CN114580028A - Case and field wind control method, device, equipment and system based on monitoring and reviewing - Google Patents

Case and field wind control method, device, equipment and system based on monitoring and reviewing Download PDF

Info

Publication number
CN114580028A
CN114580028A CN202210334738.6A CN202210334738A CN114580028A CN 114580028 A CN114580028 A CN 114580028A CN 202210334738 A CN202210334738 A CN 202210334738A CN 114580028 A CN114580028 A CN 114580028A
Authority
CN
China
Prior art keywords
monitoring data
client
monitoring
review
case
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210334738.6A
Other languages
Chinese (zh)
Inventor
王煜龙
郑常
聂亚森
罗盛
邓浩
刘勃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Wenda Zhitong Technology Co ltd
Original Assignee
Shenzhen Wenda Zhitong Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Wenda Zhitong Technology Co ltd filed Critical Shenzhen Wenda Zhitong Technology Co ltd
Priority to CN202210334738.6A priority Critical patent/CN114580028A/en
Publication of CN114580028A publication Critical patent/CN114580028A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/73Querying
    • G06F16/738Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/78Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/783Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • G06F16/7837Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content using objects detected or recognised in the video content
    • G06F16/784Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content using objects detected or recognised in the video content the detected or recognised objects being people
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/78Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/7867Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using information manually generated, e.g. tags, keywords, comments, title and artist information, manually generated time, location and usage information, user ratings
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention discloses a case and field wind control method, a device, equipment and a system based on monitoring and review, wherein the method comprises the following steps: responding to a review request, checking whether a transaction record exists in a client needing review monitoring data, if so, requesting to acquire an authentication authorization record of the client, wherein the authentication authorization record comprises certificate information, and the monitoring data is stored in a local server of a case; face extraction processing is carried out on the certificate information of the client, the certificate information after face extraction processing is transmitted to the local server to be compared with the relevance of the monitoring data, and the monitoring data which is sent by the local server and is relevant to the client is received and displayed. The invention can solve the information leakage risk and the compliance problem aiming at the latest laws and regulations when the existing case wind control system collects, stores and uses personal sensitive information, and can complete the case channel wind control function under the condition of ensuring the data privacy of customers.

Description

Case and field wind control method, device, equipment and system based on monitoring and review
Technical Field
The invention relates to the technical field of computers, in particular to a case and field wind control method, device, server and system based on monitoring and review.
Background
The rapid development of applications such as video monitoring and face recognition facilitates the life of people, and is also widely applied to various commercial scenes. In the current sale of the real estate, a sales center needs to confirm information such as the identity of a transaction user, a transaction channel and the like through a case channel wind control system. However, the traditional case wind control method needs to use personal sensitive information, such as human faces, and the like, thereby causing serious threats to the privacy and security of customers. Moreover, as national laws and regulations on face acquisition, storage, use and the like are gradually perfected, the traditional scheme cannot meet the latest regulations.
In summary, the ideal case and place wind control method should be able to meet the requirements of the latest laws and regulations on the privacy protection of the collection, storage and use links of the client information. The method not only ensures that the information of the unauthorized client is not subjected to non-compliant processing, but also can complete the function of case channel wind control under the condition of ensuring the privacy of the client data.
Disclosure of Invention
In view of the above technical problems, the present invention provides a method, an apparatus, a device and a system for controlling a case wind based on monitoring and review, so as to solve the defect of the existing case wind control system in terms of protecting the privacy of client data.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
According to one aspect of the invention, a method for controlling a case wind based on monitoring and review comprises the following steps:
responding to a review request, checking whether a transaction record exists in a client needing review of monitoring data, if so, requesting to acquire an authentication authorization record of the client, wherein the authentication authorization record comprises certificate information, and the monitoring data is stored in a local server of a case; face extraction processing is carried out on the certificate information of the client, the certificate information after face extraction processing is transmitted to the local server to be compared with the relevance of the monitoring data, and the monitoring data which is sent by the local server and is relevant to the client is received and displayed.
Furthermore, the monitoring data are acquired by a standard security video acquisition system, the monitoring data are acquired by the standard security video acquisition system, the security video acquisition system stores the acquired monitoring data in the storage device of the local server in the case, and the monitoring data are deleted after the storage time of the monitoring data exceeds the specified storage time.
Further, the authentication authorization record is acquired by an APP program in an identity authentication all-in-one machine or any terminal device of the field, and when the authentication authorization record is acquired, the identity authentication all-in-one machine or the APP program compares the identity and the certificate of the client to obtain the certificate information of the client.
Further, the face extraction processing of the certificate information of the client includes: and generating a face photo suitable for clustering and searching according to the certificate information, and sending the face photo back to a local server.
Further, after the local server obtains the face picture, clustering, retrieving, short video extracting and background picture extracting are carried out in the monitoring data, and the monitoring data associated with the client is obtained.
Further, clustering is performed in the monitoring data, including: extracting the features of the face illumination by adopting a deep neural network to generate feature vectors; clustering the feature vectors in the monitoring data based on a K-Means clustering algorithm, and distributing the same label to the feature vectors belonging to the same customer after clustering, wherein the label of the customer has uniqueness.
Further, according to the clustered feature vectors, carrying out 1: N retrieval on the face photos, finding out the feature vectors of the clients from the monitoring data, matching, and extracting short videos and background images associated with the clients according to matching results.
According to a second aspect of the present disclosure, there is provided a case wind control device based on monitoring and review, comprising: the system comprises an authentication and authorization module, a data processing module and a data processing module, wherein the authentication and authorization module is used for responding to a review request, checking whether a transaction record exists in a client needing to review monitoring data, and if so, requesting to acquire an authentication and authorization record of the client, wherein the authentication and authorization record comprises certificate information, and the monitoring data is stored in a local server of a case; and the processing module is used for carrying out face extraction processing on the certificate information of the client, transmitting the certificate information subjected to face extraction processing to the local server for correlation comparison with the monitoring data, and receiving and displaying the monitoring data which is sent by the local server and is correlated with the client.
According to a third aspect of the present disclosure, there is provided a case wind control device based on monitoring and review, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the above method when executing the computer program.
According to a fourth aspect of the present disclosure, there is provided a case wind control system based on monitoring and review, including the above case wind control device, further including: the acquisition equipment is used for acquiring and recording monitoring data in the field; the certificate reading sub-equipment is used for reading the certificate information of the client; the local server is used for storing the monitoring data; and the network switching equipment is used for storing the monitoring data of the acquisition equipment to the local server.
By adopting the scheme, the technical method disclosed by the invention has the following beneficial effects:
according to the case wind control system, the device and the equipment based on monitoring and review, the problems of information leakage risks and compliance problems aiming at latest laws and regulations when the existing case wind control system collects, stores and uses personal sensitive information can be solved. The system ensures that the face information of the client is collected and analyzed only under the condition that the client is fully informed and definitely authorized. At the same time, the information of the unauthorized client is not processed at all. Therefore, the function of case channel wind control is completed under the condition of guaranteeing the data privacy of the clients.
Drawings
Fig. 1 is a flowchart of a method for controlling a wind in a case based on monitoring and review according to an embodiment of the present disclosure;
FIG. 2 is a flowchart illustrating a method for controlling a wind in a case based on review monitoring according to an embodiment of the present disclosure;
fig. 3 is a block diagram of a case wind control device based on monitoring and review provided in an embodiment of the present specification;
fig. 4 is a monitoring review-based case wind control device provided in an embodiment of the present specification;
fig. 5 is a monitoring review-based case wind control system provided in an embodiment of the present specification.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject technology method can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known technical methods have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
Furthermore, the drawings are only schematic illustrations of the present disclosure. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
As shown in fig. 1, an embodiment of the present specification provides a workflow diagram of a scenario wind control method based on monitoring and review, where an execution subject of the method may be a dedicated scenario wind control terminal device, where the terminal device may be a server, a personal computer, or other devices with computing, storing, and network transmission functions. The method specifically comprises the following steps S101-S102:
in step S101, in response to the review request, it is checked whether a transaction record exists for the customer needing to review the monitoring data, and if so, an authentication authorization record of the customer is requested to be obtained, where the authentication authorization record includes certificate information, and the monitoring data is stored in a local server in the case.
The monitoring data is stored locally, so that the monitoring data can be prevented from being leaked, and the response to the review request means that after a client needing to be reviewed is selected, the review request is sent out, so that after the execution main body receives the request, according to the fact whether a transaction record exists in the client in the request, the execution main body cannot check the monitoring data under the condition that the transaction record does not exist, the privacy of the client is fully guaranteed, and under the condition that the transaction record exists in the client, the execution main body is requested to continue to obtain the authentication authorization record of the client, so that the monitoring data of the client is obtained under the condition that the client agrees.
In addition, the authentication and authorization record refers to historical authorization data of the client, including but not limited to authorization time of the client, certificate image provided during authorization, authorization signature and other data.
In step S102, face extraction processing is performed on the credential information of the client, the credential information after face extraction processing is transmitted to the local server to be compared with the monitoring data in association, and the monitoring data associated with the client and sent by the local service is received and displayed.
Wherein, the face extraction processing refers to extracting the face outline of the certificate photo in the certificate information to obtain the photo only containing the face, and then, the execution main body transmits the face photo to the local server, compares the monitoring data in the local server with the face photo to find out the monitoring data related to the face of the client, and the local server sends the related monitoring data to the execution main body so that the execution main body can display the monitoring data, wherein, because the monitoring data is generally huge in size, the face comparison and extraction of the monitoring data are carried out in the local server, the processing efficiency can be effectively improved, and simultaneously, in terms of protecting the privacy of the client, since the monitoring data has unauthorized privacy information of the client, the monitoring data is processed in the local server, monitoring data can be prevented from leaking out to a greater extent, so that the privacy of the client of an unauthorized part is guaranteed.
In addition, it is worth explaining that because the monitoring data stored in the local server has the problem of time span, when the monitoring data is compared with the face photos, a recording interval of the monitoring data can be set, namely, the monitoring data and the face photos in the specified time interval are compared, so that the comparison range is greatly reduced, and the working efficiency is improved.
In the above method steps, privacy protection can be performed on the monitoring data, and many pieces of client information in the monitoring data cannot be read without authorization of the client.
In an embodiment, as a supplement to the above embodiment, in steps S201 to S108 of the method shown in fig. 2, the monitoring data is acquired by a standard security video acquisition system, the security video acquisition system stores the acquired monitoring data in a storage device of the local server in a field, and the monitoring data is deleted after the storage time of the monitoring data exceeds a specified storage time.
The security video acquisition system comprises a plurality of surveillance cameras, the surveillance cameras are arranged in a case field range, video images such as walking paths, authentication authorization operation and speaking voice of customers in the case field can be recorded, clear face images of the customers are included in the video images, and after the surveillance data are acquired by the surveillance cameras, the security video acquisition system can store surveillance numerical control data in a local server through a switch.
In order to protect the privacy of the client and avoid huge accumulated data of the monitoring data, the local server only stores the monitoring data within a certain date, and deletes the monitoring data exceeding the specified storage time.
Additionally, the method may further include checking whether a transaction record exists for a client who needs to review the monitoring data in response to the review request, and if so, checking whether a transaction record date of the client exceeds a specified storage time of the monitoring data, and if so, rejecting the review request.
In an embodiment, the authentication authorization record is acquired by an APP program in an identity authentication all-in-one machine or any terminal device in a field, and during acquisition, after the identity authentication all-in-one machine or the APP program performs witness comparison on the client, the certificate information of the client is acquired.
The authentication and authorization record can be realized through authorization of a field identity authentication integrated machine or remote authentication and authorization. The identity authentication all-in-one machine is specifically equipment capable of reading the novel identity card and collecting face information, and is used for reading the identity card information of a client, collecting a face image of the identity card information for comparing with a face in the identity card information, and acquiring an authorization indication of the client after comparing and confirming that the face image in the identity card information is consistent with the collected face image, such as a nodding video or an electronic signature. The APP program authentication authorization can be that a third-party software in a mobile device such as a mobile phone is used for scanning a two-dimensional code so as to open a designated authentication website, the authentication website acquires a camera, a loudspeaker and microphone permission of the mobile phone and real-name information of a client stored on the third-party software, and indicates and reminds the client to perform authentication operation through loudspeaker voice on a touch display screen. And after the authentication authorization of the client is obtained, forming an authentication authorization record of the client by the authentication process and the certificate information.
In one embodiment, the performing of the face extraction process on the certificate information of the client includes: and generating a face photo suitable for clustering and searching according to the certificate information, and sending the face photo back to a local server.
Specifically, as described above, the certificate information should include the certificate photo, the execution main body identifies the certificate photo, the face photo suitable for clustering and retrieving in the certificate photo is extracted, and then the face photo is sent to the local server, so that subsequent monitoring data extraction work can be performed conveniently.
Additionally, in the above embodiment, after obtaining the face photograph from the certificate information, clustering and searching may be performed in the monitoring data, so as to realize short video extraction and background image extraction, and obtain the monitoring data associated with the client.
As a supplement, clustering is performed in the monitoring data, which specifically includes:
and extracting the features of the face illumination by adopting a deep neural network to generate feature vectors.
Specifically, with the deep neural network, for each given face picture, an n-dimensional feature vector can be generated, which is expressed as follows:
Figure 783291DEST_PATH_IMAGE001
clustering the feature vectors in the monitoring data based on a K-Means clustering algorithm, and distributing the same label to the feature vectors belonging to the same customer after clustering, wherein the label of the customer has uniqueness.
Specifically, assuming that the number of authorized clients is K, first, the feature vectors extracted from the face certificates of the K clients are used as a cluster center, and are expressed as:
Figure 128822DEST_PATH_IMAGE002
extracting a face image appearing in the monitoring data, and extracting a corresponding feature vector by adopting a neural network, wherein the feature vector is expressed as:
Figure 216864DEST_PATH_IMAGE003
respectively calculating the distances from the feature vector to the K cluster centers obtained in the step, and distributing the distances to the class corresponding to the cluster center with the minimum distance, wherein the process is expressed by a formula as follows:
Figure 15055DEST_PATH_IMAGE004
and repeating for multiple times until all the face images in the monitoring data are clustered according to the method.
And (3) allocating a label to each type of clustered feature vector:
Figure 479535DEST_PATH_IMAGE006
notably, the deep neural network refers to a pre-trained deep neural network model.
And additionally, according to the clustered feature vectors, performing 1: N retrieval on the face photos, finding out the feature vectors of the clients from the monitoring data, matching, and extracting short videos and background images associated with the clients according to matching results.
Specifically, after clustering, all feature vectors marked as the same class as the feature vectors of the face photograph are selected, and specifically, the feature vectors can be obtained according to the labels of the feature vectors, and then, corresponding related information including the appearance position, the corresponding image and the short video are retrieved in the video according to the vectors.
Based on the same idea, as shown in fig. 3, an exemplary embodiment of the present disclosure further provides a case wind control device 300 based on monitoring review, including: the authentication and authorization module 301 is configured to respond to a review request, check whether a transaction record exists for a client that needs to review monitoring data, and if so, request to obtain an authentication and authorization record of the client, where the authentication and authorization record includes certificate information, and the monitoring data is stored in a local server in a case; the processing module 302 is configured to perform face extraction processing on the credential information of the client, transmit the credential information after face extraction processing to the local server to perform relevance comparison with the monitoring data, and receive and display the monitoring data associated with the client and sent by the local service.
The embodiment of the specification provides a case wind control device 300 based on monitoring and review, which can solve the information leakage risk of the existing case wind control system in the process of collecting, storing and using personal sensitive information and the compliance problem aiming at the latest laws and regulations. The device ensures that the face information of the client is collected and analyzed only under the condition that the client is fully informed and definitely authorized. At the same time, the information of the unauthorized client is not processed at all. Therefore, the function of case channel wind control is completed under the condition of guaranteeing the data privacy of the clients.
The specific details of each module in the above apparatus have been described in detail in the method section, and details that are not disclosed may refer to the method section, and thus are not described again.
Based on the same idea, the embodiment of the present specification further provides a case wind control device 400 based on monitoring and review, as shown in fig. 4.
The case wind control device 400 based on monitoring review may be a terminal device or a server provided in the above embodiments.
The scenario wind control device for guaranteeing the privacy of the customer data may have a large difference due to different configurations or performances based on the scenario wind control device 400 monitoring the review, and may include one or more processors 401 and a memory 402, and one or more stored applications or data may be stored in the memory 402. Memory 402 may include, among other things, readable media in the form of volatile memory elements, such as random access memory elements (RAM) and/or cache memory elements, and may further include read-only memory elements. The application programs stored in memory 402 may include one or more program modules (not shown), including but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment. Still further, the processor 401 may be configured to communicate with the memory 402 to execute a series of computer-executable instructions in the memory 402 on a casino wind control device that preserves privacy of customer data. The arena wind control device that secures customer data privacy can also include one or more power supplies 403, one or more wired or wireless network interfaces 404, one or more I/O interfaces (input output interfaces) 405, one or more external devices 406 (e.g., keyboard, pointing device, bluetooth device, etc.), can also communicate with one or more devices that enable a user to interact with the device, and/or communicate with any device (e.g., router, modem, etc.) that enables the device to communicate with one or more other computing devices. Such communication may occur via I/O interface 405. Also, the device may communicate with one or more networks (e.g., a Local Area Network (LAN)) via a wired or wireless interface 404.
In this embodiment, in particular, in this embodiment, the park wind control device includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the video privacy protection device, and the one or more programs configured to be executed by the one or more processors include computer-executable instructions for:
responding to a review request, checking whether a transaction record exists in a client needing review of monitoring data, if so, requesting to acquire an authentication authorization record of the client, wherein the authentication authorization record comprises certificate information, and the monitoring data is stored in a local server of a case; face extraction processing is carried out on the certificate information of the client, the certificate information after face extraction processing is transmitted to the local server to be compared with the relevance of the monitoring data, and the monitoring data which is sent by the local server and is relevant to the client is received and displayed.
Based on the same idea, the embodiment of the present specification further provides a case and park wind control system based on monitoring and review, as shown in fig. 5.
The case wind control system based on monitoring review provides the case wind control device 400 including the above embodiment, and further includes: the acquisition equipment 501 is used for acquiring and recording monitoring data in a field; credential reading sub-device 502: the certificate information is used for reading the certificate information of the client; a local server 503 for storing the monitoring data; a network switching device 504, configured to store the monitoring data of the acquisition device in the local server.
The present specification also provides an embodiment of a computer storage medium that can employ a portable compact disc read only memory (CD-ROM) and include program code, and that can be run on a terminal device, such as a personal computer. However, the program product of the present disclosure is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to make a computing device (which may be a personal computer, a server, a terminal device, or a network device, etc.) execute the method according to the exemplary embodiments of the present disclosure
Furthermore, the above-described figures are merely schematic illustrations of processes included in methods according to exemplary embodiments of the present disclosure, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functions of two or more modules or units described above may be embodied in one module or unit, according to exemplary embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.

Claims (10)

1. A case and field wind control method based on monitoring and review is characterized by comprising the following steps:
responding to a review request, checking whether a transaction record exists in a client needing review of monitoring data, if so, requesting to acquire an authentication authorization record of the client, wherein the authentication authorization record comprises certificate information, and the monitoring data is stored in a local server of a case;
face extraction processing is carried out on the certificate information of the client, the certificate information after face extraction processing is transmitted to the local server to be compared with the relevance of the monitoring data, and the monitoring data which is sent by the local server and is relevant to the client is received and displayed.
2. The case wind control method based on monitoring and review of claim 1, wherein the monitoring data is acquired by a standard security video acquisition system, the security video acquisition system stores the acquired monitoring data in a storage device of the local server of the case, and the monitoring data is deleted after the storage time of the monitoring data exceeds a specified storage time.
3. The scenario wind control method based on monitoring and review as claimed in claim 1, wherein the authentication authorization record is acquired by an APP program in an identity authentication all-in-one machine or any terminal device of the scenario, and during acquisition, after the identity authentication all-in-one machine or the APP program performs a testimony comparison on the client, the certificate information of the client is acquired.
4. The method for controlling the wind of the case based on the monitoring and review as claimed in claim 1, wherein the face extraction processing of the certificate information of the client comprises: and generating a face photo suitable for clustering and searching according to the certificate information, and sending the face photo back to a local server.
5. The method for controlling the wind of a case and place based on monitoring and review as claimed in claim 4, wherein after the local server obtains the face picture, clustering, retrieving, short video extracting and background picture extracting are performed in the monitoring data to obtain the monitoring data associated with the client.
6. The method for controlling case and park wind based on monitoring and review as claimed in claim 5, wherein clustering is performed in the monitoring data, comprising:
extracting the features of the face illumination by adopting a deep neural network to generate feature vectors;
clustering the feature vectors in the monitoring data based on a K-Means clustering algorithm, and distributing the same label to the feature vectors belonging to the same customer after clustering, wherein the label of the customer has uniqueness.
7. The case wind control method based on monitoring and review as claimed in claim 6, wherein the face photos are subjected to 1: N retrieval according to the clustered feature vectors, the feature vectors of the clients are found from the monitoring data and are matched, and the short videos and the background images associated with the clients are extracted according to the matching results.
8. A case and field wind control device based on monitoring and looking back comprises:
the system comprises an authentication and authorization module, a data processing module and a data processing module, wherein the authentication and authorization module is used for responding to a review request, checking whether a transaction record exists in a client needing to review monitoring data, and if so, requesting to acquire an authentication and authorization record of the client, wherein the authentication and authorization record comprises certificate information, and the monitoring data is stored in a local server of a case;
and the processing module is used for carrying out face extraction processing on the certificate information of the client, transmitting the certificate information subjected to face extraction processing to the local server for correlation comparison with the monitoring data, and receiving and displaying the monitoring data which is sent by the local server and is correlated with the client.
9. A scenario wind control device based on monitoring review, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method according to any one of claims 1 to 7 when executing the computer program.
10. A scenario wind control system based on monitoring review, comprising the scenario wind control device of claim 9, further comprising:
the acquisition equipment is used for acquiring and recording monitoring data in the field;
the certificate reading sub-equipment is used for reading the certificate information of the client;
the local server is used for storing the monitoring data;
and the network switching equipment is used for storing the monitoring data of the acquisition equipment to the local server.
CN202210334738.6A 2022-03-31 2022-03-31 Case and field wind control method, device, equipment and system based on monitoring and reviewing Pending CN114580028A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210334738.6A CN114580028A (en) 2022-03-31 2022-03-31 Case and field wind control method, device, equipment and system based on monitoring and reviewing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210334738.6A CN114580028A (en) 2022-03-31 2022-03-31 Case and field wind control method, device, equipment and system based on monitoring and reviewing

Publications (1)

Publication Number Publication Date
CN114580028A true CN114580028A (en) 2022-06-03

Family

ID=81785502

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210334738.6A Pending CN114580028A (en) 2022-03-31 2022-03-31 Case and field wind control method, device, equipment and system based on monitoring and reviewing

Country Status (1)

Country Link
CN (1) CN114580028A (en)

Similar Documents

Publication Publication Date Title
US8917913B2 (en) Searching with face recognition and social networking profiles
CN110011954B (en) Homomorphic encryption-based biological identification method, device, terminal and business server
KR20200098875A (en) System and method for providing 3D face recognition
US20200059703A1 (en) Method and device for generating content
CN109920174B (en) Book borrowing method and device, electronic equipment and storage medium
CN112949545B (en) Method, apparatus, computing device and medium for recognizing face image
CN105659279B (en) Information processing apparatus, information processing method, and computer program
CN112650875A (en) House image verification method and device, computer equipment and storage medium
CN111860313A (en) Information query method and device based on face recognition, computer equipment and medium
CN111294482B (en) Image processing method and system
CN113139527B (en) Video privacy protection method, device, equipment and storage medium
US20230333720A1 (en) Generating presentation information associated with one or more objects depicted in image data for display via a graphical user interface
Mukherjee et al. Energy efficient face recognition in mobile-fog environment
CN114580028A (en) Case and field wind control method, device, equipment and system based on monitoring and reviewing
CN113052045B (en) Method, apparatus, computing device and medium for identifying finger vein image
CN111221803B (en) Feature library management method and coprocessor
CN113052044A (en) Method, apparatus, computing device, and medium for recognizing iris image
EP4293649A1 (en) Secret search method, secret search system, secret search device, encryption device, searcher terminal, and program
Monica Tresa Social Network Analysis for Image Origin Classification
EP4296996A1 (en) Secure search method, secure search system, secure search device, encryption device, searcher terminal, and program
CN110634219A (en) Access control identification system, method, equipment and storage medium
CN112751928B (en) Cross-terminal information interconnection method, device, computer equipment and storage medium
CN116823168A (en) Abnormal medical item detection method, device, computer equipment and storage medium
CN116416569A (en) Behavior recognition method, behavior recognition device, computer equipment and storage medium
CN117809348A (en) Security face comparison search system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination