CN112163538B - Illegal data identification method and device and electronic equipment - Google Patents

Illegal data identification method and device and electronic equipment Download PDF

Info

Publication number
CN112163538B
CN112163538B CN202011070373.8A CN202011070373A CN112163538B CN 112163538 B CN112163538 B CN 112163538B CN 202011070373 A CN202011070373 A CN 202011070373A CN 112163538 B CN112163538 B CN 112163538B
Authority
CN
China
Prior art keywords
traffic data
identification
http
sip
traffic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011070373.8A
Other languages
Chinese (zh)
Other versions
CN112163538A (en
Inventor
王洵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Zhongke Tongda High New Technology Co Ltd
Original Assignee
Wuhan Zhongke Tongda High New Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Zhongke Tongda High New Technology Co Ltd filed Critical Wuhan Zhongke Tongda High New Technology Co Ltd
Priority to CN202011070373.8A priority Critical patent/CN112163538B/en
Publication of CN112163538A publication Critical patent/CN112163538A/en
Application granted granted Critical
Publication of CN112163538B publication Critical patent/CN112163538B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • G06V20/54Surveillance or monitoring of activities, e.g. for recognising suspicious objects of traffic, e.g. cars on the road, trains or boats
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/94Hardware or software architectures specially adapted for image or video understanding
    • G06V10/95Hardware or software architectures specially adapted for image or video understanding structured as a network, e.g. client-server architectures
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/0104Measuring and analyzing of parameters relative to traffic conditions
    • G08G1/0125Traffic data processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Signal Processing (AREA)
  • Artificial Intelligence (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Evolutionary Computation (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Mathematical Physics (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • Biophysics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Evolutionary Biology (AREA)
  • Computational Linguistics (AREA)
  • Biomedical Technology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Chemical & Material Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Analytical Chemistry (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides an illegal data identification method, an illegal data identification device and electronic equipment, based on the method, a data server firstly receives an http traffic data call request sent by a traffic police terminal on a call selection page, converts the http traffic data call request into a sip traffic data call request, synchronously processes http state identifiers and the sip state identifiers corresponding to the two types of requests, then sends the sip traffic data call request to a target camera, synchronously updates identification contents of the sip state identifiers and the http state identifiers according to contents of returned sip traffic data call responses, generates an http traffic data call response and returns the http traffic data call response to the traffic police terminal when the identification contents are the traffic data call request, then receives traffic data returned by a front-end camera and sends the traffic data to identification equipment for illegal data identification, and returns illegal data to display equipment.

Description

Illegal data identification method and device and electronic equipment
Technical Field
The application relates to the field of intelligent traffic, in particular to a method and a device for identifying illegal data and electronic equipment.
Background
When the illegal behavior in the traffic data is identified, a data call request is firstly required to be initiated to the front-end camera, most security cameras on the market at present call the traffic data, in order to simplify the data call request process, the traffic data call signaling of the front-end camera is generally packaged into signaling in an SDK (Software Development Kit ) format, then the traffic police system calls the SDK for call, the SDK is developed and manufactured by an external manufacturer, and the traffic data shot by the front-end camera can be acquired by personnel in the non-traffic police system, namely, the data call mode has some potential safety hazards.
Therefore, the existing illegal data identification method has the technical problem of low safety and needs improvement.
Content of the application
The embodiment of the application provides an illegal data identification method which is used for improving the safety of a front-end camera traffic data calling process.
In order to solve the technical problems, the embodiment of the application provides the following technical scheme:
the application provides a method for identifying illegal data, which is suitable for an intelligent traffic system, wherein the intelligent traffic system comprises a front-end camera, a data server, display equipment, identification equipment and a traffic police terminal, a neural network model is operated in the identification equipment, the front-end camera is connected with the data server based on a sip protocol, the traffic police terminal, the display equipment and the identification equipment are connected with the data server based on an http protocol, and the method for identifying illegal data is applied to the data server and comprises the following steps:
Receiving an http traffic data calling request sent by the traffic police terminal based on an http protocol; the http traffic data calling request comprises a call selection page which comprises a display device selection control and a front-end camera selection control is displayed after the traffic police terminal receives a triggering instruction for calling traffic data, a target display device is determined according to a selection operation for the display device selection control, a target camera is determined according to a selection operation for the front-end camera selection control, and an http traffic data calling request conforming to an http protocol is generated according to a terminal identification of the traffic police terminal, an identification device identification of the identification device, a target camera identification of the target camera and a target display device identification of the target display device;
generating a sip traffic data call request corresponding to the http traffic data call request according to the target camera identifier, and generating an http state identifier corresponding to the http traffic data call request, wherein the sip state identifier corresponding to the sip traffic data call request synchronizes the identification content of the http state identifier and the identification content of the sip state identifier in real time, and the identification content comprises a traffic data call request completion state;
Sending the sip traffic data calling request to a target camera corresponding to the target camera identifier based on a sip protocol, receiving a response of the target camera to the sip traffic data calling returned based on the sip protocol, and synchronously updating the identifier contents of the sip state identifier and the http state identifier according to the content of the response of the sip traffic data calling;
when the identification content of the http state identification is that the traffic data calling request is completed, generating an http traffic data calling response corresponding to the http state identification, and returning the http traffic data calling response to the traffic police terminal based on an http protocol according to the terminal identification;
receiving traffic data sent by the target camera, and sending the traffic data to the identification equipment according to the identification equipment identification;
and receiving illegal data which are identified by the identification equipment from the traffic data based on the neural network model, and returning the illegal data to the target display equipment according to the target display equipment identification.
Meanwhile, the embodiment of the application also provides an illegal data identification device, which is used for an intelligent traffic system based on an http protocol, wherein the intelligent traffic system comprises a front-end camera, a data server, display equipment, identification equipment and a traffic police terminal, a neural network model is operated in the identification equipment, the front-end camera is connected with the data server based on a sip protocol, the traffic police terminal, the display equipment and the identification equipment are connected with the data server based on the http protocol, and the illegal data identification device is arranged in the data server and comprises:
The receiving module is used for receiving an http traffic data calling request sent by the traffic police terminal based on an http protocol; the http traffic data calling request comprises a call selection page which comprises a display device selection control and a front-end camera selection control is displayed after the traffic police terminal receives a triggering instruction for calling traffic data, a target display device is determined according to a selection operation for the display device selection control, a target camera is determined according to a selection operation for the front-end camera selection control, and an http traffic data calling request conforming to an http protocol is generated according to a terminal identification of the traffic police terminal, an identification device identification of the identification device, a target camera identification of the target camera and a target display device identification of the target display device;
the first synchronization module is used for generating a sip traffic data call request corresponding to the http traffic data call request according to the target camera identifier, generating an http state identifier corresponding to the http traffic data call request, synchronizing the http state identifier and the identification content of the sip state identifier in real time, wherein the identification content comprises a traffic data call request completion state;
The second synchronization module is used for sending the sip traffic data calling request to the target camera corresponding to the target camera identifier based on a sip protocol, receiving a sip traffic data calling response returned by the target camera based on the sip protocol, and synchronously updating the identifier contents of the sip state identifier and the http state identifier according to the content of the sip traffic data calling response;
the first return module is used for generating an http traffic data call response corresponding to the http state identifier when the identification content of the http state identifier is that the traffic data call request is completed, and returning the http traffic data call response to the traffic police terminal based on an http protocol according to the terminal identifier;
the sending module is used for receiving traffic data sent by the target camera and sending the traffic data to the identification equipment according to the identification equipment identification;
and the second return module is used for receiving illegal data which are identified by the identification equipment from the traffic data based on the neural network model, and returning the illegal data to the target display equipment according to the target display equipment identification.
The application also provides an electronic device, which comprises a memory and a processor; the memory stores an application program, and the processor is configured to run the application program in the memory, so as to perform operations in the illegal data identification method described in any one of the above.
The beneficial effects are that: according to the application, an http traffic data calling request is sent on the calling selection page based on an http protocol, and is converted into a sip traffic data calling request which can be identified by the front-end camera, then the sip traffic data calling response returned by the front-end camera is converted into an http traffic data calling response and then is returned to the traffic police terminal, when the request is initiated on the calling selection page, the corresponding target camera and the target display equipment can be selected only according to the selection operation, the operation is simpler, the traffic police terminal can complete the whole calling process only on a web browser or a platform without calling special SDK software, so that the safety is ensured, the http is a general protocol, the operation is simple, the understanding is convenient, and the convenience of data calling is improved. In addition, the trained neural network model is adopted to identify illegal data, compared with manual identification, the identification efficiency is improved, the identification process is independent of the data server, and when the system needs to be upgraded, only the identification equipment is required to be upgraded, and the data server with larger data quantity is not required to be integrally upgraded, so that the upgrade efficiency is improved, and the cost of data maintenance is reduced. In the protocol conversion process, the generated sip traffic data calling response can be converted into an http traffic data calling response in time by synchronizing the identification content of the sip state identification and the http state identification, so that the speed of returning the response is improved.
Drawings
The technical solution and other advantageous effects of the present application will be made apparent by the following detailed description of the specific embodiments of the present application with reference to the accompanying drawings.
Fig. 1 is a schematic view of a scenario of an illegal data identification system provided by an embodiment of the present application.
Fig. 2 is a flow chart of a method for identifying illegal data according to an embodiment of the present application.
Fig. 3 is a schematic diagram of a call selection page of a traffic police terminal in the illegal data identification method provided by the embodiment of the application.
Fig. 4 is a schematic diagram of a first model of a process from sending a traffic data call request to receiving a traffic data call response in an embodiment of the present application.
FIG. 5 is a schematic diagram of a second model of a process from sending traffic data call requests to receiving traffic data call responses in accordance with an embodiment of the present application.
Fig. 6 is a schematic diagram of a third model of a process from sending a traffic data call request to receiving a traffic data call response in an embodiment of the present application.
Fig. 7 is a schematic diagram of an illegal data display page of a display terminal in the illegal data identification method provided by the embodiment of the application.
Fig. 8 is a schematic structural diagram of an illegal data identification device according to an embodiment of the present application.
Fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. It will be apparent that the described embodiments are only some, but not all, embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to fall within the scope of the application.
In the embodiment of the application, the intelligent traffic system is a comprehensive network system which is constructed by comprehensively applying technologies such as video and audio monitoring, communication, computer network, system integration and the like and has the functions of information acquisition, transmission, exchange, control, display, storage, processing and the like and can realize interconnection, intercommunication and mutual control among different devices and systems in the traffic field with the aim of maintaining national security and social stability and preventing and striking illegal criminal activities. The intelligent traffic system comprises a front-end camera, a data server, display equipment, identification equipment and a traffic police terminal, wherein a neural network model is operated in the identification equipment, the front-end camera is connected with the data server based on a sip protocol, and the traffic police terminal, the display equipment and the identification equipment are connected with the data server based on an http protocol.
In the embodiment of the application, the front-end camera is a camera which is installed on a monitoring site in an intelligent traffic system and is used for information acquisition, coding, processing, storage, transmission and safety control.
In the embodiment of the application, the traffic police terminal refers to client equipment which is registered and authorized by the intelligent traffic system and has operation requirements on data and equipment in the system, and specifically can comprise a traffic police client and a developer client.
In the embodiment of the application, the identification equipment is equipment which runs a neural network model and can identify illegal data by calling the neural network model, the equipment and the data server are mutually independent, and only the identification equipment is required to be upgraded independently during system upgrading, and the data server is not required to be upgraded comprehensively.
In the embodiment of the application, the display device refers to a device for displaying illegal data through a webpage or a platform interface.
In the embodiment of the application, the neural network model refers to an artificial neural network structure with a hierarchical structure, and the artificial neural network structure comprises an input layer, an output layer and an intermediate layer (also called a hidden layer). In the neural network model, the number of nodes of an input layer and an output layer is usually fixed, a middle layer can be freely specified, a topology and an arrow in a structural diagram of the neural network represent the flow direction of data in the prediction process, the key in the structural diagram is the connection between neurons, and each connecting line corresponds to a different weight (the value of the connecting line is called a weight), which is needed to be obtained through training. The neural network model carries out multiple times of training based on the preprocessed training samples, and can realize the classification and identification of illegal data. After the traffic data is input into the neural network model obtained after training, the traffic data enters the middle layer after feature extraction by the input layer, a series of complex convolution, pooling, regression processing and other operations are carried out by the middle layer, various illegal behaviors can be identified, and corresponding illegal data is output by the output layer.
In the embodiment of the application, the traffic data refers to data such as vehicle information, pedestrian information, running parameters of vehicles and pedestrians in a monitoring place and the like shot by a front-end camera, and is usually visual data such as videos or images, wherein the vehicle information can comprise brands, vehicle types, colors, license plate number information and the like of the vehicles, and the pedestrian information can comprise gender, height, clothes, hairstyles and the like of the pedestrians.
The embodiment of the application provides an illegal data identification method and device for an intelligent traffic system based on an http protocol and electronic equipment. The illegal data identification device can be integrated in electronic equipment, and the electronic equipment can be a server or a terminal and other equipment.
Referring to fig. 1, fig. 1 is a schematic view of a scenario of an illegal data identification system provided by an embodiment of the present application, where the system may include terminals and servers, and the terminals, the servers, and the terminals and the servers are connected and communicated by means of the internet formed by various gateways, and the application scenario includes a traffic police terminal 11, a data server 12, a front-end camera 13, an identification device 14, and a display device 15; wherein:
The traffic police terminal 11, identification device 14, and presentation device 15 include, but are not limited to, tablet computers, notebook computers, personal computers (PC, personal Computer), mini-processing boxes, or other devices, etc.;
the data servers 12 include local servers and/or remote servers, etc.;
the front-end camera 13 includes video and image acquisition equipment provided at a monitoring site.
The traffic police terminal 11, the data server 12, the front-end camera 13, the identification device 14 and the display device 15 are located in a wireless network or a wired network, the front-end camera 13 is connected with the data server 12 based on a sip protocol, and the traffic police terminal 11, the display device 15 and the identification device 14 are connected with the data server 12 based on an http protocol so as to realize data interaction among the five, wherein:
the traffic police terminal 11 acquires the target display equipment identifier from the display equipment 15 based on the selection operation on the call selection page, the data server 12 receives an http traffic data call request sent by the traffic police terminal 11 on the call selection page based on an http protocol, then generates a corresponding sip traffic data call request, synchronizes the http state identifier corresponding to the http traffic data call request and the identifier content of the sip state identifier in real time, selects a target camera from the front-end camera 13 based on the sip protocol and sends the sip traffic data call request to the front-end camera, receives the sip traffic data call response returned by the target camera based on the sip protocol, synchronously updates the http state identifier and the identifier content of the http state identifier according to the content of the sip traffic data call response, generates an http traffic data call response corresponding to the http state identifier when the identifier content of the http state identifier is the traffic data call request is completed, returns the http traffic data call response to the traffic terminal 11 based on the http protocol, then receives traffic data sent by the target camera, sends the traffic data to the identification equipment 14 according to the identification equipment identifier, and then receives the identification data returned by the identification equipment to the traffic police terminal 14 to the traffic police terminal based on the identification method, and can realize the illegal display of the illegal traffic police terminal data based on the network method.
It should be noted that, the schematic system scenario shown in fig. 1 is only an example, and the servers and the scenarios described in the embodiments of the present application are for more clearly describing the technical solutions of the embodiments of the present application, and do not constitute a limitation on the technical solutions provided by the embodiments of the present application, and those skilled in the art can know that, with the evolution of the system and the appearance of a new service scenario, the technical solutions provided by the embodiments of the present application are equally applicable to similar technical problems. The following will describe in detail. The following description of the embodiments is not intended to limit the preferred embodiments.
Referring to fig. 2, fig. 2 is a flow chart of a method for identifying illegal data according to an embodiment of the present application, where the method includes:
s201: receiving an http traffic data calling request sent by a traffic police terminal based on an http protocol; the http traffic data calling request comprises that after a traffic police terminal receives a triggering instruction for calling traffic data, a calling selection page comprising a display device selection control and a front-end camera selection control is displayed, a target display device is determined according to a selection operation for the display device selection control, a target camera is determined according to a selection operation for the front-end camera selection control, and an http traffic data calling request conforming to an http protocol is generated according to a terminal identification of the traffic police terminal, an identification device identification of an identification device, a target camera identification of the target camera and a target display device identification of the target display device.
The traffic police terminal sends an http traffic data calling request to the data server based on an http protocol, and when the request is sent, a sender can be an internal person of a public security system and used for calling traffic data of pedestrians or vehicles at a monitoring place so that the recognition equipment can judge and process illegal behaviors, and can also be a developer of traffic data calling with access rights and used for calling real-time traffic data of the front-end camera and debugging calling parameters and calling related equipment according to calling response. The http traffic data call request can be sent through a video monitoring platform which is independently developed, and can also be directly sent in a web browser to be received by a data server. The request under the http protocol is a unidirectional channel request from the traffic police terminal to the data server.
The http traffic data call request carries a terminal identifier, an identification device identifier, a target display device identifier and a target camera identifier, wherein the terminal identifier comprises an IP address and a port of a traffic police terminal, the target camera identifier comprises an ID of a target camera, the identification device identifier comprises an IP address and a port of identification equipment, and the target display device identifier comprises an IP address and a port of display equipment. Before a request is sent, the traffic police terminal establishes connection with the identification equipment, and obtains the equipment identification of the identification equipment based on an http protocol. In general, the target display device and the traffic police terminal are the same device, i.e. the traffic police terminal initiating the request is also used as the target display device for displaying the illegal data. The target display device and the traffic police terminal can also be different devices, namely the traffic police terminal initiating the request and the target display device displaying the illegal data are different devices registered in the intelligent traffic system. In addition, the target display device can be multiple, and the multiple target display devices can comprise a traffic police terminal and other display devices, or can be all other display devices.
After receiving a triggering instruction for calling traffic data, the traffic police terminal displays a calling selection page comprising a display device selection control and a front-end camera selection control, and then performs corresponding selection operation on the calling selection page to determine which camera in a monitoring place is required to call the traffic data shot by and which display device is used for displaying illegal data corresponding to the traffic data. When the display device selection control is triggered, a catalog of all registered display devices is generated, one or some display devices can be selected as target display devices, and the traffic police terminal initiating the request or the display device which is requested to be selected last time can be set as a default target display device in the catalog of the display devices. When the front-end camera selection control is triggered, a catalog of all registered front-end cameras is generated, one front-end camera can be selected as a target camera, and the front-end camera which is requested to be selected last time can be set as a default target camera in the front-end camera catalog.
After the corresponding selection operation is carried out on the call selection page, an http traffic data call request conforming to an http protocol is generated according to the terminal identification of the traffic police terminal, the target display equipment identification of the target display equipment and the target camera identification of the target camera.
S202: generating an http traffic data call request corresponding to the http traffic data call request according to the target camera identification, generating an http state identification corresponding to the http traffic data call request, synchronizing identification contents of the http state identification and the sip state identification in real time, wherein the identification contents comprise traffic data call request completion states.
After receiving the http traffic data call request, determining a target camera from front-end camera cluster information stored in a data server according to a target camera identifier carried by the http traffic data call request, acquiring an access address of the target camera, and generating a request head in the sip traffic data call request according to the access address. Then, each call command in the http traffic data call request is converted into a call command under the sip protocol, the call command is generated into a message body in the sip traffic data call request, and the request header and the message body are combined to generate a corresponding sip traffic data call request.
After generating a sip traffic data call request corresponding to the http traffic data call request, respectively generating corresponding http state identifiers and sip state identifiers for the http traffic data call request and the sip state identifiers, wherein the identifier contents of the two state identifiers comprise the starting time of the traffic data call request and the traffic data call request completion state. And (3) synchronously processing the identification contents of the http state identification and the sip state identification, namely, when the identification content of one of the http state identification and the sip state identification changes at any moment, the identification content of the other one changes in the same way. When the traffic data call request is not processed, the traffic data call request completion state in the identification content always shows that the traffic data call request is not completed, and if the traffic data call response is received, the traffic data call request completion state in the identification content shows that the traffic data call request is completed.
S203: and sending a sip traffic data calling request to a target camera corresponding to the target camera identifier based on a sip protocol, receiving a sip traffic data calling response returned by the target camera based on the sip protocol, and synchronously updating the identifier contents of the sip state identifier and the http state identifier according to the content of the sip traffic data calling response.
After a sip traffic data calling request is obtained, a sip session is established between a data server and a target camera according to the target camera identification, the sip traffic data calling request is sent to the corresponding target camera, and the target camera processes the request after receiving the sip traffic data calling request.
After the target camera processes the sip traffic data call request, a processing signaling is sent to the data server through a sip session established between the target camera and the data server, a sip traffic data call response is generated according to the processing signaling, and then the identification content of the sip state identification and the identification content of the http state identification are synchronously updated according to the content of the sip traffic data call response. And when the content of the sip traffic data call response is that the call is completed, updating the identification content of the sip state identification and the http state identification as the traffic data call request.
S204: and when the identification content of the http state identification is that the traffic data calling request is completed, generating an http traffic data calling response corresponding to the http state identification, and returning the http traffic data calling response to the traffic police terminal based on an http protocol according to the terminal identification.
When the identification content of the sip state identification and the http state identification is updated to be that the traffic data calling request is completed, the data server generates a corresponding http traffic data calling response, and the response content of the http traffic data calling response is the same as that of the sip traffic data calling response. After the generated http traffic data call response, determining a traffic police terminal for sending the http traffic data call response according to the terminal identification, then establishing an http session between the data server and the traffic police terminal, and calling the response to the http traffic data returned by the traffic police terminal.
S205: and receiving traffic data sent by the target camera, and sending the traffic data to the identification equipment according to the identification equipment.
When the call response is that the call is completed, the data server receives traffic data sent by the target camera, the traffic data is usually a media bare stream shot by the front-end camera, before the traffic data is sent, the media bare stream needs to be packaged to form a data packet, for example, the data packet can be packaged to form an RTP data packet, then the data packet is sent to the data server, and after the data server receives the data packet, the data packet is sent to the identification equipment based on an http protocol according to the identification equipment.
S206: and receiving illegal data identified by the identification equipment from the traffic data based on the neural network model, and returning the illegal data to the target display equipment according to the target display equipment identification.
After receiving traffic data, the identification equipment unpacks the traffic data, pre-processes the unpacked traffic data, such as removing some non-video data, interference data and the like, then inputs the traffic data into a pre-trained neural network model, detects and tracks pedestrian targets and vehicle targets in each frame of image of the shot video, and determines the behavior track of the pedestrian targets and the vehicle targets. Then, the neural network model identifies the detected vehicle target, so that the attributes of the brand, the vehicle type, the license plate number, the vehicle color and the like of the detected vehicle target can be obtained, and the attributes of the sex, the height, the clothes, the hair style and the like of the detected pedestrian target can be obtained. After detection, the attribute of the detected target can be stored in the identification device or the data server for subsequent search query of the detected illegal target, and basis is provided for punishment. And then, the neural network model identifies traffic marks of the road where the target is located, such as traffic signals, traffic marking lines, speed limit signs and the like, and finally judges whether the target has traffic illegal behaviors according to the detected information such as the position where the target is located, the target behavior track, the target attribute, the traffic marks of the road where the target is located and the like. After the traffic illegal behaviors are identified, corresponding illegal data are generated, and the corresponding illegal data are returned to the target display equipment based on the http protocol according to the target display equipment identification of the target display equipment. The target display device decides whether or not to penalize the illegal target based on relevant legal regulations according to the illegal data.
According to the method, firstly, an http traffic data calling request sent by a traffic police terminal on a call selection page based on an http protocol is received, the http traffic data calling request carries a terminal identifier, a target display device identifier, an identification device identifier and a target camera identifier, a sip traffic data calling request corresponding to the http traffic data calling request is generated according to the target camera identifier, an http state identifier corresponding to the http traffic data calling request is generated, the sip state identifier corresponding to the sip traffic data calling request is synchronized with the identification content of the http state identifier in real time, the identification content comprises a traffic data calling request completion state, then the sip traffic data calling request is sent to a target camera corresponding to the target camera based on the sip protocol, the sip traffic data calling response returned by the target camera based on the sip protocol is received, and the identification content of the http state identifier and the http state identifier are synchronously updated according to the content of the sip traffic data calling response, when the identification content of the http state identifier is the traffic data calling request, the http state identifier is generated, the http state identifier corresponding to the http state identifier is sent to the traffic data calling request, the traffic data calling request is sent to the target camera based on the target camera corresponding to the traffic data display device, the traffic data calling request is sent to the target camera based on the target camera, the traffic data calling request is sent to the target camera corresponding to the neural network, and the traffic data is sent to the traffic data calling request is sent to the target camera corresponding to the data display device, and the data is identified based on the http traffic data, and the data is sent to the neural network. According to the application, an http traffic data calling request is sent on the calling selection page based on an http protocol, and is converted into a sip traffic data calling request which can be identified by the front-end camera, then the sip traffic data calling response returned by the front-end camera is converted into an http traffic data calling response and then is returned to the traffic police terminal, when the request is initiated on the calling selection page, the corresponding target camera and the target display equipment can be selected only according to the selection operation, the operation is simpler, the traffic police terminal can complete the whole calling process only on a web browser or a platform without calling special SDK software, so that the safety is ensured, the http is a general protocol, the operation is simple, the understanding is convenient, and the convenience of data calling is improved. In addition, the trained neural network model is adopted to identify illegal data, compared with manual identification, the identification efficiency is improved, the identification process is independent of the data server, and when the system needs to be upgraded, only the identification equipment is required to be upgraded, and the data server with larger data quantity is not required to be integrally upgraded, so that the upgrade efficiency is improved, and the cost of data maintenance is reduced. In the protocol conversion process, the generated sip traffic data calling response can be converted into an http traffic data calling response in time by synchronizing the identification content of the sip state identification and the http state identification, so that the speed of returning the response is improved.
As shown in fig. 3, a call traffic data control 100 is set on a platform interface of a traffic police terminal, when a user wants to call traffic data shot at a certain intersection at a certain moment, clicking the call traffic data control 100, the traffic police terminal receives a trigger instruction for calling the traffic data, and a call selection page including a display device selection control 200 and a front-end camera selection control 300 is displayed. The call traffic data control 100 and the other two controls can be arranged on different pages, namely, the call selection page can be a page generated after clicking the call traffic data control 100 on the other page of the traffic police terminal; the call traffic data control 100 and the other two controls can be arranged on the same page, when the call traffic data control 100 is not clicked, the other two controls are not displayed, and after the call traffic data control 100 is clicked, the page is used as a call selection page to display the display equipment selection control 200 and the front-end camera selection control 300. The illegal data display area 500 is also arranged in the call selection page, the illegal data display area 500 can display text description and video, and in an initial state, the illegal data display area 500 is a blank picture or a final display picture when illegal data is displayed last time.
After clicking the display device selection control 200 by calling the selection page, the display device catalog 201 is generated by calling the selection page according to the triggering operation for the device selection control 200, all the display devices registered in the intelligent transportation system can be displayed in the display device catalog 201, and then the corresponding selection operation is carried out in the display device catalog 201 to determine which display device is used as the target display device to display the illegal data. In performing the selection operation, one or more display devices may be selected from the display device catalog 201 as target display devices, wherein the traffic police terminal that initiated the request or the display device that requested the selection last time may be set as the default target display device. When there are more display devices included in the display device list 201, a search or screening function may be set to narrow the search range according to information such as keywords, thereby rapidly searching for a desired target display device.
Likewise, after the front-end camera selection control 300 is clicked by the call selection page, the front-end camera directory 301 is generated by the call selection page according to the triggering operation for the front-end camera selection control 300, all the front-end cameras registered in the intelligent transportation system can be displayed in the front-end camera directory 301, and then the corresponding selection operation is performed in the front-end camera directory 301 to determine which camera in the monitoring place is watched for the traffic data. In performing the selection operation, one of the front-end camera directories 301 may be selected as a target camera, wherein the front-end camera that requested the selection last time may be set as a default target camera. When there are more front-end cameras included in the front-end camera directory 301, a search or screening function may be set to narrow a search range according to information such as keywords, so as to quickly find a target camera to be selected.
After corresponding selection operations are performed on the device selection control 200 and the front-end camera selection control 300, clicking the determination control 400 generates an http traffic data call request conforming to an http protocol according to the terminal identifier of the traffic police terminal, the identifier of the identification device, the identifier of the target display device and the identifier of the target camera.
As shown in fig. 4, the framework from sending traffic data call requests to receiving traffic data call responses is divided into several modules, and the data server includes http-side processing logic 22, message synchronizer 23, and sip-side processing logic 24. The traffic police terminal firstly sends an http traffic data calling request 21 sent based on an http protocol to an http side processing logic 22 for processing, and then the http side processing logic 22 sends the http traffic data calling request to a message synchronizer 23; the message synchronizer 23 converts the http traffic data call request into a sip traffic data call request, generates an http state identifier for the http traffic data call request, generates a sip state identifier for the sip traffic data call request, synchronizes the identification contents of the http state identifier and the sip state identifier, and then sends the sip traffic data call request to the sip side processing logic 24 for processing; after the processing of the sip side processing logic 24 is completed, a sip session is established between the processing logic and the target camera 25, a sip traffic data calling request is sent to the target camera 25, and a sip traffic data calling response returned by the target camera 25 to the processing logic 24 of the sip side is received; the sip side processing logic 24 sends the sip traffic data call response to the message synchronizer 23, the message synchronizer 23 synchronously updates the http state identifier and the identifier content of the sip state identifier according to the content of the sip traffic data call response, and generates an http traffic data call response and sends the http traffic data call response to the http side processing logic 22 when the identifier content of the http state identifier is that the traffic data call request is completed; the http side processing logic 22 returns an http traffic data call response 26 to the traffic police terminal, and the traffic police terminal determines the processing state of the traffic data call request according to the http traffic data call response 26.
As shown in fig. 5 and 6, the http side processing logic 22 includes an http service module 221, a request parser 222, a validity judgment 223, an http message manager 224, and an http timer status notification queue 225, and the sip side processing logic 24 includes a sip call management 241, a sip message manager 242, a user agent client 243, a user agent server 244, and a front-end camera sip proxy 245, and the illegal data identification method of the present application is specifically described below with reference to fig. 4 to 6.
The traffic police terminal sends an http traffic data call request 21 to the http side processing logic 22, wherein the http traffic data call request 21 carries a terminal identifier, an identification device identifier, a target display device identifier and a target camera identifier. The terminal identification comprises an IP address and a port of a traffic police terminal, the data server determines which terminal the traffic data call response is transmitted to according to the terminal identification, the target display equipment identification comprises the IP address and the port of the target display equipment, the data server determines which terminal the illegal data is returned to according to the target display equipment identification, the target camera identification comprises the ID of the target camera, the data server determines that the target camera is positioned at the xx road xx intersection according to the target camera identification, so as to send an http traffic data call request 21 to the target camera, the identification equipment identification comprises the IP address and the port of the identification equipment, the data server determines which identification equipment the traffic data transmitted by the subsequent target camera is forwarded to according to the identification equipment identification, and the identification equipment identifies the traffic illegal behavior type, the traffic illegal behavior time, the traffic illegal vehicle or pedestrian information and other data according to the traffic behavior of vehicles or pedestrians in the traffic data and returns the traffic data to the target display equipment for further processing.
In the http side processing logic 22, the http traffic data call request 21 is received by the http service module 221, the http service module 221 comprises an http gateway, and then the http traffic data call request 21 is forwarded to the request parser 222. After the request parser 222 parses each command parameter in the http traffic data call request 21, the http traffic data call request 21 is put into the http message manager 224. The http message manager 224 continually handles the internal message buffering while sending a new incoming http traffic data call request 21 to the message synchronizer 23.
In one embodiment, before the step of placing the http traffic data call request 21 into the http message manager 224, the validity judgment 223 is further performed on the parsed http traffic data call request 21, which specifically includes: based on the effective parameter set of the traffic data call request, carrying out logic judgment on the http traffic data call request 21; if the http traffic data call request 21 is legal, the http traffic data call request 21 is cached to the http message manager 224, and if the http traffic data call request 21 is illegal, a termination request result is directly returned to the traffic police terminal, and the termination request result is expressed as an http traffic data call response 26 at the traffic police terminal. When the traffic police terminal sends out the http traffic data call request 21, the http traffic data call request 21 is usually sent out in the form of inputting a website on a web browser or a platform, parameters such as a terminal identifier, a target camera identifier, a call command and the like are included in the http traffic data call request 21, if the input of each identifier or call command is wrong, the subsequent processing logic is affected, therefore, after analysis, the http traffic data call request 21 is firstly logically judged based on the traffic data call request effective parameter set, the traffic data call request effective parameter set comprises the type of the effective parameter, specific parameter values, the arrangement sequence of each parameter and the like, if the traffic data call request effective parameter set is legal, the next step is entered, the http traffic data call request 21 is cached in the http message manager 224, if the http traffic data call request 21 is illegal, a termination request result is directly returned to the traffic police terminal, and specific error types can be further displayed, if the invalid parameters are input or the corresponding target camera and the like cannot be found, so that the traffic police terminal can conveniently adjust the http traffic data call request 21 and re-input.
In one embodiment, after the step of caching the http traffic data call request 21 to the http message manager 224, further comprising: judging whether the http traffic data calling request 21 is the same as the http traffic data calling request which enters in the preset time period; if the content is the same, the http traffic data call request 21 is removed from the http message manager 224, and if the content is different, the http traffic data call request 21 is sent to the message synchronizer 23. After the traffic police terminal sends the http traffic data call request 21, if no traffic data call response is received within the expected time, one or more refreshing operations are usually performed, each refreshing operation will send out one traffic data call request 21 again, and the content of each sent traffic data call request 21 is the same, if the data server processes each request, resource waste will be caused, so after the http traffic data call request 21 is cached in the http message manager 224, the http message manager 224 will number the incoming requests in time sequence, such as number 1, number 2, number 3, etc., and check and re-determine each time a new http traffic data call request 21 is entered.
Assuming that the new incoming http traffic data call request 21 is numbered n, the http message manager 224 first determines whether there is an n-1 request to enter within a preset period of time from the n-th request entry time, where the preset period of time may be set according to the sending behavior of most request senders, for example, 2 seconds may be used as the preset period of time if most request senders start to reinitiate the request after receiving no response within 2 seconds after sending the request. If no n-1 request is detected to enter within the previous preset time period, a new entering http traffic data call request can be directly sent to the message synchronizer 23. If it is detected that the n-1 th request enters in the preset time period, the n-1 th request and the n-1 th request are subjected to content check and duplication judgment, when the content is the same, the n-1 th request is indicated to be a repeated request, the newly-entered http traffic data calling request is removed from the http message manager 224, the n-1 th request is continuously processed, when the content is different, the n-1 th request is indicated to be a new request, the newly-entered http traffic data calling request is sent to the message synchronizer 23, and after the n-1 th request is processed, the n-1 th request is continuously processed.
After receiving the http traffic data call request 21, the message synchronizer 23 generates a sip traffic data call request corresponding to the http traffic data call request according to the target camera identification. The front-end cameras registered in the data server are all located in the cluster information, each front-end camera is provided with a unique identification, a target camera is determined from the front-end camera cluster information according to the target camera identification, an access address of the target camera is obtained, and a request head in a sip traffic data call request can be generated according to the access address. Then, each call command in the http traffic data call request 21 is converted into a call command under the sip protocol, and then the call command is generated into a message body in the sip traffic data call request, and the request header and the message body are combined to generate a corresponding sip traffic data call request.
The message synchronizer 23 generates an http state identifier for the http traffic data call request 21, generates a sip state identifier for the sip traffic data call request, and synchronizes the http state identifier and the identification content of the sip state identifier in real time, wherein the identification content comprises a traffic data call request completion state. In the message synchronizer 23, the http state identifier and the sip state identifier have the same identifier content at any time, and the synchronization operation is realized through a corresponding synchronization program.
For the http traffic data call request 21 newly entering the message synchronizer 23, after the steps of format conversion and identification synchronization are completed, the sip traffic data call request is sent to the sip side processing logic 24, and then the sip side processing logic 24 sends the sip traffic data call request to the target camera corresponding to the target camera identification based on the sip protocol. After sending, the message synchronizer 23 will complete detection on the traffic data call request, if the sip side processing logic 24 has returned a sip traffic data call response, the message synchronizer 23 will generate a corresponding http traffic data call response and put it into the http timer status notification queue 225, the http timer status notification queue 225 notifies the http message manager 224 according to the sequence of entering the response, and the http message manager 224 returns an http traffic data call response 26 to the traffic police terminal, so that the traffic police terminal can obtain the processing result of the traffic data call request.
In the sip-side processing logic 24, the specific steps of the process include: caching the sip traffic data call request into a sip message manager 242 and establishing a session with a front-end camera sip proxy 245 based on a sip protocol; determining a target camera 25 from the front-end camera sip proxy 245 according to the target camera identification; the sip traffic data call request is sent to the target camera 25 based on the sip protocol.
The sip traffic data call request is first sent to the sip call manager 241, and the sip call manager 241 generates a unique identifier for the sip traffic data call request and then caches the unique identifier in the sip message manager 242. The user agent client 243 then checks from the sip message manager 242 whether a new traffic data call request arrives or an update of the traffic data call request status, and sends a different request to the front-end camera sip agent 245 according to the check result. When it is checked that a new sip traffic data call request arrives in the sip message manager 242, the user agent client 243 calls its own proxy mode, establishes a session with the front-end camera sip proxy 245 based on the sip protocol, sends an Invite request, and after the front-end camera sip proxy 245 receives the Invite request, determines the target camera 25 from the front-end camera sip proxy 245 according to the target camera identifier, and then the front-end camera sip proxy 245 sends the sip traffic data call request to the target camera 25. When it is detected that there is a status update of the traffic data call request in the sip message manager 242, if the request is terminated, a corresponding processing request is sent to the front-end camera sip proxy 245 according to the updated status.
Next, the sip-side processing logic 24 receives the sip traffic data call response returned by the target camera 25 based on the sip protocol, and synchronously updates the identification content of the sip state identification and the http state identification according to the content of the sip traffic data call response.
In one embodiment, the steps specifically include: receiving processing signaling returned by the target camera 25 to the sip message manager 242 based on the sip protocol; updating the identification content of the sip state identification corresponding to the sip traffic data call request in the sip message manager 242 according to the processing signaling; when the identification content of the sip state identification is detected to be that the traffic data calling request is completed, returning a sip traffic data calling response to the message synchronizer 23; and synchronously updating the identification contents of the sip state identification and the http state identification in the message synchronizer 23 according to the contents of the sip traffic data call response.
The processing signaling returned by the target camera 25 after processing the sip traffic data call request is received by the user agent server 244, and the user agent server 244 updates the identification content of the sip status identification corresponding to the sip traffic data call request in the sip message manager 242 according to the processing signaling. Specifically, when the processing signaling is 200OK, which indicates that the traffic data call request is completed, the user agent server 244 matches the sip traffic data call request in the sip message manager 242 and updates the identification content of the corresponding sip status identifier to the traffic data call request.
When the identification content of the sip state identification is detected to be the traffic data call request is completed, a sip traffic data call response is generated and returned to the message synchronizer 23, and then the identification content of the sip state identification and the identification content of the http state identification in the message synchronizer 23 are synchronously updated according to the content of the sip traffic data call response, and then the identification content of the sip state identification and the identification content of the http state identification are updated to be the traffic data call request.
In one embodiment, the steps after returning the sip traffic data call response to the message synchronizer 23 include: the sip traffic data call request is removed from the sip message manager 242. At this point the traffic data call request has been processed and a corresponding traffic data call response is generated, so that it is removed from the sip message manager 242 and the buffer space of the sip message manager 242 can be freed up to facilitate the sip message manager 242 to process further request messages. In addition, after removal, the data server can store relevant logs of the sip traffic data call responses, classify a plurality of traffic data call responses within a certain period of time in the logs, for example, classify according to the traffic data call request completion time, analyze the condition of longer processing time, find reasons, facilitate the developers to perform BUG positioning and program debugging, and subsequently maintain and upgrade the system.
When the identification content of the http state identification is that the traffic data call request is completed, the message synchronizer 23 generates an http traffic data call response corresponding to the http state identification, and returns an http traffic data call response 26 to the traffic police terminal based on the http protocol according to the terminal identification. The message synchronizer 23 determines which port of which client the traffic data call response should be sent to according to the terminal identification, and then returns the http traffic data call response 26, and the traffic police terminal determines the processing result of the traffic data call request according to the content of the http traffic data call response 26.
In one embodiment, the steps following the return of the http traffic data call response 26 to the traffic police terminal include: the http traffic data call request and the sip traffic data call request are removed from the message synchronizer 23. After removal, the internal space of the message synchronizer 23 is also released to facilitate the message synchronizer 23 to process further request messages.
After the traffic police terminal acquires the http traffic data call response 26, the target camera 25 packages and transmits the photographed traffic data to the data server, and then the data server transmits the packaged traffic data to the identification device according to the identification device IP address and the port in the identification device identifier. After receiving traffic data, the identification equipment unpacks the traffic data, pre-processes the unpacked traffic data, such as removing some non-video data, interference data and the like, then inputs the traffic data into a pre-trained neural network model, and the neural network model identifies illegal data.
The neural network model firstly detects and tracks pedestrian targets and vehicle targets in each frame of image of the video, and determines the behavior track of the pedestrian targets and the vehicle targets. In order to reduce the influence of false detection and omission, the system judges that a new target enters only when continuous M frames of the target are detected, and considers that the target has disappeared only when continuous N frames of the target are not detected, wherein M and N are positive integers, and can be set to different values according to the type of the target, the running speed and other parameters. Specifically, in the process of tracking the targets, the historical position of each target is recorded, the initial motion track of each target is formed, and the initial motion track of each target is subjected to smooth filtering by adopting a kalman filter, so that the target behavior track is obtained.
Then, the neural network model identifies the detected vehicle target, so that the attributes of the brand, the vehicle type, the license plate number, the vehicle color and the like of the detected vehicle target can be obtained, and the attributes of the sex, the height, the clothes, the hair style and the like of the detected pedestrian target can be obtained. After detection, the attribute of the detected target can be stored in the identification device or the data server for subsequent search query of the detected illegal target, and basis is provided for punishment.
Then, the neural network model identifies traffic marks of the road where the target is located, such as traffic signal lamps, traffic marking lines, speed limit signs and the like, and then judges whether traffic illegal behaviors exist in the target according to the detected information such as the position where the target is located, the target behavior track, the target attribute, the traffic marks of the road where the target is located and the like.
For example, when the traffic signal lamp is recognized to be in a red light state and the traffic marking of the current road comprises a stop line, whether the position of the target exceeds the stop line is judged within a range of 15 meters before and after the stop line, and if so, the illegal action of running the red light exists. For another example, when the traffic markings of the current road are identified to include road type markings, such as pedestrian lanes, motor lanes, and non-motor lanes, and the target attribute is identified to be not matched with the type of the current road, illegal action of illegally occupying the road exists.
In the embodiment of the application, illegal data identification is performed by using the identification equipment running with the neural network model, and the identification efficiency of the neural network model is gradually increased after the neural network model is trained for a plurality of times. When training the neural network model, the video data shot by the front-end camera is required to be acquired, all the characteristics in the video data are artificially marked, then the video data are input into the neural network model as training samples for training, and when traffic data to be identified are input subsequently, the trained neural network model can have corresponding identification capability.
In the training sample, the pedestrian target and the vehicle target are manually marked, and when traffic data is input subsequently, the trained neural network model can have the capability of identifying the pedestrian target and the vehicle target. In the training sample, the attribute of the pedestrian target and the attribute of the vehicle target are marked by people, so that the trained neural network model can have the capability of identifying the attribute of the pedestrian target and the attribute of the vehicle target. In the training sample, different labels are manually carried out on the pixels where the non-traffic marks are located and the pixels where the traffic marks are located, and corresponding traffic mark types are marked at the same time, so that the trained neural network model can have the capability of identifying the traffic marks and the corresponding categories thereof. Through the three training, the neural network model can identify the information such as the position where the target is located, the target behavior track, the target attribute, the traffic identification of the road where the target is located and the like according to the input traffic data, so that understanding of the road traffic video is completed, and further, illegal behaviors are identified. In order to make the recognition effect of the neural network model better, training needs to be performed for a sufficient number of times so that the recognition accuracy is not lower than a preset value.
After the traffic illegal behaviors of the targets are identified, the identification equipment generates corresponding illegal data, the illegal data comprise information such as illegal time, illegal places, illegal targets, illegal types and the like, the illegal data are returned to the data server based on an http protocol, and the data server returns the illegal data to the target display equipment according to the target display equipment identification. And the traffic police terminal decides whether to punish the illegal target or not based on relevant legal regulations according to the illegal data.
In this embodiment, taking the target display device and the traffic police terminal as the same device as an example, as shown in fig. 7, after the target display device receives the illegal data, the target display device displays the illegal data in the illegal data display area 500, where the displayed content includes a description of characters and videos, for example, the displayed characters are "the vehicles with license plate numbers xxxxxx are not gived by pedestrians at the xx moment xx intersection", after the characters are triggered, the whole video process of the illegal vehicles not gived by pedestrians can be displayed in the illegal data display area 500, so as to realize the recognition and subsequent processing of the traffic illegal data. In addition, if there are multiple illegal actions in the traffic data, multiple rows of characters are displayed in the illegal data display area 500, each row of characters correspondingly describes one illegal action, and videos corresponding to the illegal actions described by the row of characters can be played one by clicking each row of characters in turn. When traffic data shot by other front-end cameras is wanted to be called after the watching is completed, the traffic data calling control 100 can be clicked again to generate a next data calling request. When the target display device and the traffic police terminal are different devices, the link address for displaying the illegal data can be sent to the target display device, and after the target display device clicks the link address, the illegal data display area 500 is displayed in the clicked page, so that illegal data can be displayed on other devices except the traffic police terminal.
According to the illegal data identification method disclosed by the embodiment of the application, the http-based traffic data calling request is sent out on the calling selection page based on the http protocol, the http-based traffic data calling request is converted into the sip-based traffic data calling request which can be identified by the front-end camera, then the sip-based traffic data calling response returned by the front-end camera is converted into the http-based traffic data calling response and then returned to the traffic police terminal, the corresponding target camera and the target display device can be selected only according to the selection operation when the request is sent out on the calling selection page, the operation is simpler, the traffic police terminal can complete the whole calling process only on a webpage browser or a platform without calling special SDK software, so that the safety is ensured, the http is a general protocol, the operation is simple, the understanding is convenient, and the convenience of data calling is improved. In addition, the trained neural network model is adopted to identify illegal data, compared with manual identification, the identification efficiency is improved, the identification process is independent of the data server, and when the system needs to be upgraded, only the identification equipment is required to be upgraded, and the data server with larger data quantity is not required to be integrally upgraded, so that the upgrade efficiency is improved, and the cost of data maintenance is reduced. In the protocol conversion process, the generated sip traffic data calling response can be converted into an http traffic data calling response in time by synchronizing the identification content of the sip state identification and the http state identification, so that the speed of returning the response is improved.
On the basis of the method described in the foregoing embodiment, this embodiment will be further described from the point of view of an illegal data identification device, and referring to fig. 8, fig. 8 specifically describes an illegal data identification device provided in the embodiment of the present application, which may include:
the receiving module 110 is configured to receive an http traffic data call request sent by the traffic police terminal based on an http protocol; the http traffic data calling request comprises that after a traffic police terminal receives a triggering instruction for calling traffic data, a calling selection page comprising a display equipment selection control and a front-end camera selection control is displayed, a target display equipment is determined according to a selection operation for the display equipment selection control, a target camera is determined according to a selection operation for the front-end camera selection control, and an http traffic data calling request conforming to an http protocol is generated according to a terminal identification of the traffic police terminal, an identification equipment identification of an identification equipment, a target camera identification of the target camera and a target display equipment identification of the target display equipment;
the first synchronization module 120 is configured to generate, according to the target camera identifier, a sip traffic data call request corresponding to the http traffic data call request, and generate an http state identifier corresponding to the http traffic data call request, where the sip state identifier corresponding to the sip traffic data call request synchronizes, in real time, identification contents of the http state identifier and the sip state identifier, and the identification contents include a traffic data call request completion state;
The second synchronization module 130 is configured to send a sip traffic data call request to a target camera corresponding to the target camera identifier based on the sip protocol, receive a response to the sip traffic data call returned by the target camera based on the sip protocol, and synchronously update the identifier contents of the sip state identifier and the http state identifier according to the content of the response to the sip traffic data call;
the first return module 140 is configured to generate an http traffic data call response corresponding to the http state identifier when the identification content of the http state identifier is that the traffic data call request is completed, and return the http traffic data call response to the traffic police terminal based on the http protocol according to the terminal identifier;
the sending module 150 is configured to receive traffic data sent by the target camera, and send the traffic data to the identification device according to the identification device identifier;
and the second returning module 160 is configured to receive the illegal data identified by the identifying device from the traffic data based on the neural network model, and return the illegal data to the target display device according to the target display device identifier.
In one embodiment, the illegal data identification device further includes a logic judgment module, configured to logically judge the http traffic data call request based on the traffic data call request valid parameter set after the receiving module 110 receives the http traffic data call request; if the http traffic data calling request is legal, the http traffic data calling request is cached to an http message manager, and if the http traffic data calling request is illegal, a termination request result is directly returned to the traffic police terminal.
In one embodiment, the illegal data identification device further comprises a duplication checking module, after caching the http traffic data calling request to the http message manager, the duplication checking module is used for judging whether the http traffic data calling request is identical to the http traffic data calling request which enters in the preset time period; if the content is the same, the http traffic data calling request is removed from the http message manager, and if the content is different, the http traffic data calling request is sent to the message synchronizer.
In one embodiment, the second synchronization module 130 specifically includes:
the caching unit is used for caching the sip traffic data calling request into the sip message manager and establishing a session with the front-end camera sip proxy based on a sip protocol;
the determining unit is used for determining the target camera from the front-end camera sip proxy according to the target camera identifier;
and the sending unit is used for sending the sip traffic data calling request to the target camera based on the sip protocol.
In one embodiment, the second synchronization module 130 specifically includes:
the receiving unit is used for receiving processing signaling returned by the target camera to the sip message manager based on the sip protocol;
the first updating unit is used for updating the identification content of the sip state identification corresponding to the sip traffic data calling request in the sip message manager according to the processing signaling;
The return unit is used for returning a sip traffic data call response to the message synchronizer when the identification content of the sip state identification is detected to be that the traffic data call request is completed;
and the second updating unit is used for synchronously updating the identification content of the sip state identification and the http state identification in the message synchronizer according to the content of the sip traffic data call response.
In one embodiment, the second updating unit is configured to synchronously update the identification content of the sip state identification and the http state identification to the traffic data call request according to the content of the sip traffic data call response.
In one embodiment, the illegal data identifying device further includes a removing module, configured to remove the http traffic data call request and the sip traffic data call request from the message synchronizer after the first returning module 160 returns the http traffic data call response to the traffic police terminal.
Compared with the prior art, the illegal data identification device provided by the application has the advantages that the http protocol-based http traffic data calling request is sent out on the calling selection page, the http traffic data calling request is converted into the sip traffic data calling request which can be identified by the front-end camera, then the sip traffic data calling response returned by the front-end camera is converted into the http traffic data calling response and then returned to the traffic police terminal, the corresponding target camera and the target display equipment can be selected only according to the selection operation when the request is initiated on the calling selection page, the operation is simpler, the traffic police terminal can complete the whole calling process only on the webpage browser or platform without calling special SDK software, the safety is ensured, the http is the general protocol, the operation is simple, the understanding is convenient, and the convenience of data calling is improved. In addition, the trained neural network model is adopted to identify illegal data, compared with manual identification, the identification efficiency is improved, the identification process is independent of the data server, and when the system needs to be upgraded, only the identification equipment is required to be upgraded, and the data server with larger data quantity is not required to be integrally upgraded, so that the upgrade efficiency is improved, and the cost of data maintenance is reduced. In the protocol conversion process, the generated sip traffic data calling response can be converted into an http traffic data calling response in time by synchronizing the identification content of the sip state identification and the http state identification, so that the speed of returning the response is improved.
Accordingly, an embodiment of the present application also provides an electronic device, as shown in fig. 9, which may include radio frequency circuitry 901, a memory 902 including one or more computer-readable storage media, an input unit 903, a display unit 904, a sensor 905, an audio circuit 906, a WiFi module 907, a processor 908 including one or more processing cores, and a power supply 909. It will be appreciated by those skilled in the art that the electronic device structure shown in fig. 9 is not limiting of the electronic device and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components. Wherein:
the radio frequency circuit 901 may be used for receiving and transmitting signals during the process of receiving and transmitting information or communication, in particular, after receiving downlink information of a base station, the downlink information is processed by one or more processors 908; in addition, data relating to uplink is transmitted to the base station. The memory 902 may be used to store software programs and modules that the processor 908 performs various functional applications and data processing by executing the software programs and modules stored in the memory 902. The input unit 903 may be used to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control.
The display unit 904 may be used to display information entered by a user or provided to a user as well as various graphical user interfaces of the electronic device, which may be composed of graphics, text, icons, video, and any combination thereof.
The electronic device may also include at least one sensor 905, such as a light sensor, a motion sensor, and other sensors. The audio circuitry 906 includes speakers, which may provide an audio interface between a user and the electronic device.
WiFi belongs to a short-distance wireless transmission technology, and the electronic equipment can help a user to send and receive emails, browse webpages, access streaming media and the like through a WiFi module 907, so that wireless broadband Internet access is provided for the user. Although fig. 9 shows a WiFi module 907, it is to be understood that it does not belong to the necessary constitution of the electronic device, and can be omitted entirely as needed within a range that does not change the essence of the application.
The processor 908 is a control center of the electronic device, connects various parts of the entire handset using various interfaces and lines, and performs various functions of the electronic device and processes data by running or executing software programs and/or modules stored in the memory 902, and invoking data stored in the memory 902, thereby performing overall monitoring of the handset.
The electronic device also includes a power supply 909 (e.g., a battery) that provides power to the various components, preferably in logical communication with the processor 908 via a power management system, to enable management of charge, discharge, and power consumption by the power management system.
Although not shown, the electronic device may further include a camera, a bluetooth module, etc., which will not be described herein. In particular, in this embodiment, the processor 908 in the electronic device loads executable files corresponding to the processes of one or more application programs into the memory 902 according to the following instructions, and the processor 908 executes the application programs stored in the memory 902, so as to implement the following functions:
receiving an http traffic data calling request sent by a traffic police terminal based on an http protocol; the http traffic data calling request comprises that after a traffic police terminal receives a triggering instruction for calling traffic data, a calling selection page comprising a display equipment selection control and a front-end camera selection control is displayed, a target display equipment is determined according to a selection operation for the display equipment selection control, a target camera is determined according to a selection operation for the front-end camera selection control, and an http traffic data calling request conforming to an http protocol is generated according to a terminal identification of the traffic police terminal, an identification equipment identification of an identification equipment, a target camera identification of the target camera and a target display equipment identification of the target display equipment; generating an http traffic data call request corresponding to the http traffic data call request according to the target camera identification, generating an http state identification corresponding to the http traffic data call request, synchronizing identification contents of the http state identification and the sip state identification in real time, wherein the identification contents comprise traffic data call request completion states; a sip traffic data calling request is sent to a target camera corresponding to the target camera identification based on a sip protocol, a sip traffic data calling response returned by the target camera based on the sip protocol is received, and identification contents of the sip state identification and the http state identification are synchronously updated according to contents of the sip traffic data calling response; when the identification content of the http state identification is that the traffic data calling request is completed, generating an http traffic data calling response corresponding to the http state identification, and returning the http traffic data calling response to the traffic police terminal based on an http protocol according to the terminal identification; receiving traffic data sent by a target camera, and sending the traffic data to identification equipment according to identification of the identification equipment; and receiving illegal data identified by the identification equipment from the traffic data based on the neural network model, and returning the illegal data to the target display equipment according to the target display equipment identification.
In the foregoing embodiments, the descriptions of the embodiments are focused on, and the portions of an embodiment that are not described in detail in the foregoing embodiments may be referred to in the foregoing detailed description, which is not repeated herein.
In one embodiment, the identification device provided by the application can be used as a node in a blockchain system, and after illegal data are identified by calling a neural network model to process traffic data, the illegal data are verified and stored in the blockchain as a new block after verification is passed, so that the illegal data cannot be tampered.
Blockchains are novel application modes of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanisms, encryption algorithms, and the like. The Blockchain (Blockchain), which is essentially a decentralised database, is a string of data blocks that are generated by cryptographic means in association, each data block containing a batch of information of network transactions for verifying the validity of the information (anti-counterfeiting) and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The blockchain underlying platform may include processing modules for user management, basic services, smart contracts, operation monitoring, and the like. The user management module is responsible for identity information management of all blockchain participants, including maintenance of public and private key generation (account management), key management, maintenance of corresponding relation between the real identity of the user and the blockchain address (authority management) and the like, and under the condition of authorization, supervision and audit of transaction conditions of certain real identities, and provision of rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node devices, is used for verifying the validity of a service request, recording the service request on a storage after the effective request is identified, for a new service request, the basic service firstly analyzes interface adaptation and authenticates the interface adaptation, encrypts service information (identification management) through an identification algorithm, and transmits the encrypted service information to a shared account book (network communication) in a complete and consistent manner, and records and stores the service information; the intelligent contract module is responsible for registering and issuing contracts, triggering contracts and executing contracts, a developer can define contract logic through a certain programming language, issue the contract logic to a blockchain (contract registering), invoke keys or other event triggering execution according to the logic of contract clauses to complete the contract logic, and simultaneously provide a function of registering contract upgrading; the operation monitoring module is mainly responsible for deployment in the product release process, modification of configuration, contract setting, cloud adaptation and visual output of real-time states in product operation, for example: alarms, monitoring network conditions, monitoring node device health status, etc.
The platform product service layer provides basic capabilities and implementation frameworks of typical applications, and developers can complete the blockchain implementation of business logic based on the basic capabilities and the characteristics of the superposition business. The application service layer provides the application service based on the block chain scheme to the business participants for use.
The above describes in detail a method and a device for identifying illegal data and an electronic device provided by the embodiments of the present application, and specific examples are applied to describe the principle and implementation of the present application, and the description of the above embodiments is only used to help understand the technical solution and core idea of the present application; those of ordinary skill in the art will appreciate that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the application.

Claims (10)

1. The utility model provides a illegal data identification method which is characterized in that is applicable to intelligent transportation system, intelligent transportation system includes front end camera, data server, display device, identification equipment and traffic police terminal, the operation has neural network model in the identification equipment, front end camera is based on the sip protocol connection data server, traffic police terminal, display device and identification equipment are based on http protocol connection data server, illegal data identification method is applied to data server, illegal data identification method includes:
Receiving an http traffic data calling request sent by the traffic police terminal based on an http protocol; the http traffic data calling request comprises a call selection page which comprises a display device selection control and a front-end camera selection control is displayed after the traffic police terminal receives a triggering instruction for calling traffic data, a target display device is determined according to a selection operation for the display device selection control, a target camera is determined according to a selection operation for the front-end camera selection control, and an http traffic data calling request conforming to an http protocol is generated according to a terminal identification of the traffic police terminal, an identification device identification of the identification device, a target camera identification of the target camera and a target display device identification of the target display device;
generating a sip traffic data call request corresponding to the http traffic data call request according to the target camera identifier, and generating an http state identifier corresponding to the http traffic data call request, wherein the sip state identifier corresponding to the sip traffic data call request synchronizes the identification content of the http state identifier and the identification content of the sip state identifier in real time, and the identification content comprises a traffic data call request completion state;
Sending the sip traffic data calling request to a target camera corresponding to the target camera identifier based on a sip protocol, receiving a response of the target camera to the sip traffic data calling returned based on the sip protocol, and synchronously updating the identifier contents of the sip state identifier and the http state identifier according to the content of the response of the sip traffic data calling;
when the identification content of the http state identification is that the traffic data calling request is completed, generating an http traffic data calling response corresponding to the http state identification, and returning the http traffic data calling response to the traffic police terminal based on an http protocol according to the terminal identification;
receiving traffic data sent by the target camera, and sending the traffic data to the identification equipment according to the identification equipment identification;
and receiving illegal data which are identified by the identification equipment from the traffic data based on the neural network model, and returning the illegal data to the target display equipment according to the target display equipment identification.
2. The method of claim 1, wherein the step of determining a target presentation device from a selection operation for the presentation device selection control and determining a target camera from a selection operation for the front-end camera selection control comprises:
Generating a display equipment catalog according to the triggering operation of the display equipment selection equipment, and determining target display equipment according to the selection operation of the display equipment in the display equipment catalog;
generating a front-end camera catalog according to triggering operation of the front-end camera selection control, and determining a target camera according to selection operation of a front-end camera in the front-end camera catalog.
3. The illegal data identification method according to claim 1, further comprising, before the step of generating the sip traffic data call request corresponding to the http traffic data call request according to the target camera identification:
based on the effective parameter set of the traffic data calling request, carrying out logic judgment on the http traffic data calling request;
if the http traffic data calling request is legal, caching the http traffic data calling request to an http message manager, and if the http traffic data calling request is illegal, directly returning a termination request result to the traffic police terminal.
4. The method of claim 3, further comprising, after the step of caching the http traffic data call request to an http message manager:
Judging whether the http traffic data calling request is the same as the http traffic data calling request which enters in the preset time period;
and if the content is the same, removing the http traffic data calling request from the http message manager, and if the content is different, sending the http traffic data calling request to a message synchronizer.
5. The illegal data identification method according to claim 1, characterized in that the step of transmitting the sip traffic data call request to the target camera corresponding to the target camera identification based on a sip protocol includes:
caching the sip traffic data calling request into a sip message manager, and establishing a session with a front-end camera sip proxy based on a sip protocol;
determining a target camera from the front-end camera sip proxy according to the target camera identifier;
and sending the sip traffic data calling request to the target camera based on a sip protocol.
6. The method for identifying illegal data according to claim 1, wherein the step of receiving a sip traffic data call response returned by the target camera based on a sip protocol and synchronously updating the identification contents of the sip state identification and the http state identification according to the content of the sip traffic data call response comprises the steps of:
Receiving a processing signaling returned by the target camera to a sip message manager based on a sip protocol;
updating the identification content of the sip state identification corresponding to the sip traffic data calling request in the sip message manager according to the processing signaling;
when the identification content of the sip state identification is detected to be that the traffic data calling request is completed, returning a sip traffic data calling response to the message synchronizer;
and synchronously updating the identification content of the sip state identification and the http state identification in the message synchronizer according to the content of the sip traffic data call response.
7. The method of claim 6, wherein the step of synchronously updating the identity content of the sip state identity and the http state identity in the message synchronizer based on the content of the sip traffic data call response comprises:
and synchronously updating the identification contents of the sip state identification and the http state identification into the traffic data calling request according to the contents of the sip traffic data calling response.
8. The method of claim 7, further comprising, after the step of returning the http traffic data call response to the traffic police terminal based on the http protocol according to the terminal identification, and before the step of receiving the traffic data transmitted by the target camera:
And removing the http traffic data call request and the sip traffic data call request from the message synchronizer.
9. The utility model provides a illegal data identification device, its characterized in that, illegal data identification device is used for wisdom traffic system based on http protocol, wisdom traffic system includes front end camera, data server, display device, identification equipment and traffic police terminal, it has neural network model to operate in the identification equipment, front end camera is based on the sip protocol connection data server, traffic police terminal, display device with identification equipment is based on the http protocol connection data server, illegal data identification device sets up in the data server, illegal data identification device includes:
the receiving module is used for receiving an http traffic data calling request sent by the traffic police terminal based on an http protocol; the http traffic data calling request comprises a call selection page which comprises a display device selection control and a front-end camera selection control is displayed after the traffic police terminal receives a triggering instruction for calling traffic data, a target display device is determined according to a selection operation for the display device selection control, a target camera is determined according to a selection operation for the front-end camera selection control, and an http traffic data calling request conforming to an http protocol is generated according to a terminal identification of the traffic police terminal, an identification device identification of the identification device, a target camera identification of the target camera and a target display device identification of the target display device;
The first synchronization module is used for generating a sip traffic data call request corresponding to the http traffic data call request according to the target camera identifier, generating an http state identifier corresponding to the http traffic data call request, synchronizing the http state identifier and the identification content of the sip state identifier in real time, wherein the identification content comprises a traffic data call request completion state;
the second synchronization module is used for sending the sip traffic data calling request to the target camera corresponding to the target camera identifier based on a sip protocol, receiving a sip traffic data calling response returned by the target camera based on the sip protocol, and synchronously updating the identifier contents of the sip state identifier and the http state identifier according to the content of the sip traffic data calling response;
the first return module is used for generating an http traffic data call response corresponding to the http state identifier when the identification content of the http state identifier is that the traffic data call request is completed, and returning the http traffic data call response to the traffic police terminal based on an http protocol according to the terminal identifier;
The sending module is used for receiving traffic data sent by the target camera and sending the traffic data to the identification equipment according to the identification equipment identification;
and the second return module is used for receiving illegal data which are identified by the identification equipment from the traffic data based on the neural network model, and returning the illegal data to the target display equipment according to the target display equipment identification.
10. An electronic device comprising a memory and a processor; the memory stores an application program, and the processor is configured to execute the application program in the memory to perform the operations in the illegal data identification method according to any one of claims 1 to 8.
CN202011070373.8A 2020-09-30 2020-09-30 Illegal data identification method and device and electronic equipment Active CN112163538B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011070373.8A CN112163538B (en) 2020-09-30 2020-09-30 Illegal data identification method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011070373.8A CN112163538B (en) 2020-09-30 2020-09-30 Illegal data identification method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN112163538A CN112163538A (en) 2021-01-01
CN112163538B true CN112163538B (en) 2023-10-24

Family

ID=73861597

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011070373.8A Active CN112163538B (en) 2020-09-30 2020-09-30 Illegal data identification method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN112163538B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010050617A (en) * 2008-08-20 2010-03-04 Nippon Telegr & Teleph Corp <Ntt> Protocol conversion device and protocol conversion method
EP2395726A1 (en) * 2010-06-10 2011-12-14 Research In Motion Limited Method and system for reducing transmission of redundant data
CN110740217A (en) * 2019-09-12 2020-01-31 平安科技(深圳)有限公司 multi-channel data integration interaction method, device, equipment and storage medium
CN111132120A (en) * 2020-04-01 2020-05-08 北京三快在线科技有限公司 Method, system and equipment for identifying camera device in room local area network
CN111260341A (en) * 2020-05-06 2020-06-09 武汉中科通达高新技术股份有限公司 Traffic violation data auditing method, computer equipment and readable storage medium
CN111476107A (en) * 2020-03-18 2020-07-31 平安国际智慧城市科技股份有限公司 Image processing method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7480723B2 (en) * 2003-04-08 2009-01-20 3Com Corporation Method and system for providing directory based services
JP6672910B2 (en) * 2016-03-11 2020-03-25 株式会社リコー Remote communication system, communication terminal, extended function providing method, and extended function providing program

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010050617A (en) * 2008-08-20 2010-03-04 Nippon Telegr & Teleph Corp <Ntt> Protocol conversion device and protocol conversion method
EP2395726A1 (en) * 2010-06-10 2011-12-14 Research In Motion Limited Method and system for reducing transmission of redundant data
CN110740217A (en) * 2019-09-12 2020-01-31 平安科技(深圳)有限公司 multi-channel data integration interaction method, device, equipment and storage medium
CN111476107A (en) * 2020-03-18 2020-07-31 平安国际智慧城市科技股份有限公司 Image processing method and device
CN111132120A (en) * 2020-04-01 2020-05-08 北京三快在线科技有限公司 Method, system and equipment for identifying camera device in room local area network
CN111260341A (en) * 2020-05-06 2020-06-09 武汉中科通达高新技术股份有限公司 Traffic violation data auditing method, computer equipment and readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ENUM技术在IP-PBX中的应用;杨国民;电信快报(第09期);15-17 *

Also Published As

Publication number Publication date
CN112163538A (en) 2021-01-01

Similar Documents

Publication Publication Date Title
US11659308B2 (en) Intelligent gas meter for internet of things (IOT) system
CN111798664B (en) Illegal data identification method and device and electronic equipment
AU2020203865B2 (en) System for securing a personal digital assistant with stacked data structures
CN107528818B (en) Data processing method and device for media file
US11030240B1 (en) Systems and methods for efficiently sending video metadata
CN105491102A (en) Intelligent monitoring system based on cloud computing technology and device thereof
CN114422271A (en) Data processing method, device, equipment and readable storage medium
CN112163538B (en) Illegal data identification method and device and electronic equipment
US20230205817A1 (en) Systems and methods for identifying events within video content using intelligent search query
CN112202786B (en) Illegal data identification method and device and electronic equipment
CN112201046B (en) Illegal data identification method and device and electronic equipment
CN111489276B (en) Personnel management method and related device
US11681752B2 (en) Systems and methods for searching for events within video content
Hang et al. Design and implementation of intelligent fire notification service using IP camera in smart home
CN116070191A (en) Information processing method and device, storage medium, and program product
CN111935316A (en) Method and device for acquiring front-end equipment catalog
CN112188243B (en) Front-end camera real-time video-on-demand method and device and electronic equipment
CN112291210B (en) Method and device for acquiring front-end equipment catalog
CN112291209B (en) Method and device for acquiring front-end equipment catalog
CN112188244A (en) Front-end camera real-time video-on-demand method and device and electronic equipment
CN111953944B (en) Community observation system
CN115378688A (en) Artificial intelligence early warning system
CN117152855A (en) Parking lot charging method, device, equipment and readable storage medium
CN117216540A (en) Model training method, device, computer equipment, storage medium and product
CN115695224A (en) Hazardous chemical substance warehouse edge data processing method and device and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant