CN112435150A - Security check method and device, computer equipment and storage medium - Google Patents

Security check method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN112435150A
CN112435150A CN202011334124.5A CN202011334124A CN112435150A CN 112435150 A CN112435150 A CN 112435150A CN 202011334124 A CN202011334124 A CN 202011334124A CN 112435150 A CN112435150 A CN 112435150A
Authority
CN
China
Prior art keywords
security
level
event
inspection
adjusting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011334124.5A
Other languages
Chinese (zh)
Inventor
鞠金采
张坤飞
黄锐鑫
李鹏
余鸿浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN202011334124.5A priority Critical patent/CN112435150A/en
Publication of CN112435150A publication Critical patent/CN112435150A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/96Management of image or video recognition tasks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V2201/00Indexing scheme relating to image or video recognition or understanding
    • G06V2201/05Recognition of patterns representing particular kinds of hidden objects, e.g. weapons, explosives, drugs

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Marketing (AREA)
  • Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Alarm Systems (AREA)

Abstract

The application relates to a security inspection method, a security inspection device, computer equipment and a storage medium, wherein the security inspection method comprises the following steps: the method comprises the steps of obtaining a security event, wherein the security event comprises a plurality of security levels, and the security event is an event with a security level requirement higher than a preset requirement; adjusting a security level based on the security level of the security incident, wherein the higher the security level is, the higher the identification level of the article to be security checked is; and checking the articles to be subjected to security inspection based on the security inspection grade. According to the security inspection method, the security inspection device, the computer equipment and the storage medium, the security event is acquired; adjusting a security level based on the security level of the security incident, wherein the higher the security level is, the higher the identification level of the article to be security checked is; and based on the mode of checking the articles to be subjected to security inspection by the security inspection grade, dynamically adjusting the security inspection grade according to the requirements of security events with different security grades on the security inspection grade so as to check the articles to be subjected to security inspection, so that the security inspection effect is better, and the omission factor is lower.

Description

Security check method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of security inspection technologies, and in particular, to a security inspection method, apparatus, computer device, and storage medium.
Background
The X-ray security inspection machine is widely applied to safety inspection of stations, subways, airports, major events or moving places. Along with the development of science and technology, traditional security check machine is replaced gradually to intelligent X-ray security check machine, and it can be through the X-ray image of gathering, and whether intelligent identification has forbidden article in the parcel, has improved efficiency greatly, has reduced the reliance to security check personnel, has promoted personnel's through-speed simultaneously.
In the security check process, the identification range of forbidden articles can be improved by improving the security check grade, more forbidden articles with low risk degree can be identified, the security check quality can be improved, and the omission factor is reduced. However, after the security inspection level is improved, the article identification speed is relatively slow, the situations that package opening inspection is needed are increased, and the passing speed of personnel is slow. Therefore, the security level needs to be dynamically adjusted according to actual requirements.
The traditional security level adjusting method is to adjust the security level according to the flow of people, namely, the security level is reduced when the flow of people is large so as to improve the security speed, and the reduction of the security level can cause the leakage of forbidden articles. However, for a security incident requiring a high security level, no matter how many people are, security inspection needs to be performed by adopting the high security level. The traditional security level adjusting method cannot dynamically adjust the security level according to the requirement on the security level, has poor security effect and is easy to miss detection.
Disclosure of Invention
The embodiment of the application provides a security inspection method, a security inspection device, computer equipment and a storage medium, and aims to at least solve the problems that a traditional security inspection grade adjusting method in the related art cannot dynamically adjust the security inspection grade according to the requirement on the security inspection grade, the security inspection effect is poor, and the omission inspection is easy.
In a first aspect, an embodiment of the present application provides a security inspection method, including:
the method comprises the steps of obtaining a security event, wherein the security event comprises a plurality of security levels, and the security event is an event with a security level requirement higher than a preset requirement;
adjusting a security level based on the security level of the security incident, wherein the higher the security level is, the higher the identification level of the article to be security checked is;
and checking the articles to be subjected to security inspection based on the security inspection grade.
In some of these embodiments, the obtaining a security event comprises:
acquiring peripheral image information, and acquiring a security event based on the peripheral image information;
and/or the presence of a catalyst in the reaction mixture,
and receiving a security event notice, and acquiring a security event based on the security event notice.
In some embodiments, the obtaining the security event further comprises:
and acquiring the corresponding relation between the security level of the security event and the security inspection level.
In some of these embodiments, said adjusting a security level based on a security level of said security event comprises:
and adjusting the security level based on the security level of the security event and the corresponding relation between the security level and the security level.
In some of these embodiments, said adjusting a security level based on a security level of said security event further comprises:
and if a plurality of safety events exist, adjusting the safety inspection level based on the safety event with the highest safety level.
In some embodiments, the inspecting the item to be security checked based on the security check level further comprises:
and if the security incident does not exist, checking the article to be subjected to security inspection based on a preset security inspection grade.
In some embodiments, after the inspecting the to-be-inspected article based on the inspection level, the method further includes:
obtaining a duration based on the security event;
determining whether the security event has ended based on the duration;
and if the safety event is finished, checking the article to be subjected to security inspection based on a preset security inspection grade.
In a second aspect, an embodiment of the present application provides a security inspection apparatus, including:
the system comprises an event acquisition module, a security event processing module and a security management module, wherein the event acquisition module is used for acquiring a security event, the security event comprises a plurality of security levels, and the security event is an event with a security check requirement higher than a preset requirement;
the level adjusting module is used for adjusting the security level based on the security level of the security incident, and the higher the security level is, the higher the identification level of the article to be security checked is;
and the inspection module is used for inspecting the articles to be subjected to security inspection based on the security inspection grade.
In a third aspect, an embodiment of the present application provides a computer device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and when the processor executes the computer program, the security inspection method according to the first aspect is implemented.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the security inspection method according to the first aspect.
Compared with the related art, according to the security inspection method, the security inspection device, the computer equipment and the storage medium provided by the embodiment of the application, the security event is obtained, wherein the security event comprises a plurality of security levels, and the security event is an event with a security inspection requirement higher than a preset requirement; adjusting a security level based on the security level of the security incident, wherein the higher the security level is, the higher the identification level of the article to be security checked is; and based on the mode of checking the articles to be subjected to security inspection by the security inspection grade, dynamically adjusting the security inspection grade according to the requirements of security events with different security grades on the security inspection grade so as to check the articles to be subjected to security inspection, so that the security inspection effect is better, and the omission factor is lower.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a schematic flow chart of a security inspection method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of adjusting security level of a security inspection method according to an embodiment of the invention;
FIG. 3 is a schematic flow chart illustrating a security inspection method according to another embodiment of the present invention;
FIG. 4 is a block diagram of a security inspection apparatus according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a hardware structure of a computer device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application.
It is obvious that the drawings in the following description are only examples or embodiments of the present application, and that it is also possible for a person skilled in the art to apply the present application to other similar contexts on the basis of these drawings without inventive effort. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as referred to herein means two or more. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
The security control method provided by the embodiment of the invention is applied to electronic equipment, and the electronic equipment can be mobile phones, Personal Computers (PCs), tablet computers, servers and other equipment, and can also be security equipment such as X-ray security check machines and X-ray security check controllers.
Referring to fig. 1, fig. 1 is a schematic flow chart illustrating a security inspection method according to an embodiment of the invention.
In this embodiment, the security inspection method includes:
s101, a security event is obtained, wherein the security event comprises a plurality of security levels, and the security event is an event with a security level requirement higher than a preset requirement.
For example, a security event is an event that has a higher requirement for security, and therefore a higher requirement for security level than normal.
S102, adjusting the security level based on the security level of the security incident, wherein the higher the security level is, the higher the identification level of the article to be security checked is.
It can be understood that the higher the security check level is, the higher the identification level of the object to be security checked is, the larger the identification range of the forbidden object during security check is, the higher the identification accuracy is, the forbidden objects with low risk can be identified, the security check quality can be improved, and the omission factor can be reduced.
Illustratively, the higher the security level is, the higher the article identification level is, the higher the complexity of the article identification algorithm adopted by the X-ray security inspection machine is, the higher the identification precision of the article is, and the higher the accuracy of detecting whether contraband exists in the acquired X-ray image is. For example: when the article identification grade is 1, the X-ray security inspection machine adopts an article identification algorithm comprising 24 convolutional layers; when the article identification level is 2, the X-ray security inspection machine adopts an article identification algorithm comprising 36 convolutional layers; when the article identification grade is 3, the X-ray security inspection machine adopts an article identification algorithm comprising 48 convolutional layers; when the article identification level is 4, the X-ray security inspection machine adopts an article identification algorithm comprising 60 convolutional layers; when the article identification level is 5, the X-ray security inspection machine adopts an article identification algorithm comprising 72 convolutional layers, and the detailed description is omitted. It can be understood that the corresponding relationship between the security level, the item identification level and the item identification algorithm can be set according to actual conditions.
S103, checking the articles to be subjected to security inspection based on the security inspection grade.
Illustratively, the articles to be security checked are checked at the security level set in step S102 to meet the security inspection requirement of the security incident.
According to the security inspection method, the security event is obtained, the security event comprises a plurality of security levels, and the security event is an event with a security inspection requirement higher than a preset requirement; adjusting the security level based on the security level of the security incident, wherein the higher the security level is, the higher the identification level of the article to be security checked is; the mode of checking the articles to be subjected to security check based on the security check level dynamically adjusts the security check level according to the requirements of security incidents with different security levels on the security check level so as to check the articles to be subjected to security check, and therefore the security check effect is better and the omission factor is lower.
In another embodiment, acquiring the security event includes acquiring ambient image information, acquiring the security event based on the ambient image information; and/or receiving the safety event notice and acquiring the safety event based on the safety event notice. It is understood that the security incidents include the occurrence of suspicious persons, the gathering of persons, and the like, as well as government early notice announcements, such as large academic lectures, large conferences, sporting events, and like gathering activities. For example, the surrounding image information may be acquired only by an acquisition device, such as a camera, and whether a security event exists is determined based on the image information, for example, the image information in the image information is compared with the image information of suspicious people in the database, and if matching is successful, the suspicious people appear and the security event is determined; for another example, if the image information shows that the number of people around the image information is too large within the preset time, the image information is gathered by the people and is judged as a safety event. Such security events may be determined, for example, by collecting ambient image information. In addition, if a government issues a security event notice, such as a notice of an aggregated activity such as a large academic lecture, a large conference, a sports meeting, etc., a security event may be acquired based on the acquired security event notice. It can be understood that the security event may be acquired only through the peripheral image information, acquired only through the security event announcement, or acquired in two ways at the same time, and the selection is performed according to the actual situation. It can be understood that the security incident can also be obtained through other channels, as long as a large-scale gathering activity is about to be held around, when the flow of people increases to a certain degree, higher requirements can be generated on the security condition, that is, higher requirements on the security inspection level can be obtained, and the security incident can be judged.
In another embodiment, the obtaining of the security event further comprises obtaining a security level of the security event and a correspondence between the security levels. It will be appreciated that different security events have different security levels that characterize their requirements for a security condition, with higher security levels indicating higher requirements for a security condition. However, the higher the requirement on the security condition is, the higher the requirement on the security check is, and the higher the security check level is, so there is a corresponding relationship between the security level and the security check level, for example, when the security level of the security event is level 1, the corresponding security check level is level 1, and when the security level of the security event is level 2, the corresponding security check level is level 2. It can be understood that the corresponding relationship between the security level and the security level can be set by the user according to the actual situation.
In another embodiment, determining the security level based on the security level of the security event includes determining the security level based on the security level of the security event and a correspondence between the security level and the security level. It can be understood that there is a corresponding relationship between the security level and the security level, and therefore, after the security level of the security event is determined, the security level can be obtained correspondingly.
In another embodiment, determining the security level based on the security level of the security event further comprises determining the security level based on the security event with the highest security level if there are multiple security events. Illustratively, if a plurality of security events are judged to occur simultaneously and the security levels of the plurality of security events are different, the security event with the highest security level is selected from the security events, and the corresponding security level is selected based on the security level of the security event. It is understood that in other embodiments, an average security level of a plurality of security events may be selected, and a security level may be determined based on the average security level, which may be selected by a user based on the actual situation.
In another embodiment, inspecting the item to be security checked based on the security check level further comprises inspecting the item to be security checked based on a preset security check level if there is no security incident. Exemplarily, in a normal case, the article to be subjected to security inspection is inspected by using a preset security inspection level, and if there is no security event, the article to be subjected to security inspection belongs to a normal case, that is, the article to be subjected to security inspection is inspected by using the preset security inspection level. It is understood that the preset security level can be set by the user according to actual situations.
In another embodiment, the step of obtaining the duration based on the security event is further included after the step of checking the item to be security checked based on the security level; determining whether the security event has ended based on the duration; and if the safety event is finished, checking the article to be subjected to security inspection based on the preset security inspection level. Illustratively, each security event lasts for a period of time during which the corresponding security level needs to be maintained at all times; and after the safety event is finished, the safety inspection can be carried out by recovering to the preset safety inspection level. It can be understood that if the security event is obtained based on the analysis of the peripheral image information, the peripheral image information is continuously acquired until the situation of representing the security event is judged to disappear based on the peripheral image information, and the security event is ended; if the security event is obtained based on the security event announcement, the duration time is indicated in the security event announcement, and whether the security event is ended is judged based on the starting time and the duration time.
In another embodiment, after inspecting the item to be security checked based on the security level, determining whether the security event requires manual confirmation to be concluded is also included. For example, if the security event has not a fixed duration, it may be set to be manually determined by the user and manually confirmed when it is determined that the security event has ended, so as to release the security event.
Referring to fig. 2, fig. 2 is a schematic diagram illustrating adjustment of a security level of a security inspection method according to an embodiment of the invention. It can be understood that when a plurality of security events are detected, the security level is adjusted according to the security level sequence of the security events, the security level is preferentially adjusted according to the security event with the highest security level, and after the security event with the highest security level is finished, the security level is adjusted according to the security event with the next highest level, and so on.
Referring to fig. 3, fig. 3 is a schematic flow chart of a security inspection method according to another embodiment of the invention.
In this embodiment, the security inspection method includes:
s201, starting the process.
S202, setting the association relation between the security level of the security event in the security check machine and the security check level. Wherein the security event may be selected according to capabilities supported by the camera. In addition, the security level can be selected from the existing security level, and a new security level can be customized.
And S203, in the normal operation of the security check machine, regularly detecting whether a security event occurs in the peripheral image information acquired by the associated camera (or equipment), or acquiring the security event through the security event notice of the government or other departments. Wherein the associated camera (or device) may be a camera (or detection module) mounted with the security check machine, or may be a camera (or detection module) independent of the surroundings.
And S204, judging whether a safety event exists or not.
And S205, when the security event is judged to exist in the step S204, the security check machine program searches the security check level X associated with the security event of the security level according to the security level of the security event, adjusts the security check level of the security check machine to the X level, and records the security check level Y before adjustment. After the adjustment, the process returns to step S03.
And S206, when the step S204 judges that no safety event exists, executing the step. This step judges whether or not the security event that has been previously in process can be released by the duration of the security event. The judgment here includes: whether the time for releasing the safety event is not up or not and whether the safety event can be released by manual confirmation is needed. If the security event cannot be released, the process returns to step S203.
And S207, when the security incident can be released in the step S206, the security check machine adjusts the security check level to the Y level before the security incident occurs.
It should be noted that the steps illustrated in the above-described flow diagrams or in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and that, although a logical order is illustrated in the flow diagrams, in some cases, the steps illustrated or described may be performed in an order different than here.
The present embodiment further provides a security inspection apparatus, which is used to implement the foregoing embodiments and preferred embodiments, and the description of the apparatus is omitted here. As used hereinafter, the terms "module," "unit," "subunit," and the like may implement a combination of software and/or hardware for a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 4 is a block diagram of a security inspection apparatus according to an embodiment of the present application, and as shown in fig. 4, the apparatus includes:
the event acquiring module 10 is configured to acquire a security event, where the security event includes multiple security levels, and the security event is an event that a security inspection requirement is higher than a preset requirement.
The event obtaining module 10 is further configured to:
acquiring peripheral image information, and acquiring a security event based on the peripheral image information;
and/or the presence of a catalyst in the reaction mixture,
and receiving the safety event notice, and acquiring the safety event based on the safety event notice.
And the level adjusting module 20 is used for adjusting the security level based on the security level of the security incident, wherein the higher the security level is, the higher the identification level of the article to be security-checked is.
The level adjusting module 20 is further configured to adjust the security level based on the security level of the security event and the corresponding relationship between the security level and the security level.
And the level adjusting module 20 is further configured to adjust the security level based on the security event with the highest security level if a plurality of security events exist.
And the inspection module 30 is used for inspecting the articles to be subjected to security inspection based on the security inspection grade.
The inspection module 30 is further configured to inspect the to-be-inspected article based on a preset security level if there is no security event.
The security installations still includes: and a corresponding relation obtaining module.
And the corresponding relation acquisition module is used for acquiring the corresponding relation between the security level of the security event and the security inspection level.
The security installations still includes: a judgment module;
a determination module configured to:
obtaining a duration based on the security event;
determining whether the security event has ended based on the duration;
and if the safety event is finished, checking the article to be subjected to security inspection based on the preset security inspection level.
The above modules may be functional modules or program modules, and may be implemented by software or hardware. For a module implemented by hardware, the modules may be located in the same processor; or the modules can be respectively positioned in different processors in any combination.
In addition, the security inspection method of the embodiment described in conjunction with fig. 1 may be implemented by a computer device. Fig. 5 is a hardware structure diagram of a computer device according to an embodiment of the present application.
The computer device may comprise a processor 51 and a memory 52 in which computer program instructions are stored.
Specifically, the processor 51 may include a Central Processing Unit (CPU), or A Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 52 may include, among other things, mass storage for data or instructions. By way of example, and not limitation, memory 52 may include a Hard Disk Drive (Hard Disk Drive, abbreviated to HDD), a floppy Disk Drive, a Solid State Drive (SSD), flash memory, an optical Disk, a magneto-optical Disk, magnetic tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 52 may include removable or non-removable (or fixed) media, where appropriate. The memory 52 may be internal or external to the data processing apparatus, where appropriate. In a particular embodiment, the memory 52 is a Non-Volatile (Non-Volatile) memory. In particular embodiments, Memory 52 includes Read-Only Memory (ROM) and Random Access Memory (RAM). The ROM may be mask-programmed ROM, Programmable ROM (PROM), Erasable PROM (EPROM), Electrically Erasable PROM (EEPROM), Electrically rewritable ROM (EAROM), or FLASH Memory (FLASH), or a combination of two or more of these, where appropriate. The RAM may be a Static Random-Access Memory (SRAM) or a Dynamic Random-Access Memory (DRAM), where the DRAM may be a Fast Page Mode Dynamic Random-Access Memory (FPMDRAM), an Extended data output Dynamic Random-Access Memory (EDODRAM), a Synchronous Dynamic Random-Access Memory (SDRAM), and the like.
The memory 52 may be used to store or cache various data files that need to be processed and/or used for communication, as well as possible computer program instructions executed by the processor 51.
The processor 51 may implement any one of the security check methods in the above embodiments by reading and executing computer program instructions stored in the memory 52.
In some of these embodiments, the computer device may also include a communication interface 53 and a bus 50. As shown in fig. 5, the processor 51, the memory 52, and the communication interface 53 are connected via the bus 50 to complete mutual communication.
The communication interface 53 is used for implementing communication between modules, apparatuses, units and/or devices in the embodiments of the present application. The communication interface 53 may also enable communication with other components such as: the data communication is carried out among external equipment, image/data acquisition equipment, a database, external storage, an image/data processing workstation and the like.
Bus 50 comprises hardware, software, or both coupling the components of the computer device to each other. Bus 50 includes, but is not limited to, at least one of the following: data Bus (Data Bus), Address Bus (Address Bus), Control Bus (Control Bus), Expansion Bus (Expansion Bus), and Local Bus (Local Bus). By way of example, and not limitation, Bus 50 may include an Accelerated Graphics Port (AGP) or other Graphics Bus, an Enhanced Industry Standard Architecture (EISA) Bus, a Front-Side Bus (Front Side Bus), an FSB (FSB), a Hyper Transport (HT) Interconnect, an ISA (ISA) Bus, an InfiniBand (InfiniBand) Interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a microchannel Architecture (MCA) Bus, a PCI (Peripheral Component Interconnect) Bus, a PCI-Express (PCI-X) Bus, a Serial Advanced Technology Attachment (SATA) Bus, a Video Electronics Bus (audio Association) Bus, abbreviated VLB) bus or other suitable bus or a combination of two or more of these. Bus 50 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the application, any suitable buses or interconnects are contemplated by the application.
The computer device may execute the security inspection method in the embodiment of the present application based on the acquired computer program instruction, thereby implementing the security inspection method described in conjunction with fig. 1.
In addition, in combination with the security inspection method in the foregoing embodiments, the embodiments of the present application may provide a computer-readable storage medium to implement. The computer readable storage medium having stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement any of the security methods of the above embodiments.
According to the security inspection method, the security inspection device, the computer equipment and the storage medium, the security event is obtained, the security event comprises a plurality of security levels, and the security event is an event with a security inspection requirement higher than a preset requirement; adjusting the security level based on the security level of the security incident, wherein the higher the security level is, the higher the identification level of the article to be security checked is; the mode of examining the articles to be subjected to security inspection based on the security inspection levels dynamically adjusts the security inspection levels according to the requirements of security incidents with different security levels on the security inspection levels so as to examine the articles to be subjected to security inspection, has better security inspection effect and lower omission ratio, and can be used for conducting security inspection on the articles to be subjected to security inspection with different security requirements, thereby being suitable for various security inspection scenes and improving the passing speed of personnel while ensuring the quality of security inspection.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A security inspection method, comprising:
the method comprises the steps of obtaining a security event, wherein the security event comprises a plurality of security levels, and the security event is an event with a security level requirement higher than a preset requirement;
adjusting a security level based on the security level of the security incident, wherein the higher the security level is, the higher the identification level of the article to be security checked is;
and checking the articles to be subjected to security inspection based on the security inspection grade.
2. The security inspection method of claim 1, wherein the obtaining of the security event comprises:
acquiring peripheral image information, and acquiring a security event based on the peripheral image information;
and/or the presence of a catalyst in the reaction mixture,
and receiving a security event notice, and acquiring a security event based on the security event notice.
3. The security inspection method of claim 1, wherein obtaining the security event further comprises:
and acquiring the corresponding relation between the security level of the security event and the security inspection level.
4. The security screening method of claim 3, wherein adjusting the security level based on the security level of the security event comprises:
and adjusting the security level based on the security level of the security event and the corresponding relation between the security level and the security level.
5. The security screening method of claim 1, wherein adjusting the security level based on the security level of the security event further comprises:
and if a plurality of safety events exist, adjusting the safety inspection level based on the safety event with the highest safety level.
6. The security inspection method of claim 1, wherein inspecting the item to be security inspected based on the security inspection level further comprises:
and if the security incident does not exist, checking the article to be subjected to security inspection based on a preset security inspection grade.
7. The security inspection method of claim 1, further comprising, after inspecting the item to be security inspected based on the security inspection level:
obtaining a duration based on the security event;
determining whether the security event has ended based on the duration;
and if the safety event is finished, checking the article to be subjected to security inspection based on a preset security inspection grade.
8. A security device, comprising:
the system comprises an event acquisition module, a security event processing module and a security management module, wherein the event acquisition module is used for acquiring a security event, the security event comprises a plurality of security levels, and the security event is an event with a security check requirement higher than a preset requirement;
the level adjusting module is used for adjusting the security level based on the security level of the security incident, and the higher the security level is, the higher the identification level of the article to be security checked is;
and the inspection module is used for inspecting the articles to be subjected to security inspection based on the security inspection grade.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the security check method according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the security check method according to any one of claims 1 to 7.
CN202011334124.5A 2020-11-25 2020-11-25 Security check method and device, computer equipment and storage medium Pending CN112435150A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011334124.5A CN112435150A (en) 2020-11-25 2020-11-25 Security check method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011334124.5A CN112435150A (en) 2020-11-25 2020-11-25 Security check method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112435150A true CN112435150A (en) 2021-03-02

Family

ID=74697416

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011334124.5A Pending CN112435150A (en) 2020-11-25 2020-11-25 Security check method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112435150A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113837537A (en) * 2021-08-18 2021-12-24 航天信息股份有限公司 Data processing method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110009541A (en) * 2019-03-21 2019-07-12 北京博图纵横科技有限责任公司 Processing method, device, computer equipment and the storage medium of occurred events of public safety
CN110580459A (en) * 2019-08-27 2019-12-17 浙江大华技术股份有限公司 Safety check method and control equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110009541A (en) * 2019-03-21 2019-07-12 北京博图纵横科技有限责任公司 Processing method, device, computer equipment and the storage medium of occurred events of public safety
CN110580459A (en) * 2019-08-27 2019-12-17 浙江大华技术股份有限公司 Safety check method and control equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113837537A (en) * 2021-08-18 2021-12-24 航天信息股份有限公司 Data processing method and device

Similar Documents

Publication Publication Date Title
WO2022062416A1 (en) Asset risk assessment method, apparatus, computer device, and storage medium
CN109753848B (en) Method, device and system for executing face recognition processing
CN114255436B (en) Security check image recognition system and method based on artificial intelligence
CN111968625A (en) Sensitive audio recognition model training method and recognition method fusing text information
CN111694665B (en) Resource balancing method, device and system based on three-dimensional scanning device
CN112435150A (en) Security check method and device, computer equipment and storage medium
CN111861998A (en) Human body image quality evaluation method, device and system and computer equipment
CN115238105A (en) Illegal content detection method, system, equipment and medium fusing multimedia
WO2023273531A1 (en) Baggage management method, related device, and storage medium
CN114913480A (en) Package detection method, device, system, controller and storage medium
CN112926059B (en) Data processing method, device, equipment and storage medium
CN112214770B (en) Malicious sample identification method, device, computing equipment and medium
CN112184166A (en) Data reporting method, device, equipment and readable storage medium of business system
CN113630389B (en) User abnormal behavior identification method, system, electronic equipment and storage medium
CN112560638A (en) Meeting place concentration evaluation method and system based on face recognition and behavior detection
CN111694673B (en) Memory processing method, memory processing device, electronic equipment and computer readable storage medium
CN113364702A (en) Advertisement flow abnormity detection method, system, storage medium and electronic equipment
CN113077235A (en) Conference schedule conflict management method and system, electronic equipment and storage medium
CN111833993A (en) AI-based regional image remote quality control management system
CN109784226B (en) Face snapshot method and related device
CN112817952A (en) Data quality evaluation method and system
CN112560970A (en) Abnormal picture detection method, system, equipment and storage medium based on self-coding
CN113204706A (en) Data screening and extracting method and system based on MapReduce
CN111093188B (en) Method and device for monitoring harmful Bluetooth information
CN117746215A (en) Security check method, equipment, system and application platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210302

RJ01 Rejection of invention patent application after publication