CN117746215A - Security check method, equipment, system and application platform - Google Patents

Security check method, equipment, system and application platform Download PDF

Info

Publication number
CN117746215A
CN117746215A CN202311733682.2A CN202311733682A CN117746215A CN 117746215 A CN117746215 A CN 117746215A CN 202311733682 A CN202311733682 A CN 202311733682A CN 117746215 A CN117746215 A CN 117746215A
Authority
CN
China
Prior art keywords
image
security
security inspection
application platform
inspection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311733682.2A
Other languages
Chinese (zh)
Inventor
陈刚
赵少治
王立明
刘伎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nuctech Co Ltd
Original Assignee
Nuctech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nuctech Co Ltd filed Critical Nuctech Co Ltd
Priority to CN202311733682.2A priority Critical patent/CN117746215A/en
Publication of CN117746215A publication Critical patent/CN117746215A/en
Pending legal-status Critical Current

Links

Landscapes

  • Image Analysis (AREA)

Abstract

The disclosure provides a security inspection method, device, system and application platform, and relates to the technical field of security inspection, wherein the method comprises the following steps: the security inspection equipment determines at least one image with similarity higher than a threshold value between the security inspection equipment and a security inspection image from a first image library in a first network where the security inspection equipment is located, wherein the first image library comprises a plurality of images with different identifiers; the security inspection equipment sends the identifier of the at least one image to an application platform in a second network, so that the application platform obtains the at least one image from a second image library comprising a plurality of images in the second network based on the identifier of the at least one image, and performs a first inspection operation according to the obtained at least one image; and receiving a first instruction from the application platform for indicating to check the security inspection object by the security inspection device under the condition that the result of the first checking operation indicates that the security inspection object associated with the security inspection image is suspected.

Description

Security check method, equipment, system and application platform
Technical Field
The disclosure relates to the technical field of security inspection, in particular to a security inspection method, security inspection equipment, security inspection system and application platform.
Background
A security inspection device in the related art opens a data transmission interface, and can transmit security inspection images to a remote application platform. A user can check the security inspection image through the application platform to judge whether the security inspection object associated with the security inspection image is suspected or not, so that remote inspection of the security inspection image is realized.
After the inspection is completed, the user can send an instruction corresponding to the inspection result to the security inspection equipment through the application platform so as to inspect the security inspection object with suspicion at the security inspection equipment end and pass the security inspection object without suspicion.
However, in the case where the network condition is poor (for example, the network bandwidth is insufficient) or a large number of security inspection images are to be transmitted (for example, one application platform is responsible for remote inspection of the security inspection images of a plurality of security inspection devices at the same time), the security inspection devices cannot quickly transmit the security inspection images to the application platform, so that the user cannot quickly inspect the security inspection images, and further, an instruction corresponding to the inspection result cannot be quickly sent to the security inspection devices. This can lead to a pile-up of security inspection objects at the security inspection device, reducing the efficiency of the security inspection.
In order to improve the efficiency of security inspection, in the related art, a default treatment mode (i.e., inspection or release) may be set at the security inspection device. In this case, once the security inspection device has not received the instruction from the application platform after a period of time from the transmission of the security inspection image, the security inspection object can be automatically handled in the set handling manner without waiting for the instruction from the application platform.
Disclosure of Invention
However, in the case where the set treatment mode is inspection, a large number of non-suspected security inspection objects are inspected, resulting in still low efficiency of security inspection. If the set treatment mode is release, the efficiency of security inspection can be improved, but since the suspected security inspection object is directly released without inspection, the reliability of security inspection is lowered, and potential safety hazard is likely to occur.
In view of this, the embodiments of the present disclosure propose solutions that can improve the efficiency and reliability of security inspection at the same time.
According to an aspect of the disclosed embodiments, there is provided a security inspection method, including: the security inspection device determines at least one image with similarity higher than a threshold value between the security inspection device and a security inspection image from a first image library in a first network where the security inspection device is located, wherein the first image library comprises a plurality of images with different identifiers; the security inspection device sends the identifier of the at least one image to an application platform in a second network, so that the application platform obtains the at least one image from a second image library comprising the plurality of images based on the identifier of the at least one image, and performs a first inspection operation according to the obtained at least one image, wherein the second image library is in the second network; and under the condition that the result of the first checking operation indicates that the security check object associated with the security check image is suspected, the security check equipment receives a first instruction from the application platform, wherein the first instruction is used for indicating to check the security check object.
In some embodiments, the method further comprises: and the security inspection equipment sends the security inspection image to the application platform so that the application platform executes a second inspection operation according to the security inspection image.
In some embodiments, the method further comprises: and under the condition that the result of the first checking operation indicates that the security check object is not suspected and the result of the second checking operation indicates that the security check object is suspected, the security check equipment receives a second instruction from the application platform, wherein the second instruction is used for prompting the security check object to be tracked.
In some embodiments, the method further comprises: the security inspection device sends alarm information about the security inspection object to the application platform, wherein the first inspection operation is further executed according to the alarm information.
In some embodiments, the security inspection device determines the at least one image using an artificial intelligence based image analysis algorithm.
According to another aspect of the embodiments of the present disclosure, there is provided a security inspection method, including: the method comprises the steps that an application platform receives identifiers of at least one image, wherein the similarity between the identifiers and security inspection images is higher than a threshold value, and the identifiers are determined by security inspection equipment from a first image library in a first network where the security inspection equipment is located, and the first image library comprises a plurality of images with different identifiers; the application platform acquiring the at least one image from a second image library comprising the plurality of images based on an identifier of the at least one image, and performing a first review operation according to the acquired at least one image, the second image library and the application platform being in a second network; and sending a first instruction to the security inspection equipment by the application platform under the condition that the result of the first inspection operation indicates that the security inspection object associated with the security inspection image is suspected, wherein the first instruction is used for indicating to inspect the security inspection object.
In some embodiments, the method further comprises: the application platform receives the security inspection image sent by the security inspection device; and the application platform executes a second examination operation according to the security check image.
In some embodiments, the method further comprises: and when the result of the first checking operation indicates that the security check object is not suspected and the result of the second checking operation indicates that the security check object is suspected, the application platform sends a second instruction to the security check device, wherein the second instruction is used for prompting the security check object to be tracked.
In some embodiments, the method further comprises: the application platform receives alarm information about the security inspection object sent by the security inspection device, wherein the first inspection operation is further executed according to the alarm information.
In some embodiments, each image of the plurality of images carries a flag indicating whether there is a suspicion; the method further comprises the steps of: the application platform determines prompt information according to the mark carried by the at least one obtained image, wherein the first examination operation is further executed according to the prompt information.
In some embodiments, the number of the at least one image is related to a network transmission speed between the first network and the second network.
In some embodiments, the similarity between each of the at least one image and the security inspection image is higher than the similarity between any of the plurality of images other than the at least one image and the security inspection image.
According to still another aspect of the embodiments of the present disclosure, there is provided a security inspection apparatus, including: and a module configured to perform the operation performed by the security inspection device in the security inspection method according to any one of the embodiments.
According to still another aspect of the embodiments of the present disclosure, there is provided a security inspection apparatus, including: a memory; and a processor, coupled to the memory, configured to perform the operations performed by the security device in the security method according to any of the embodiments above, based on the instructions stored in the memory.
According to still another aspect of the embodiments of the present disclosure, there is provided an application platform, including: and the module is configured to execute the operation executed by the application platform in the security inspection method according to any one of the embodiments.
According to still another aspect of the embodiments of the present disclosure, there is provided an application platform, including: a memory; and a processor, coupled to the memory, configured to perform the operations performed by the application platform in the security inspection method according to any one of the embodiments, based on the instructions stored in the memory.
According to still another aspect of the embodiments of the present disclosure, there is provided a security inspection system including: the security inspection device of any one of the embodiments above; and the application platform of any one of the embodiments.
According to a further aspect of the disclosed embodiments, a computer readable storage medium is provided, including computer program instructions, wherein the computer program instructions, when executed by a processor, implement the security inspection method according to any one of the embodiments.
According to a further aspect of the disclosed embodiments, a computer program product is provided, which comprises a computer program, wherein the computer program, when executed by a processor, implements the security inspection method according to any one of the above embodiments.
In the embodiment of the disclosure, the security inspection device determines an image with high similarity to a security inspection image from a first image library of a local first network, and sends an identifier of the image with high similarity to an application platform, so that the application platform acquires the image with high similarity to the security inspection image from a second image library of a local second network according to the identifier, and therefore a first inspection operation is executed according to the acquired image. Then, under the condition that the result of the first checking operation indicates that the security check object associated with the security check image is suspected, the security check equipment receives a first instruction from the application platform, wherein the first instruction is used for indicating to check the security check object. In this way, even if the network condition is poor or a large number of security inspection images are to be transmitted, the security inspection device can still receive the first instruction from the application platform quickly under the condition that the result of the first inspection operation indicates that the security inspection object associated with the security inspection image is suspected, so as to inspect the security inspection object. Thus, the efficiency and the reliability of security inspection can be improved simultaneously.
The technical scheme of the present disclosure is described in further detail below through the accompanying drawings and examples.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings may be obtained according to these drawings without inventive effort to a person of ordinary skill in the art.
FIG. 1 is a flow diagram of a security inspection method according to some embodiments of the present disclosure;
FIG. 2 is a flow diagram of a security inspection method according to further embodiments of the present disclosure;
FIG. 3 is a flow diagram of a security inspection method according to further embodiments of the present disclosure;
FIG. 4 is a schematic illustration of a security image and an image having a similarity to the security image above a threshold, according to some embodiments of the present disclosure;
FIG. 5 is a schematic structural view of a security inspection device according to some embodiments of the present disclosure;
FIG. 6 is a schematic structural diagram of an application platform according to some embodiments of the present disclosure;
FIG. 7 is a schematic diagram of an electronic device according to some embodiments of the present disclosure;
Fig. 8 is a schematic structural view of a security inspection system according to some embodiments of the present disclosure.
Detailed Description
The following description of the technical solutions in the embodiments of the present disclosure will be made clearly and completely with reference to the accompanying drawings in the embodiments of the present disclosure, and it is apparent that the described embodiments are only some embodiments of the present disclosure, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments in this disclosure without inventive faculty, are intended to fall within the scope of this disclosure.
The relative arrangement of the components and steps, numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless it is specifically stated otherwise.
Meanwhile, it should be understood that the sizes of the respective parts shown in the drawings are not drawn in actual scale for convenience of description.
Techniques, methods, and apparatus known to one of ordinary skill in the relevant art may not be discussed in detail, but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any specific values should be construed as merely illustrative, and not a limitation. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further discussion thereof is necessary in subsequent figures.
Fig. 1 is a flow diagram of a security inspection method according to some embodiments of the present disclosure.
As shown in fig. 1, the security inspection method performed by the security inspection device includes steps 102 to 106.
At step 102, the security device determines at least one image having a similarity to the security image above a threshold from a first image library in a first network in which the security device is located.
Here, the first image library includes a plurality of images having different identifiers.
Because the first image library and the security inspection device are both in the first network, the security inspection device can more quickly determine at least one image from the first image library. The first network may be, for example, a local area network in which the security device is located.
As some implementations, the security device may utilize an artificial intelligence (i.e., AI) based image analysis algorithm to determine at least one image having a similarity to the security image above a threshold.
In step 104, the security inspection device sends the identifier of the at least one image to an application platform in the second network, such that the application platform obtains the at least one image from a second image library comprising a plurality of images based on the identifier of the at least one image, and performs a first inspection operation according to the obtained at least one image.
Here, the second image library is in a second network. It will be appreciated that the identifiers of each of the plurality of images in the second image library are the same as the identifiers of each of the plurality of images in the first image library.
In some embodiments, image synchronization may be performed between the first image repository and the second image repository using, but is not limited to, a distributed image repository or the like technique such that the first image repository and the second image repository include the same plurality of images. As some implementations, image synchronization may be performed between the first image library and the second image library based on the image synchronization instructions. As other implementations, image synchronization may be periodically performed between the first image library and the second image library.
Because the data volume of the identifier of the image sent by the security inspection device to the application platform is smaller, the application platform can still receive the identifier of the image sent by the security inspection device more quickly even if the network condition is poor.
In addition, since the second image library and the application platform are both in the second network, the security inspection device can obtain the image with high similarity to the security inspection image (i.e., at least one image with similarity to the security inspection image higher than the threshold value) from the second image library relatively quickly. The second network may be, for example, a service network in which the application platform is located.
In other words, by executing step 104, the application platform can acquire the image having high similarity with the security inspection image more quickly, so that the first inspection operation can be performed more quickly according to the acquired image.
In some embodiments, the first review operation performed by the application platform may include displaying the acquired image via a display device (e.g., a display screen) so that the user reviews the displayed image to obtain a result of the first review operation based on the user's discrimination.
Because the similarity between the image according to the first checking operation and the security check image is high, the result of the first checking operation can approximately indicate whether the security check object associated with the security check image is suspected or not.
In step 106, the security inspection device receives a first instruction from the application platform in the case that the result of the first inspection operation indicates that the security inspection object associated with the security inspection image is suspected.
Here, the first instruction is for instructing to inspect the security inspection object. For example, in response to receiving the first instruction, the security inspection device may prompt the user to inspect the security inspection object.
In the above embodiment, the security inspection device determines the image with high similarity to the security inspection image from the first image library of the local first network, and sends the identifier of the image with high similarity to the application platform, so that the application platform obtains the image with high similarity to the security inspection image from the second image library of the local second network according to the identifier, thereby executing the first inspection operation according to the obtained image. Then, under the condition that the result of the first checking operation indicates that the security check object associated with the security check image is suspected, the security check equipment receives a first instruction from the application platform, wherein the first instruction is used for indicating to check the security check object. In this way, even if the network condition is poor or a large number of security inspection images are to be transmitted, the security inspection device can still receive the first instruction from the application platform quickly under the condition that the result of the first inspection operation indicates that the security inspection object associated with the security inspection image is suspected, so as to inspect the security inspection object. Thus, the efficiency and the reliability of security inspection can be improved simultaneously.
The security method performed by the security device is further described below in connection with some embodiments.
In some embodiments, the security inspection device further transmits the security inspection image to the application platform to cause the application platform to perform a second inspection operation in accordance with the security inspection image. In other words, in these embodiments, the application platform performs both the initial review (and the first review operation) from the image having a high similarity to the security image and the review (i.e., the second review operation) from the security image. Thus, the reliability of security inspection can be further improved.
As some implementations, the second review operation performed by the application platform may include displaying the security inspection image via a display device so that the user reviews the security inspection image to obtain a result of the second review operation based on the user's discrimination.
It can be appreciated that the identifiers of the security inspection image and the image with high similarity to the security inspection image are not packaged together and sent to the application platform at one time, but are sent to the application platform separately.
As some implementations, the security device sequentially sends an identifier of an image with high similarity to the security image and the security image.
For example, the security inspection device first transmits the security inspection image, determines an image having high similarity to the security inspection image while transmitting the security inspection image, and then transmits an identifier of the image having high similarity to the security inspection image. Compared with the mode that the identifier is sent first and then the security inspection image is sent, the security inspection device can enable the application platform to receive the security inspection image earlier by sending the security inspection image first and then sending the identifier, so that the second inspection operation can be executed according to the security inspection image earlier.
For another example, the security device first transmits an identifier of an image that has a high similarity to the security image, and then transmits the security image. This may prevent the transmission of the identifier from being slowed by the security image so that the application platform may receive the identifier more quickly to perform the first review operation more quickly. Therefore, the security inspection device can receive the first instruction from the application platform more quickly under the condition that the result of the first inspection operation indicates that the security inspection object associated with the security inspection image is suspected, so that the security inspection efficiency can be further improved.
As other implementations, the security device sends the security image and the identifier of the image with high similarity to the security image at the same time.
It can be appreciated that, since the data size of the identifier of the image with high similarity to the security image is much smaller than the data size of the security image, the application platform can receive the identifier first, whether the security device sends the security image first or sends the security image and the identifier simultaneously. In other words, the application platform typically performs the first review operation and then performs the second review operation.
In some embodiments, the security device receives the second instruction from the application platform if the result of the first inspection operation indicates that the security object is not suspected and the result of the second inspection operation indicates that the security object is suspected. Here, the second instruction is used to prompt the tracking of the security check object.
Since the first checking operation is performed according to the image having high similarity with the security check image and the second checking operation is directly performed according to the security check image, the accuracy of the result of the second checking operation is higher than that of the result of the first checking operation. Therefore, although the result of the first inspection operation indicates that the security inspection object is not suspected, the security inspection object should be inspected as long as the result of the second inspection operation indicates that the security inspection object is suspected.
However, since the first inspection operation is performed earlier than the second inspection operation, the security inspection object may have been released in a case where it is determined that the result of the second inspection operation indicates that the security inspection object is suspected. In this case, the security inspection device receives a second instruction from the application platform prompting the tracking of the security inspection object. Thus, the reliability of security inspection can be further improved.
In some embodiments, the security device may also send alarm information about the security object to the application platform. The alarm information may include, but is not limited to, information that nuclear radiation of the security check object exceeds standard, and the like. In this case, at least one of the first and second examination operations is also performed according to the alarm information.
As some implementations, the first review operation is also performed in accordance with the alert information. For example, the first review operation may include displaying, via the display device, the alarm information and the image having high similarity to the security image so that the user reviews the image having high similarity to the security image more accurately based on the alarm information. Thus, the accuracy of the result of the first checking operation executed by the application platform can be improved, and the reliability of security check can be further improved.
As other implementations, the second audit operation is also performed based on the alert information. For example, the second review operation may include displaying the alarm information and the security inspection image via a display device so that the user reviews the security inspection image more accurately based on the alarm information. Thus, the accuracy of the result of the second checking operation executed by the application platform can be improved, and the reliability of security check can be further improved.
Fig. 2 is a flow diagram of a security inspection method according to further embodiments of the present disclosure.
As shown in fig. 2, the security inspection method performed by the application platform includes steps 202 to 206.
In step 202, the application platform receives an identifier of at least one image for which the security device determines from a first image library in a first network in which the security device is located that a similarity to the security image is above a threshold.
Here, the first image library includes a plurality of images having different identifiers.
In step 204, the application platform obtains at least one image from a second image library comprising a plurality of images based on the identifier of the at least one image and performs a first review operation based on the obtained at least one image.
Here, the second image repository and the application platform are in a second network.
In step 206, the application platform sends a first instruction to the security inspection device in a case that the result of the first inspection operation indicates that the security inspection object associated with the security inspection image is suspected.
Here, the first instruction is for instructing to inspect the security inspection object.
For the description of steps 202 to 206, reference may be made to the previous descriptions of steps 102 to 106, which are not repeated here.
In the above embodiment, the application platform receives the identifier of the image with high similarity to the security image from the security device, and acquires the image with high similarity to the security image from the second image library of the local network based on the identifier. Then, the application platform executes a first checking operation according to the acquired image with high similarity with the security check image, and sends a first instruction for indicating checking of the security check object to the security check device under the condition that the result of the first checking operation indicates that the security check object is suspected. Thus, the efficiency and the reliability of security inspection can be improved simultaneously.
The security inspection method performed by the application platform is further described below in connection with some embodiments.
In some embodiments, the application platform may not send an instruction to the security device if the result of the first inspection operation indicates that the security object is not suspected, but only send the first instruction to the security device if the result of the first inspection operation indicates that the security object is suspected. In this case, the security device may automatically pass the security object if an instruction from the application platform has not been received after a period of time from the transmission of the identifier has elapsed. Thus, the interaction pressure between the application platform and the security inspection equipment can be reduced.
In other embodiments, the application platform may further send a third instruction for indicating that the security inspection object is released to the security inspection device if the result of the first inspection operation indicates that the security inspection object is not suspected. In other words, the security inspection device may further receive a third instruction from the application platform if the result of the first inspection operation indicates that the security inspection object is not suspected. Thus, the security inspection device does not need to wait for a period of time, but can directly pass through the security inspection object under the condition that the third instruction is received. Thus, the efficiency of security inspection can be further improved.
In some embodiments, the application platform also receives a security inspection image sent by the security inspection device. In this case, the application platform also performs a second review operation based on the received security images. Thus, the reliability of security inspection can be further improved.
As some implementations, in the case that the result of the second inspection operation is the same as the result of the first inspection operation, the application platform does not need to send an instruction to the security inspection device based on the result of the second inspection operation. As other implementations, in a case where the result of the first inspection operation indicates that the security inspection object is suspected and the result of the second inspection operation indicates that the security inspection object is not suspected, the application platform does not need to send a third instruction for indicating that the security inspection object is released to the security inspection device based on the result of the second inspection operation. Thus, the interaction pressure between the application platform and the security inspection equipment can be reduced.
As yet other implementations, the application platform may send a second instruction to the security device prompting tracking of the security object in a case where the result of the first inspection operation indicates that the security object is not suspected and the result of the second inspection operation indicates that the security object is suspected. Thus, the reliability of security inspection can be further improved.
In some embodiments, the application platform may also receive alarm information about the security check object sent by the security check device. In these embodiments, at least one of the first and second auditing operations is also performed in accordance with the alert information. Thus, the accuracy of the results of the first checking operation and/or the second checking operation can be improved, and the reliability of the security check can be further improved.
In some embodiments, each image of the plurality of images carries a flag indicating whether the object with which the image is associated has a suspicion. In these embodiments, the application platform may further determine the prompt information according to the obtained mark carried by the image with high similarity to the security image. The prompt information may be, for example, a proportion of an image with a high similarity to the security image, which carries a mark indicating suspicion, to an image with a high similarity to the security image.
In this case, the first review operation is also performed based on the hint information. For example, the first review operation may include displaying, via the display device, the hint information, the alarm information, and the image having a high similarity to the security image, so that the user reviews the image having a high similarity to the security image more accurately based on the hint information and the alarm information. Thus, the accuracy of the result of the first checking operation can be improved, and the reliability of the security check can be further improved.
The security inspection methods of the above embodiments are described with respect to one of two objects (i.e., the security inspection device and the application platform) that are interacted with each other as an execution subject, respectively, but it should be understood that embodiments of the security inspection methods of different execution subjects may be referred to each other.
For ease of understanding, the following description is provided in connection with fig. 3. Fig. 3 is a flow diagram of a security inspection method according to further embodiments of the present disclosure.
As shown in fig. 3, a first image library is deployed in a first network local to the security inspection device, and a second image library is deployed in a second network local to the application platform. Image synchronization may be performed between the first image repository and the second image repository such that the second image repository includes a plurality of images in the first image repository. Each image of the plurality of images has a respective identifier.
In case a security image is acquired, the security device may perform step 302.
In step 302, the security inspection device determines an image with high similarity to the security inspection image from the first image library. As some implementations, the security inspection device utilizes an artificial intelligence based image analysis algorithm to determine images that are highly similar to the security inspection image.
In step 304, the security device sends an identifier of the image with high similarity to the security image to the application platform.
For the example shown in fig. 4, the identifier sequences sent by the security inspection device to the application platform include "N0320308", "N0320309", "N0320310", "N0320311", "N0320312", and "N0320313". In fig. 4, "N0320315" is an identifier of the security check image.
In step 306, the application platform obtains the image with high similarity to the security image from the second image library according to the received identifier of the image with high similarity to the security image.
In step 308, the application platform performs a first review operation according to the acquired image with high similarity to the security image.
The first review operation may include displaying an image having a high similarity to the security image through the display device so that the user reviews the image having the high similarity to the security image.
In some embodiments, the security device may also send alert information about the security object to the application platform. In this case, the application platform may also perform a first review operation according to the alert information.
In some embodiments, the security inspection device may further determine the prompt information according to a mark carried by an image with high similarity to the security inspection image. In this case, the application platform may further perform a first review operation according to the prompt information.
In step 310, the application platform sends an instruction corresponding to the result of the first review operation to the security device.
In step 312, the security inspection device shunts the security inspection object according to whether an instruction from the application platform is received or according to the received instruction from the application platform. The diversion may be passing the security check object or checking the security check object.
In some embodiments, the application platform sends a first instruction for indicating to check the security inspection object to the security inspection device if the result of the first checking operation indicates that the security inspection object is suspected, and sends a third instruction for indicating to pass the security inspection object to the security inspection device if the result of the first checking operation indicates that the security inspection object is not suspected.
In these embodiments, the security inspection device may shunt the security inspection object according to the received instructions. Specifically, the security inspection device may prompt the user to inspect the security inspection object when the first instruction is received, and release the security inspection object when the third instruction is received.
In other embodiments, the application platform sends a first instruction for indicating to check the security inspection object to the security inspection device only if the result of the first checking operation indicates that the security inspection object is suspected, and does not send an instruction to the security inspection device if the result of the first checking operation indicates that the security inspection object is not suspected.
In these embodiments, the security inspection device may prompt the user to inspect the security inspection object if the first instruction is received, and may automatically pass the security inspection object if the instruction from the application platform is not received within a period of time after the identifier is transmitted.
By the security inspection method shown in fig. 3, the security inspection equipment can rapidly and accurately split the security inspection object, so that the security inspection efficiency and reliability can be improved simultaneously.
It will be appreciated that the security inspection method shown in fig. 3 may also include other various embodiments, and the relevant points may be referred to the foregoing description, which is not repeated herein.
The security inspection method of some embodiments of the present disclosure is further described below.
In some embodiments, the number of images with high similarity to the security images determined by the security device is related to a network transmission speed between the first network and the second network. As some implementations, the number may be set by the user based on the network transmission speed.
For example, in the case where the network transmission speed is large, the number of images with high similarity to the security image determined by the security device is large, and in the case where the network transmission speed is small, the number of images with high similarity to the security image determined by the security device is small.
In the above embodiment, the number of images with high similarity to the security inspection image determined by the security inspection device is related to the network transmission speed between the first network and the second network.
On one hand, the number of identifiers of the sent images with high similarity to the security inspection images can be increased under the condition of high network transmission speed, so that the application platform can execute the first inspection operation according to more images, the accuracy of the result of the first inspection operation can be improved, and the security inspection reliability can be further improved while the security inspection efficiency is ensured.
On the other hand, this can reduce the number of identifiers of the transmitted images having high similarity to the security check image in the case where the network transmission speed is small, to ensure that the identifiers can be transmitted to the application platform more quickly, so that the application platform can perform the first review operation more quickly. Thus, the efficiency of security inspection can be further improved.
In some embodiments, the similarity between each of the at least one image and the security inspection image determined by the security inspection device is higher than the similarity between any of the plurality of images of the first image library other than the at least one image and the security inspection image. In this way, the application platform may perform the first review operation according to one or more images having the highest similarity with the security inspection image among the plurality of images. Thus, the accuracy of the result of the first checking operation can be improved, and the reliability of the security check can be further improved.
As some implementations, the security inspection device may determine a similarity between each of the plurality of images of the first image library and the security inspection image. Then, the security inspection device may sort the plurality of images in order of high-to-low similarity with the security inspection images, so as to use the first few images of the sorted plurality of images as the determined at least one image.
The embodiment of the disclosure also provides a security inspection device configured to execute the operations executed by the security inspection device in the security inspection method of any one of the embodiments.
In some embodiments, the security device comprises a module configured to perform the operations performed by the security device in the security method of any of the embodiments described above.
In other embodiments, the security device includes a memory and a processor coupled to the memory, the processor configured to perform the operations performed by the security device in the security method of any of the embodiments described above based on instructions stored in the memory.
The embodiment of the disclosure further provides an application platform configured to execute the operations executed by the application platform in the security inspection method of any one of the embodiments.
In some embodiments, the application platform includes a module configured to perform the operations performed by the application platform in the security inspection method of any of the embodiments described above.
In other embodiments, the application platform includes a memory and a processor coupled to the memory, the processor configured to perform the operations performed by the application platform in the security inspection method of any of the above embodiments based on instructions stored in the memory.
Fig. 5 is a schematic structural view of a security inspection device according to some embodiments of the present disclosure.
As shown in fig. 5, the security inspection device 500 includes a determination module 501, a transmission module 502, and a reception module 503.
The determination module 501 is configured to determine at least one image having a similarity to the security inspection image above a threshold from a first image library in a first network in which the security inspection device 500 is located. Here, the first image library includes a plurality of images having different identifiers.
The sending module 502 is configured to send the identifier of the at least one image to an application platform in the second network, such that the application platform obtains the at least one image from a second image library comprising a plurality of images based on the identifier of the at least one image, and performs a first review operation according to the obtained at least one image. Here, the second image library is in a second network.
The receiving module 503 is configured to receive a first instruction from the application platform in a case where the result of the first examination operation indicates that the security inspection object associated with the security inspection image is suspected. Here, the first instruction is for instructing to inspect the security inspection object.
It should be understood that the security inspection device 500 may further include other modules to perform the operations performed by the security inspection device in the security inspection method of any of the embodiments described above, which are not described in detail herein.
Fig. 6 is a schematic structural diagram of an application platform according to some embodiments of the present disclosure.
As shown in fig. 6, the application platform 600 includes a receiving module 601, an acquiring module 602, and a transmitting module 603.
The receiving module 601 is configured to receive an identifier of at least one image, determined by the security device from a first image library in a first network in which the security device is located, that has a similarity to the security image that is higher than a threshold. Here, the first image library includes a plurality of images having different identifiers.
The acquisition module 602 is configured to acquire at least one image from a second image library comprising a plurality of images based on an identifier of the at least one image, and to perform a first review operation according to the acquired at least one image. Here, the second image repository and application platform 600 are in a second network.
The sending module 603 is configured to send a first instruction to the security inspection device if the result of the first inspection operation indicates that the security inspection object associated with the security inspection image is suspected. Here, the first instruction is for instructing to inspect the security inspection object.
It should be understood that the application platform 600 may further include other modules to perform the operations performed by the application platform in the security inspection method of any of the above embodiments, which are not described in detail herein.
Fig. 7 is a schematic structural diagram of an electronic device according to some embodiments of the present disclosure.
As shown in fig. 7, an electronic apparatus 700 includes a memory 701 and a processor 702 coupled to the memory 701, the processor 702 being configured to perform operations performed by the security inspection device and/or the application platform in the security inspection method of any of the embodiments described above based on instructions stored in the memory 701.
The memory 701 may include, for example, system memory, fixed nonvolatile storage media, and the like. The system memory may store, for example, an operating system, application programs, boot Loader (Boot Loader), and other programs.
The electronic device 700 may also include an input-output interface 703, a network interface 704, a storage interface 705, and the like. These interfaces input/output interface 703, network interface 704, storage interface 705, and memory 701 and processor 702 may be connected by bus 706, for example. The input/output interface 703 provides a connection interface for input/output devices such as a display, mouse, keyboard, touch screen, etc. The network interface 704 provides a connection interface for various networking devices. The storage interface 705 provides a connection interface for external storage devices such as SD cards, U discs, and the like.
It is understood that the electronic device 700 may be a security inspection apparatus or an application platform in the security inspection method of any of the above embodiments.
Fig. 8 is a schematic structural view of a security inspection system according to some embodiments of the present disclosure.
As shown in fig. 8, the security system includes a security device 801 and an application platform 802.
The security device 801 may be a security device (e.g., security device 500) of any of the embodiments described above. Application platform 802 may be an application platform of any of the embodiments described above (e.g., application platform 600).
In some embodiments, referring to fig. 8, security check device 801 and application platform 802 may interact through switch 803.
In some embodiments, referring to fig. 8, a security inspection system may include a plurality of security inspection devices 801 (3 are schematically shown in fig. 8) so that centralized remote security inspection may be implemented
In some embodiments, the application platform 802 may be deployed on a host including a display device (e.g., a display screen) and an input device (e.g., a keyboard, a mouse, etc.) for a user to perform image discrimination based on the first and/or second review operations performed by the application platform 802.
By utilizing the security inspection system disclosed by the embodiment of the invention, the efficiency and the reliability of security inspection in a remote security inspection scene can be improved simultaneously.
The disclosed embodiments also provide a computer readable storage medium comprising computer program instructions which, when executed by a processor, implement the security inspection method of any of the above embodiments.
The disclosed embodiments also provide a computer program product comprising a computer program which, when executed by a processor, implements the security method of any of the above embodiments.
Thus, various embodiments of the present disclosure have been described in detail. In order to avoid obscuring the concepts of the present disclosure, some details known in the art are not described. How to implement the solutions disclosed herein will be fully apparent to those skilled in the art from the above description.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different manner from other embodiments, so that the same or similar parts between the embodiments are mutually referred to. For the device and system embodiments, the description is relatively simple as it essentially corresponds to the method embodiments, as relevant see the section of the description of the method embodiments.
It will be appreciated by those skilled in the art that embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that functions specified in one or more of the flowcharts and/or one or more of the blocks in the block diagrams may be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Although some specific embodiments of the present disclosure have been described in detail by way of example, it should be understood by those skilled in the art that the above examples are for illustration only and are not intended to limit the scope of the present disclosure. It will be understood by those skilled in the art that the foregoing embodiments may be modified and equivalents substituted for elements thereof without departing from the scope and spirit of the disclosure. The scope of the present disclosure is defined by the appended claims.

Claims (18)

1. A security inspection method comprising:
the security inspection device determines at least one image with similarity higher than a threshold value between the security inspection device and a security inspection image from a first image library in a first network where the security inspection device is located, wherein the first image library comprises a plurality of images with different identifiers;
The security inspection device sends the identifier of the at least one image to an application platform in a second network, so that the application platform obtains the at least one image from a second image library comprising the plurality of images based on the identifier of the at least one image, and performs a first inspection operation according to the obtained at least one image, wherein the second image library is in the second network; and
and under the condition that the result of the first checking operation indicates that the security check object associated with the security check image is suspected, the security check equipment receives a first instruction from the application platform, wherein the first instruction is used for indicating to check the security check object.
2. The method of claim 1, further comprising:
and the security inspection equipment sends the security inspection image to the application platform so that the application platform executes a second inspection operation according to the security inspection image.
3. The method of claim 2, further comprising:
and under the condition that the result of the first checking operation indicates that the security check object is not suspected and the result of the second checking operation indicates that the security check object is suspected, the security check equipment receives a second instruction from the application platform, wherein the second instruction is used for prompting the security check object to be tracked.
4. The method of claim 1, further comprising:
the security inspection device sends alarm information about the security inspection object to the application platform, wherein the first inspection operation is further executed according to the alarm information.
5. The method of claim 1, wherein the security inspection device determines the at least one image using an artificial intelligence based image analysis algorithm.
6. A security inspection method comprising:
the method comprises the steps that an application platform receives identifiers of at least one image, wherein the similarity between the identifiers and security inspection images is higher than a threshold value, and the identifiers are determined by security inspection equipment from a first image library in a first network where the security inspection equipment is located, and the first image library comprises a plurality of images with different identifiers;
the application platform acquiring the at least one image from a second image library comprising the plurality of images based on an identifier of the at least one image, and performing a first review operation according to the acquired at least one image, the second image library and the application platform being in a second network; and
and under the condition that the result of the first checking operation indicates that the security check object associated with the security check image is suspected, the application platform sends a first instruction to the security check device, wherein the first instruction is used for indicating to check the security check object.
7. The method of claim 6, further comprising:
the application platform receives the security inspection image sent by the security inspection device; and
and the application platform executes a second checking operation according to the security check image.
8. The method of claim 7, further comprising:
and when the result of the first checking operation indicates that the security check object is not suspected and the result of the second checking operation indicates that the security check object is suspected, the application platform sends a second instruction to the security check device, wherein the second instruction is used for prompting the security check object to be tracked.
9. The method of claim 6, further comprising:
the application platform receives alarm information about the security inspection object sent by the security inspection device, wherein the first inspection operation is further executed according to the alarm information.
10. The method of claim 6, wherein each image of the plurality of images carries a flag indicating whether it is suspected;
the method further comprises the steps of:
the application platform determines prompt information according to the mark carried by the at least one obtained image, wherein the first examination operation is further executed according to the prompt information.
11. The method of any of claims 1-10, wherein the number of the at least one image is related to a network transmission speed between the first network and the second network.
12. The method of any of claims 1-10, wherein a similarity between each of the at least one image and the security inspection image is higher than a similarity between any of the plurality of images other than the at least one image and the security inspection image.
13. A security inspection apparatus comprising:
a module configured to perform the security method of any of claims 1-5.
14. A security inspection apparatus comprising:
a memory; and
a processor coupled to the memory and configured to perform the security method of any of claims 1-5 based on instructions stored in the memory.
15. An application platform, comprising:
a module configured to perform the security method of any of claims 6-10.
16. An application platform, comprising:
a memory; and
a processor coupled to the memory and configured to perform the security method of any of claims 6-10 based on instructions stored in the memory.
17. A security inspection system, comprising:
the security device of claim 13 or 14; and
the application platform of claim 15 or 16.
18. A computer readable storage medium comprising computer program instructions, wherein the computer program instructions when executed by a processor implement the security method of any of claims 1-12.
CN202311733682.2A 2023-12-15 2023-12-15 Security check method, equipment, system and application platform Pending CN117746215A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311733682.2A CN117746215A (en) 2023-12-15 2023-12-15 Security check method, equipment, system and application platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311733682.2A CN117746215A (en) 2023-12-15 2023-12-15 Security check method, equipment, system and application platform

Publications (1)

Publication Number Publication Date
CN117746215A true CN117746215A (en) 2024-03-22

Family

ID=90280559

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311733682.2A Pending CN117746215A (en) 2023-12-15 2023-12-15 Security check method, equipment, system and application platform

Country Status (1)

Country Link
CN (1) CN117746215A (en)

Similar Documents

Publication Publication Date Title
CN103839005B (en) The malware detection method of Mobile operating system and malware detection system
US8627146B2 (en) Model-based testing of an application program under test
US20200097355A1 (en) Method and apparatus for outputting information
CN111211929A (en) Fault positioning method, fault positioning device, control equipment and intelligent equipment
CN112346947B (en) Performance detection method, device, electronic equipment and computer readable medium
CN109240802B (en) Request processing method and device
CN105468507B (en) Branch standard reaching detection method and device
CN110704303B (en) Method and device for acquiring test coverage information
CN110908708B (en) Code release method, device and system
CN112948224B (en) Data processing method, device, terminal and storage medium
CN110471784A (en) Playback terminal abnormality eliminating method and device based on Electron platform
CN113590492B (en) Information processing method, system, electronic device and computer readable storage medium
CN116225886A (en) Test case generation method, device, equipment, storage medium and program product
CN117746215A (en) Security check method, equipment, system and application platform
CN117520195A (en) Method, apparatus, device, storage medium and program product for testing interface
CN108763053B (en) Method for generating buried point name and terminal equipment
US20200028733A1 (en) Method and apparatus for processing information
CN113821450B (en) Integrated method and system for executing computer software test
CN114579416B (en) Index determination method, device, server and medium
CN110716859A (en) Method for automatically pushing test cases for modified codes and related device
CN111833993B (en) AI-based regional image remote quality control management system
CN115587046A (en) Code exception processing method and device, storage medium and computer equipment
CN112435150A (en) Security check method and device, computer equipment and storage medium
CN115203178A (en) Data quality inspection method and device, electronic equipment and storage medium
CN110334763B (en) Model data file generation method, model data file generation device, model data file identification device, model data file generation apparatus, model data file identification apparatus, and model data file identification medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination