server.
The video monitoring and analyzing system and method provided by the application have the following advantages:
1. the safety is high: the video monitoring and analyzing system ensures that the collected video can not be easily stolen and utilized by people in the transmission process by carrying out encryption transmission, and has higher safety.
2. The analysis accuracy and precision can be improved: the video monitoring analysis system can continuously improve the accuracy of analysis through deep learning, and the analysis is more accurate than that of a traditional analysis system.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 shows a system structural diagram of a video surveillance analysis system provided in an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application is provided by way of specific examples, and other advantages and effects of the present application will be readily apparent to those skilled in the art from the disclosure herein. The present application is capable of other and different embodiments and its several details are capable of modifications and/or changes in various respects, all without departing from the spirit of the present application. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present application, and the drawings only show the components related to the present application rather than the number, shape and size of the components in actual implementation, and the type, amount and ratio of the components in actual implementation may be changed arbitrarily, and the layout of the components may be more complicated.
Example 1:
as shown in fig. 1, the present embodiment discloses a video monitoring and analyzing system, which includes but is not limited to: the system comprises a management server, a training server and a plurality of video preprocessing terminals; the management server and the training server are respectively in communication connection with the video preprocessing terminals to exchange data. The management server, the training server and the video preprocessing terminals can be connected through wired communication or wireless communication. Since this is a technique well known to those skilled in the art, it will not be described in detail herein. Wherein the content of the first and second substances,
the video preprocessing terminal is used for collecting image data of the monitoring point, analyzing the collected image data according to the danger identification model, feeding back an analysis result to the management server, and uploading the image data to the training server. The image data includes video data and/or image data. And setting and monitoring points by the video preprocessing terminal. The monitoring points are set according to actual needs. For example, the video monitoring and analyzing system is used for monitoring fire in a factory building, and then the monitoring point is arranged in an area where a fire easily occurs in the factory building, and the video preprocessing terminal is used for collecting image data of the monitoring point.
In a preferred embodiment of the present application, the video pre-processing terminal includes but is not limited to: the device comprises a camera, an analysis module and a video encryption module; the camera is in communication connection with the analysis module; the analysis module is in communication connection with the video encryption module; wherein the content of the first and second substances,
the camera is used for collecting image data of the monitoring point and sending the image data to the analysis module and the video encryption module.
The analysis module is used for analyzing the image data according to the danger identification model and feeding back an analysis result to the management server; the danger identification model is obtained by continuously training a training sample through a neural network by a training server. Preferably, the neural network employs a deep belief network.
The video encryption module is used for encrypting the acquired image data through a video key and transmitting the encrypted image data to the training server and the management server. Based on the consideration of the security of the image data, in this embodiment, before the video preprocessing terminal sends the image data to the management server and the training server, the video preprocessing terminal encrypts the image data to prevent the image data from being stolen.
Further, the video preprocessing terminal further comprises a first authentication module and a first key negotiation module, wherein the first authentication module is used for realizing authentication with the management server and/or the training server through a public key. The first key agreement module is used for establishing key agreement with the management server and/or the training server through keys.
The training server is used for training the danger identification model by taking the image data as a training sample. Training servers include, but are not limited to: the training module and the second video decryption module; the second video decryption module is in communication connection with the video encryption module in the video preprocessing terminal, wherein,
the training module is used for taking the image data with dangerous analysis results as a training sample, training the training sample through a deep belief network, and continuously updating and perfecting a dangerous recognition model. Deep belief networks are neural network learning methods well known to those skilled in the art and will not be described in detail herein.
The second video decryption module is used for decrypting the video data from the video encryption module. In this embodiment, the video key is used to encrypt the acquired image data at the video preprocessing terminal, and correspondingly, the corresponding second video decryption module is arranged at the training server and performs decryption processing through the video key.
Further, the training server further comprises a third authentication module and a third key negotiation module; the third authentication module of the training server and the first authentication module of the video preprocessing terminal are used for realizing authentication between the training server and the video preprocessing terminal through public keys; and the third key negotiation module of the training server and the first key negotiation module of the video preprocessing terminal establish key negotiation between the training server and the video preprocessing terminal through keys.
The management server is used for controlling and managing the training server and the video preprocessing terminals. Management servers include, but are not limited to: the system comprises a management module and a first video decryption module; the first video decryption module is in communication connection with a video encryption module in the video preprocessing terminal; wherein
The management module is used for managing the training server and the video preprocessing terminals and executing a preset alarm processing flow when receiving an analysis result fed back by the video preprocessing terminals as a danger; the management module is also used for storing and managing the image data.
The first video decryption module is used for decrypting the video data from the video encryption module. The management server is provided with a first video decryption module corresponding to the video encryption module of the video preprocessing terminal, as well as the training server, so as to decrypt the image data through the video key.
Further, the management server also comprises a second authentication module and a second key negotiation module;
the second authentication module of the management server and the first authentication module of the video preprocessing terminal are used for realizing the authentication between the video preprocessing terminal and the management server through a public key;
the second key negotiation module of the management server and the first key negotiation module of the video preprocessing terminal are used for establishing key negotiation between the video preprocessing terminal and the management server through keys.
Also, in a preferred embodiment of the present application, the video key is updatable.
According to some embodiments of the present application, the mutual authentication between the camera and the management server or the training server is performed when the camera first turns on or refreshes a session communication protocol to register with the management server or the training server. Through bidirectional authentication, the two parties acquire the public key of the other party, namely a digital certificate, the public key is used for a key agreement process during subsequent key agreement establishment, and an information authentication key MAK is negotiated for authenticating subsequent signaling except registration information. When key agreement is carried out between the camera and the management server or the training server, the key agreement between video encryption communication and automatic key agreement when the key is changed regularly are established for the first time.
Implement 2
The embodiment discloses a video monitoring analysis method, which comprises the following steps:
acquiring image data of a monitoring point through a video preprocessing terminal;
analyzing, identifying and judging the acquired image data according to a danger identification model:
when the judgment result is normal, uploading the acquired image data to a management server and a training server;
and when the judgment result is dangerous, feeding back an analysis result to the management server, executing a preset alarm processing flow by the management server, and uploading the acquired image data to the management server and the training server.
Preferably, when the video surveillance system of embodiment 1 starts to work or the communication connection is reestablished, the following operations are further performed:
the authentication between the video preprocessing terminal and the management server and/or the training server is realized through a public key;
and establishing key agreement between the video preprocessing terminal and the management server and/or the training server through the key.
For example, after the management server and the video preprocessing terminal, or the training server and the video preprocessing terminal both authenticate, the management server or the training server sends image data request information to the camera of the video preprocessing terminal, where the image data request information includes a signaling and a key MAK subjected to hash calculation;
after the video preprocessing terminal receives the image data request information, the video preprocessing terminal verifies a key MAK, and if the key MAK passes the verification, the video preprocessing terminal is also used for sending information to a management server/a training server in two situations:
in the first case: if the video preprocessing terminal does not update the video key VKEK, the video key VKEK is encrypted by using a public key of the management server/training server to generate a video key encryption key ciphertext EVKEK, and then the video key encryption key ciphertext EVKEK and a video key encryption key version number VKEVKEVversion are put into an SDP channel to be sent to the management server/training server;
in the second case: if the video preprocessing terminal updates the video key VKEK, the video key VKEK is encrypted by using a public key of the management server/training server to generate a video key encryption key ciphertext EVKEK, and then the video key encryption key ciphertext EVKEK, the updated video key encryption key version number VKEVKEVversion and the key MAK subjected to Hash calculation are sent to the management server/training server; and after the video preprocessing terminal receives the information, verifying the key MAK, and after the verification is passed, putting the video key encryption key ciphertext EVKEK and the video key encryption key version number VKEVVERSION into an SDP channel and sending the SDP channel to the management server/training server.
And after the video preprocessing terminal receives the video key encryption key ciphertext EVKEK and the video key encryption key version number VKEVVersion, verifying the key MAK, and after the verification is passed, returning a verification receipt to the camera, so that the key negotiation with the management server/training server is successful.
In a preferred embodiment of the present application, the video monitoring and analyzing method further includes: encrypting the acquired image data through a video key; and uploading the encrypted image data to a management server and a training server.
According to the video monitoring and analyzing system and method, through encrypted transmission, the collected video can not be easily stolen and utilized by people in the transmission process, and the safety is high. Moreover, the video monitoring analysis system can continuously improve the accuracy of analysis through deep learning, and compared with the traditional analysis system, the video monitoring analysis system is more accurate in analysis and higher in accuracy.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a unit, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional units in the embodiments of the present application may be integrated together to form an independent part, or each unit may exist separately, or two or more units may be integrated to form an independent part.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U disk, a removable hard disk, a Read-only memory (ROM, Read-Onl8 memory 8), a Random Access memory (RAM, Random Access memory 8), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.

Claims (10)

1. A video surveillance analysis system, comprising: the system comprises a management server, a training server and a plurality of video preprocessing terminals; the management server and the training server are respectively in communication connection with a plurality of video preprocessing terminals;
the management server is used for controlling and managing the training server and the video preprocessing terminals;
the training server is used for training a danger identification model by taking the image data as a training sample;
the video preprocessing terminal is used for collecting image data of a monitoring point, analyzing the collected image data according to the danger identification model, feeding back an analysis result to the management server, and uploading the image data to the training server.
2. The video surveillance analysis system of claim 1, wherein the video pre-processing terminal comprises: the device comprises a camera, an analysis module and a video encryption module; the camera is in communication connection with the analysis module; the analysis module is in communication connection with the video encryption module;
the camera is used for collecting image data of a monitoring point and sending the image data to the analysis module and the video encryption module;
the analysis module is used for analyzing the image data according to the danger identification model and feeding back an analysis result to the management server;
the video encryption module is used for encrypting the collected image data through a video key and transmitting the encrypted image data to the training server and the management server.
3. The video surveillance analysis system of claim 2, wherein the management server comprises: the system comprises a management module and a first video decryption module; the first video decryption module is in communication connection with a video encryption module in the video preprocessing terminal;
the management module is used for managing the training server and the video preprocessing terminals, and executing a preset alarm processing flow when the analysis result fed back is dangerous; the camera is also used for storing and managing the image data of the camera;
the first video decryption module is used for decrypting the video data from the video encryption module.
4. The video surveillance analysis system of claim 2, wherein the training server comprises: the training module and the second video decryption module; the second video decryption module is in communication connection with a video encryption module in the video preprocessing terminal;
the training module is used for taking image data with dangerous analysis results as a training sample, training the training sample through a deep belief network, and updating and perfecting the dangerous recognition model;
the second video decryption module is used for decrypting the video data from the video encryption module.
5. The video surveillance analysis system of claim 2, wherein the video pre-processing terminal further comprises a first authentication module and a first key agreement module; the management server also comprises a second authentication module and a second key negotiation module; the first authentication module and the second authentication module are used for realizing the authentication between the video preprocessing terminal and the management server through public keys;
the first key negotiation module and the second key negotiation module are used for establishing key negotiation between the video preprocessing terminal and the management server through keys;
6. the video surveillance analysis system of claim 5, wherein the training server further comprises a third authentication module and a third key agreement module;
the first authentication module and the third authentication module are used for realizing the authentication between the video preprocessing terminal and the training server through public keys;
the first key negotiation module and the third key negotiation module are used for establishing key negotiation between the video preprocessing terminal and the management server through keys.
7. A video surveillance analysis method based on the video surveillance analysis system of any one of claims 1 to 6, comprising:
acquiring image data of a monitoring point through a video preprocessing terminal;
analyzing, identifying and judging the acquired image data according to a danger identification model:
when the judgment result is normal, uploading the acquired image data to a management server and a training server;
and when the judgment result is dangerous, feeding back an analysis result to the management server, executing a preset alarm processing flow by the management server, and uploading the acquired image data to the management server and the training server.
8. The video surveillance analysis method of claim 7, further comprising:
the authentication between the video preprocessing terminal and the management server and/or the training server is realized through a public key;
and establishing key agreement between the video preprocessing terminal and the management server and/or the training server through the key.
9. The video surveillance analysis method of claim 7, further comprising:
encrypting the acquired image data through a video key;
and uploading the encrypted image data to a management server and a training server.
10. The video surveillance analysis method of claim 9, wherein the video key is updatable.
CN202010707531.XA 2020-07-21 2020-07-21 Video monitoring analysis system and method Pending CN111818237A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010707531.XA CN111818237A (en) 2020-07-21 2020-07-21 Video monitoring analysis system and method
PCT/CN2020/105183 WO2022016573A1 (en) 2020-07-21 2020-07-28 Video monitoring analysis system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010707531.XA CN111818237A (en) 2020-07-21 2020-07-21 Video monitoring analysis system and method

Publications (1)

Publication Number Publication Date
CN111818237A true CN111818237A (en) 2020-10-23

Family

ID=72861587

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010707531.XA Pending CN111818237A (en) 2020-07-21 2020-07-21 Video monitoring analysis system and method

Country Status (2)

Country Link
CN (1) CN111818237A (en)
WO (1) WO2022016573A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115797850B (en) * 2023-02-06 2023-04-18 中国石油大学(华东) Oil field production safety early warning analysis system based on video stream

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080049942A1 (en) * 2006-08-28 2008-02-28 General Instrument Corporation System and method for secure key distribution to manufactured products
CN107277456A (en) * 2017-07-26 2017-10-20 北京计算机技术及应用研究所 A kind of video security monitoring system based on Android device
CN108830143A (en) * 2018-05-03 2018-11-16 深圳市中电数通智慧安全科技股份有限公司 A kind of video analytic system based on deep learning
CN109151508A (en) * 2018-11-09 2019-01-04 北京京航计算通讯研究所 A kind of video encryption method
CN109218825A (en) * 2018-11-09 2019-01-15 北京京航计算通讯研究所 A kind of video encryption system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6611206B2 (en) * 2001-03-15 2003-08-26 Koninklijke Philips Electronics N.V. Automatic system for monitoring independent person requiring occasional assistance
CA2656268A1 (en) * 2006-08-03 2008-02-07 International Business Machines Corporation Video surveillance system and method with combined video and audio recognition
KR101337876B1 (en) * 2009-12-14 2013-12-06 한국전자통신연구원 Server/Camera for video surveillance system and event processing method thereof
US10706701B2 (en) * 2018-01-12 2020-07-07 Qognify Ltd. System and method for dynamically ordering video channels according to rank of abnormal detection
CN108109385B (en) * 2018-01-18 2022-06-14 南京杰迈视讯科技有限公司 System and method for identifying and judging dangerous behaviors of power transmission line anti-external damage vehicle
CN110858288A (en) * 2018-08-24 2020-03-03 中国移动通信集团浙江有限公司 Abnormal behavior identification method and device
CN109544870B (en) * 2018-12-20 2021-06-04 同方威视科技江苏有限公司 Alarm judgment method for intelligent monitoring system and intelligent monitoring system
CN110717433A (en) * 2019-09-30 2020-01-21 华中科技大学 Deep learning-based traffic violation analysis method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080049942A1 (en) * 2006-08-28 2008-02-28 General Instrument Corporation System and method for secure key distribution to manufactured products
CN107277456A (en) * 2017-07-26 2017-10-20 北京计算机技术及应用研究所 A kind of video security monitoring system based on Android device
CN108830143A (en) * 2018-05-03 2018-11-16 深圳市中电数通智慧安全科技股份有限公司 A kind of video analytic system based on deep learning
CN109151508A (en) * 2018-11-09 2019-01-04 北京京航计算通讯研究所 A kind of video encryption method
CN109218825A (en) * 2018-11-09 2019-01-15 北京京航计算通讯研究所 A kind of video encryption system

Also Published As

Publication number Publication date
WO2022016573A1 (en) 2022-01-27

Similar Documents

Publication Publication Date Title
US8356342B2 (en) Method and system for issuing a kill sequence for a token
CN111882233A (en) Storage risk early warning method, system and device based on block chain and storage medium
CN108491785B (en) Artificial intelligence image identification attack defense system
CN110083757A (en) A kind of abnormal data access and querying method, system based on alliance's chain network
WO2024012515A1 (en) Vehicle monitoring method and device, and storage medium
CN114783553A (en) Rework epidemic prevention passing system and method by combining health code data with temperature measuring equipment
Albano et al. Secure and distributed video surveillance via portable devices
CN111553689A (en) Matching correlation method and system based on quadratic hash
CN117642783A (en) Monitoring data filtering techniques
CN111818237A (en) Video monitoring analysis system and method
CN108512651B (en) Artificial intelligence image identification attack defense method, system and storage medium
KR102365589B1 (en) Method and apparatus for detecting abuse based on log information in closed-circuit television integrated management system
CN112084932A (en) Data processing method, device and equipment based on image recognition and storage medium
CN116756750A (en) Medical sensitive data acquisition desensitization method
CN112800454B (en) Case data processing method, related device and computer readable medium
CN109271811B (en) Group signature-based electronic material evidence tamper-proof storage method
CN109120648B (en) A kind of anti-tamper verifying system of real-time monitoring data
CN111553690A (en) Block chain system supporting multipoint transaction
JP2008059543A (en) Authentication system for cellphone for use in private school such as children music school, and program
CN111553694A (en) Distributed storage block chain method and system
CN117349822B (en) Data processing method, device, computer equipment, storage medium and program product
CN116684207B (en) Method, device, equipment and medium for processing monitoring data based on blockchain
CN115277093B (en) Tamper verification method, tamper verification system, tamper verification device and electronic equipment
CN114661934B (en) Method for multidimensional monitoring of government new media public opinion early warning based on data mining analysis technology
CN116647369A (en) Identity verification method, device, equipment and storage medium based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210219

Address after: 211100 No. 18 Zhilan Road, Jiangning District, Nanjing City, Jiangsu Province

Applicant after: Nanjing Zhihan Technology Development Co.,Ltd.

Address before: 211100 18 / F, building 4, No.18 Zhilan Road, Jiangning District, Nanjing City, Jiangsu Province

Applicant before: Nanjing Zhijin science and Technology Innovation Service Center

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201023