CN113032801A - Traffic video viewing method, system, device and computer readable storage medium - Google Patents

Traffic video viewing method, system, device and computer readable storage medium Download PDF

Info

Publication number
CN113032801A
CN113032801A CN202110219562.5A CN202110219562A CN113032801A CN 113032801 A CN113032801 A CN 113032801A CN 202110219562 A CN202110219562 A CN 202110219562A CN 113032801 A CN113032801 A CN 113032801A
Authority
CN
China
Prior art keywords
video
traffic
event
user
identity information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110219562.5A
Other languages
Chinese (zh)
Inventor
刘新
黄庆财
雷喜龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN202110219562.5A priority Critical patent/CN113032801A/en
Publication of CN113032801A publication Critical patent/CN113032801A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/75Clustering; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • Medical Informatics (AREA)
  • Data Mining & Analysis (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The embodiment of the application discloses a traffic video viewing method, a system, equipment and a computer readable storage medium, which can enable users with different identities to view video contents conforming to self identity information and protect the privacy of corresponding parties. The method in the embodiment of the application comprises the following steps: acquiring a look-up request of a traffic video, wherein the look-up request comprises identity information of a look-up user; judging whether the identity information of the consulting user is related to the traffic events in the traffic video or not according to the consulting request; if so, acquiring an event permission identifier according to the identity information of the reference user, wherein the event permission identifier comprises permission information for the reference user to view the traffic video; acquiring a target video corresponding to the authority information according to the event authority identification; and presenting the target video to the reference user.

Description

Traffic video viewing method, system, device and computer readable storage medium
Technical Field
The embodiment of the application relates to the technical field of video processing, in particular to a traffic video viewing method, a system, equipment and a computer readable storage medium.
Background
When a vehicle collision or other traffic safety accidents occur, the traffic video is one of the important bases for judging accident responsibility, and objective evaluation is required to be carried out on the safety accidents, and in addition to the fact that the person concerned and the persons present on the scene witness the safety accidents, careful observation and research are carried out on the traffic video most importantly.
At present, when a traffic video is observed and researched, all unprocessed videos can be clearly seen by an observer of the traffic video, so that the privacy of traffic accident parties cannot be effectively guaranteed.
Disclosure of Invention
The embodiment of the application provides a traffic video viewing method, a traffic video viewing system, traffic video viewing equipment and a computer readable storage medium, which can enable users with different identities to view video contents conforming to self identity information and protect the privacy of corresponding parties.
The application provides a traffic video viewing method in a first aspect, which includes:
acquiring a look-up request of a traffic video, wherein the look-up request comprises identity information of a look-up user;
judging whether the identity information of the consulting user is related to the traffic events in the traffic video or not according to the consulting request;
if so, acquiring an event permission identifier according to the identity information of the reference user, wherein the event permission identifier comprises permission information for the reference user to view the traffic video;
acquiring a target video corresponding to the authority information according to the event authority identification;
and presenting the target video to the reference user.
Optionally, before the obtaining of the request for consulting the traffic video, the method further includes:
acquiring video content of the traffic video;
grading the video content of the traffic video according to preset authority information to obtain a graded video, wherein the preset authority information comprises primary authority information, secondary authority information and tertiary authority information;
and encrypting the hierarchical video to obtain an encrypted video.
Optionally, the step of performing hierarchical processing on the video content of the traffic video according to the preset authority information to obtain a hierarchical video includes:
clearly processing a face image in the video content of the traffic video according to the primary authority information to obtain a first video;
blurring the face image in the video content of the traffic video according to the secondary authority information to obtain a second video;
and clearing the face image in the video content of the traffic video according to the three-level authority information to obtain a third video.
Optionally, the obtaining the event permission identifier according to the identity information of the reference user includes:
when the identity information of the consulting user is the party of the traffic event, acquiring a primary event authority identification according to the identity information of the consulting user, wherein the primary event authority identification corresponds to the consulting authority of the first video;
or the like, or, alternatively,
when the identity information of the consulting user is the traffic manager of the traffic event, acquiring a secondary event permission identifier according to the identity information of the consulting user, wherein the secondary event permission identifier corresponds to the consulting permission of the second video;
or the like, or, alternatively,
and when the identity information of the consulting user is the illegal person of the traffic event, acquiring a tertiary event permission identifier according to the identity information of the consulting user, wherein the tertiary event permission identifier corresponds to the consulting permission of the third video.
Optionally, the encrypting the hierarchical video to obtain an encrypted video includes:
encrypting the first video to obtain a first encrypted video;
encrypting the second video to obtain a second encrypted video;
and encrypting the third video to obtain a third encrypted video.
Optionally, the obtaining the target video corresponding to the permission information according to the event permission identifier includes:
when the identity information of the consulting user is the party of the traffic event, acquiring the first encrypted video according to the primary event authority identification;
decrypting the first encrypted video to obtain the first video;
or the like, or, alternatively,
when the identity information of the consulting user is a traffic manager of the traffic event, acquiring the second encrypted video according to a secondary event authority identifier;
decrypting the second encrypted video to obtain the second video;
or the like, or, alternatively,
when the identity information of the consulting user is the illegal person of the traffic event, acquiring the third encrypted video according to the third-level event authority identification;
and decrypting the third encrypted video to obtain the third video.
Optionally, after the determining whether the identity information of the referring user is associated with the identity information of the party to the traffic event in the traffic video, the method further includes:
if not, rejecting the consulting request of the traffic video and sending an unsuccessful operation prompt.
A second aspect of the present application provides a traffic video viewing system, comprising
The system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring a reference request of the traffic video, and the reference request comprises identity information of a reference user;
the judging unit is used for judging whether the identity information of the consulting user is related to the traffic events in the traffic video or not according to the consulting request;
the second obtaining unit is used for obtaining an event authority identification according to the identity information of the consulting user when the judging unit determines that the identity information of the consulting user is related to the traffic event in the traffic video, wherein the event authority identification comprises authority information for the consulting user to check the traffic video;
the third acquisition unit is used for acquiring a target video corresponding to the authority information according to the event authority identifier;
and the presentation unit is used for presenting the target video to the consulting user.
A third aspect of the present application provides a traffic video viewing device, including:
the device comprises a processor, a memory, an input and output unit and a bus;
the processor is connected with the memory, the input and output unit and the bus;
the memory holds a program that the processor calls to execute the traffic video viewing method according to any one of the first aspect.
A fourth aspect of the present application provides a computer readable storage medium having a program stored thereon, which when executed on a computer performs the method of any one of the first aspects.
According to the technical scheme, the embodiment of the application has the following advantages:
firstly, acquiring a look-up request for looking up a traffic video, wherein the look-up request comprises identity information of a look-up user; judging whether identity information of a consulting user is related to a traffic event in a traffic video according to a consulting request, if the identity information of the consulting user is determined to be related to the traffic event, acquiring an event permission identifier, wherein the event permission identifier comprises permission information for the consulting user to check the traffic video, acquiring a target video according to the event identifier, and presenting the target video to the consulting user; according to the method and the device, after the query request is obtained, the relevance information of the consultant and the traffic event is obtained, the video which is in line with the watching of the consultant is called out and sent to the consultant according to the identity of the consultant and the relevance of the consultant and the event, so that users with different identities can only view the video content in line with the identity information of the users, and the privacy of the corresponding parties is protected.
Drawings
FIG. 1 is a schematic diagram of one embodiment of a traffic video viewing method;
FIG. 2 is a schematic diagram of another embodiment of a traffic video viewing method;
FIG. 3 is a schematic diagram of one embodiment of a traffic video viewing system;
FIG. 4 is a schematic diagram of one embodiment of a traffic video viewing device.
Detailed Description
At present, when a traffic video is observed and researched, all unprocessed videos can be clearly seen by an observer of the traffic video, so that the privacy of traffic accident parties cannot be effectively guaranteed.
Based on the above, the application provides a traffic video viewing method, a system, a device and a computer readable storage medium, which can enable users with different identities to view video content conforming to self identity information, and protect privacy of corresponding parties.
The technical solutions in the present application will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The method of the present application may be applied to a server, a terminal, or other devices with logic processing capability, and the present application is not limited thereto. For convenience of description, the following description will be given taking the execution subject as a server as an example.
Referring to fig. 1, a first aspect of the present application provides an embodiment of a traffic video viewing method, including:
101. the server acquires a look-up request of the traffic video, wherein the look-up request comprises identity information of a look-up user.
In the embodiment of the present application, when a reference user searches for a corresponding traffic video file on a server, a reference request for referring to a traffic video needs to be submitted on the server first, and identity information of the reference user included in the reference request mainly includes, but is not limited to, the following information: the name, age, sex, occupation, family address, family member information of the consulting user and the relation with the party in the traffic video needing to be looked up need to be explained, the consulting request also comprises consulting request time, application reason and the like of the consulting user, and in the application, the information contained in the consulting request is not specifically limited.
102. And the server judges whether the identity information of the consulting user is related to the traffic events in the traffic video according to the consulting request.
In the embodiment of the application, after receiving a reference request of a reference user for referring to a traffic video, a server briefly summarizes traffic event situations occurring in the traffic video according to the traffic video, and mainly includes, but is not limited to, the following information: the server determines whether the identity information of the user is related to the traffic event in the traffic video, and the server determines whether the identity information of the user is related to the traffic event in the traffic video, wherein the relevance is mainly related to the user and the party who causes the traffic event, but for the staff of the relevant department who handles the traffic event and the owner (the unauthorized person) of the vehicle in the traffic event, it is required to be noted that the owner (the unauthorized person) mainly refers to the fact that the person who causes the traffic event is not the owner but the vehicle who causes the traffic event is the owner, and more specifically, for example: the user A owns the automobile, but a friend user B of the user A borrows the automobile, the user B is the party of the traffic accident due to improper operation of the user B, although the user A is not the party of the traffic accident, the user A is classified as an illegal person in the situation because the vehicle B belongs to the user A; after determining that the identity information of the referring user is associated with the traffic event in the traffic video, the server performs step 103.
103. And the server acquires an event permission identifier according to the identity information of the reference user, wherein the event permission identifier comprises permission information for the reference user to view the traffic video.
In this embodiment of the present application, after the server determines that the reference user identity information is related to a traffic event in a traffic video, it is necessary to obtain a corresponding event permission identifier according to the reference user identity information, and it should be noted that the content of the traffic video that can be referred by different reference users is different, for example: if the identity of the user is a driver (party), acquiring the corresponding event identifier as a primary event authority identifier, and viewing all videos; if the applied user identity is a person in the traffic management department, and the obtained corresponding event is a secondary event authority identification, the condition of the person in the video can be seen, but the video is obtained after fuzzy processing is carried out on the face of the person; if a user identity owner (driver of an unauthorized person) is applied, the corresponding event identifier is acquired as a three-level event authority identifier, and the conditions inside the vehicle in the traffic event, including the conditions of personnel inside the vehicle, cannot be seen; and the server acquires the video which is in line with the identity of the reference user for watching according to the identity of the reference user.
104. And the server acquires a target video corresponding to the authority information according to the event authority identification.
In the application, the target video mainly refers to a video which is obtained according to traffic video processing and accords with the reference permission of a reference user, after the server obtains an event permission identifier corresponding to the reference user, the server obtains the video which accords with the identity of the reference user for watching, and it needs to be noted that the server directly obtains the corresponding target video according to the event permission identifier, and the traffic video is not edited after the event permission identifier is obtained; after the server acquires the traffic video, different clipping processing is performed on the traffic video according to different permissions, and here, the classification of the permissions is not specifically limited, for example: the method comprises the steps of carrying out covering processing on the condition inside a vehicle in a traffic video, carrying out fuzzy processing on the human face of personnel inside the vehicle in the traffic video, carrying out clear display processing on the human face of the personnel inside the traffic video and the like, processing the traffic video by a server to obtain a plurality of processed videos, encrypting the processed videos and storing the encrypted videos in the server locally, so that after the server identifies according to event authorities, the videos which accord with the inquiry of a user are called out from a server body according to the event authorities.
105. And the server presents the target video to the reference user.
The server acquires videos meeting the requirements of a consulting user, and displays the target videos on a display screen of the server or a display screen externally connected with the server; according to the method and the device, the video which is in line with the watching of the looking-up user can be called out and sent to the looking-up user according to the identity of the looking-up user and the relevance degree of the event, so that the users with different identities can only look up the video content in line with the identity information of the users, and the privacy of the corresponding parties is protected.
Referring to fig. 2, a first aspect of the present application provides another embodiment of a traffic video viewing method, including:
201. and the server acquires the video content of the traffic video.
In the embodiment of the application, the server obtains a complete traffic video through an intelligent traffic device, such as a vehicle data recorder or a violation shooting camera, in the application, the complete traffic video mainly refers to a complete traffic violation video, a traffic accident video and the like, and the server extracts video content of a corresponding traffic video according to the obtained traffic video, for example: the license plate number of the vehicle, the personnel condition in the vehicle, the damage degree of the vehicle and the like of the traffic accident are extracted from the acquired traffic accident video, and the video content of the traffic video is not specifically limited in the application.
202. The server performs grading processing on the video content of the traffic video according to preset authority information to obtain a graded video, wherein the preset authority information comprises primary authority information, secondary authority information and tertiary authority information.
In the embodiment of the application, the preset authority information mainly comprises primary authority information, secondary authority information and tertiary authority information, and the server performs different processing on the traffic video according to different authority information, for example: the server carries out clear processing on the face image in the video content of the traffic video according to the primary authority information, the obtained traffic video is a clear traffic video, all video content in the traffic video can be seen completely and clearly, the server carries out fuzzy processing on the face image in the video content of the traffic video according to the secondary authority information, the obtained traffic video is a traffic video with a fuzzy face, the video content of the traffic video can be seen, but the face in the video content cannot be seen, the server carries out face image removing processing on the video content of the traffic video according to the tertiary authority information, the obtained traffic video does not have the face image, and the condition of the interior of a vehicle in the video content cannot be seen; after the server clips the traffic video according to the authority information, after the authority information corresponding to the user can be determined to be consulted, the video corresponding to the authority can be directly called out, and the user can conveniently consult the video.
203. And the server encrypts the hierarchical video to obtain an encrypted video.
In the embodiment of the application, a server encrypts an acquired hierarchical video to obtain an encrypted video, encrypts a first video to obtain a first encrypted video, and encrypts a second video to obtain a second encrypted video; encrypting the third video to obtain a third encrypted video, wherein the main encryption method for the graded video comprises the following steps: after the server acquires the video content of the graded video, the storage capacity of the video content needs to be acquired through calculation, and due to the fact that the duration of a traffic event and the vehicles and personnel involved in the traffic event are different, the capacity information of the video content of the graded video acquired is different and may be 100M or 200M, and in the application, the storage capacity of the video content is not specifically limited; after the server acquires the storage capacity of the video content, it needs to determine whether the storage capacity of the video content of the hierarchical video reaches a preset storage capacity, in this application, a specific numerical value of the preset storage capacity is not specifically limited, and if it is determined that the storage capacity reaches the preset storage capacity, the server encrypts the video content by using an encryption method of a combination of numbers and letters to acquire an encrypted video, for example: the encryption mode is a combination mode of numbers and letters, and can be a mode of capital letters plus numbers, capital lower case letters plus numbers or lower case letters plus numbers, for example: the encryption mode of the combination of numbers and letters is not specifically limited in the application in the forms of MMM123456, Mmmm123456 or Mmmm123456 and the like; if the server determines that the storage capacity does not reach the preset storage capacity, the server encrypts the video content of the classified video by using a digital/alphabetic encryption mode to obtain an encrypted video, wherein the encryption mode is a digital or alphabetic encryption mode, and can be in a capital letter, lowercase letter or number form, for example: MMM, 123456, and the like, and the encryption method of the number or letter combination is not particularly limited in the present application.
204. The server obtains a searching request for searching the traffic video, wherein the searching request comprises identity information of a searching user.
205. And the server judges whether the identity information of the consulting user is related to the identity information of the parties of the traffic events in the traffic video according to the consulting request.
If the server determines that the identity information of the referring user does not have an association with the party identity information of the traffic event in the traffic video, step 206 is performed, and if the server determines that the identity information of the referring user has an association with the party identity information of the traffic event in the traffic video, step 207 is performed.
In the present embodiment, steps 204 to 205 are similar to steps 101 to 102 described above, and are not limited in detail.
206. And the server refuses the consulting request for consulting the traffic video and sends an operation unsuccessful prompt.
207. And the server acquires an event permission identifier according to the identity information of the reference user, wherein the event permission identifier comprises permission information for the reference user to view the traffic video.
In the embodiment, step 207 is similar to step 103, and is not described herein again.
208. And the server acquires a target video corresponding to the authority information according to the event authority identification.
In this embodiment of the application, after acquiring the corresponding event permission identifier, the server acquires the corresponding target video according to the event permission identifier, specifically: the server acquires a first encrypted video according to the primary event authority identification, and then decrypts the first encrypted video to acquire a first video; the server acquires a second encrypted video according to the secondary event identifier, and decrypts the second encrypted video to acquire a second video; the server acquires a third encrypted video according to the three-level event identifier, decrypts the mechanical energy of the third encrypted video and acquires the third video; it should be noted that, after determining the reference event permission identifier of the reference user, the server directly obtains the corresponding encrypted video according to the event permission identifier, decrypts the encrypted video to obtain the video that can be viewed, and facilitates the reference user to view and watch.
209. And the server presents the target video to the reference user.
In the embodiment, step 209 is similar to step 105, and is not described herein again.
For a clearer explanation of the traffic video viewing method, an application scenario of the traffic video viewing method is described below by way of example:
when a vehicle A collides, a server acquires a complete traffic video of the vehicle A by intelligent traffic equipment such as a vehicle data recorder or a violation shooting camera, the server clips the traffic video according to three permission levels after acquiring the traffic video, the first-level permission corresponds to a driver of the vehicle A, namely the driver of the traffic event, the server clearly processes the content in the traffic video according to the first-level permission, the content comprises face images appearing in the traffic video, the face images can be clearly processed, and the acquired video is a clear and complete video; the second-level authority corresponds to a traffic manager for processing the traffic event, and the server performs fuzzy processing on the content in the traffic video according to the second-level authority, namely performs fuzzy processing on a face image appearing in the traffic video to obtain that the traffic video is not clear of a face; the third-level authority corresponds to the owner (the unauthorized person) of the vehicle A, the server removes the face image content in the traffic video according to the third-level authority, namely the server removes the face image appearing in the traffic video, removes the situation in the vehicle A, and obtains the traffic video in which the situation in the vehicle A and the face information cannot be seen; after the traffic video is graded according to the authority information, the server encrypts the graded traffic video, and respectively acquires a first encrypted video, a second encrypted video and a third encrypted video which respectively correspond to the video of the first authority, the video of the second authority and the video of the third authority.
After the user A submits a lookup request for looking up the traffic video on the server, the server acquires the identity information of the user A according to the lookup request and acquires the associated information of the user A and the traffic event according to the information of the user identity A; if the identity of the user A is applied as a driver (party), acquiring a corresponding event identifier as a primary authority; if the identity of the application user A is a traffic manager, acquiring a corresponding event identifier as a secondary authority; if the identity of the user A is applied as an owner (driver of an unauthorized person), acquiring a corresponding event as a three-level permission; after the server determines the identity information of the user A, the corresponding event permission identifier is obtained, and after the corresponding event permission identifier is obtained, the server calls the corresponding encrypted video and decrypts the encrypted video, so that the video content which is in line with the user A can be obtained.
According to the method and the device, after the query request is obtained, the relevance information of the consultant and the traffic event is obtained, the video which is in line with the watching of the consultant is called out and sent to the consultant according to the identity of the consultant and the relevance of the consultant and the event, so that users with different identities can only view the video content in line with the identity information of the users, and the privacy of the corresponding parties is protected.
Referring to fig. 3, a second aspect of the present application provides an embodiment of a traffic video viewing system, including:
a first obtaining unit 301, configured to obtain a reference request for a traffic video, where the reference request includes identity information of a reference user.
A determining unit 302, configured to determine, according to the query request, whether the identity information of the query user is related to a traffic event in the traffic video.
A second obtaining unit 303, configured to, when the determining unit determines that the identity information of the reference user is related to the traffic event in the traffic video, obtain an event permission identifier according to the identity information of the reference user, where the event permission identifier includes permission information for the reference user to view the traffic video.
A third obtaining unit 304, configured to obtain, according to the event permission identifier, a target video corresponding to the permission information.
A presentation unit 305 for presenting the target video to the referring user.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Optionally, the system further includes:
a first execution unit 306, the first execution unit 306 configured to execute the following steps:
acquiring video content of the traffic video;
grading the video content of the traffic video according to preset authority information to obtain a graded video, wherein the preset authority information comprises primary authority information, secondary authority information and tertiary authority information;
and encrypting the hierarchical video to obtain an encrypted video.
Optionally, the first executing unit 306 is further configured to execute the following steps:
clearly processing a face image in the video content of the traffic video according to the primary authority information to obtain a first video;
blurring the face image in the video content of the traffic video according to the secondary authority information to obtain a second video;
and clearing the face image in the video content of the traffic video according to the three-level authority information to obtain a third video.
Optionally, the first executing unit 306 is further configured to execute the following steps:
encrypting the first video to obtain a first encrypted video;
encrypting the second video to obtain a second encrypted video;
and encrypting the third video to obtain a third encrypted video.
Optionally, the second obtaining unit 303 is further configured to perform the following steps:
when the identity information of the consulting user is the party of the traffic event, acquiring a primary event authority identification according to the identity information of the consulting user, wherein the primary event authority identification corresponds to the consulting authority of the first video;
or the like, or, alternatively,
when the identity information of the consulting user is the traffic manager of the traffic event, acquiring a secondary event permission identifier according to the identity information of the consulting user, wherein the secondary event permission identifier corresponds to the consulting permission of the second video;
or the like, or, alternatively,
and when the identity information of the consulting user is the illegal person of the traffic event, acquiring a tertiary event permission identifier according to the identity information of the consulting user, wherein the tertiary event permission identifier corresponds to the consulting permission of the third video.
Optionally, the third obtaining unit 304 is further configured to perform the following steps:
when the identity information of the consulting user is the party of the traffic event, acquiring the first encrypted video according to the primary event authority identification;
decrypting the first encrypted video to obtain the first video;
or the like, or, alternatively,
when the identity information of the consulting user is a traffic manager of the traffic event, acquiring the second encrypted video according to a secondary event authority identifier;
decrypting the second encrypted video to obtain the second video;
or the like, or, alternatively,
when the identity information of the consulting user is the illegal person of the traffic event, acquiring the third encrypted video according to the third-level event authority identification;
and decrypting the third encrypted video to obtain the third video.
Optionally, the system further includes:
a second execution unit 307 for performing the steps of:
if not, rejecting the consulting request of the traffic video and sending an unsuccessful operation prompt.
Referring to fig. 4, a third aspect of the present application provides an embodiment of a traffic video viewing device, including:
a processor 401, a memory 402, an input-output unit 403, and a bus 404;
the processor 401 is connected to the memory 402, the input/output unit 403 and the bus 404;
the memory 402 holds a program that the processor 401 calls to perform the traffic video viewing method according to any one of the first aspect.
A fourth aspect of the present application provides a computer readable storage medium having a program stored thereon, which when executed on a computer performs the method of any one of the first aspects.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like.

Claims (10)

1. A traffic video viewing method, comprising:
acquiring a look-up request of a traffic video, wherein the look-up request comprises identity information of a look-up user;
judging whether the identity information of the consulting user is related to the traffic events in the traffic video or not according to the consulting request;
if so, acquiring an event permission identifier according to the identity information of the reference user, wherein the event permission identifier comprises permission information for the reference user to view the traffic video;
acquiring a target video corresponding to the authority information according to the event authority identification;
and presenting the target video to the reference user.
2. The traffic video viewing method according to claim 1, wherein prior to the request for review of the acquired traffic video, the method further comprises:
acquiring video content of the traffic video;
grading the video content of the traffic video according to preset authority information to obtain a graded video, wherein the preset authority information comprises primary authority information, secondary authority information and tertiary authority information;
and encrypting the hierarchical video to obtain an encrypted video.
3. The traffic video viewing method of claim 2, wherein the step of performing a rating process on the video content of the traffic video according to the preset authority information to obtain a rated video comprises:
clearly processing a face image in the video content of the traffic video according to the primary authority information to obtain a first video;
blurring the face image in the video content of the traffic video according to the secondary authority information to obtain a second video;
and clearing the face image in the video content of the traffic video according to the three-level authority information to obtain a third video.
4. The traffic video viewing method of claim 3, wherein the obtaining of the event permission identifier according to the identity information of the referring user comprises:
when the identity information of the consulting user is the party of the traffic event, acquiring a primary event authority identification according to the identity information of the consulting user, wherein the primary event authority identification corresponds to the consulting authority of the first video;
or the like, or, alternatively,
when the identity information of the consulting user is the traffic manager of the traffic event, acquiring a secondary event permission identifier according to the identity information of the consulting user, wherein the secondary event permission identifier corresponds to the consulting permission of the second video;
or the like, or, alternatively,
and when the identity information of the consulting user is the illegal person of the traffic event, acquiring a tertiary event permission identifier according to the identity information of the consulting user, wherein the tertiary event permission identifier corresponds to the consulting permission of the third video.
5. The traffic video viewing method of claim 3, wherein said encrypting the hierarchical video to obtain an encrypted video comprises:
encrypting the first video to obtain a first encrypted video;
encrypting the second video to obtain a second encrypted video;
and encrypting the third video to obtain a third encrypted video.
6. The traffic video viewing method according to claim 5, wherein the acquiring the target video corresponding to the authority information according to the event authority identifier includes:
when the identity information of the consulting user is the party of the traffic event, acquiring the first encrypted video according to the primary event authority identification;
decrypting the first encrypted video to obtain the first video;
or the like, or, alternatively,
when the identity information of the consulting user is a traffic manager of the traffic event, acquiring the second encrypted video according to a secondary event authority identifier;
decrypting the second encrypted video to obtain the second video;
or the like, or, alternatively,
when the identity information of the consulting user is the illegal person of the traffic event, acquiring the third encrypted video according to the third-level event authority identification;
and decrypting the third encrypted video to obtain the third video.
7. The traffic video viewing method of claim 1, wherein after said determining whether the identity information of the reviewing user is associated with the party identity information for the traffic event in the traffic video, the method further comprises:
if not, rejecting the consulting request of the traffic video and sending an unsuccessful operation prompt.
8. A traffic video viewing system, comprising:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring a reference request of the traffic video, and the reference request comprises identity information of a reference user;
the judging unit is used for judging whether the identity information of the consulting user is related to the traffic events in the traffic video or not according to the consulting request;
the second obtaining unit is used for obtaining an event authority identification according to the identity information of the consulting user when the judging unit determines that the identity information of the consulting user is related to the traffic event in the traffic video, wherein the event authority identification comprises authority information for the consulting user to check the traffic video;
the third acquisition unit is used for acquiring a target video corresponding to the authority information according to the event authority identifier;
and the presentation unit is used for presenting the target video to the consulting user.
9. A traffic video viewing device, comprising:
the device comprises a processor, a memory, an input and output unit and a bus;
the processor is connected with the memory, the input and output unit and the bus;
the memory holds a program that the processor calls to execute the traffic video viewing method according to any one of claims 1 to 7.
10. A computer-readable storage medium having a program stored thereon, which when executed on a computer performs the method of any one of claims 1 to 7.
CN202110219562.5A 2021-02-26 2021-02-26 Traffic video viewing method, system, device and computer readable storage medium Pending CN113032801A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110219562.5A CN113032801A (en) 2021-02-26 2021-02-26 Traffic video viewing method, system, device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110219562.5A CN113032801A (en) 2021-02-26 2021-02-26 Traffic video viewing method, system, device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN113032801A true CN113032801A (en) 2021-06-25

Family

ID=76461951

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110219562.5A Pending CN113032801A (en) 2021-02-26 2021-02-26 Traffic video viewing method, system, device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN113032801A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113656730A (en) * 2021-07-30 2021-11-16 德派软件(北京)有限公司 Autonomous front-end design and display system
CN113689715A (en) * 2021-07-20 2021-11-23 新奇点智能科技集团有限公司 Information pushing method and device, electronic equipment and computer readable storage medium
CN113965726A (en) * 2021-10-14 2022-01-21 三星电子(中国)研发中心 Method, device and system for processing traffic video
CN115311824A (en) * 2022-07-05 2022-11-08 南京邮电大学 Campus security management system and method based on Internet

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104486083A (en) * 2014-12-19 2015-04-01 小米科技有限责任公司 Supervisory video processing method and device
CN104967875A (en) * 2015-07-28 2015-10-07 浙江宇视科技有限公司 Method and device for controlling monitoring video checking authority
CN105959648A (en) * 2016-06-23 2016-09-21 浙江宇视科技有限公司 Encryption method and device, and video monitoring system
CN107341376A (en) * 2016-04-29 2017-11-10 深圳富泰宏精密工业有限公司 The anti-misinformation of picture and glance prevention method and electronic equipment
CN108040230A (en) * 2017-12-19 2018-05-15 司马大大(北京)智能系统有限公司 A kind of monitoring method and device for protecting privacy
CN108200382A (en) * 2017-12-15 2018-06-22 北京奇虎科技有限公司 A kind of method and apparatus of video monitoring
CN110505455A (en) * 2019-08-30 2019-11-26 北京青岳科技有限公司 A kind of the monitor video access method and system of secret protection
CN110569662A (en) * 2019-08-15 2019-12-13 中国平安财产保险股份有限公司 method for improving information security and related product
CN111294482A (en) * 2020-01-23 2020-06-16 深圳市大拿科技有限公司 Image processing method and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104486083A (en) * 2014-12-19 2015-04-01 小米科技有限责任公司 Supervisory video processing method and device
CN104967875A (en) * 2015-07-28 2015-10-07 浙江宇视科技有限公司 Method and device for controlling monitoring video checking authority
CN107341376A (en) * 2016-04-29 2017-11-10 深圳富泰宏精密工业有限公司 The anti-misinformation of picture and glance prevention method and electronic equipment
CN105959648A (en) * 2016-06-23 2016-09-21 浙江宇视科技有限公司 Encryption method and device, and video monitoring system
CN108200382A (en) * 2017-12-15 2018-06-22 北京奇虎科技有限公司 A kind of method and apparatus of video monitoring
CN108040230A (en) * 2017-12-19 2018-05-15 司马大大(北京)智能系统有限公司 A kind of monitoring method and device for protecting privacy
CN110569662A (en) * 2019-08-15 2019-12-13 中国平安财产保险股份有限公司 method for improving information security and related product
CN110505455A (en) * 2019-08-30 2019-11-26 北京青岳科技有限公司 A kind of the monitor video access method and system of secret protection
CN111294482A (en) * 2020-01-23 2020-06-16 深圳市大拿科技有限公司 Image processing method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113689715A (en) * 2021-07-20 2021-11-23 新奇点智能科技集团有限公司 Information pushing method and device, electronic equipment and computer readable storage medium
CN113656730A (en) * 2021-07-30 2021-11-16 德派软件(北京)有限公司 Autonomous front-end design and display system
CN113965726A (en) * 2021-10-14 2022-01-21 三星电子(中国)研发中心 Method, device and system for processing traffic video
CN115311824A (en) * 2022-07-05 2022-11-08 南京邮电大学 Campus security management system and method based on Internet

Similar Documents

Publication Publication Date Title
CN113032801A (en) Traffic video viewing method, system, device and computer readable storage medium
CN107870983A (en) Vehicle peccancy approaches to IM, block chain and storage medium based on block chain
KR101522311B1 (en) A carrying-out system for images of the closed-circuit television with preview function
US20010007975A1 (en) Data access system
US20060265328A1 (en) Electronic information management system
WO2018225775A1 (en) Image masking device and image masking method
CN112949545A (en) Method, apparatus, computing device and medium for recognizing face image
Levashov The Rise of New Type of Surveillance for Which the Law Wasn't Ready
CN112956167A (en) Authentication module for sensor data
CN111951084B (en) Method, electronic device, and medium for vehicle rental order management
CN111432286B (en) Video processing method, device and system
CN111626884B (en) Method and device for preventing insurance fraud
CN110958410A (en) Video processing method and device and automobile data recorder
CN116186656A (en) Meta universe identity authentication method, device, equipment and storage medium
US11706381B2 (en) Selective obfuscation of objects in media content
CN115242746A (en) Safety processing method and system for social application users
Jackson Jr Infotainment and Telematic Systems Challenges Effecting Vehicle Forensic Law Enforcement Capabilities
KR101468407B1 (en) Digital forensic photographing device and digital forensic photographing system installed in car for preventing abuse of personal image information using the device
CN106157412A (en) A kind of personnel's access system and method
CN112328998A (en) Computer information security monitoring method
WO2009124819A1 (en) Method for the protection of personality rights when taking pictures of persons
CN113128294A (en) Road event evidence obtaining method and device, electronic equipment and storage medium
CN111881478B (en) Traffic management system with trace elimination function
US20230036423A1 (en) Method and Apparatus for Obtaining Identifying Information from Biometric Data
Chechulin et al. Cybercrime investigation model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination