WO2018161339A1 - Application method and apparatus for big data searching in security monitoring - Google Patents

Application method and apparatus for big data searching in security monitoring Download PDF

Info

Publication number
WO2018161339A1
WO2018161339A1 PCT/CN2017/076277 CN2017076277W WO2018161339A1 WO 2018161339 A1 WO2018161339 A1 WO 2018161339A1 CN 2017076277 W CN2017076277 W CN 2017076277W WO 2018161339 A1 WO2018161339 A1 WO 2018161339A1
Authority
WO
WIPO (PCT)
Prior art keywords
avatar
data
database
library
sub
Prior art date
Application number
PCT/CN2017/076277
Other languages
French (fr)
Chinese (zh)
Inventor
马岩
Original Assignee
深圳市博信诺达经贸咨询有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市博信诺达经贸咨询有限公司 filed Critical 深圳市博信诺达经贸咨询有限公司
Priority to PCT/CN2017/076277 priority Critical patent/WO2018161339A1/en
Publication of WO2018161339A1 publication Critical patent/WO2018161339A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Definitions

  • the invention relates to the field of security, and in particular relates to a method and a device for applying big data search in security monitoring.
  • the security monitoring system is a system that uses optical fibers, coaxial cables or microwaves to transmit video signals in its closed loop and from camera to image display and recording. It can reflect the monitored object in real time, image and reality. It can be used for long-term monitoring instead of manual in harsh environments and recorded by video recorder. At the same time, the alarm system equipment alarms for illegal intrusion.
  • the existing security monitoring is not continuous in big data search and cannot meet the user's data search requirements.
  • a method for applying big data search in security monitoring is provided, which solves the defect that the search results of the prior art are discontinuous.
  • a method for applying big data search in security monitoring includes the following steps:
  • the monitoring system receives the big data search condition input by the user
  • the monitoring system extracts the first avatar data from all the video data, and compares the first avatar data with the existing avatar database;
  • the first avatar data sub-library is created, the first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is sorted by time. Output search results.
  • the method further includes:
  • the data corresponding to the first avatar data is added to the first avatar data sub-bank by time.
  • the method further includes:
  • the monitoring system deletes data that does not contain an avatar from the data search library.
  • an application device for big data search in security monitoring includes:
  • a transceiver unit configured to receive a big data search condition input by a user
  • the processing unit is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data sub-library is established.
  • the first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is sorted by time, and the search result is output.
  • the processing unit is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-bank by time.
  • the processing unit is configured to delete data that does not include an avatar from the data search library.
  • a third aspect provides an application device for big data search in security monitoring, the device comprising: a processor, a transceiver, a memory, and a bus, wherein the processor, the transceiver, and the memory are connected by using a bus;
  • a transceiver for receiving a big data search condition input by a user for receiving a big data search condition input by a user.
  • the processor is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data sub-library is established.
  • the first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is sorted by time, and the search result is output.
  • the processor is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-bank by time.
  • the processor is configured to delete data that does not include an avatar from the data search library.
  • the technical solution provided by the specific embodiments of the present invention has the advantages of satisfying the current continuous search of security monitoring data.
  • FIG. 1 is a schematic flowchart diagram of a method for applying big data search in security monitoring according to the present invention.
  • FIG. 2 is a schematic structural diagram of an apparatus for applying big data search in security monitoring according to the present invention.
  • FIG. 3 is a schematic structural diagram of an apparatus for applying big data search in security monitoring according to the present invention.
  • FIG. 1 is a schematic diagram of a method for applying big data search in security monitoring according to a first preferred embodiment of the present invention.
  • the method is implemented by a security system.
  • the method is as shown in FIG. 1 and includes the following steps:
  • Step S101 The monitoring system receives a big data search condition input by the user.
  • Step S102 The monitoring system extracts the first avatar data from all the video data, and compares the first avatar data with the existing avatar database.
  • Step S103 If the first avatar data is not stored in the avatar database, the first avatar data sub-library is established, and the first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is pressed. The search results are output after the time is sorted.
  • the technical solution provided by the invention can establish an avatar data sub-library according to the same avatar data, and then sort the avatar data by time in the sub-library, thereby realizing the advantage of continuous avatar data.
  • the foregoing method may further include:
  • the data corresponding to the first avatar data is added to the first avatar data sub-bank by time.
  • the foregoing method may further include:
  • the monitoring system deletes data that does not contain an avatar from the data search library.
  • FIG. 2 is a schematic diagram of an apparatus for applying big data search in security monitoring according to a second preferred embodiment of the present invention.
  • the transceiver unit 201 is configured to receive a big data search condition input by the user;
  • the processing unit 202 is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data is created.
  • the library adds the first avatar data sub-library to the avatar database, and sorts the data in all the first avatar data sub-libraries by time to output the search result.
  • the processing unit 202 is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-bank by time.
  • processing unit 202 is configured to delete data that does not include an avatar from the data search library.
  • the present invention also provides an application device 30 for big data search in security monitoring, the device comprising: a processor 301, a transceiver 302, a memory 303 and a bus 304, wherein the processor, the transceiver, and the memory are connected by a bus;
  • the transceiver 302 is configured to receive a big data search condition input by a user.
  • the processor 301 is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data is created.
  • the library adds the first avatar data sub-library to the avatar database, and sorts the data in all the first avatar data sub-libraries by time to output the search result.
  • the processor 301 is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-account by time.
  • the processor 301 is configured to delete data that does not include an avatar from the data search library.
  • Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
  • a storage medium may be any available media that can be accessed by a computer.
  • the computer readable medium may include random access memory (Random) Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium.
  • a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.

Abstract

Provided in the present invention are an application method and apparatus for big data searching in security monitoring, the method comprising the following steps: a monitoring system receives big data search conditions inputted by a user; the monitoring system extracts first avatar data from all of the video data, and compares the first avatar data with an existing avatar database; if the first avatar data is not stored in the avatar database, then establishing a first avatar sub-database and adding the first avatar sub-database to the avatar database, and, after sorting all of the data in the first avatar sub-database into chronological order, outputting search results. The technical solution provided in the present invention has the advantage of continuous search results.

Description

大数据搜索在安防监控中的应用方法及装置  Application method and device for big data search in security monitoring 技术领域Technical field
本发明涉及安防领域,尤其涉及一种大数据搜索在安防监控中的应用方法及装置。The invention relates to the field of security, and in particular relates to a method and a device for applying big data search in security monitoring.
背景技术Background technique
安防监控系统是应用光纤、同轴电缆或微波在其闭合的环路内传输视频信号,并从摄像到图像显示和记录构成独立完整的系统。它能实时、形象、真实地反映被监控对象,它可以在恶劣的环境下代替人工进行长时间监视,通过录像机记录下来。同时报警系统设备对非法入侵进行报警。The security monitoring system is a system that uses optical fibers, coaxial cables or microwaves to transmit video signals in its closed loop and from camera to image display and recording. It can reflect the monitored object in real time, image and reality. It can be used for long-term monitoring instead of manual in harsh environments and recorded by video recorder. At the same time, the alarm system equipment alarms for illegal intrusion.
现有的安防监控在大数据搜索不连续,无法满足用户的数据搜索要求。The existing security monitoring is not continuous in big data search and cannot meet the user's data search requirements.
技术问题technical problem
提供一种大数据搜索在安防监控中的应用方法,其解决了现有技术搜索结果不连续的缺陷。A method for applying big data search in security monitoring is provided, which solves the defect that the search results of the prior art are discontinuous.
技术解决方案Technical solution
一方面,提供一种大数据搜索在安防监控中的应用方法,所述方法包括如下步骤:In one aspect, a method for applying big data search in security monitoring is provided, and the method includes the following steps:
监控系统接收用户输入的大数据搜索条件;The monitoring system receives the big data search condition input by the user;
监控系统将所有的视频数据中提取第一头像数据,将第一头像数据与已有的头像数据库比对;The monitoring system extracts the first avatar data from all the video data, and compares the first avatar data with the existing avatar database;
如第一头像数据未存储于头像数据库内,建立第一头像数据子库,将第一头像数据子库添加在所述头像数据库,将所有的第一头像数据子库内的数据按时间排序后输出搜索结果。If the first avatar data is not stored in the avatar database, the first avatar data sub-library is created, the first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is sorted by time. Output search results.
可选的,所述方法还包括:Optionally, the method further includes:
如所述第一头像数据存储于头像数据库内,则按时间将该第一头像数据对应的数据添加到第一头像数据子库内。If the first avatar data is stored in the avatar database, the data corresponding to the first avatar data is added to the first avatar data sub-bank by time.
可选的,所述方法还包括:Optionally, the method further includes:
监控系统将未包含头像的数据从数据搜索库中删除。The monitoring system deletes data that does not contain an avatar from the data search library.
第二方面,提供一种大数据搜索在安防监控中的应用装置,所述装置包括:In a second aspect, an application device for big data search in security monitoring is provided, and the device includes:
收发单元,用于接收用户输入的大数据搜索条件;a transceiver unit, configured to receive a big data search condition input by a user;
处理单元,用于将所有的视频数据中提取第一头像数据,将第一头像数据与已有的头像数据库比对;如第一头像数据未存储于头像数据库内,建立第一头像数据子库,将第一头像数据子库添加在所述头像数据库,将所有的第一头像数据子库内的数据按时间排序后输出搜索结果。The processing unit is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data sub-library is established. The first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is sorted by time, and the search result is output.
可选的,所述处理单元,还用于如所述第一头像数据存储于头像数据库内,则按时间将该第一头像数据对应的数据添加到第一头像数据子库内。Optionally, the processing unit is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-bank by time.
可选的,所述处理单元,用于将未包含头像的数据从数据搜索库中删除。Optionally, the processing unit is configured to delete data that does not include an avatar from the data search library.
第三方面,提供一种大数据搜索在安防监控中的应用设备,所述设备包括:处理器、收发器、存储器和总线,其中,处理器、收发器、存储器通过总线连接;A third aspect provides an application device for big data search in security monitoring, the device comprising: a processor, a transceiver, a memory, and a bus, wherein the processor, the transceiver, and the memory are connected by using a bus;
收发器,用于接收用户输入的大数据搜索条件。A transceiver for receiving a big data search condition input by a user.
处理器,用于将所有的视频数据中提取第一头像数据,将第一头像数据与已有的头像数据库比对;如第一头像数据未存储于头像数据库内,建立第一头像数据子库,将第一头像数据子库添加在所述头像数据库,将所有的第一头像数据子库内的数据按时间排序后输出搜索结果。The processor is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data sub-library is established. The first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is sorted by time, and the search result is output.
可选的,所述处理器,还用于如所述第一头像数据存储于头像数据库内,则按时间将该第一头像数据对应的数据添加到第一头像数据子库内。Optionally, the processor is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-bank by time.
可选的,所述处理器,用于将未包含头像的数据从数据搜索库中删除。Optionally, the processor is configured to delete data that does not include an avatar from the data search library.
有益效果Beneficial effect
本发明具体实施方式提供的技术方案具有满足目前安防监控数据搜索连续的优点。The technical solution provided by the specific embodiments of the present invention has the advantages of satisfying the current continuous search of security monitoring data.
附图说明DRAWINGS
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below. Obviously, the drawings in the following description are only It is a certain embodiment of the present invention, and other drawings can be obtained from those skilled in the art without any creative work.
图1为本发明提供的一种大数据搜索在安防监控中的应用方法的流程示意图。FIG. 1 is a schematic flowchart diagram of a method for applying big data search in security monitoring according to the present invention.
图2为本发明提供的一种大数据搜索在安防监控中的应用装置的结构示意图。FIG. 2 is a schematic structural diagram of an apparatus for applying big data search in security monitoring according to the present invention.
图3为本发明提供的一种大数据搜索在安防监控中的应用装置的结构示意图。FIG. 3 is a schematic structural diagram of an apparatus for applying big data search in security monitoring according to the present invention.
本发明的实施方式Embodiments of the invention
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, but not all embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
参阅图1,图1为本发明第一较佳实施方式提供的一种大数据搜索在安防监控中的应用方法,该方法由安防系统实现,该方法如图1所示,包括如下步骤:Referring to FIG. 1, FIG. 1 is a schematic diagram of a method for applying big data search in security monitoring according to a first preferred embodiment of the present invention. The method is implemented by a security system. The method is as shown in FIG. 1 and includes the following steps:
步骤S101、监控系统接收用户输入的大数据搜索条件。Step S101: The monitoring system receives a big data search condition input by the user.
步骤S102、监控系统将所有的视频数据中提取第一头像数据,将第一头像数据与已有的头像数据库比对。Step S102: The monitoring system extracts the first avatar data from all the video data, and compares the first avatar data with the existing avatar database.
步骤S103、如第一头像数据未存储于头像数据库内,建立第一头像数据子库,将第一头像数据子库添加在所述头像数据库,将所有的第一头像数据子库内的数据按时间排序后输出搜索结果。Step S103: If the first avatar data is not stored in the avatar database, the first avatar data sub-library is established, and the first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is pressed. The search results are output after the time is sorted.
本发明提供的技术方案能够依据相同的头像数据建立一个头像数据子库,然后再子库内按时间对头像数据进行排序,从而实现头像数据连续的优点。The technical solution provided by the invention can establish an avatar data sub-library according to the same avatar data, and then sort the avatar data by time in the sub-library, thereby realizing the advantage of continuous avatar data.
可选的,上述方法在步骤S103之后还可以包括:Optionally, after the step S103, the foregoing method may further include:
如所述第一头像数据存储于头像数据库内,则按时间将该第一头像数据对应的数据添加到第一头像数据子库内。If the first avatar data is stored in the avatar database, the data corresponding to the first avatar data is added to the first avatar data sub-bank by time.
可选的,上述方法在步骤S103之后还可以包括:Optionally, after the step S103, the foregoing method may further include:
监控系统将未包含头像的数据从数据搜索库中删除。The monitoring system deletes data that does not contain an avatar from the data search library.
参阅图2,图2为本发明第二较佳实施方式提供的一种大数据搜索在安防监控中的应用装置,该装置如图2所示,包括:Referring to FIG. 2, FIG. 2 is a schematic diagram of an apparatus for applying big data search in security monitoring according to a second preferred embodiment of the present invention.
收发单元201,用于接收用户输入的大数据搜索条件;The transceiver unit 201 is configured to receive a big data search condition input by the user;
处理单元202,用于将所有的视频数据中提取第一头像数据,将第一头像数据与已有的头像数据库比对;如第一头像数据未存储于头像数据库内,建立第一头像数据子库,将第一头像数据子库添加在所述头像数据库,将所有的第一头像数据子库内的数据按时间排序后输出搜索结果。The processing unit 202 is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data is created. The library adds the first avatar data sub-library to the avatar database, and sorts the data in all the first avatar data sub-libraries by time to output the search result.
可选的,所述处理单元202,还用于如所述第一头像数据存储于头像数据库内,则按时间将该第一头像数据对应的数据添加到第一头像数据子库内。Optionally, the processing unit 202 is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-bank by time.
可选的,所述处理单元202,用于将未包含头像的数据从数据搜索库中删除。Optionally, the processing unit 202 is configured to delete data that does not include an avatar from the data search library.
本发明还提供一种大数据搜索在安防监控中的应用设备30,所述设备包括:处理器301、收发器302、存储器303和总线304,其中,处理器、收发器、存储器通过总线连接;The present invention also provides an application device 30 for big data search in security monitoring, the device comprising: a processor 301, a transceiver 302, a memory 303 and a bus 304, wherein the processor, the transceiver, and the memory are connected by a bus;
收发器302,用于接收用户输入的大数据搜索条件。The transceiver 302 is configured to receive a big data search condition input by a user.
处理器301,用于将所有的视频数据中提取第一头像数据,将第一头像数据与已有的头像数据库比对;如第一头像数据未存储于头像数据库内,建立第一头像数据子库,将第一头像数据子库添加在所述头像数据库,将所有的第一头像数据子库内的数据按时间排序后输出搜索结果。The processor 301 is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data is created. The library adds the first avatar data sub-library to the avatar database, and sorts the data in all the first avatar data sub-libraries by time to output the search result.
可选的,所述处理器301,还用于如所述第一头像数据存储于头像数据库内,则按时间将该第一头像数据对应的数据添加到第一头像数据子库内。Optionally, the processor 301 is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-account by time.
可选的,所述处理器301,用于将未包含头像的数据从数据搜索库中删除。Optionally, the processor 301 is configured to delete data that does not include an avatar from the data search library.
需要说明的是,对于前述的各方法实施方式或实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为根据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述实施方式或实施例均属于优选实施例,所涉及的动作和单元并不一定是本发明所必须的。It should be noted that, for the foregoing method embodiments or embodiments, for the sake of simple description, they are all expressed as a series of action combinations, but those skilled in the art should know that the present invention is not subject to the described action sequence. Limitations, as certain steps may be performed in other sequences or concurrently in accordance with the present invention. In the following, those skilled in the art should also understand that the embodiments or examples described in the specification are preferred embodiments, and the actions and units involved are not necessarily required by the present invention.
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。In the above embodiments, the descriptions of the various embodiments are different, and the details that are not detailed in a certain embodiment can be referred to the related descriptions of other embodiments.
本发明实施例方法中的步骤可以根据实际需要进行顺序调整、合并和删减。The steps in the method of the embodiment of the present invention may be sequentially adjusted, merged, and deleted according to actual needs.
本发明实施例装置中的单元可以根据实际需要进行合并、划分和删减。本领域的技术人员可以将本说明书中描述的不同实施例以及不同实施例的特征进行结合或组合。The units in the apparatus of the embodiment of the present invention may be combined, divided, and deleted according to actual needs. Those skilled in the art can combine or combine the different embodiments described in the specification and the features of the different embodiments.
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到本发明可以用硬件实现,或固件实现,或它们的组合方式来实现。当使用软件实现时,可以将上述功能存储在计算机可读介质中或作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是计算机能够存取的任何可用介质。以此为例但不限于:计算机可读介质可以包括随机存取存储器(Random Access Memory,RAM)、只读存储器(Read-Only Memory,ROM)、电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质。此外。任何连接可以适当的成为计算机可读介质。例如,如果软件是使用同轴电缆、光纤光缆、双绞线、数字用户线(Digital Subscriber Line,DSL)或者诸如红外线、无线电和微波之类的无线技术从网站、服务器或者其他远程源传输的,那么同轴电缆、光纤光缆、双绞线、DSL或者诸如红外线、无线和微波之类的无线技术包括在所属介质的定影中。如本发明所使用的,盘(Disk)和碟(disc)包括压缩光碟(CD)、激光碟、光碟、数字通用光碟(DVD)、软盘和蓝光光碟,其中盘通常磁性的复制数据,而碟则用激光来光学的复制数据。上面的组合也应当包括在计算机可读介质的保护范围之内。Through the description of the above embodiments, those skilled in the art can clearly understand that the present invention can be implemented in hardware, firmware implementation, or a combination thereof. When implemented in software, the functions described above may be stored in or transmitted as one or more instructions or code on a computer readable medium. Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another. A storage medium may be any available media that can be accessed by a computer. Taking this as an example, but not limited to: the computer readable medium may include random access memory (Random) Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium. For example, if the software is using coaxial cable, fiber optic cable, twisted pair, digital subscriber line (Digital Subscriber Line, DSL) or wireless technology such as infrared, radio and microwave transmission from a website, server or other remote source, then coaxial cable, fiber optic cable, twisted pair, DSL or such as infrared, wireless and microwave Wireless technology is included in the fixing of the associated medium. As used in the present invention, a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.
总之,以上所述仅为本发明技术方案的较佳实施例而已,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。 In summary, the above description is only a preferred embodiment of the technical solution of the present invention, and is not intended to limit the scope of the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Claims (9)

  1. 一种大数据搜索在安防监控中的应用方法,其特征在于,所述方法包括如下步骤: A method for applying big data search in security monitoring, characterized in that the method comprises the following steps:
    监控系统接收用户输入的大数据搜索条件;The monitoring system receives the big data search condition input by the user;
    监控系统将所有的视频数据中提取第一头像数据,将第一头像数据与已有的头像数据库比对;The monitoring system extracts the first avatar data from all the video data, and compares the first avatar data with the existing avatar database;
    如第一头像数据未存储于头像数据库内,建立第一头像数据子库,将第一头像数据子库添加在所述头像数据库,将所有的第一头像数据子库内的数据按时间排序后输出搜索结果。If the first avatar data is not stored in the avatar database, the first avatar data sub-library is created, the first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is sorted by time. Output search results.
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 further comprising:
    如所述第一头像数据存储于头像数据库内,则按时间将该第一头像数据对应的数据添加到第一头像数据子库内。If the first avatar data is stored in the avatar database, the data corresponding to the first avatar data is added to the first avatar data sub-bank by time.
  3. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 further comprising:
    监控系统将未包含头像的数据从数据搜索库中删除。The monitoring system deletes data that does not contain an avatar from the data search library.
  4. 一种大数据搜索在安防监控中的应用装置,其特征在于,所述装置包括:An application device for big data search in security monitoring, characterized in that the device comprises:
    收发单元,用于接收用户输入的大数据搜索条件;a transceiver unit, configured to receive a big data search condition input by a user;
    处理单元,用于将所有的视频数据中提取第一头像数据,将第一头像数据与已有的头像数据库比对;如第一头像数据未存储于头像数据库内,建立第一头像数据子库,将第一头像数据子库添加在所述头像数据库,将所有的第一头像数据子库内的数据按时间排序后输出搜索结果。The processing unit is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data sub-library is established. The first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is sorted by time, and the search result is output.
  5. 根据权利要求4所述的装置,其特征在于,The device according to claim 4, characterized in that
    所述处理单元,还用于如所述第一头像数据存储于头像数据库内,则按时间将该第一头像数据对应的数据添加到第一头像数据子库内。The processing unit is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-bank by time.
  6. 根据权利要求4所述的装置,其特征在于,The device according to claim 4, characterized in that
    所述处理单元,用于将未包含头像的数据从数据搜索库中删除。The processing unit is configured to delete data that does not include an avatar from the data search library.
  7. 一种大数据搜索在安防监控中的应用设备,其特征在于,所述设备包括:处理器、收发器、存储器和总线,其中,处理器、收发器、存储器通过总线连接;An application device for large data search in security monitoring, characterized in that the device comprises: a processor, a transceiver, a memory and a bus, wherein the processor, the transceiver, and the memory are connected by a bus;
    收发器,用于接收用户输入的大数据搜索条件。A transceiver for receiving a big data search condition input by a user.
    处理器,用于将所有的视频数据中提取第一头像数据,将第一头像数据与已有的头像数据库比对;如第一头像数据未存储于头像数据库内,建立第一头像数据子库,将第一头像数据子库添加在所述头像数据库,将所有的第一头像数据子库内的数据按时间排序后输出搜索结果。The processor is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data sub-library is established. The first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is sorted by time, and the search result is output.
  8. 根据权利要求7所述的设备,其特征在于,The device according to claim 7, wherein
    所述收发器,还用于如所述第一头像数据存储于头像数据库内,则按时间将该第一头像数据对应的数据添加到第一头像数据子库内。The transceiver is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-bank by time.
  9. 根据权利要求7所述的设备,其特征在于,The device according to claim 7, wherein
    所述处理器,用于将未包含头像的数据从数据搜索库中删除。The processor is configured to delete data that does not include an avatar from a data search library.
PCT/CN2017/076277 2017-03-10 2017-03-10 Application method and apparatus for big data searching in security monitoring WO2018161339A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/076277 WO2018161339A1 (en) 2017-03-10 2017-03-10 Application method and apparatus for big data searching in security monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/076277 WO2018161339A1 (en) 2017-03-10 2017-03-10 Application method and apparatus for big data searching in security monitoring

Publications (1)

Publication Number Publication Date
WO2018161339A1 true WO2018161339A1 (en) 2018-09-13

Family

ID=63448103

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/076277 WO2018161339A1 (en) 2017-03-10 2017-03-10 Application method and apparatus for big data searching in security monitoring

Country Status (1)

Country Link
WO (1) WO2018161339A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114817265A (en) * 2022-04-28 2022-07-29 北京辰行科技有限公司 Financial information acquisition method using big data server

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1260934A2 (en) * 2001-05-22 2002-11-27 Matsushita Electric Industrial Co., Ltd. Surveillance recording device and method
CN102467659A (en) * 2010-11-16 2012-05-23 金奈科技股份有限公司 High-definition image type face identification and monitoring system
CN106254494A (en) * 2016-08-17 2016-12-21 浙江诚名智能工程有限公司 Artificial abortion's monitoring system
CN106331589A (en) * 2015-06-26 2017-01-11 神讯电脑(昆山)有限公司 Webcam system and remote monitoring method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1260934A2 (en) * 2001-05-22 2002-11-27 Matsushita Electric Industrial Co., Ltd. Surveillance recording device and method
CN102467659A (en) * 2010-11-16 2012-05-23 金奈科技股份有限公司 High-definition image type face identification and monitoring system
CN106331589A (en) * 2015-06-26 2017-01-11 神讯电脑(昆山)有限公司 Webcam system and remote monitoring method thereof
CN106254494A (en) * 2016-08-17 2016-12-21 浙江诚名智能工程有限公司 Artificial abortion's monitoring system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114817265A (en) * 2022-04-28 2022-07-29 北京辰行科技有限公司 Financial information acquisition method using big data server
CN114817265B (en) * 2022-04-28 2023-08-18 深圳市领航财富教育科技有限公司 Financial information acquisition method by utilizing big data server

Similar Documents

Publication Publication Date Title
WO2018218806A1 (en) Terminal privacy protection method and system
WO2018161339A1 (en) Application method and apparatus for big data searching in security monitoring
WO2018148958A1 (en) Data transmission method and device for security protection and monitoring
WO2018152670A1 (en) Big data management method and device for security monitoring
WO2018027557A1 (en) Wifi attendance record method and system in security
WO2018165863A1 (en) Data classification method and apparatus in safety and protection monitoring
WO2018152669A1 (en) Security control method and device for security monitoring
WO2018027576A1 (en) Method and system for collecting operating time in statistics in internet of things
WO2018035697A1 (en) Method and system for searching for house listings on internet
WO2018148957A1 (en) Method and device for applying big data in security protection system
WO2018161341A1 (en) Method and apparatus for implementing security monitoring on basis of cloud technology
WO2018148956A1 (en) Cloud backup method and system for security protection and monitoring
WO2018209646A1 (en) Smart household monitoring method and system
WO2018027577A1 (en) Application method and system for television application in internet of things
WO2018023710A1 (en) Secure playing method and system for video
WO2018027456A1 (en) Method and system for specifying application to be shared in big data
WO2018023711A1 (en) Real-time monitoring method and system in audio broadcasting network
WO2018027458A1 (en) Method and system for sharing big data in real time
WO2018205141A1 (en) Method and system for stitching and arranging video clips
WO2018023709A1 (en) Method and system for monitoring and prompting energy consumption in broadcast network
WO2018027457A1 (en) Method and system for sharing mobile big data
WO2018027470A1 (en) Method and system for sharing big data in wechat
WO2018027455A1 (en) Method and system for sharing big data in social network
WO2018027564A1 (en) Security-based split screen display method and system for video conference
WO2018023708A1 (en) Method and system for monitoring program in broadcast system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17899725

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22/01/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17899725

Country of ref document: EP

Kind code of ref document: A1