WO2018165863A1 - Procédé et appareil de classification de données en surveillance de sécurité et de protection - Google Patents

Procédé et appareil de classification de données en surveillance de sécurité et de protection Download PDF

Info

Publication number
WO2018165863A1
WO2018165863A1 PCT/CN2017/076636 CN2017076636W WO2018165863A1 WO 2018165863 A1 WO2018165863 A1 WO 2018165863A1 CN 2017076636 W CN2017076636 W CN 2017076636W WO 2018165863 A1 WO2018165863 A1 WO 2018165863A1
Authority
WO
WIPO (PCT)
Prior art keywords
avatar
avatar information
database
category
information
Prior art date
Application number
PCT/CN2017/076636
Other languages
English (en)
Chinese (zh)
Inventor
张北江
胡君健
Original Assignee
华平智慧信息技术(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华平智慧信息技术(深圳)有限公司 filed Critical 华平智慧信息技术(深圳)有限公司
Priority to PCT/CN2017/076636 priority Critical patent/WO2018165863A1/fr
Publication of WO2018165863A1 publication Critical patent/WO2018165863A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor

Definitions

  • the invention relates to the field of security, and in particular to a method and a device for classifying data in security monitoring.
  • the security monitoring system is a system that uses optical fibers, coaxial cables or microwaves to transmit video signals in its closed loop and from camera to image display and recording. It can reflect the monitored object in real time, image and reality. It can be used for long-term monitoring instead of manual in harsh environments and recorded by video recorder. At the same time, the alarm system equipment alarms for illegal intrusion.
  • a method for data classification in security monitoring is provided, which solves the inconvenience of the prior art when it is required to query a video file of big data.
  • a method for data classification in security monitoring comprising the steps of:
  • the monitoring system captures the first avatar information of the person in the video big data
  • the monitoring system compares the first avatar information with the existing avatar information in the avatar database
  • the video data including the first avatar information is classified into a security category
  • the video data corresponding to the first avatar information is classified into a category to be determined.
  • the method further includes:
  • the video data of the first avatar information is classified into a category to be determined.
  • the method further includes:
  • an apparatus for classifying data in security monitoring comprising:
  • a crawling unit configured to capture first avatar information of a character in the video big data
  • a processing unit configured to compare the first avatar information with the existing avatar information in the avatar database; if the first avatar information exists in the avatar database and occurs more than a set threshold, the method includes The video data of the first avatar information is classified into the security category; if the first avatar information does not exist in the avatar database, the video data corresponding to the first avatar information is classified into the to-be-determined category.
  • the processing unit is further configured to: if the first avatar information exists in the avatar database but the number of occurrences is less than a set threshold, classify the video data of the first avatar information to be determined. In the category.
  • the processing unit is configured to: when the first avatar information appears more than the set number of times, move all the video data corresponding to the first avatar information into the security category.
  • a third aspect provides a device for classifying data in security monitoring, the device comprising: a processor, a transceiver, a memory, and a bus, wherein the processor, the transceiver, and the memory are connected by using a bus;
  • a processor configured to capture first avatar information of a character in the video big data; compare the first avatar information with an existing avatar information in the avatar database; if the first avatar information exists in the avatar database If the number of occurrences is more than a set threshold, the video data including the first avatar information is classified into a security category; if the first avatar information does not exist in the avatar database, the first avatar information is The corresponding video data is classified into the category to be determined.
  • the processor is further configured to: if the first avatar information exists in the avatar database but the number of occurrences is less than a set threshold, classify the video data of the first avatar information to be determined. In the category.
  • the processor is configured to: when the first avatar information appears more than the set number of times, move all the video data corresponding to the first avatar information into the security category.
  • FIG. 1 is a schematic flowchart diagram of a method for data classification in security monitoring according to the present invention.
  • FIG. 2 is a schematic structural diagram of an apparatus for classifying data in security monitoring according to the present invention.
  • FIG. 3 is a schematic structural diagram of an apparatus for classifying data in security monitoring according to the present invention.
  • FIG. 1 is a method for data classification in security monitoring according to a first preferred embodiment of the present invention.
  • the method is implemented by a security system.
  • the method is as shown in FIG. 1 and includes the following steps:
  • Step S101 The monitoring system captures the first avatar information of the person in the video big data.
  • Step S102 The monitoring system compares the first avatar information with the existing avatar information in the avatar database.
  • Step S103 If the first avatar information exists in the avatar database and occurs more than a set threshold, the video data including the first avatar information is classified into a security category; If the information does not exist in the avatar database, the video data corresponding to the first avatar information is classified into a category to be determined.
  • the technical solution provided by the present invention can determine whether the data is to be confirmed according to the number of times the avatar data appears, because for big data, most of the data is known user data, and the data is safe at this time.
  • the data does not need to be searched at all, so it is necessary to distinguish between secure data and non-secure data, so it has the advantage of querying data.
  • the foregoing method may further include:
  • the video data of the first avatar information is classified into a category to be determined.
  • the foregoing method may further include:
  • FIG. 2 is a device for classifying data in security monitoring according to a second preferred embodiment of the present invention. As shown in FIG. 2, the device includes:
  • the capturing unit 201 is configured to capture first avatar information of a person in the video big data
  • the processing unit 202 is configured to compare the first avatar information with the existing avatar information in the avatar database; if the first avatar information exists in the avatar database and occurs more than a set threshold, the method includes The video data having the first avatar information is classified into the security category; if the first avatar information is not present in the avatar database, the video data corresponding to the first avatar information is classified into the to-be-determined category.
  • the processing unit 202 is further configured to: if the first avatar information exists in the avatar database but the number of occurrences is less than a set threshold, classify the video data of the first avatar information to be Determine the category.
  • the processing unit 202 is configured to: when the first avatar information appears more than the set number of times, move all the video data corresponding to the first avatar information into the security category.
  • the present invention also provides a device 30 for data classification in security monitoring, the device comprising: a processor 301, a transceiver 302, a memory 303 and a bus 304, wherein the processor, the transceiver, and the memory are connected by a bus;
  • the processor 301 is configured to capture first avatar information of a person in the video big data, and compare the first avatar information with existing avatar information in the avatar database; if the first avatar information exists in the avatar database If the number of occurrences is more than a set threshold, the video data including the first avatar information is classified into a security category; if the first avatar information does not exist in the avatar database, the first avatar is The video data corresponding to the information is classified into the category to be determined.
  • the processor 301 is further configured to: if the first avatar information exists in the avatar database but the number of occurrences is less than a set threshold, classify the video data of the first avatar information to be Determine the category.
  • the processor 301 is configured to: when the first avatar information appears more than the set number of times, move all the video data corresponding to the first avatar information into the security category.
  • Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
  • a storage medium may be any available media that can be accessed by a computer.
  • the computer readable medium may include random access memory (Random) Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium.
  • a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

L'invention concerne un procédé et un appareil de classification de données dans une surveillance de sécurité et de protection. Le procédé comprend les étapes suivantes : un système de surveillance capture des premières informations de portrait de tête d'une figure dans des mégadonnées vidéo (S101); le système de surveillance compare les premières informations de portrait de tête à des informations de portrait de tête existantes dans une base de données de portrait de tête (S102); et si les premières informations de portrait de tête existent dans la base de données de portrait de tête et que le nombre de fois d'apparition est supérieur à un seuil défini, classifier des données vidéo comprenant les premières informations de portrait de tête dans une catégorie de sécurité; et si les premières informations de portrait de tête n'existent pas dans la base de données de portrait de tête, classifier des données vidéo correspondant aux premières informations de portrait de tête dans une catégorie à déterminer (S103). Le procédé présente l'avantage de permettre à une requête de données d'être pratique.
PCT/CN2017/076636 2017-03-14 2017-03-14 Procédé et appareil de classification de données en surveillance de sécurité et de protection WO2018165863A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/076636 WO2018165863A1 (fr) 2017-03-14 2017-03-14 Procédé et appareil de classification de données en surveillance de sécurité et de protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/076636 WO2018165863A1 (fr) 2017-03-14 2017-03-14 Procédé et appareil de classification de données en surveillance de sécurité et de protection

Publications (1)

Publication Number Publication Date
WO2018165863A1 true WO2018165863A1 (fr) 2018-09-20

Family

ID=63523372

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/076636 WO2018165863A1 (fr) 2017-03-14 2017-03-14 Procédé et appareil de classification de données en surveillance de sécurité et de protection

Country Status (1)

Country Link
WO (1) WO2018165863A1 (fr)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050002561A1 (en) * 2003-07-02 2005-01-06 Lockheed Martin Corporation Scene analysis surveillance system
US20080080748A1 (en) * 2006-09-28 2008-04-03 Kabushiki Kaisha Toshiba Person recognition apparatus and person recognition method
CN104079877A (zh) * 2014-06-24 2014-10-01 海信集团有限公司 一种监控设备和安防监控方法及系统
CN105354902A (zh) * 2015-11-10 2016-02-24 深圳市商汤科技有限公司 一种基于人脸识别的安保管理方法及系统
CN106294011A (zh) * 2016-08-08 2017-01-04 马岩 分类式大数据存储方法及系统
CN106355154A (zh) * 2016-08-31 2017-01-25 上海依图网络科技有限公司 一种监控视频中检测频繁过人的方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050002561A1 (en) * 2003-07-02 2005-01-06 Lockheed Martin Corporation Scene analysis surveillance system
US20080080748A1 (en) * 2006-09-28 2008-04-03 Kabushiki Kaisha Toshiba Person recognition apparatus and person recognition method
CN104079877A (zh) * 2014-06-24 2014-10-01 海信集团有限公司 一种监控设备和安防监控方法及系统
CN105354902A (zh) * 2015-11-10 2016-02-24 深圳市商汤科技有限公司 一种基于人脸识别的安保管理方法及系统
CN106294011A (zh) * 2016-08-08 2017-01-04 马岩 分类式大数据存储方法及系统
CN106355154A (zh) * 2016-08-31 2017-01-25 上海依图网络科技有限公司 一种监控视频中检测频繁过人的方法

Similar Documents

Publication Publication Date Title
WO2018218806A1 (fr) Procédé et système de protection de la confidentialité d'un terminal
WO2017117715A1 (fr) Procédé et système de vérification de présence de système de surveillance
WO2018165863A1 (fr) Procédé et appareil de classification de données en surveillance de sécurité et de protection
WO2018161339A1 (fr) Procédé et appareil d'application pour la recherche de mégadonnées dans une surveillance de sécurité
WO2018035663A1 (fr) Procédé et système de détection de nourrisson pour housse de couette de l'internet des objets
WO2018148958A1 (fr) Procédé et dispositif de transmission de données destinés à la protection et la surveillance de sécurité
WO2018152670A1 (fr) Procédé et dispositif de gestion de mégadonnées pour surveillance de sécurité
WO2018152669A1 (fr) Procédé et dispositif de contrôle de sécurité permettant une surveillance de sécurité
WO2018027557A1 (fr) Procédé et système d'enregistrement de présence wi-fi en matière de sécurité
WO2018027702A1 (fr) Procédé et système d'attribution de fichiers sur des canaux de réseau double à des fins de sécurité et de surveillance
WO2018148957A1 (fr) Procédé et dispositif d'application de mégadonnées dans un système de protection de sécurité
WO2018209646A1 (fr) Procédé et système de surveillance de domicile intelligent
WO2018148956A1 (fr) Procédé et système de sauvegarde en nuage pour une protection et une surveillance de la sécurité
WO2018027703A1 (fr) Procédé et système de mise en œuvre de la surveillance de sécurité du canal de réseau double
WO2018161341A1 (fr) Procédé et appareil pour mettre en oeuvre une surveillance de sécurité sur la base d'une technologie en nuage
WO2018027698A1 (fr) Procédé et système de suivi de portrait de tête pour vidéoconférence de sécurité
WO2018027697A1 (fr) Procédé et système destinés à appliquer un procédé de recherche de cible audio dans une visioconférence de sécurité
WO2018027699A1 (fr) Procédé et système de transmission pour une visioconférence de sécurité dans un environnement à faible vitesse de réseau
WO2018027564A1 (fr) Procédé et système d'affichage d'écran partagé basés sur la sécurité pour une visioconférence
WO2018027563A1 (fr) Procédé et système d'insertion et de transmission de vidéo pour visioconférence
WO2018040028A1 (fr) Procédé et système de reconnaissance faciale dans une vidéo
WO2018027570A1 (fr) Procédé et système de transmission de fichier vidéo de vidéoconférence de sécurité à distance
WO2018027568A1 (fr) Procédé et système de transmission vidéo ultra haute définition pour une vidéoconférence dans un système de surveillance
WO2018027700A1 (fr) Procédé et système de transmission pour un environnement de réseau à grande vitesse
WO2018027567A1 (fr) Procédé et système d'affichage plein écran pour vidéoconférence de sécurité

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17900955

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 31/01/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17900955

Country of ref document: EP

Kind code of ref document: A1