CN112822434A - Anti-license processing method, equipment and system - Google Patents

Anti-license processing method, equipment and system Download PDF

Info

Publication number
CN112822434A
CN112822434A CN201911117632.5A CN201911117632A CN112822434A CN 112822434 A CN112822434 A CN 112822434A CN 201911117632 A CN201911117632 A CN 201911117632A CN 112822434 A CN112822434 A CN 112822434A
Authority
CN
China
Prior art keywords
monitoring
alarm
server
image recognition
recognition result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911117632.5A
Other languages
Chinese (zh)
Inventor
周士昕
苏睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Kerui Zhiying Information Technology Co Ltd
Original Assignee
Xi'an Kerui Zhiying Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Kerui Zhiying Information Technology Co Ltd filed Critical Xi'an Kerui Zhiying Information Technology Co Ltd
Priority to CN201911117632.5A priority Critical patent/CN112822434A/en
Publication of CN112822434A publication Critical patent/CN112822434A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

The disclosure provides a method, equipment and a system for processing anti-theft photo, relates to the technical field of electronic information, and can solve the problem of potential safety hazard caused by data leakage due to the anti-theft photo. The specific technical scheme is as follows: receiving monitoring pictures of the corresponding sensitive areas acquired by each monitoring device in real time; carrying out image recognition on the monitoring picture to obtain an image recognition result; and generating an alarm prompt when the image recognition result contains the target element or the target behavior.

Description

Anti-license processing method, equipment and system
Technical Field
The present disclosure relates to the field of electronic information technologies, and in particular, to a method, a device, and a system for anti-theft processing.
Background
With the popularization of electronic products with photographing functions such as mobile phones, cameras, video cameras and the like, information such as confidential documents in confidential places or confidential units can be stolen by photographing and the like, so that data leakage is caused. For protecting data, the security regulation and system and the security ideological education are mainly relied on, and the electromagnetic shielding device is technically adopted to prevent mobile phone communication and the like. However, the protection degree of these protection measures is limited, the security is poor, and the potential safety hazard of data leakage still exists.
Disclosure of Invention
The embodiment of the disclosure provides a method and a device for processing anti-theft photo, which can solve the problem of potential safety hazard caused by data leakage due to the anti-theft photo. The technical scheme is as follows:
according to a first aspect of the embodiments of the present disclosure, there is provided an anti-theft processing method applied to a server, where the server is in communication connection with a plurality of monitoring devices, and each monitoring device is disposed at a different location for monitoring a different sensitive area, the method including:
receiving monitoring pictures of the corresponding sensitive areas acquired by each monitoring device in real time;
carrying out image recognition on the monitoring picture to obtain an image recognition result;
and generating an alarm prompt when the image recognition result contains a target element or a target behavior, wherein the target element is used for indicating the shooting equipment, and the target behavior is used for indicating the shooting behavior of shooting by using the shooting equipment.
This openly implements and carries out real-time analysis through the server to the control picture of supervisory equipment collection, confirms whether someone uses cell-phone, camera or other steal and shine the equipment and steal the illumination, carries out the suggestion of reporting to the police when there is steal the illumination, is convenient for in time discover steal and shine the action, avoids data to reveal and the potential safety hazard that brings.
In one embodiment, generating the alert prompt when the target element or the target behavior is included in the image recognition result comprises:
when the image recognition result contains the target element but does not contain the target behavior, generating a first alarm prompt;
and generating a second alarm prompt when the image recognition result contains the target behavior.
And different alarm prompts are generated according to the content contained in the image identification result, so that the manager can conveniently perform corresponding processing according to the different alarm prompts.
In one embodiment, the method further comprises: and when the image recognition result contains a target element or a target behavior, intercepting and storing an evidence picture from the monitoring picture.
When shooting intentions or shooting behaviors exist, the hidden danger of data leakage is reduced to a certain extent by capturing and storing evidence pictures from the monitoring pictures.
In one embodiment, the method further comprises: and the server sends the alarm prompt to the management terminal so that management personnel can process the alarm prompt.
In one embodiment, the method further comprises: when the alarm prompt comprises voice alarm information, the method further comprises the following steps: and the server controls the voice alarm equipment to alarm according to the voice alarm information.
In one embodiment, when the alert prompt includes indicator light alert information, the method further comprises:
and the server controls the indicator lamp to give an alarm according to the indicator lamp alarm information.
According to a second aspect of the embodiments of the present disclosure, there is provided an anti-theft processing device, the anti-theft processing device being in communication connection with a plurality of monitoring devices, the monitoring devices being disposed at different locations for monitoring different sensitive areas, the anti-theft processing device comprising:
the receiving module is used for receiving the monitoring pictures of the corresponding sensitive areas acquired by each monitoring device in real time;
the identification module is used for carrying out image identification on the monitoring picture to obtain an image identification result;
and the generating module is used for generating an alarm prompt when the image recognition result contains a target element or a target behavior, wherein the target element is used for indicating the shooting equipment, and the target behavior is used for indicating the shooting behavior of shooting by using the shooting equipment.
According to a third aspect of the embodiments of the present disclosure, an anti-theft processing system is provided, which includes a server, a plurality of monitoring devices in communication connection with the server, and a management terminal in communication connection with the server, where the monitoring devices are disposed at different locations for monitoring different sensitive areas;
each monitoring device is used for acquiring a monitoring picture of a corresponding sensitive area in real time and sending the monitoring picture to the server;
the server is used for carrying out image recognition on the monitoring picture to obtain an image recognition result, generating an alarm prompt when the image recognition result contains a target element or a target behavior, and sending the alarm prompt to the management terminal.
In one embodiment, the anti-theft processing system further comprises: the voice alarm equipment is in communication connection with the server;
when the alarm prompt is voice alarm information, the server is used for sending the voice alarm information to the voice alarm equipment, and the voice alarm equipment is used for giving an alarm according to the voice alarm information.
In one embodiment, the anti-theft processing system further comprises: the indicating lamp alarm equipment is in communication connection with the server; the server is used for controlling the indicator light alarm equipment to alarm according to the alarm prompt
According to a fourth aspect of embodiments of the present disclosure, there is provided an anti-theft processing device, comprising a processor and a memory, the memory having stored therein at least one computer instruction, the instruction being loaded and executed by the processor to implement the steps performed in the anti-theft processing method described in the first aspect and in any of the embodiments of the first aspect.
According to a fifth aspect of embodiments of the present disclosure, there is provided a computer-readable storage medium having stored therein at least one computer instruction, which is loaded and executed by a processor to implement the steps performed in the anti-theft processing method described in the first aspect and any of the embodiments of the first aspect.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow chart of a method of anti-theft processing provided by an embodiment of the present disclosure;
FIG. 2 is a block diagram of an anti-theft processing device provided by an embodiment of the present disclosure;
FIG. 3 is a block diagram of an anti-theft processing device provided by an embodiment of the present disclosure;
FIG. 4 is a block diagram of an anti-theft processing device provided by an embodiment of the present disclosure;
fig. 5 is a block diagram of an anti-theft processing device provided by an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The embodiment of the disclosure provides an anti-theft processing method, which is applied to a server, wherein the server is in communication connection with a plurality of monitoring devices, each monitoring device is arranged at a different position and is used for monitoring different sensitive areas, and the sensitive areas monitored by the monitoring devices are partially overlapped, so that the monitoring areas can be completely covered. Referring to fig. 1, the anti-skimming processing method includes the steps of:
101. and receiving the monitoring pictures of the corresponding sensitive areas acquired by each monitoring device in real time.
The sensitive area comprises a display screen, a confidential document, a display commodity and other places needing confidentiality. In the embodiment of the disclosure, the monitoring devices in the on state shoot respective corresponding sensitive areas in real time to obtain monitoring pictures, and send the monitoring pictures to the server, where the server may be a cloud server or a local server. The monitoring device may be automatically turned on after being powered on, or a user may trigger a power-on key of the monitoring device, or the monitoring device may be turned on according to a power-on instruction sent by a server, specifically, the power-on instruction is selected according to an actual situation, and the embodiment of the present disclosure does not impose any limitation on this.
102. And carrying out image recognition on the monitoring picture to obtain an image recognition result.
In the embodiment of the present disclosure, there may be a plurality of ways to perform image recognition on the monitoring screen, and two specific examples are listed here for explanation.
In a first example, performing image recognition on a monitoring picture to obtain an image recognition result includes:
acquiring an image matching model; and performing image recognition on the monitored picture by using the image matching model and generating an image recognition result, wherein the image recognition result is used for indicating whether the monitored picture contains a target element or a target behavior.
And an image matching model is obtained, and whether the monitoring picture contains target elements or target behaviors is judged more accurately by using the image matching model, so that misjudgment is reduced. The image matching model may be set in advance, or may be obtained by training and learning.
In a second example, a database may be established, where the database includes a large number of target elements or target behaviors, and then the monitoring screen is matched with the target elements or target behaviors in the database, so as to determine whether the monitoring screen includes the target elements or target behaviors. For example, performing image recognition on a monitoring picture to obtain an image recognition result includes: carrying out image recognition on the monitoring picture to obtain at least one image element; matching at least one image element with a target element, if the matching is successful, determining that the at least one image element contains the target element, and if the matching is failed, determining that the at least one image element does not contain the target element; and generating an image recognition result according to the matching result.
It should be noted that each image element of the at least one image element includes at least one pixel, and a target image element also includes at least one pixel, and matching the at least one image element with the target element may be determined by comparing pixels at the same position of the two image elements. The matching result is more accurate through pixel-level matching, and the target element or the target behavior in the database can be updated, so that the target element or the target behavior can cover various shooting behaviors, and the safety of data protection is higher.
103. And generating an alarm prompt when the image recognition result contains the target element or the target behavior.
The target element is used for indicating a shooting device, such as a mobile phone, a camera, an electronic product with a shooting function and the like; the target behavior is used for indicating a shooting behavior of shooting with the shooting device, and mainly includes key information of the shooting behavior, such as human face features of a shooting person, a shooting posture, a shooting position, shooting time, shooting contents and the like.
In the embodiment of the present disclosure, generating an alarm prompt when the image recognition result includes a target element or a target behavior includes:
when the image recognition result contains the target element but does not contain the target behavior, generating a first alarm prompt;
and generating a second alarm prompt when the image recognition result contains the target behavior.
Specifically, when the image recognition result only contains the target element but not the target behavior, it means that a person only holds the shooting device or takes out the shooting device, and if the shooting intention exists but the shooting is not performed, a first alarm prompt is generated; when the image recognition result contains the target behavior, the situation that a candid person uses the shooting equipment to take candid shot is meant, and at the moment, a second alarm prompt is generated. It should be noted that, for the first alarm prompt and the second alarm prompt, different types of alarm prompt tones, or alarm prompt tones with different intensities, or alarm lamps with different colors, and the like may be used for distinguishing, and different alarm prompts may be generated.
In the embodiment of the present disclosure, the alarm prompt may be a voice alarm, an indicator light alarm, etc., and two examples are listed below for specific description.
In a first example, when the alert prompt includes voice alert information, the method further comprises: and the server controls the voice alarm equipment to alarm according to the voice alarm information. Specifically, the server sends the voice alarm information to the voice alarm equipment, and the voice alarm equipment carries out alarm prompting according to the voice alarm information. The voice alarm information comprises keywords such as 'no photographing'.
In a second example, when the alert prompt includes indicator light alert information, the method further comprises: and the server controls the indicator lamp to alarm according to the indicator lamp alarm information. Illustratively, if the first alarm prompt is that the indicating lamp displays yellow, the server controls the indicating lamp to display yellow, and the yellow is used for warning; if the second alarm prompt is that the indicating lamp displays red, the server controls the indicating lamp to display red, and the red is used for indicating that candid behavior is generated and management personnel need to deal with the behavior as soon as possible.
Further, after the server generates the alarm prompt, the method further includes: and the server sends the alarm prompt to the management terminal so that management personnel can process the alarm prompt.
After receiving the alarm prompt, the manager can stop the candid camera from continuing to shoot on site, and the candid camera is required to delete the shot content, so that the data to be protected is prevented from being leaked.
In addition, when the image recognition result contains a target element or a target behavior, an evidence picture needs to be captured from the monitoring picture and stored. The evidence picture is an image captured from the monitoring picture or a continuous image frame sequence, and can be used as the basis of alarming by acquiring the evidence picture, and meanwhile, the hidden danger of data leakage is reduced to a certain extent.
According to the anti-theft processing method provided by the embodiment of the disclosure, a server receives monitoring pictures of respective corresponding sensitive areas acquired by each monitoring device in real time; carrying out image recognition on the monitoring picture to obtain an image recognition result; and generating an alarm prompt when the image recognition result contains the target element or the target behavior. This openly implements and carries out real-time analysis through the server to the control picture of supervisory equipment collection, confirms whether someone uses cell-phone, camera or other steal and shine the equipment and steal the illumination, carries out the suggestion of reporting to the police when there is steal the illumination, is convenient for in time discover steal and shine the action, avoids data to reveal and the potential safety hazard that brings.
Based on the anti-theft processing method described in the embodiment corresponding to fig. 1, the following is an embodiment of the apparatus of the present disclosure, which can be used to execute an embodiment of the method of the present disclosure.
The embodiment of the present disclosure provides an anti-theft processing device, which is in communication connection with a plurality of monitoring devices, each monitoring device being disposed at a different location for monitoring a different sensitive area, as shown in fig. 2, the anti-theft processing device 20 includes: a receiving module 201, a recognition module 202 and a generating module 203;
a receiving module 201, configured to receive a monitoring picture of a corresponding sensitive area, which is acquired by each monitoring device in real time;
the identification module 202 is configured to perform image identification on the monitoring picture to obtain an image identification result;
a generating module 203, configured to generate an alarm prompt when the image recognition result includes a target element or a target behavior, where the target element is used to indicate a shooting device, and the target behavior is used to indicate a shooting behavior for shooting with the shooting device.
In one embodiment, the generating module 203 is configured to generate a first alarm prompt when the image recognition result includes the target element but does not include the target behavior;
and the generating module 203 is configured to generate a second alarm prompt when the image recognition result includes the target behavior.
In one embodiment, as shown in fig. 3, the anti-theft processing device 20 includes: an intercept module 204;
and the intercepting module 204 is configured to intercept and store an evidence picture from the monitoring picture when the image recognition result includes a target element or a target behavior.
In one embodiment, as shown in fig. 4, the anti-theft processing device 20 includes: a sending module 205;
a sending module 205, configured to send the alarm prompt to a management terminal, so that a manager performs processing according to the alarm prompt.
In one embodiment, as shown in fig. 5, the anti-theft processing device 20 includes: a control module 206;
and the control module 206 is used for controlling the voice alarm equipment to alarm according to the voice alarm information when the alarm prompt comprises the voice alarm information.
In an embodiment, the control module 206 is configured to control an indicator lamp to perform an alarm prompt according to the indicator lamp alarm information when the alarm prompt includes the indicator lamp alarm information.
According to the anti-theft processing device provided by the embodiment of the disclosure, the server receives the monitoring pictures of the corresponding sensitive areas acquired by each monitoring device in real time; carrying out image recognition on the monitoring picture to obtain an image recognition result; and generating an alarm prompt when the image recognition result contains the target element or the target behavior. This openly implements and carries out real-time analysis through the server to the control picture of supervisory equipment collection, confirms whether someone uses cell-phone, camera or other steal and shine the equipment and steal the illumination, carries out the suggestion of reporting to the police when there is steal the illumination, is convenient for in time discover steal and shine the action, avoids data to reveal and the potential safety hazard that brings.
Based on the anti-theft processing method described in the embodiment corresponding to fig. 1, an embodiment of the present disclosure further provides an anti-theft processing system, where the anti-theft processing system includes a server, multiple monitoring devices in communication connection with the server, and a management terminal in communication connection with the server, where the monitoring devices are disposed at different locations for monitoring different sensitive areas; each monitoring device is used for acquiring a monitoring picture of a corresponding sensitive area in real time and sending the monitoring picture to a server; the server is used for carrying out image recognition on the monitoring picture to obtain an image recognition result, generating an alarm prompt when the image recognition result contains a target element or a target behavior, and sending the alarm prompt to the management terminal.
Further, the anti-theft processing system further comprises: the voice alarm equipment is in communication connection with the server; when the alarm prompt is voice alarm information, the server is used for sending the voice alarm information to the voice alarm equipment, and the voice alarm equipment gives an alarm according to the voice alarm information.
Further, the anti-theft processing system further comprises: the anti-theft processing system further comprises: the indicating lamp alarm equipment is in communication connection with the server; and the server controls the indicator lamp alarm equipment to alarm according to the alarm prompt.
The embodiment of the present disclosure further provides an anti-theft processing device, which includes a receiver, a transmitter, a memory and a processor, where the transmitter and the memory are respectively connected to the processor, the memory stores at least one computer instruction, and the processor is configured to load and execute the at least one computer instruction to implement the anti-theft processing method described in the embodiment corresponding to fig. 1.
Based on the anti-theft processing method described in the embodiment corresponding to fig. 1, an embodiment of the present disclosure further provides a computer-readable storage medium, for example, the non-transitory computer-readable storage medium may be a Read Only Memory (ROM), a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like. The storage medium stores computer instructions for executing the anti-piracy processing method described in the embodiment corresponding to fig. 1, which is not described herein again.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (10)

1. An anti-theft processing method is applied to a server which is in communication connection with a plurality of monitoring devices, wherein each monitoring device is arranged at a different position and is used for monitoring a different sensitive area, and the method comprises the following steps:
receiving monitoring pictures of the corresponding sensitive areas acquired by each monitoring device in real time;
carrying out image recognition on the monitoring picture to obtain an image recognition result;
and generating an alarm prompt when the image recognition result contains a target element or a target behavior, wherein the target element is used for indicating the shooting equipment, and the target behavior is used for indicating the shooting behavior of shooting by using the shooting equipment.
2. The method of claim 1, wherein generating an alarm prompt when a target element or a target behavior is included in the image recognition result comprises:
when the image recognition result contains a target element but does not contain a target behavior, generating a first alarm prompt;
and generating a second alarm prompt when the image recognition result contains the target behavior.
3. The method of claim 1, further comprising:
and when the image recognition result contains a target element or a target behavior, capturing and storing an evidence picture from the monitoring picture.
4. The method of claim 1, further comprising:
and the server sends the alarm prompt to a management terminal so that management personnel can process the alarm prompt.
5. The method of claim 1, wherein when the alert prompt includes voice alert information, the method further comprises:
and the server controls voice alarm equipment to alarm according to the voice alarm information.
6. The method of claim 1, wherein when the alert prompt includes indicator light alert information, the method further comprises:
and the server controls the indicator lamp to give an alarm according to the indicator lamp alarm information.
7. An anti-theft processing apparatus, wherein the anti-theft processing apparatus is communicatively connected to a plurality of monitoring apparatuses, the monitoring apparatuses being provided at different locations for monitoring different sensitive areas, the anti-theft processing apparatus comprising:
the receiving module is used for receiving the monitoring pictures of the corresponding sensitive areas acquired by each monitoring device in real time;
the identification module is used for carrying out image identification on the monitoring picture to obtain an image identification result;
and the generating module is used for generating an alarm prompt when the image recognition result contains a target element or a target behavior, wherein the target element is used for indicating the shooting equipment, and the target behavior is used for indicating the shooting behavior of shooting by using the shooting equipment.
8. The anti-theft processing system is characterized by comprising a server, a plurality of monitoring devices and a management terminal, wherein the monitoring devices are in communication connection with the server, the management terminal is in communication connection with the server, and the monitoring devices are arranged at different positions and used for monitoring different sensitive areas;
each monitoring device is used for acquiring a monitoring picture of a corresponding sensitive area in real time and sending the monitoring picture to a server;
the server is used for carrying out image recognition on the monitoring picture to obtain an image recognition result, generating an alarm prompt when the image recognition result contains a target element or a target behavior, and sending the alarm prompt to the management terminal.
9. The anti-theft processing system of claim 8, further comprising: the voice alarm equipment is in communication connection with the server;
when the alarm prompt is voice alarm information, the server is used for sending the voice alarm information to voice alarm equipment, and the voice alarm equipment is used for giving an alarm according to the voice alarm information.
10. The anti-theft processing system of claim 8, further comprising: the indicator light alarm device is in communication connection with the server;
and the server is used for controlling the indicator light alarm equipment to alarm according to the alarm prompt.
CN201911117632.5A 2019-11-15 2019-11-15 Anti-license processing method, equipment and system Pending CN112822434A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911117632.5A CN112822434A (en) 2019-11-15 2019-11-15 Anti-license processing method, equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911117632.5A CN112822434A (en) 2019-11-15 2019-11-15 Anti-license processing method, equipment and system

Publications (1)

Publication Number Publication Date
CN112822434A true CN112822434A (en) 2021-05-18

Family

ID=75851725

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911117632.5A Pending CN112822434A (en) 2019-11-15 2019-11-15 Anti-license processing method, equipment and system

Country Status (1)

Country Link
CN (1) CN112822434A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113536980A (en) * 2021-06-28 2021-10-22 浙江大华技术股份有限公司 Shooting behavior detection method and device, electronic device and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070291991A1 (en) * 2006-06-16 2007-12-20 National Institute Of Advanced Industrial Science And Technology Unusual action detector and abnormal action detecting method
US20080123975A1 (en) * 2004-09-08 2008-05-29 Nobuyuki Otsu Abnormal Action Detector and Abnormal Action Detecting Method
CN108182396A (en) * 2017-12-25 2018-06-19 中国电子科技集团公司电子科学研究院 A kind of automatic identification is taken pictures the method and device of behavior
CN108831087A (en) * 2018-07-17 2018-11-16 中创智慧(天津)科技发展股份有限公司 Circumference optical fiber incudes video monitoring safety management system
CN108847008A (en) * 2018-08-16 2018-11-20 张家港康得新光电材料有限公司 System alarm processing method, device, server and storage medium
CN110031852A (en) * 2019-04-17 2019-07-19 深圳市安特保电子商务集团有限公司 It is a kind of for detecting the method, apparatus and storage device of equipment of taking on the sly
CN110084076A (en) * 2019-04-12 2019-08-02 重庆科芮智能科技有限公司 Evidence display methods and device
CN110096972A (en) * 2019-04-12 2019-08-06 重庆科芮智能科技有限公司 Data guard method, apparatus and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080123975A1 (en) * 2004-09-08 2008-05-29 Nobuyuki Otsu Abnormal Action Detector and Abnormal Action Detecting Method
US20070291991A1 (en) * 2006-06-16 2007-12-20 National Institute Of Advanced Industrial Science And Technology Unusual action detector and abnormal action detecting method
CN108182396A (en) * 2017-12-25 2018-06-19 中国电子科技集团公司电子科学研究院 A kind of automatic identification is taken pictures the method and device of behavior
CN108831087A (en) * 2018-07-17 2018-11-16 中创智慧(天津)科技发展股份有限公司 Circumference optical fiber incudes video monitoring safety management system
CN108847008A (en) * 2018-08-16 2018-11-20 张家港康得新光电材料有限公司 System alarm processing method, device, server and storage medium
CN110084076A (en) * 2019-04-12 2019-08-02 重庆科芮智能科技有限公司 Evidence display methods and device
CN110096972A (en) * 2019-04-12 2019-08-06 重庆科芮智能科技有限公司 Data guard method, apparatus and system
CN110031852A (en) * 2019-04-17 2019-07-19 深圳市安特保电子商务集团有限公司 It is a kind of for detecting the method, apparatus and storage device of equipment of taking on the sly

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113536980A (en) * 2021-06-28 2021-10-22 浙江大华技术股份有限公司 Shooting behavior detection method and device, electronic device and storage medium

Similar Documents

Publication Publication Date Title
US10943357B2 (en) Video based indoor leak detection
US20160019427A1 (en) Video surveillence system for detecting firearms
CN111815916A (en) Monitoring and early warning method and system for target area and mobile terminal
US9870700B2 (en) Method and device for avoiding false alarms in monitoring systems
CN110163100B (en) Anti-photographing display
CN107592506B (en) Monitoring method, monitoring device and monitoring system
CA2983316C (en) Monitoring system having personal information protection function and method thereof
CN111985428A (en) Security detection method and device, electronic equipment and storage medium
KR20190092227A (en) System for Serarching Using Intelligent Analyzing Video
CN111259461A (en) Anti-stealing-lighting method, terminal equipment and system
US10878688B2 (en) Monitoring system and monitoring method
KR20210039663A (en) Violent behavior management system and method
CN115083089A (en) Night visual monitoring system and method based on unmanned aerial vehicle
US10290325B1 (en) Securing protected content by identifying recording devices
CN109348173B (en) Monitoring video management method and device and terminal equipment
CN112822434A (en) Anti-license processing method, equipment and system
CN111832458A (en) Anti-theft method and system
CN111881787A (en) Camera-based store illegal operation behavior identification method and system
CN110084076A (en) Evidence display methods and device
KR101335429B1 (en) Vehicle integrated monitoring system and providing method thereof
CN113450520B (en) Equipment management method, device, server and storage medium
CN110516501A (en) Face identification system exposes bright compensation method
KR101892963B1 (en) System, method and apparatus for automatic security of mobile platform
KR20180003897A (en) Document security method, device and computer readable medium
CN110830769B (en) Monitoring processing method and system, processing device, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210518