CN112163538A - Illegal data identification method and device and electronic equipment - Google Patents

Illegal data identification method and device and electronic equipment Download PDF

Info

Publication number
CN112163538A
CN112163538A CN202011070373.8A CN202011070373A CN112163538A CN 112163538 A CN112163538 A CN 112163538A CN 202011070373 A CN202011070373 A CN 202011070373A CN 112163538 A CN112163538 A CN 112163538A
Authority
CN
China
Prior art keywords
identification
traffic data
http
sip
traffic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011070373.8A
Other languages
Chinese (zh)
Other versions
CN112163538B (en
Inventor
王洵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Zhongke Tongda High New Technology Co Ltd
Original Assignee
Wuhan Zhongke Tongda High New Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Zhongke Tongda High New Technology Co Ltd filed Critical Wuhan Zhongke Tongda High New Technology Co Ltd
Priority to CN202011070373.8A priority Critical patent/CN112163538B/en
Publication of CN112163538A publication Critical patent/CN112163538A/en
Application granted granted Critical
Publication of CN112163538B publication Critical patent/CN112163538B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • G06V20/54Surveillance or monitoring of activities, e.g. for recognising suspicious objects of traffic, e.g. cars on the road, trains or boats
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/94Hardware or software architectures specially adapted for image or video understanding
    • G06V10/95Hardware or software architectures specially adapted for image or video understanding structured as a network, e.g. client-server architectures
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/0104Measuring and analyzing of parameters relative to traffic conditions
    • G08G1/0125Traffic data processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Signal Processing (AREA)
  • Artificial Intelligence (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Multimedia (AREA)
  • Software Systems (AREA)
  • Evolutionary Biology (AREA)
  • Mathematical Physics (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • Biomedical Technology (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Chemical & Material Sciences (AREA)
  • Analytical Chemistry (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides an illegal data identification method, a device and electronic equipment, based on the method, a data server firstly receives an http traffic data calling request sent by a traffic police terminal on a calling selection page, converts the http traffic data calling request into an sip traffic data calling request, synchronously processing the http state identification and the sip state identification corresponding to the two types of requests, sending the sip traffic data calling request to the target camera, according to the content of the returned sip traffic data call response, synchronously updating the identification content of the sip state identification and the http state identification, when the identification content is the traffic data calling request is completed, generating an http traffic data calling response and returning the http traffic data calling response to the traffic police terminal, then, the traffic data returned by the front-end camera is received and sent to the identification equipment for illegal data identification, and illegal data are returned to the display equipment.

Description

Illegal data identification method and device and electronic equipment
Technical Field
The application relates to the field of intelligent traffic, in particular to an illegal data identification method and device and electronic equipment.
Background
When illegal behaviors in traffic data are identified, a data calling request needs to be initiated for a front-end camera, when most security cameras on the market call the traffic data, in order to simplify the data calling request process, traffic data calling signaling of the front-end camera is usually packaged into signaling in an SDK (Software Development Kit) format, and then an SDK is called by a traffic police system and is developed and manufactured by an external manufacturer, and the traffic data shot by the front-end camera can be acquired by personnel in a non-traffic police system, namely, some potential safety hazards exist in the data calling mode.
Therefore, the existing illegal data identification method has the technical problem of low safety, and needs to be improved.
Content of application
The embodiment of the application provides an illegal data identification method which is used for improving the safety of a front-end camera traffic data calling process.
In order to solve the above technical problem, an embodiment of the present application provides the following technical solutions:
the application provides a method for identifying illegal data, is applicable to wisdom traffic system, wisdom traffic system includes front end camera, data server, display device, identification equipment and traffic police terminal, it has the neural network model to operate in the identification equipment, the front end camera is connected based on the sip agreement data server, the traffic police terminal the display device with the identification equipment is connected based on the http agreement data server, illegal data identification method is applied to the data server, illegal data identification method includes:
receiving an http traffic data calling request sent by the traffic police terminal based on an http protocol; the http traffic data calling request comprises that after the traffic police terminal receives a triggering instruction for calling traffic data, a calling selection page comprising a display equipment selection control and a front-end camera selection control is displayed, target display equipment is determined according to selection operation aiming at the display equipment selection control, a target camera is determined according to selection operation aiming at the front-end camera selection control, and the http traffic data calling request conforming to an http protocol is generated according to a terminal identifier of the traffic police terminal, an identification equipment identifier of the identification equipment, a target camera identifier of the target camera and a target display equipment identifier of the target display equipment;
generating an sip traffic data calling request corresponding to the http traffic data calling request according to the target camera identification, and generating an http state identification corresponding to the http traffic data calling request, wherein the sip state identification corresponding to the sip traffic data calling request synchronizes the identification contents of the http state identification and the sip state identification in real time, and the identification contents comprise a traffic data calling request completion state;
sending the sip traffic data calling request to a target camera corresponding to the target camera identification based on an sip protocol, receiving an sip traffic data calling response returned by the target camera based on the sip protocol, and synchronously updating the identification contents of the sip state identification and the http state identification according to the content of the sip traffic data calling response;
when the identification content of the http state identification is that a traffic data calling request is completed, generating an http traffic data calling response corresponding to the http state identification, and returning the http traffic data calling response to the traffic police terminal based on an http protocol according to the terminal identification;
receiving traffic data sent by the target camera, and sending the traffic data to the identification equipment according to the identification equipment;
and receiving illegal data which is identified from the traffic data by the identification equipment based on the neural network model, and returning the illegal data to the target display equipment according to the target display equipment identification.
Simultaneously, this application embodiment still provides a device for recognizing illegal data, device for recognizing illegal data is used for wisdom traffic system based on the http protocol, wisdom traffic system includes front end camera, data server, display device, identification equipment and traffic police terminal, it has the neural network model to operate in the identification equipment, the front end camera is connected based on the sip protocol data server, the traffic police terminal display device with identification equipment connects based on the http protocol data server, device for recognizing illegal data sets up in the data server, device for recognizing illegal data includes:
the receiving module is used for receiving an http traffic data calling request sent by the traffic police terminal based on an http protocol; the http traffic data calling request comprises that after the traffic police terminal receives a triggering instruction for calling traffic data, a calling selection page comprising a display equipment selection control and a front-end camera selection control is displayed, target display equipment is determined according to selection operation aiming at the display equipment selection control, a target camera is determined according to selection operation aiming at the front-end camera selection control, and the http traffic data calling request conforming to an http protocol is generated according to a terminal identifier of the traffic police terminal, an identification equipment identifier of the identification equipment, a target camera identifier of the target camera and a target display equipment identifier of the target display equipment;
the first synchronization module is used for generating an sip traffic data calling request corresponding to the http traffic data calling request according to the target camera identification, generating an http state identification corresponding to the http traffic data calling request, synchronizing the identification content of the http state identification and the sip state identification in real time, wherein the identification content comprises a traffic data calling request completion state;
the second synchronization module is used for sending the sip traffic data calling request to the target camera corresponding to the target camera identification based on an sip protocol, receiving an sip traffic data calling response returned by the target camera based on the sip protocol, and synchronously updating the identification contents of the sip state identification and the http state identification according to the content of the sip traffic data calling response;
the first returning module is used for generating an http traffic data calling response corresponding to the http state identifier when the identifier content of the http state identifier is that a traffic data calling request is completed, and returning the http traffic data calling response to the traffic police terminal based on an http protocol according to the terminal identifier;
the sending module is used for receiving the traffic data sent by the target camera and sending the traffic data to the identification equipment according to the identification equipment identifier;
and the second returning module is used for receiving the illegal data which is identified by the identification equipment from the traffic data based on the neural network model and returning the illegal data to the target display equipment according to the target display equipment identification.
The application also provides an electronic device comprising a memory and a processor; the memory stores an application program, and the processor is configured to execute the application program in the memory to perform any one of the operations of the illegal data identification method.
Has the advantages that: the method and the device send out the http traffic data calling request based on the http protocol on the calling selection page, and convert the http traffic data calling request into the sip traffic data calling request which can be identified by the front-end camera, then convert the sip traffic data calling response returned by the front-end camera into the http traffic data calling response and return the http traffic data calling response to the traffic police terminal, when the request is initiated on the calling selection page, the corresponding target camera and the target display equipment can be selected only according to the selection operation, the operation is simple, the whole calling process traffic police terminal can be completed only on a web browser or a platform, special SDK software does not need to be called, safety is guaranteed, the http is a general protocol, the operation is simple, understanding is facilitated, and convenience in data calling is improved. In addition, adopt the neural network model of training to discern illegal data, for artifical recognition, improved recognition efficiency, and the recognition process is independent of outside the data server, when the system needs the upgrading, only need upgrade to identification equipment, and need not carry out whole upgrading to the data server that the data bulk is great, consequently improved upgrading efficiency, also reduced the cost of data maintenance. In the protocol conversion process, the identification contents of the sip state identification and the http state identification are synchronized, so that the generated sip traffic data call response can be converted into the http traffic data call response in time, and the response returning speed is improved.
Drawings
The technical solution and other advantages of the present application will become apparent from the detailed description of the embodiments of the present application with reference to the accompanying drawings.
Fig. 1 is a schematic view of a scenario of an illegal data identification system according to an embodiment of the present application.
Fig. 2 is a schematic flowchart of an illegal data identification method according to an embodiment of the present application.
Fig. 3 is a schematic diagram of a call selection page of a traffic police terminal in the illegal data identification method according to the embodiment of the present application.
Fig. 4 is a schematic diagram of a first model of a process from sending a traffic data call request to receiving a traffic data call response in an embodiment of the present application.
Fig. 5 is a schematic diagram of a second model of a process from sending a traffic data call request to receiving a traffic data call response in the embodiment of the present application.
Fig. 6 is a schematic diagram of a third model of a process from sending a traffic data call request to receiving a traffic data call response in the embodiment of the present application.
Fig. 7 is a schematic view of an illegal data display page of a display terminal in the illegal data identification method provided in the embodiment of the application.
Fig. 8 is a schematic structural diagram of an illegal data identification device according to an embodiment of the present application.
Fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the embodiment of the present application, the intelligent traffic system is an integrated network system that is constructed by comprehensively applying technologies such as audio/video monitoring, communication, computer network, system integration, etc. and has functions of information acquisition, transmission, exchange, control, display, storage, processing, etc. and can realize interconnection, intercommunication, and mutual control between different devices and systems in the traffic field for the purpose of maintaining national security and social stability and preventing and fighting against illegal criminal activities. The intelligent traffic system comprises a front-end camera, a data server, display equipment, identification equipment and a traffic police terminal, wherein a neural network model runs in the identification equipment, the front-end camera is connected with the data server based on an sip protocol, and the traffic police terminal, the display equipment and the identification equipment are connected with the data server based on an http protocol.
In the embodiment of the application, the front-end camera refers to a camera which is installed in a monitoring site in an intelligent traffic system and is used for information acquisition, encoding, processing, storage, transmission and safety control.
In the embodiment of the present application, the traffic police terminal refers to a client device registered and authorized by the intelligent transportation system and having an operation requirement on data and devices in the system, and may specifically include a client for traffic police and a client for developers.
In the embodiment of the application, the identification device is a device which operates with a neural network model and can identify illegal data by calling the neural network model, the device and the data server are mutually independent, and the identification device is only required to be independently updated when the system is updated, and the data server is not required to be comprehensively updated.
In the embodiment of the present application, the display device refers to a device that displays illegal data through a web page or a platform interface.
In the embodiment of the present application, the neural network model refers to an artificial neural network structure having a hierarchical structure, which includes an input layer, an output layer, and an intermediate layer (also called a hidden layer). In a neural network model, the number of nodes of an input layer and an output layer is often fixed, an intermediate layer can be freely designated, the topology and the arrows in a neural network structure diagram represent the flow direction of data in a prediction process, the key in the structure diagram is the connection among neurons, and each connecting line corresponds to a different weight (the value of which is called a weight), which is obtained by training. The neural network model is trained for multiple times based on the preprocessed training samples, and classification and identification of illegal data can be realized. After the traffic data are input into the trained neural network model, the traffic data enter the intermediate layer after feature extraction is carried out on the input layer, a series of complex operations such as convolution, pooling, regression processing and the like are carried out on the intermediate layer, various illegal behaviors can be identified, and corresponding illegal data are output by the output layer.
In the embodiment of the present application, the traffic data refers to data, such as vehicle information, pedestrian information, and operation parameters of vehicles and pedestrians, in a monitoring location, which are captured by a front-end camera, and is usually visual data such as video or image, where the vehicle information may include a brand, a model, a color, license plate number information, and the like of a vehicle, and the pedestrian information may include a gender, a height, clothing, a hairstyle, and the like of a pedestrian.
The embodiment of the application provides an http protocol-based illegal data identification method and device for an intelligent traffic system and electronic equipment. The illegal data identification device can be integrated in electronic equipment, and the electronic equipment can be a server or a terminal and other equipment.
Referring to fig. 1, fig. 1 is a schematic view of a scene of an illegal data identification system provided in an embodiment of the present application, where the system may include terminals and servers, and the terminals, the servers, and the terminals and the servers are connected and communicated through the internet formed by various gateways, and the like, where the application scene includes a traffic police terminal 11, a data server 12, a front-end camera 13, an identification device 14, and a display device 15; wherein:
the traffic police terminal 11, the recognition device 14 and the display device 15 include, but are not limited to, a tablet Computer, a notebook Computer, a Personal Computer (PC), a mini processing box, or other devices;
the data server 12 comprises a local server and/or a remote server and the like;
the front-end camera 13 includes video and image capture equipment disposed at the monitoring site.
The traffic police terminal 11, the data server 12, the front-end camera 13, the identification device 14 and the display device 15 are located in a wireless network or a wired network, the front-end camera 13 is connected with the data server 12 based on an sip protocol, and the traffic police terminal 11, the display device 15 and the identification device 14 are connected with the data server 12 based on an http protocol, so as to realize data interaction between the five devices, wherein:
the traffic police terminal 11 obtains a target display equipment identifier from the display equipment 15 based on the selection operation on the calling selection page, the data server 12 receives an http traffic data calling request sent by the traffic police terminal 11 on the calling selection page based on an http protocol, then generates a corresponding sip traffic data calling request, synchronizes the identification contents of the http state identifier and the sip state identifier corresponding to the traffic police terminal 11 in real time, selects a target camera from the front-end camera 13 based on the sip protocol and sends the sip traffic data calling request to the target camera, receives a sip traffic data calling response returned by the target camera based on the sip protocol, then synchronously updates the identification contents of the sip state identifier and the http state identifier according to the contents of the sip traffic data calling response, and generates the http traffic data calling response corresponding to the http state identifier when the identification contents of the http state identifier are the traffic data calling request, and returning an http traffic data call response to the traffic police terminal 11 based on an http protocol, receiving traffic data sent by the target camera, sending the traffic data to the recognition device 14 according to the recognition device identifier, receiving illegal data recognized by the recognition device 14 from the traffic data based on the neural network model, and returning the illegal data to the display device 15 according to the target display device identifier, so that the traffic police terminal 11 can recognize the illegal data.
It should be noted that the system scenario diagram shown in fig. 1 is only an example, and the server and the scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not form a limitation on the technical solution provided in the embodiment of the present application, and as a person having ordinary skill in the art knows, with the evolution of the system and the occurrence of a new service scenario, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems. The following are detailed below. It should be noted that the following description of the embodiments is not intended to limit the preferred order of the embodiments.
Referring to fig. 2, fig. 2 is a schematic flowchart of a method for identifying illegal data according to an embodiment of the present application, where the method includes:
s201: receiving an http traffic data calling request sent by a traffic police terminal based on an http protocol; the http traffic data calling request comprises the steps that after a traffic police terminal receives a triggering instruction for calling traffic data, a calling selection page comprising a display equipment selection control and a front-end camera selection control is displayed, target display equipment is determined according to selection operation aiming at the display equipment selection control, a target camera is determined according to selection operation aiming at the front-end camera selection control, and the http traffic data calling request conforming to an http protocol is generated according to a terminal identification of the traffic police terminal, an identification equipment identification of the identification equipment, a target camera identification of the target camera and a target display equipment identification of the target display equipment.
The traffic police terminal sends an http traffic data calling request to the data server based on an http protocol, when the request is sent, a sender can be an internal person of a public security system and is used for calling traffic data of pedestrians or vehicles in a monitoring place so as to enable identification equipment to judge and process illegal behaviors, and the sender can also be a developer with access authority and used for calling real-time traffic data of a front-end camera and debugging calling parameters and calling related equipment according to calling responses. The http traffic data calling request can be sent through a video monitoring platform which is developed independently, or can be directly sent through a web browser and received by a data server. The request under the http protocol is a one-way channel request from the traffic police terminal to the data server.
The http traffic data calling request carries a terminal identification, an identification equipment identification, a target display equipment identification and a target camera identification, wherein the terminal identification comprises an IP address and a port of a traffic police terminal, the target camera identification comprises an ID of a target camera, the identification equipment identification comprises the IP address and the port of the identification equipment, and the target display equipment identification comprises the IP address and the port of the display equipment. Before sending the request, the traffic police terminal establishes connection with the identification device, and obtains the device identifier of the identification device based on the http protocol. In general, the target display device and the traffic police terminal are the same device, that is, the traffic police terminal initiating the request also serves as the target display device displaying the illegal data. The target display device and the traffic police terminal can also be different devices, namely the traffic police terminal which initiates the request and the target display device which displays the illegal data are different devices which are registered in the intelligent traffic system. In addition, there may be a plurality of target display devices, and the plurality of target display devices may include a traffic police terminal and other display devices, or may all be other display devices.
After receiving a triggering instruction for calling traffic data, the traffic police terminal displays a calling selection page comprising a display equipment selection control and a front-end camera selection control, and then performs corresponding selection operation on the calling selection page to determine which camera in a monitoring place is required to be called to shoot the traffic data and which display equipment displays illegal data corresponding to the traffic data. When the display device selection control is triggered, a list of all registered display devices is generated, then one or some display devices can be selected as target display devices, and the display device list can set the traffic police terminal initiating the request or the display device selected by the last request as the default target display device. When the front-end camera selection control is triggered, directories of all registered front-end cameras are generated, one of the directories can be selected as a target camera, and the front-end camera selected by the previous request can be set as a default target camera in the front-end camera directory.
And after the corresponding selection operation is carried out on the calling selection page, generating an http traffic data calling request according with an http protocol according to the terminal identifier of the traffic police terminal, the target display device identifier of the target display device and the target camera identifier of the target camera.
S202: and generating an sip traffic data calling request corresponding to the http traffic data calling request according to the target camera identification, and generating an http state identification corresponding to the http traffic data calling request, an sip state identification corresponding to the sip traffic data calling request, and synchronizing identification contents of the http state identification and the sip state identification in real time, wherein the identification contents comprise a traffic data calling request completion state.
After receiving the http traffic data calling request, determining a target camera from the front-end camera cluster information stored in the data server according to a target camera identification carried in the http traffic data calling request, acquiring an access address of the target camera, and generating a request head in the sip traffic data calling request according to the access address. And then, converting each calling command in the http traffic data calling request into a calling command under an sip protocol, generating the calling command into a message body in the sip traffic data calling request, and combining a request header and the message body to generate a corresponding sip traffic data calling request.
After the sip traffic data calling request corresponding to the http traffic data calling request is generated, corresponding http state identification and sip state identification are respectively generated for the http traffic data calling request and the sip traffic data calling request, and identification contents of the two state identifications comprise the starting time of the traffic data calling request and the completion state of the traffic data calling request. And synchronizing the identification contents of the http state identification and the sip state identification, namely, when the identification content of one of the http state identification and the sip state identification changes at any moment, the identification content of the other one of the http state identification and the sip state identification changes in the same way. When the traffic data call request is not processed, the traffic data call request completion state in the identification content always shows that the traffic data call request is not completed, and if a traffic data call response is received, the traffic data call request completion state in the identification content shows that the traffic data call request is completed.
S203: sending an sip traffic data calling request to a target camera corresponding to the target camera identification based on the sip protocol, receiving an sip traffic data calling response returned by the target camera based on the sip protocol, and synchronously updating the identification contents of the sip state identification and the http state identification according to the content of the sip traffic data calling response.
After the sip traffic data calling request is obtained, according to the identification of the target camera, a sip session is established between the data server and the target camera, the sip traffic data calling request is sent to the corresponding target camera, and the target camera processes the request after receiving the sip traffic data calling request.
After the target camera processes the sip traffic data calling request, sending a processing signaling to the data server through an sip session established between the target camera and the data server, generating an sip traffic data calling response according to the processing signaling, and then synchronously updating the identification contents of the sip state identification and the http state identification according to the content of the sip traffic data calling response. And when the content of the sip traffic data calling response is that the calling is completed, updating the identification content of the sip state identification and the http state identification into the traffic data calling request.
S204: and when the identification content of the http state identification is that the traffic data calling request is completed, generating an http traffic data calling response corresponding to the http state identification, and returning the http traffic data calling response to the traffic police terminal based on an http protocol according to the terminal identification.
And when the identification contents of the sip state identification and the http state identification are updated to the completion of the traffic data calling request, the data server generates a corresponding http traffic data calling response, wherein the response content of the http traffic data calling response is the same as the response content of the sip traffic data calling response. And after the generated http traffic data call response, determining the traffic police terminal of the sent http traffic data call response according to the terminal identifier, then establishing an http session between the data server and the traffic police terminal, and calling the response to the http traffic data returned by the traffic police terminal.
S205: and receiving traffic data sent by the target camera, and sending the traffic data to the identification equipment according to the identification of the identification equipment.
When the call response is that the call is completed, the data server receives traffic data sent by the target camera, the traffic data is usually a media bare stream shot by the front-end camera, before the traffic data is sent, the traffic data needs to be encapsulated to form a data packet, for example, the data packet can be packaged into an RTP data packet, then the data packet is sent to the data server, and after the data packet is received by the data server, the data packet is sent to the identification device based on an http protocol according to the identification device identifier.
S206: and receiving illegal data which is identified from the traffic data by the identification equipment based on the neural network model, and returning the illegal data to the target display equipment according to the target display equipment identification.
And after receiving the traffic data, the identification equipment unpacks the traffic data, preprocesses the unpacked traffic data, such as removing some non-video data, interference data and the like, inputs the traffic data into a pre-trained neural network model, detects and tracks pedestrian targets and vehicle targets in each frame of image of the shot video, and determines the behavior track of the pedestrian targets and the vehicle targets. Then, the neural network model identifies the detected vehicle target to obtain attributes such as brand, vehicle type, license plate number, vehicle color and the like, and identifies the detected pedestrian target to obtain attributes such as gender, height, clothing, hairstyle and the like. After the detection, the attribute of the detected target may be stored in the identification device or the data server, so as to be used for performing a subsequent search query on the detected illegal target, thereby providing a basis for punishment. Then, the neural network model identifies the traffic signs of the road where the target is located, such as traffic signal lamps, traffic marking lines, speed limit boards and the like, and finally judges whether the traffic illegal behaviors exist in the target or not according to the detected information of the position where the target is located, the target behavior track, the target attribute, the traffic signs of the road where the target is located and the like. And after the traffic violation behaviors are identified, generating corresponding violation data, and returning the corresponding violation data to the target display equipment based on the http protocol according to the target display equipment identification of the target display equipment. The target display equipment determines whether the illegal target needs to be punished or not based on relevant legal provisions according to the illegal data.
It can be known from the above method that the illegal data recognition method provided in the embodiments of the present application, first receives an http traffic data call request sent by a traffic police terminal on a call selection page based on an http protocol, where the http traffic data call request carries a terminal identifier, a target display device identifier, a recognition device identifier, and a target camera identifier, generates an sip traffic data call request corresponding to the http traffic data call request according to the target camera identifier, generates an http state identifier corresponding to the http traffic data call request, synchronizes an sip state identifier corresponding to the sip traffic data call request in real time with identifier contents of the http state identifier and the sip state identifier, where the identifier contents include a traffic data call request completion state, then sends the sip traffic data call request to the target camera corresponding to the target camera identifier based on the sip protocol, receives a sip traffic data call response returned by the target camera based on the sip protocol, and according to the content of the sip traffic data calling response, synchronously updating the identification content of the sip state identification and the http state identification, when the identification content of the http state identification is that the traffic data calling request is completed, generating an http traffic data calling response corresponding to the http state identification, according to the terminal identification, returning the http traffic data calling response to the traffic police terminal based on an http protocol, then receiving the traffic data sent by the target camera, sending the traffic data to the identification equipment according to the identification equipment identification, finally receiving the illegal data identified by the identification equipment from the traffic data based on the neural network model, and returning the illegal data to the target display equipment according to the target display equipment identification. The method and the device send out the http traffic data calling request based on the http protocol on the calling selection page, and convert the http traffic data calling request into the sip traffic data calling request which can be identified by the front-end camera, then convert the sip traffic data calling response returned by the front-end camera into the http traffic data calling response and return the http traffic data calling response to the traffic police terminal, when the request is initiated on the calling selection page, the corresponding target camera and the target display equipment can be selected only according to the selection operation, the operation is simple, the whole calling process traffic police terminal can be completed only on a web browser or a platform, special SDK software does not need to be called, safety is guaranteed, the http is a general protocol, the operation is simple, understanding is facilitated, and convenience in data calling is improved. In addition, adopt the neural network model of training to discern illegal data, for artifical recognition, improved recognition efficiency, and the recognition process is independent of outside the data server, when the system needs the upgrading, only need upgrade to identification equipment, and need not carry out whole upgrading to the data server that the data bulk is great, consequently improved upgrading efficiency, also reduced the cost of data maintenance. In the protocol conversion process, the identification contents of the sip state identification and the http state identification are synchronized, so that the generated sip traffic data call response can be converted into the http traffic data call response in time, and the response returning speed is improved.
As shown in fig. 3, a platform interface of the traffic police terminal is provided with a call traffic data control 100, and when the call traffic data control 100 is clicked when the traffic data shot at a certain intersection at a certain time is to be called, the traffic police terminal receives a trigger instruction for calling the traffic data, and displays a call selection page including a display device selection control 200 and a front-end camera selection control 300. The calling traffic data control 100 and the other two controls can be arranged on different pages, that is, the calling selection page can be a page generated by clicking the calling traffic data control 100 on another page of the traffic police terminal; the calling traffic data control 100 and the other two controls can be arranged on the same page, when the calling traffic data control 100 is not clicked, the other two controls are not displayed, and after the calling traffic data control 100 is clicked, the page serves as a calling selection page to display the display device selection control 200 and the front-end camera selection control 300. An illegal data display area 500 is further arranged in the calling selection page, text description and video can be displayed in the illegal data display area 500, and in an initial state, a blank picture or a final display picture when illegal data is displayed last time is in the illegal data display area 500.
After the selection page is called and the display device selection control 200 is clicked, the selection page is called, according to the triggering operation aiming at the device selection control 200, a display device directory 201 can be generated, all display devices registered in the intelligent traffic system can be displayed in the display device directory 201, and then the corresponding selection operation is carried out in the display device directory 201, so that which display device is used as a target display device to display illegal data is determined. In performing the selection operation, one or more display devices may be selected from the display device directory 201 as target display devices, wherein the traffic police terminal initiating the request or the display device selected last time may be set as a default target display device. When there are many display devices in the display device directory 201, a search or screening function may be set, and the search range is narrowed according to information such as keywords, so that a target display device to be selected can be quickly searched.
Similarly, after the front-end camera selection control 300 is clicked on the calling selection page, the calling selection page generates a front-end camera directory 301 according to the trigger operation for the front-end camera selection control 300, all front-end cameras registered in the intelligent traffic system can be displayed in the front-end camera directory 301, and then the corresponding selection operation is performed on the front-end camera directory 301 to determine which camera in the monitoring place to view the traffic data. In performing the selection operation, one of the front-end cameras from the front-end camera list 301 may be selected as a target camera, wherein the front-end camera that was last requested to be selected may be set as a default target camera. When there are many front-end cameras included in the front-end camera directory 301, a search or screening function may be set, and the search range is narrowed down according to information such as keywords, so that a target camera desired to be selected is quickly searched.
After the corresponding selection operations are executed on the device selection control 200 and the front-end camera selection control 300, and the determination control 400 is clicked, an http traffic data call request conforming to an http protocol is generated according to the terminal identifier of the traffic police terminal, the identification identifier of the identification device, the target display device identifier of the target display device, and the target camera identifier of the target camera.
As shown in fig. 4, the framework for sending a traffic data call request to receive a traffic data call response is divided into several modules, and the data server includes http-side processing logic 22, message synchronizer 23, and sip-side processing logic 24. The http traffic data call request 21 sent by the traffic police terminal based on the http protocol is firstly sent to the http side processing logic 22 for processing, and then sent to the message synchronizer 23 by the http side processing logic 22; the message synchronizer 23 converts the http traffic data call request into an sip traffic data call request, generates an http state identifier for the http traffic data call request, generates an sip state identifier for the sip traffic data call request, synchronizes the identifier contents of the http state identifier and the sip state identifier, and then sends the sip traffic data call request to the sip side processing logic 24 for processing; after the processing of the sip side processing logic 24 is completed, establishing an sip session with the target camera 25, sending an sip traffic data calling request to the target camera 25, and receiving an sip traffic data calling response returned to the sip side processing logic 24 by the target camera 25; the sip side processing logic 24 sends the sip traffic data call response to the message synchronizer 23, the message synchronizer 23 synchronously updates the identification content of the http state identification and the sip state identification according to the content of the sip traffic data call response, and generates an http traffic data call response and sends the http traffic data call response to the http side processing logic 22 when the identification content of the http state identification is that the traffic data call request is completed; the http side processing logic 22 returns an http traffic data call response 26 to the traffic police terminal, and the traffic police terminal determines the processing state of the traffic data call request according to the http traffic data call response 26.
As shown in fig. 5 and fig. 6, the http side processing logic 22 includes an http service module 221, a request parser 222, a validity judgment 223, an http message manager 224, and an http timer status notification queue 225, and the sip side processing logic 24 includes an sip call manager 241, an sip message manager 242, a user agent client 243, a user agent server 244, and a front-end camera sip agent 245, and the method for recognizing illegal data according to the present application is specifically described below with reference to fig. 4 to fig. 6.
The traffic police terminal sends an http traffic data call request 21 to the http side processing logic 22, and the http traffic data call request 21 carries a terminal identifier, an identification device identifier, a target display device identifier and a target camera identifier. The terminal identification comprises an IP address and a port of a traffic police terminal, the data server determines which terminal the traffic data call response is sent to after receiving the traffic data call response according to the terminal identification, the target display equipment identification comprises the IP address and the port of target display equipment, the data server determines which terminal the illegal data should be sent back to according to the target display equipment identification, the target camera identification comprises an ID of a target camera, the data server determines that the target camera is specifically positioned at a xx road section xx intersection in an xx area according to the target camera identification so as to send an http traffic data call request 21 to the target camera, the identification equipment identification comprises the IP address and the port of identification equipment, the data server determines which identification equipment the traffic data sent by the subsequent target camera should be forwarded to according to the identification equipment identification, and the identification equipment determines the traffic behavior of vehicles or pedestrians at the intersection in the traffic data, and identifying data such as traffic violation behaviors, traffic violation behavior time, information of traffic violation vehicles or pedestrians and the like, and returning the data to the target display equipment for further processing.
In the http side processing logic 22, the http traffic data invoking request 21 is received by the http service module 221, the http service module 221 includes an http gateway, and then the http traffic data invoking request 21 is transferred to the request parser 222. The request parser 222 parses each command parameter in the http traffic data invoking request 21, and then puts the http traffic data invoking request 21 into the http message manager 224. The http message manager 224 continuously processes the internal message cache while sending the newly incoming http traffic data call request 21 to the message synchronizer 23.
In an embodiment, before the step of placing the http traffic data invocation request 21 into the http message manager 224, the validity judgment 223 is further performed on the parsed http traffic data invocation request 21, which specifically includes: carrying out logic judgment on the http traffic data calling request 21 based on the traffic data calling request effective parameter set; and if the http traffic data call request 21 is legal, caching the http traffic data call request 21 into the http message manager 224, and if the http traffic data call request 21 is illegal, directly returning a termination request result to the traffic police terminal, wherein the termination request result is represented as an http traffic data call response 26 at the traffic police terminal. When the traffic police terminal sends out the http traffic data call request 21, the http traffic data call request 21 is sent out in a form of inputting a website on a web browser or a platform, the http traffic data call request 21 comprises parameters such as a terminal identifier, a target camera identifier and a call command, if the input of each identifier or call command is wrong, subsequent processing logic is affected, therefore, after analysis, firstly, a logic judgment is made on the http traffic data call request 21 based on a traffic data call request effective parameter set, the traffic data call request effective parameter set comprises types of effective parameters, specific parameter values, an arrangement sequence of each parameter and the like, if the valid parameter set is legal, the next step is carried out, the http traffic data call request 21 is cached in the http message manager 224, if the valid parameter set is illegal, a termination request result is directly returned to the traffic police terminal, and a specific error type can be further displayed, if the input is an invalid parameter or a corresponding target camera cannot be found, and the like, so that the http traffic data call request 21 can be adjusted and input again by the traffic police terminal.
In one embodiment, after the step of caching the http traffic data invocation request 21 to the http message manager 224, the method further comprises: judging whether the http traffic data calling request 21 has the same content as the http traffic data calling request entering in the previous preset time period or not; if the content is the same, the http traffic data invocation request 21 is removed from the http message manager 224, and if the content is different, the http traffic data invocation request 21 is sent to the message synchronizer 23. After the traffic police terminal sends the http traffic data call request 21, if no traffic data call response is received within an expected time, one or more refresh operations are usually performed, each refresh operation re-sends one traffic data call request 21, the content of each sent traffic data call request 21 is the same, and if the data server processes each request, resource waste is caused, so after the http traffic data call request 21 is cached in the http message manager 224, the http message manager 224 numbers the incoming requests in time sequence, such as No. 1, No. 2, No. 3, and the like, and each time a new http traffic data call request 21 is entered, the incoming requests are re-checked and judged.
Assuming that the number of the newly entered http traffic data invocation request 21 is n, the http message manager 224 first determines whether an n-1 th request enters within a preset time period from the time of the n-th request entering, where the preset time period may be set according to the sending behavior of the majority of request senders, for example, if the majority of request senders do not receive a response within 2 seconds after sending the request, the request senders may start to initiate a request again, and then 2 seconds may be used as the preset time period. If it is detected that no request n-1 is entered within the previous preset time period, the newly entered http traffic data call request may be directly sent to the message synchronizer 23. If an n-1 request is detected to enter in the previous preset time period, content duplication judgment is carried out on the n-1 request and the n request, when the contents are the same, the n request is a repeated request, the newly entered http traffic data calling request is removed from the http message manager 224, the n-1 request is continuously processed, when the contents are different, the n request is a new request, the newly entered http traffic data calling request is sent to the message synchronizer 23, and after the n-1 request is processed, the n request is continuously processed.
After receiving the http traffic data call request 21, the message synchronizer 23 generates an sip traffic data call request corresponding to the http traffic data call request according to the identification of the target camera. The data server stores cluster information of front-end cameras, the front-end cameras registered in the data server are all located in the cluster information, each front-end camera has a unique identifier, a target camera is determined from the cluster information of the front-end cameras according to the identifier of the target camera, an access address of the target camera is obtained, and a request head in a sip traffic data calling request can be generated according to the access address. Then, each call command in the http traffic data call request 21 is converted into a call command under the sip protocol, and then the call command is generated into a message body in the sip traffic data call request, and a request header and the message body are combined to generate a corresponding sip traffic data call request.
The message synchronizer 23 generates an http state identifier for the http traffic data call request 21, generates an sip state identifier for the sip traffic data call request, and synchronizes the http state identifier and the identification content of the sip state identifier in real time, wherein the identification content includes a traffic data call request completion state. In the message synchronizer 23, the identification contents of the http state identification and the sip state identification are the same at any moment, and the synchronization operation is realized by a corresponding synchronization program.
For the http traffic data call request 21 newly entering the message synchronizer 23, after the steps of format conversion and identification synchronization are completed, the sip traffic data call request is sent to the sip side processing logic 24, and then the sip side processing logic 24 sends the sip traffic data call request to the target camera corresponding to the target camera identification based on the sip protocol. After the sending, the inside of the message synchronizer 23 can complete the detection on the traffic data call request, if the sip side processing logic 24 has returned the sip traffic data call response, the message synchronizer 23 can generate a corresponding http traffic data call response, and place the http traffic data call response into the http timer state notification queue 225, the http timer state notification queue 225 notifies the http message manager 224 according to the sequence of the response entering, and the http traffic data call response 26 is returned to the traffic police terminal by the http message manager 224, so that the traffic police terminal can obtain the processing result of the traffic data call request.
In the sip side processing logic 24, the specific steps of the processing include: caching the sip traffic data call request into the sip message manager 242, and establishing a session with the front-end camera sip agent 245 based on the sip protocol; determining a target camera 25 from the front-end camera sip agent 245 according to the target camera identification; and sending the sip traffic data calling request to the target camera 25 based on the sip protocol.
The sip traffic data invoking request is first sent to the sip invoking management 241, and the sip invoking management 241 generates a unique identifier for the sip traffic data invoking request and then caches the unique identifier into the sip message manager 242. Then, the user agent client 243 checks from the sip message manager 242 whether a new traffic data call request arrives or whether the traffic data call request status is updated, and sends a different request to the front-end camera sip agent 245 according to the check result. When a new sip traffic data call request arrives at the sip message manager 242, the user agent client 243 calls its own proxy mode, establishes a session with the front-end camera sip proxy 245 based on the sip protocol, and sends an Invite request, after the front-end camera sip proxy 245 receives the Invite request, the front-end camera sip proxy 245 determines the target camera 25 from the front-end camera sip proxy 245 according to the target camera identifier, and then the front-end camera sip proxy 245 sends the sip traffic data call request to the target camera 25. When it is checked that the state of the traffic data call request is updated in the sip message manager 242, if the request is terminated, a corresponding processing request is sent to the front-end camera sip proxy 245 according to the updated state.
Then, the sip-side processing logic 24 receives the sip traffic data call response returned by the target camera 25 based on the sip protocol, and synchronously updates the identification contents of the sip state identification and the http state identification according to the content of the sip traffic data call response.
In one embodiment, the steps specifically include: receiving a processing signaling returned by the target camera 25 to the sip message manager 242 based on the sip protocol; updating the identification content of the sip state identification corresponding to the sip traffic data calling request in the sip message manager 242 according to the processing signaling; when detecting that the identification content of the sip state identification is that the traffic data calling request is completed, returning a sip traffic data calling response to the message synchronizer 23; and according to the content of the sip traffic data call response, synchronously updating the identification content of the sip state identification and the http state identification in the message synchronizer 23.
The processing signaling returned by the target camera 25 after processing the sip traffic data invocation request is received by the user agent 244, and the user agent 244 updates the identification content of the sip state identification corresponding to the sip traffic data invocation request in the sip message manager 242 according to the processing signaling. Specifically, when the processing signaling is 200OK, indicating that the traffic data invocation request is completed, the user agent 244 matches the sip traffic data invocation request in the sip message manager 242, and updates the identification content of the corresponding sip status identifier to the completion of the traffic data invocation request.
When detecting that the identification content of the sip state identification is that the traffic data call request is completed, generating and returning a sip traffic data call response to the message synchronizer 23, and then synchronously updating the identification content of the sip state identification and the http state identification in the message synchronizer 23 according to the content of the sip traffic data call response, so that the identification content of the sip state identification and the http state identification is updated to be that the traffic data call request is completed.
In one embodiment, the steps after returning the sip traffic data invocation response to the message synchronizer 23 include: the sip traffic data invocation request is removed from the sip message manager 242. At this point, the traffic data invocation request has been processed and a corresponding traffic data invocation response is generated, so that it is removed from the sip message manager 242, and the cache space of the sip message manager 242 can be released to facilitate the sip message manager 242 to process other request messages. In addition, after the removal, the data server can store the log related to the sip traffic data call response, classify a plurality of traffic data call responses in a certain period of time in the log, for example, classify according to the completion time of the traffic data call request, analyze the condition with long processing time, find the reason, and facilitate the development personnel to perform BUG positioning and program debugging, and subsequently maintain and upgrade the system.
And when the identification content of the http state identification is the traffic data calling request, the message synchronizer 23 generates an http traffic data calling response corresponding to the http state identification, and returns an http traffic data calling response 26 to the traffic police terminal based on the http protocol according to the terminal identification. The message synchronizer 23 determines which port of which client the traffic data call response should be sent to according to the terminal identifier, and then returns the http traffic data call response 26, and the traffic police terminal determines the processing result of the traffic data call request according to the content of the http traffic data call response 26.
In one embodiment, the steps after returning the http traffic data invocation response 26 to the traffic police terminal include: the http traffic data invocation request and the sip traffic data invocation request are removed from the message synchronizer 23. After removal, the internal space of the message synchronizer 23 is also released to facilitate the message synchronizer 23 to process other request messages.
After the traffic police terminal obtains the http traffic data call response 26, the target camera 25 packages the shot traffic data and sends the packaged traffic data to the data server, and then the data server sends the packaged traffic data to the identification device according to the identification device IP address and the port in the identification device identifier. After receiving the traffic data, the identification device unpacks the traffic data, preprocesses the unpacked traffic data, such as removing some non-video data, interference data and the like, inputs the traffic data into a pre-trained neural network model, and identifies illegal data by the neural network model.
The neural network model firstly detects and tracks the pedestrian target and the vehicle target in each frame of image of the video and determines the behavior track of the pedestrian target and the vehicle target. In order to reduce the influence of false detection and missed detection, the system can judge that a new target enters only when M continuous frames of the target are detected, and can consider that the target disappears only when N continuous frames of the target are not detected, wherein M and N are positive integers and can be set to different values according to parameters such as the type of the target, the driving speed and the like. Specifically, in the target tracking process, the historical position of each target is recorded, an initial motion trajectory of the target is formed, and the initial motion trajectory of the target is subjected to smooth filtering by adopting a kalman filter, so that a target behavior trajectory is obtained.
Then, the neural network model identifies the detected vehicle target to obtain attributes such as brand, vehicle type, license plate number, vehicle color and the like, and identifies the detected pedestrian target to obtain attributes such as gender, height, clothing, hairstyle and the like. After the detection, the attribute of the detected target may be stored in the identification device or the data server, so as to be used for performing a subsequent search query on the detected illegal target, thereby providing a basis for punishment.
Then, the neural network model identifies the traffic signs of the road where the target is located, such as traffic signal lamps, traffic marking lines, speed limit boards and the like, and then judges whether traffic illegal behaviors exist in the target or not according to the detected information of the position where the target is located, the target behavior track, the target attribute, the traffic signs of the road where the target is located and the like.
For example, when it is recognized that the traffic signal lamp is in a red light state and the traffic marking of the current road includes a stop line, it is determined whether the position of the target exceeds the stop line within 15 meters before and after the stop line, and if so, there is illegal behavior of running the red light. For another example, when the traffic markings of the current road include road type markings, such as pedestrian lanes, motor lanes, and non-motor lanes, and the target attribute is not matched with the type of the current road, illegal road occupation behaviors exist.
In the embodiment of the application, illegal data are identified by using the identification equipment operated with the neural network model, and the identification efficiency of the neural network model is gradually increased after the neural network model is trained for multiple times. When the neural network model is trained, video data shot by a front-end camera needs to be acquired, all features of the video data are artificially labeled, the video data are input into the neural network model as a training sample for training, and the trained neural network model can have corresponding recognition capability when traffic data to be recognized are subsequently input.
In the training sample, the pedestrian target and the vehicle target are artificially labeled, and when traffic data is subsequently input, the trained neural network model can have the capacity of identifying the pedestrian target and the vehicle target. In the training sample, attributes of the pedestrian target and the vehicle target are labeled manually, and the trained neural network model can have the capability of identifying the attributes of the pedestrian target and the vehicle target. In the training sample, different labels are manually carried out on the pixels where the non-traffic marks are located and the pixels where the traffic marks are located, and the corresponding traffic mark types are labeled, so that the trained neural network model can have the capacity of identifying the traffic marks and the corresponding classes thereof. Through the three types of training, the neural network model can identify information such as the position of a target, a target behavior track, target attributes, traffic identification of a road where the target is located and the like according to input traffic data, so that understanding of a road traffic video is completed, and identification of illegal behaviors is achieved. In order to make the recognition effect of the neural network model better, training needs to be performed for enough times so that the recognition accuracy is not lower than a preset value.
After the traffic violation of the target is identified, the identification equipment generates corresponding violation data, the violation data comprises information such as violation time, violation places, violation targets and violation types, and then the violation data is returned to the data server based on the http protocol, and the data server returns the violation data to the target display equipment according to the target display equipment identification. And the traffic police terminal determines whether to punish the illegal target based on relevant legal provisions according to the illegal data.
In this embodiment, taking the target display device and the traffic police terminal as the same device as an example, as shown in fig. 7, after the target display device receives the illegal data, the illegal data is displayed in the illegal data display area 500, the displayed content includes text description and video, for example, the displayed text is "the vehicle with license plate number xxxxxx does not give way to pedestrians at xx crossing at xx moment", after the text is triggered, the whole video process of the illegal vehicle without giving way to pedestrians can be displayed in the illegal data display area 500, so that the identification and subsequent processing of the traffic illegal data are realized. In addition, if there are multiple illegal activities in the traffic data, multiple lines of characters are displayed in the illegal data display area 500, each line of characters correspondingly describes one illegal activity, and videos corresponding to the illegal activities described by the lines of characters can be played one by sequentially clicking each line of characters. When the traffic data shot by other front-end cameras is required to be called after the watching is finished, the traffic data control 100 can be clicked again to generate a next data calling request. When the target display device and the traffic police terminal are different devices, the link address of illegal data display can be sent to the target display device, and after the target display device clicks the link address, the illegal data display area 500 can be displayed in the opened page, so that illegal data can be displayed on other devices except the traffic police terminal.
According to the illegal data identification method, the http traffic data calling request is sent out on the calling selection page based on the http protocol and is converted into the sip traffic data calling request which can be identified by the front-end camera, then the sip traffic data calling response returned by the front-end camera is converted into the http traffic data calling response and is returned to the traffic police terminal, when the request is initiated on the calling selection page, the corresponding target camera and the target display equipment can be selected only according to the selection operation, the operation is simple, the whole calling process traffic police terminal can be completed only on a web browser or a platform, special SDK software does not need to be called, and therefore safety is guaranteed, the http is a general protocol, the operation is simple, understanding is facilitated, and convenience in data calling is improved. In addition, adopt the neural network model of training to discern illegal data, for artifical recognition, improved recognition efficiency, and the recognition process is independent of outside the data server, when the system needs the upgrading, only need upgrade to identification equipment, and need not carry out whole upgrading to the data server that the data bulk is great, consequently improved upgrading efficiency, also reduced the cost of data maintenance. In the protocol conversion process, the identification contents of the sip state identification and the http state identification are synchronized, so that the generated sip traffic data call response can be converted into the http traffic data call response in time, and the response returning speed is improved.
On the basis of the method described in the foregoing embodiment, the embodiment will be further described from the perspective of an illegal data identification device, please refer to fig. 8, where fig. 8 specifically describes the illegal data identification device provided in the embodiment of the present application, which may include:
the receiving module 110 is configured to receive an http traffic data call request sent by a traffic police terminal based on an http protocol; the http traffic data calling request comprises that after a traffic police terminal receives a triggering instruction for calling traffic data, a calling selection page comprising a display equipment selection control and a front-end camera selection control is displayed, target display equipment is determined according to selection operation aiming at the display equipment selection control, a target camera is determined according to selection operation aiming at the front-end camera selection control, and an http traffic data calling request conforming to an http protocol is generated according to a terminal identifier of the traffic police terminal, an identification equipment identifier of the identification equipment, a target camera identifier of the target camera and a target display equipment identifier of the target display equipment;
the first synchronization module 120 is configured to generate an sip traffic data call request corresponding to the http traffic data call request according to the target camera identifier, generate an http state identifier corresponding to the http traffic data call request, synchronize identifier contents of the http state identifier and the sip state identifier in real time, where the identifier contents include a traffic data call request completion state;
the second synchronization module 130 is configured to send an sip traffic data call request to a target camera corresponding to the target camera identifier based on the sip protocol, receive an sip traffic data call response returned by the target camera based on the sip protocol, and update the identifier contents of the sip state identifier and the http state identifier synchronously according to the content of the sip traffic data call response;
the first returning module 140 is configured to generate an http traffic data calling response corresponding to the http state identifier when the identifier content of the http state identifier is that the traffic data calling request is completed, and return the http traffic data calling response to the traffic police terminal based on the http protocol according to the terminal identifier;
the sending module 150 is used for receiving the traffic data sent by the target camera and sending the traffic data to the identification device according to the identification device identifier;
and the second returning module 160 is configured to receive the illegal data recognized by the recognition device from the traffic data based on the neural network model, and return the illegal data to the target display device according to the target display device identifier.
In an embodiment, the illegal data identification device further includes a logic judgment module, configured to perform logic judgment on the http traffic data call request based on the traffic data call request valid parameter set after the receiving module 110 receives the http traffic data call request; and if the http traffic data calling request is legal, caching the http traffic data calling request to an http message manager, and if the http traffic data calling request is illegal, directly returning a termination request result to the traffic police terminal.
In one embodiment, the illegal data identification device further comprises a duplication checking module, wherein after the http traffic data calling request is cached to the http message manager, the duplication checking module is used for judging whether the http traffic data calling request has the same content with the http traffic data calling request entering in the previous preset time period; and if the contents are the same, removing the http traffic data calling request from the http message manager, and if the contents are different, sending the http traffic data calling request to the message synchronizer.
In an embodiment, the second synchronization module 130 specifically includes:
the caching unit is used for caching the sip traffic data calling request into the sip message manager and establishing a session with a front-end camera sip proxy based on an sip protocol;
the determining unit is used for determining a target camera from the front-end camera sip proxy according to the target camera identification;
and the sending unit is used for sending the sip traffic data calling request to the target camera based on the sip protocol.
In an embodiment, the second synchronization module 130 specifically includes:
the receiving unit is used for receiving a processing signaling returned to the sip message manager by the target camera based on the sip protocol;
the first updating unit is used for updating the identification content of the sip state identification corresponding to the sip traffic data calling request in the sip message manager according to the processing signaling;
the return unit is used for returning the sip traffic data calling response to the message synchronizer when detecting that the identification content of the sip state identification is that the traffic data calling request is completed;
and the second updating unit is used for synchronously updating the identification contents of the sip state identification and the http state identification in the message synchronizer according to the content of the sip traffic data call response.
In an embodiment, the second updating unit is configured to update the identification content of the sip status identifier and the http status identifier synchronously to that the traffic data invocation request is completed according to the content of the sip traffic data invocation response.
In an embodiment, the illegal data identification device further comprises a removing module, configured to remove the http traffic data call request and the sip traffic data call request from the message synchronizer after the second returning module 160 returns the http traffic data call response to the traffic police terminal.
Different from the prior art, the illegal data recognition device provided by the application sends out an http traffic data calling request based on an http protocol on a calling selection page, converts the http traffic data calling request into an sip traffic data calling request which can be recognized by a front-end camera, converts the sip traffic data calling response returned by the front-end camera into an http traffic data calling response, and returns the http traffic data calling response to a traffic police terminal. In addition, adopt the neural network model of training to discern illegal data, for artifical recognition, improved recognition efficiency, and the recognition process is independent of outside the data server, when the system needs the upgrading, only need upgrade to identification equipment, and need not carry out whole upgrading to the data server that the data bulk is great, consequently improved upgrading efficiency, also reduced the cost of data maintenance. In the protocol conversion process, the identification contents of the sip state identification and the http state identification are synchronized, so that the generated sip traffic data call response can be converted into the http traffic data call response in time, and the response returning speed is improved.
Accordingly, embodiments of the present application also provide an electronic device, as shown in fig. 9, which may include components such as a radio frequency circuit 901, a memory 902 including one or more computer-readable storage media, an input unit 903, a display unit 904, a sensor 905, an audio circuit 906, a WiFi module 907, a processor 908 including one or more processing cores, and a power supply 909. Those skilled in the art will appreciate that the electronic device configuration shown in fig. 9 does not constitute a limitation of the electronic device and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. Wherein:
the rf circuit 901 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, receives downlink information of a base station and then sends the received downlink information to the one or more processors 908 for processing; in addition, data relating to uplink is transmitted to the base station. The memory 902 may be used to store software programs and modules, and the processor 908 executes various functional applications and data processing by operating the software programs and modules stored in the memory 902. The input unit 903 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control.
The display unit 904 may be used to display information input by or provided to a user and various graphical user interfaces of the electronic device, which may be made up of graphics, text, icons, video, and any combination thereof.
The electronic device may also include at least one sensor 905, such as light sensors, motion sensors, and other sensors. The audio circuitry 906 includes a speaker that can provide an audio interface between a user and the electronic device.
WiFi belongs to short-distance wireless transmission technology, and the electronic equipment can help a user to send and receive e-mails, browse webpages, access streaming media and the like through the WiFi module 907, and provides wireless broadband internet access for the user. Although fig. 9 shows the WiFi module 907, it is understood that it does not belong to the essential constitution of the electronic device, and may be omitted entirely as needed within the scope not changing the essence of the application.
The processor 908 is a control center of the electronic device, connects various parts of the entire cellular phone using various interfaces and lines, and performs various functions of the electronic device and processes data by operating or executing software programs and/or modules stored in the memory 902 and calling data stored in the memory 902, thereby performing overall monitoring of the cellular phone.
The electronic device also includes a power supply 909 (e.g., a battery) that provides power to the various components, which may preferably be logically coupled to the processor 908 via a power management system, such that the functions of managing charging, discharging, and power consumption are performed via the power management system.
Although not shown, the electronic device may further include a camera, a bluetooth module, and the like, which are not described in detail herein. Specifically, in this embodiment, the processor 908 in the electronic device loads an executable file corresponding to a process of one or more application programs into the memory 902 according to the following instructions, and the processor 908 executes the application programs stored in the memory 902, so as to implement the following functions:
receiving an http traffic data calling request sent by a traffic police terminal based on an http protocol; the http traffic data calling request comprises that after a traffic police terminal receives a triggering instruction for calling traffic data, a calling selection page comprising a display equipment selection control and a front-end camera selection control is displayed, target display equipment is determined according to selection operation aiming at the display equipment selection control, a target camera is determined according to selection operation aiming at the front-end camera selection control, and an http traffic data calling request conforming to an http protocol is generated according to a terminal identifier of the traffic police terminal, an identification equipment identifier of the identification equipment, a target camera identifier of the target camera and a target display equipment identifier of the target display equipment; generating an sip traffic data calling request corresponding to the http traffic data calling request according to the target camera identification, and generating an http state identification corresponding to the http traffic data calling request, an sip state identification corresponding to the sip traffic data calling request, synchronizing identification contents of the http state identification and the sip state identification in real time, wherein the identification contents comprise a traffic data calling request completion state; sending an sip traffic data calling request to a target camera corresponding to the target camera identification based on an sip protocol, receiving an sip traffic data calling response returned by the target camera based on the sip protocol, and synchronously updating identification contents of the sip state identification and the http state identification according to the content of the sip traffic data calling response; when the identification content of the http state identification is that the traffic data calling request is completed, generating an http traffic data calling response corresponding to the http state identification, and returning the http traffic data calling response to the traffic police terminal based on an http protocol according to the terminal identification; receiving traffic data sent by a target camera, and sending the traffic data to identification equipment according to identification equipment identification; and receiving illegal data which is identified from the traffic data by the identification equipment based on the neural network model, and returning the illegal data to the target display equipment according to the target display equipment identification.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and parts that are not described in detail in a certain embodiment may refer to the above detailed description, and are not described herein again.
In an embodiment, the identification device provided by the present application may be used as a node in a blockchain system, and after the traffic data is processed by calling a neural network model, the illegal data is verified, and after the illegal data is verified, the illegal data is stored as a new block in the blockchain, so as to ensure that the illegal data is not tampered.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The block chain underlying platform can comprise processing modules such as user management, basic service, intelligent contract and operation monitoring. The user management module is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, the user management module supervises and audits the transaction condition of certain real identities and provides rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request to storage after consensus on the valid request is completed, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, triggering the contracts and executing the contracts, developers can define contract logics through a certain programming language, issue the contract logics to a block chain (contract registration), call keys or other event triggering and executing according to the logics of contract clauses, complete the contract logics and simultaneously provide the function of upgrading and canceling the contracts; the operation monitoring module is mainly responsible for deployment, configuration modification, contract setting, cloud adaptation in the product release process and visual output of real-time states in product operation, such as: alarm, monitoring network conditions, monitoring node equipment health status, and the like.
The platform product service layer provides basic capability and an implementation framework of typical application, and developers can complete block chain implementation of business logic based on the basic capability and the characteristics of the superposed business. The application service layer provides the application service based on the block chain scheme for the business participants to use.
The method, the device and the electronic device for recognizing the illegal data provided by the embodiment of the application are introduced in detail, a specific example is applied in the text to explain the principle and the implementation of the application, and the description of the embodiment is only used for helping to understand the technical scheme and the core idea of the application; those of ordinary skill in the art will understand that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications or substitutions do not depart from the spirit and scope of the present disclosure as defined by the appended claims.

Claims (10)

1. The illegal data identification method is applicable to a smart traffic system, the smart traffic system comprises a front-end camera, a data server, display equipment, identification equipment and a traffic police terminal, a neural network model runs in the identification equipment, the front-end camera is connected with the data server based on a sip protocol, the traffic police terminal, the display equipment and the identification equipment are connected with the data server based on a http protocol, the illegal data identification method is applied to the data server, and the illegal data identification method comprises the following steps:
receiving an http traffic data calling request sent by the traffic police terminal based on an http protocol; the http traffic data calling request comprises that after the traffic police terminal receives a triggering instruction for calling traffic data, a calling selection page comprising a display equipment selection control and a front-end camera selection control is displayed, target display equipment is determined according to selection operation aiming at the display equipment selection control, a target camera is determined according to selection operation aiming at the front-end camera selection control, and the http traffic data calling request conforming to an http protocol is generated according to a terminal identifier of the traffic police terminal, an identification equipment identifier of the identification equipment, a target camera identifier of the target camera and a target display equipment identifier of the target display equipment;
generating an sip traffic data calling request corresponding to the http traffic data calling request according to the target camera identification, and generating an http state identification corresponding to the http traffic data calling request, wherein the sip state identification corresponding to the sip traffic data calling request synchronizes the identification contents of the http state identification and the sip state identification in real time, and the identification contents comprise a traffic data calling request completion state;
sending the sip traffic data calling request to a target camera corresponding to the target camera identification based on an sip protocol, receiving an sip traffic data calling response returned by the target camera based on the sip protocol, and synchronously updating the identification contents of the sip state identification and the http state identification according to the content of the sip traffic data calling response;
when the identification content of the http state identification is that a traffic data calling request is completed, generating an http traffic data calling response corresponding to the http state identification, and returning the http traffic data calling response to the traffic police terminal based on an http protocol according to the terminal identification;
receiving traffic data sent by the target camera, and sending the traffic data to the identification equipment according to the identification equipment;
and receiving illegal data which is identified from the traffic data by the identification equipment based on the neural network model, and returning the illegal data to the target display equipment according to the target display equipment identification.
2. The illegal data recognition method of claim 1, wherein the step of determining a target display device according to a selection operation for the display device selection control and determining a target camera according to a selection operation for the front-end camera selection control comprises:
generating a display equipment directory according to the trigger operation aiming at the display equipment selection equipment, and determining target display equipment according to the selection operation aiming at the display equipment in the display equipment directory;
and generating a front-end camera directory according to the triggering operation aiming at the front-end camera selection control, and determining a target camera according to the selection operation aiming at the front-segment camera in the front-end camera directory.
3. The illegal data identification method according to claim 1, further comprising, before the step of generating a sip traffic data call request corresponding to the http traffic data call request according to the target camera identification, the steps of:
carrying out logic judgment on the http traffic data calling request based on the traffic data calling request effective parameter set;
and if the http traffic data calling request is legal, caching the http traffic data calling request to an http message manager, and if the http traffic data calling request is illegal, directly returning a termination request result to the traffic police terminal.
4. The method for illegal data identification according to claim 3, further comprising, after the step of caching the http traffic data call request to an http message manager:
judging whether the http traffic data calling request has the same content as the http traffic data calling request entering in the previous preset time period or not;
and if the contents are the same, removing the http traffic data calling request from the http message manager, and if the contents are different, sending the http traffic data calling request to a message synchronizer.
5. The illegal data identification method according to claim 1, wherein the step of sending the sip traffic data call request to the target camera identified by the target camera based on an sip protocol comprises:
caching the sip traffic data call request into a sip message manager, and establishing a session with a front-end camera sip proxy based on a sip protocol;
determining a target camera from the front-end camera sip agent according to the target camera identification;
and sending the sip traffic data calling request to the target camera based on a sip protocol.
6. The illegal data identification method according to claim 1, wherein the step of receiving an sip traffic data call response returned by the target camera based on an sip protocol, and synchronously updating the identification contents of the sip state identifier and the http state identifier according to the content of the sip traffic data call response comprises the steps of:
receiving a processing signaling returned to the sip message manager by the target camera based on the sip protocol;
updating the identification content of the sip state identification corresponding to the sip traffic data calling request in the sip message manager according to the processing signaling;
when detecting that the identification content of the sip state identification is that the traffic data calling request is completed, returning a sip traffic data calling response to the message synchronizer;
and according to the content of the sip traffic data call response, synchronously updating the identification content of the sip state identification and the http state identification in the message synchronizer.
7. The illegal data recognition method according to claim 6, wherein the step of synchronously updating the identification contents of the sip state identifier and the http state identifier in the message synchronizer according to the content of the sip traffic data call response comprises:
and according to the content of the sip traffic data call response, synchronously updating the identification content of the sip state identification and the http state identification into the traffic data call request is completed.
8. The illegal data recognition method according to claim 7, further comprising, after the step of returning the http traffic data call response to the traffic police terminal based on an http protocol according to the terminal identification, the steps of:
and removing the http traffic data call request and the sip traffic data call request from the message synchronizer.
9. The utility model provides a device for recognizing illegal data, its characterized in that, device for recognizing illegal data is used for wisdom traffic system based on the http protocol, wisdom traffic system includes front end camera, data server, display device, identification equipment and traffic police terminal, it has the neural network model to operate in the identification equipment, the front end camera is connected based on the sip protocol data server, the traffic police terminal the display device with identification equipment connects based on the http protocol data server, illegal data recognition device sets up in the data server, illegal data recognition device includes:
the receiving module is used for receiving an http traffic data calling request sent by the traffic police terminal based on an http protocol; the http traffic data calling request comprises that after the traffic police terminal receives a triggering instruction for calling traffic data, a calling selection page comprising a display equipment selection control and a front-end camera selection control is displayed, target display equipment is determined according to selection operation aiming at the display equipment selection control, a target camera is determined according to selection operation aiming at the front-end camera selection control, and the http traffic data calling request conforming to an http protocol is generated according to a terminal identifier of the traffic police terminal, an identification equipment identifier of the identification equipment, a target camera identifier of the target camera and a target display equipment identifier of the target display equipment;
the first synchronization module is used for generating an sip traffic data calling request corresponding to the http traffic data calling request according to the target camera identification, generating an http state identification corresponding to the http traffic data calling request, synchronizing the identification content of the http state identification and the sip state identification in real time, wherein the identification content comprises a traffic data calling request completion state;
the second synchronization module is used for sending the sip traffic data calling request to the target camera corresponding to the target camera identification based on an sip protocol, receiving an sip traffic data calling response returned by the target camera based on the sip protocol, and synchronously updating the identification contents of the sip state identification and the http state identification according to the content of the sip traffic data calling response;
the first returning module is used for generating an http traffic data calling response corresponding to the http state identifier when the identifier content of the http state identifier is that a traffic data calling request is completed, and returning the http traffic data calling response to the traffic police terminal based on an http protocol according to the terminal identifier;
the sending module is used for receiving the traffic data sent by the target camera and sending the traffic data to the identification equipment according to the identification equipment identifier;
and the second returning module is used for receiving the illegal data which is identified by the identification equipment from the traffic data based on the neural network model and returning the illegal data to the target display equipment according to the target display equipment identification.
10. An electronic device comprising a memory and a processor; the memory stores an application program, and the processor is configured to execute the application program in the memory to perform the operations of the illegal data identification method according to any one of claims 1 to 8.
CN202011070373.8A 2020-09-30 2020-09-30 Illegal data identification method and device and electronic equipment Active CN112163538B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011070373.8A CN112163538B (en) 2020-09-30 2020-09-30 Illegal data identification method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011070373.8A CN112163538B (en) 2020-09-30 2020-09-30 Illegal data identification method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN112163538A true CN112163538A (en) 2021-01-01
CN112163538B CN112163538B (en) 2023-10-24

Family

ID=73861597

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011070373.8A Active CN112163538B (en) 2020-09-30 2020-09-30 Illegal data identification method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN112163538B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040249951A1 (en) * 2003-04-08 2004-12-09 3Com Corporation Method and system for providing directory based services
JP2010050617A (en) * 2008-08-20 2010-03-04 Nippon Telegr & Teleph Corp <Ntt> Protocol conversion device and protocol conversion method
EP2395726A1 (en) * 2010-06-10 2011-12-14 Research In Motion Limited Method and system for reducing transmission of redundant data
US20170264671A1 (en) * 2016-03-11 2017-09-14 Takeshi Homma Remote communication system, communication terminal, and extended function providing method
CN110740217A (en) * 2019-09-12 2020-01-31 平安科技(深圳)有限公司 multi-channel data integration interaction method, device, equipment and storage medium
CN111132120A (en) * 2020-04-01 2020-05-08 北京三快在线科技有限公司 Method, system and equipment for identifying camera device in room local area network
CN111260341A (en) * 2020-05-06 2020-06-09 武汉中科通达高新技术股份有限公司 Traffic violation data auditing method, computer equipment and readable storage medium
CN111476107A (en) * 2020-03-18 2020-07-31 平安国际智慧城市科技股份有限公司 Image processing method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040249951A1 (en) * 2003-04-08 2004-12-09 3Com Corporation Method and system for providing directory based services
JP2010050617A (en) * 2008-08-20 2010-03-04 Nippon Telegr & Teleph Corp <Ntt> Protocol conversion device and protocol conversion method
EP2395726A1 (en) * 2010-06-10 2011-12-14 Research In Motion Limited Method and system for reducing transmission of redundant data
US20170264671A1 (en) * 2016-03-11 2017-09-14 Takeshi Homma Remote communication system, communication terminal, and extended function providing method
CN110740217A (en) * 2019-09-12 2020-01-31 平安科技(深圳)有限公司 multi-channel data integration interaction method, device, equipment and storage medium
CN111476107A (en) * 2020-03-18 2020-07-31 平安国际智慧城市科技股份有限公司 Image processing method and device
CN111132120A (en) * 2020-04-01 2020-05-08 北京三快在线科技有限公司 Method, system and equipment for identifying camera device in room local area network
CN111260341A (en) * 2020-05-06 2020-06-09 武汉中科通达高新技术股份有限公司 Traffic violation data auditing method, computer equipment and readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨国民: "ENUM技术在IP-PBX中的应用", 电信快报, no. 09, pages 15 - 17 *

Also Published As

Publication number Publication date
CN112163538B (en) 2023-10-24

Similar Documents

Publication Publication Date Title
CN111798664B (en) Illegal data identification method and device and electronic equipment
US11659308B2 (en) Intelligent gas meter for internet of things (IOT) system
CN110189524A (en) A kind of active violation recognition methods, system and electronic equipment violating the regulations
CN111800521A (en) Front-end equipment control method and device
CN103974032A (en) Monitoring and management system of security equipment
CN112202786B (en) Illegal data identification method and device and electronic equipment
CN112217813A (en) Front-end equipment control method and device
CN112201046B (en) Illegal data identification method and device and electronic equipment
CN112188245B (en) Front-end camera real-time video-on-demand method and device and electronic equipment
CN112163538B (en) Illegal data identification method and device and electronic equipment
CN114885012A (en) System access method and system of Internet of things platform
CN114187580A (en) Method for updating digital twin model state and related equipment
CN112188244B (en) Front-end camera real-time video-on-demand method and device and electronic equipment
Hang et al. Design and implementation of intelligent fire notification service using IP camera in smart home
CN112187810A (en) Front-end equipment control method and device
CN112188243B (en) Front-end camera real-time video-on-demand method and device and electronic equipment
CN111489276A (en) Personnel management method and related device
CN112291210B (en) Method and device for acquiring front-end equipment catalog
CN114125502B (en) Video stream management method and device
CN111953944B (en) Community observation system
CN112291209B (en) Method and device for acquiring front-end equipment catalog
CN112291207B (en) Method and device for acquiring front-end equipment catalog
CN112188242A (en) Front-end camera real-time video-on-demand method and device and electronic equipment
CN117152855A (en) Parking lot charging method, device, equipment and readable storage medium
CN115731702A (en) Vehicle data processing method and device, vehicle and cloud

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant