WO2024022216A1 - Information processing method and apparatus, storage medium, and electronic device - Google Patents

Information processing method and apparatus, storage medium, and electronic device Download PDF

Info

Publication number
WO2024022216A1
WO2024022216A1 PCT/CN2023/108365 CN2023108365W WO2024022216A1 WO 2024022216 A1 WO2024022216 A1 WO 2024022216A1 CN 2023108365 W CN2023108365 W CN 2023108365W WO 2024022216 A1 WO2024022216 A1 WO 2024022216A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm
alarm information
level
abnormal behavior
information
Prior art date
Application number
PCT/CN2023/108365
Other languages
French (fr)
Chinese (zh)
Inventor
杨焱
孔岳
马明园
Original Assignee
京东方科技集团股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 京东方科技集团股份有限公司 filed Critical 京东方科技集团股份有限公司
Publication of WO2024022216A1 publication Critical patent/WO2024022216A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/20Movements or behaviour, e.g. gesture recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/764Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects

Definitions

  • the present disclosure relates to the field of computer technology, and specifically, to an information processing method, an information processing device, a computer-readable storage medium, and an electronic device.
  • Anomaly detection technology can automatically detect and alert abnormal behaviors such as intrusion and loitering by intelligently analyzing human behavior in monitoring scenarios, thereby enabling the monitoring system to proactively detect abnormalities.
  • alarms are usually eliminated manually in batches, which results in certain limitations in alarm elimination efficiency.
  • the present disclosure provides an information processing method, an information processing device, a computer-readable storage medium, and an electronic device.
  • the present disclosure provides an information processing method, including:
  • alarm information corresponding to the abnormal behavior is generated, including:
  • the current alarm level of the alarm information is the first level; and responding to the alarm information according to the alarm rule corresponding to the current alarm level includes:
  • the alarm information is automatically eliminated
  • the video data does not include video data related to the abnormal behavior handler, a reminder message is sent to the superior of the abnormal behavior handler.
  • the method further includes:
  • alarm information corresponding to each of the abnormal behaviors is generated.
  • the alarm information corresponding to each of the abnormal behaviors has different alarm levels. There is at least one abnormal behavior in each of the abnormal behaviors.
  • the alarm level of the corresponding alarm information is level one;
  • the alarm information corresponding to the multiple abnormal behaviors is automatically eliminated in batches.
  • the current alarm level of the alarm information is the second level; and responding to the alarm information according to the alarm rule corresponding to the current alarm level includes:
  • reminder information is sent to the abnormal behavior handler and the superior of the abnormal behavior handler.
  • the method before eliminating the alarm information within the second preset time period, the method further includes:
  • the pre-configuration can eliminate the alarm information of the target area and/or the alarm information of the abnormal target behavior in batches.
  • the current alarm level of the alarm information is the third level; and responding to the alarm information according to the alarm rule corresponding to the alarm level of the alarm information includes: :
  • the alarm information is stored in a database, and the alarm information is used for at least any one of data analysis, statistics, and hidden points.
  • the present disclosure is an information processing device, including:
  • the fire alarm rule configuration module is used to configure the mapping relationship between multiple abnormal behaviors and multiple alarm levels, and presets the fire alarm rules corresponding to each alarm level;
  • An alarm information generation module used to generate alarm information corresponding to the abnormal behavior when an abnormal behavior is detected in the target area
  • An alarm level determination module configured to determine the current alarm level of the alarm information according to the mapping relationship
  • An alarm information response module is configured to respond to the alarm information according to the alarm rules corresponding to the current alarm level.
  • the present disclosure provides a computer-readable storage medium on which a computer program is stored.
  • a computer program is stored on which a computer program is stored.
  • the computer program is executed by a processor, any one of the methods described above is implemented.
  • the present disclosure provides an electronic device, including: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform any of the above by executing the executable instructions. method described.
  • Figure 1 shows a schematic diagram of a system architecture to which information processing methods and devices according to embodiments of the present disclosure can be applied;
  • Figure 2 schematically shows a flow chart of an information processing method in an embodiment of the present disclosure
  • Figure 3 schematically shows a flow chart of alarm information processing according to an embodiment of the present disclosure
  • Figure 4 schematically shows a flow chart of another alarm information processing according to an embodiment of the present disclosure
  • Figure 5 schematically shows a flow chart of another information processing method in an embodiment of the present disclosure
  • Figure 6 schematically shows a block diagram of an information processing device according to an embodiment of the present disclosure
  • FIG. 7 schematically shows a structural diagram of an electronic device suitable for implementing embodiments of the present disclosure.
  • Example embodiments will now be described more fully with reference to the accompanying drawings.
  • Example embodiments may, however, be embodied in various forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concepts of the example embodiments.
  • the described features, structures or characteristics may be combined in any suitable manner in one or more embodiments.
  • numerous specific details are provided to provide a thorough understanding of embodiments of the disclosure.
  • those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details described, or other methods, components, devices, steps, etc. may be adopted.
  • well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the disclosure.
  • FIG. 1 shows a schematic diagram of the system architecture of an exemplary application environment in which an information processing method and apparatus according to embodiments of the present disclosure can be applied.
  • a system architecture 100 may include multiple camera devices 101 , a network 102 and a data processing device 103 .
  • the camera device 101 may be a surveillance camera installed in a public area/fixed area, and is used to collect on-site data in the public area/fixed area.
  • the data processing device 103 can be a terminal device, such as various electronic devices, including but not limited to desktop computers, portable computers, smart phones, tablets, etc.; the data processing device 103 can also be a server, or it can be composed of multiple servers.
  • the server cluster can also be a cloud computing platform or virtualization center.
  • the network 102 is used as a medium to provide a communication link between the camera device 101 and the data analysis device 103.
  • the network 102 may include various connection types, such as wired, wireless communication links, optical fiber cables, and so on.
  • the data processing device 103 can be used to: configure mapping relationships between multiple abnormal behaviors and multiple alarm levels, and preset alarm rules corresponding to each alarm level; when abnormal behaviors are detected in the target area when, generating alarm information corresponding to the abnormal behavior; determining the current alarm level of the alarm information according to the mapping relationship; and responding to the alarm information according to the alarm rule corresponding to the current alarm level.
  • the number of each device in Figure 1 is only exemplary, and there may be any number of camera devices 101, networks 102 and data processing devices 103 according to implementation requirements.
  • anomaly detection technology can be used to intelligently analyze human behavior in monitoring scenarios, so as to automatically detect and alert abnormal behaviors such as human intrusion and loitering, and realize the monitoring system's ability to proactively detect abnormalities.
  • alarms are usually eliminated manually in batches. Through manual processing, the alarm information may not be processed in a timely manner, thus reducing the alarm elimination efficiency.
  • the information processing method may include steps S210 to S240:
  • Step S210 Configure mapping relationships between multiple abnormal behaviors and multiple alarm levels, and preset alarm rules corresponding to each alarm level
  • Step S220 When an abnormal behavior is detected in the target area, generate alarm information corresponding to the abnormal behavior;
  • Step S230 Determine the current alarm level of the alarm information according to the mapping relationship
  • Step S240 Respond to the alarm information according to the alarm elimination rule corresponding to the current alarm level.
  • the information processing method provided by the exemplary embodiment of the present disclosure, by configuring the mapping relationship between multiple abnormal behaviors and multiple alarm levels, and presetting the alarm rules corresponding to each alarm level; when a target area is detected.
  • alarm information corresponding to the abnormal behavior is generated; the current alarm level of the alarm information is determined according to the mapping relationship; and the alarm information is responded to according to the alarm rule corresponding to the current alarm level.
  • the present disclosure improves the processing efficiency of alarm information by flexibly processing alarm information of different alarm levels.
  • step S210 mapping relationships between multiple abnormal behaviors and multiple alarm levels are configured, and alarm rules corresponding to each alarm level are preset.
  • mapping relationships between multiple abnormal behaviors and multiple alarm levels can be pre-configured, and alarm rules corresponding to each alarm level can be preset. It is understandable that in different scenarios, the alarm levels corresponding to a certain abnormal behavior may be different. For example, as shown in Table 1, multiple abnormal behaviors and alarms in a certain scenario are given.
  • the alarm levels may include at least three levels, namely the first level, the second level and the third level.
  • the first level is an emergency alarm
  • the second level is an important alarm
  • the third level is a general alarm.
  • the abnormal behavior personnel can be security personnel and other related staff; when the second-level alarm information is issued, the alarm situation is not urgent and abnormal.
  • the behavior handling personnel can arrive at the scene within the preset time on the day of the incident, or they can directly conduct online firefighting; when the third level of alarm information is issued, this level of alarm information does not require manual alarming, and only needs to be Alarm information is recorded.
  • the level of the alarm level can be flexibly defined, and this disclosure does not limit this.
  • corresponding fire alarm rules can also be set for a certain camera device. For example, after installing multiple camera devices around the park lake, all alarm information issued by each camera device in the area can be set to the first level. When the alarm information is issued, security personnel are required to arrive at the scene in time.
  • the corresponding alarm level is configured according to the urgency of the abnormal behavior, so that the abnormality handling personnel can prioritize the abnormal behavior with a higher degree of urgency.
  • the abnormality handling personnel can prioritize the abnormal behavior with a higher degree of urgency.
  • step S220 when an abnormal behavior is detected in the target area, alarm information corresponding to the abnormal behavior is generated.
  • the target area may be any area determined according to user needs, and at least one camera device is installed in the target area for acquiring video data or image data containing human behavior.
  • a museum needs to monitor in real time whether strangers enter the venue when it is not open, or it needs to monitor whether visitors have uncivilized behavior when the venue is open.
  • multiple partitions in the museum where camera devices are installed can be used as target areas.
  • the target area can be multiple partitions, or one of the multiple partitions. This disclosure does not limit this.
  • abnormal behavior can include illegal entry into the venue, loitering in the venue, etc.; when the museum is open, abnormal behavior can include moving exhibit items, smoking, fighting, etc., or other abnormal behaviors, which will not be discussed here. Limited one by one. It is understandable that different abnormal behaviors can be identified for different scenarios.
  • the video data of the target area collected in real time by the camera device installed in the target area can be obtained.
  • alarm information corresponding to the abnormal behavior can be generated.
  • the alarm information may at least include information such as the type of abnormal behavior, the time when the abnormal behavior occurs, the location where the abnormal behavior occurs, and the identification of the camera device.
  • the camera device can be deployed and controlled according to the actual needs of the user.
  • the camera device can be a smart camera, which can be used to capture images from a certain angle, or can be used to capture panoramic images in a target area, and extract each panoramic image.
  • the video data in the target area can be stored locally on the camera device, or the video data can be stored in a server, such as an AI (Artificial Intelligence) server or an edge server. wait.
  • a server such as an AI (Artificial Intelligence) server or an edge server.
  • the video data in the target area can be obtained in real time by pulling the stream. For example, you can pull existing video data from the AI server by specifying an address to analyze the video data.
  • the video data of the target area can be decomposed into image frames, and the image frames containing behavioral characteristics can be filtered out.
  • image frames containing behavioral characteristics By detecting image frames containing behavioral characteristics, it is possible to identify whether the image frames contain abnormal behaviors.
  • deep learning can be used to identify whether the video data contains abnormal behavior.
  • the historical abnormal behaviors acquired by the camera device in the area can be input into the behavior recognition model for training, and the behavioral characteristics in the image frames can be judged through the trained behavior recognition model.
  • the image frames to be identified can also be matched with images containing abnormal behaviors stored in the abnormal behavior library. If the matches are consistent, it indicates that the video data in the target area contains abnormal behaviors.
  • the target area is a certain area in the park, and the abnormal behaviors that need to be monitored in this area include at least trampling on the lawn, smoking, etc. Analyze the video data in this area. When it is detected that the video data contains smoking behavior, corresponding alarm information can be generated.
  • the alarm information may include Warning_Type: smoking, Time: 202062910, Warning_CamID: 10000001, etc.
  • the frequency of generating alarm information can be set according to user needs. For example, the alarm information can be generated once every minute or every 5 minutes. This disclosure does not make a specific limit.
  • abnormal behaviors occurring in the target area can be identified faster and more accurately.
  • corresponding alarm information can be generated based on the detected abnormal behavior, which facilitates abnormal behavior handling personnel to promptly clear alarms based on the alarm information, thereby improving alarm elimination efficiency.
  • step S230 the current alarm level of the alarm information is determined according to the mapping relationship.
  • the current alarm level of the alarm information can be determined according to the abnormal behavior type contained in the alarm information. For example, it is detected that the video data of the target area contains the behavior of falling into the lake, and the generated alarm information includes Warning_Type: drowning. From the mapping relationship between the preset abnormal behavior and the alarm level, it can be seen that the current warning level of the behavior of falling into the lake is the One level.
  • step S240 respond to the alarm information according to the alarm elimination rule corresponding to the current alarm level.
  • the first level alarm information may be processed according to steps S310 to S340.
  • Step S310 When receiving the image data that the abnormal behavior handler appears in the target area within the first preset time period, eliminate the alarm information.
  • the abnormal behavior handlers can be security personnel and other related staff
  • the first preset time period is the first class The alarm time corresponding to the level of alarm information, such as 10 minutes or 30 minutes, etc.
  • first-level alarm information abnormal behavior handling personnel are required to appear in the target area within the first preset time period to dispel the alarm. For example, you can submit abnormal behavior handling personnel to appear in the target area within the first preset time period. image data and eliminate the alarm information online.
  • Step S320 Obtain the video data of the target area within the first preset time period.
  • step S310 in addition to realizing online alarm removal by submitting the image data of the abnormal behavior handling personnel appearing in the target area within the first preset time period, the video of the target area within the first preset time period can also be obtained.
  • the data is used to analyze the video data to determine whether the abnormal behavior handling personnel arrived at the scene within the first preset time period, and to determine whether to eliminate the alarm information.
  • Step S330 If the video data includes video data related to the abnormal behavior handler, automatically eliminate the alarm information.
  • the alarm information can be automatically eliminated.
  • Step S340 If the video data does not include video data related to the abnormal behavior handler, send reminder information to the superior of the abnormal behavior handler.
  • the alarm level of the alarm information will be upgraded and the abnormal behavior handler will be informed. Send a reminder message to your superior to eliminate the alarm message in a timely manner.
  • security personnel need to arrive at the scene in time for emergency treatment. For example, if the first preset time period is 10 minutes, that is, after receiving the alarm, the security personnel Need to arrive at the scene within 10 minutes.
  • the alarm information is automatically eliminated. You can also submit pictures of security personnel arriving at the scene within 10 minutes of the incident on the day of the incident to eliminate the alarm information online. If the security personnel do not arrive at the scene within ten minutes after the incident, a reminder message will be sent to the security personnel's superior, such as by phone or text message. In addition, security personnel can also submit the reasons for not arriving at the scene online.
  • alarm information is generated and the system issues an alarm. If the abnormal behavior continues to occur within a certain period of time, you can configure the frequency of the camera device to send alarms. For example, the camera device can send an alarm once every minute. , to remind abnormal behavior handling personnel to arrive at the scene in time for emergency treatment, thereby ensuring firefighting efficiency.
  • alarm information corresponding to each abnormal behavior can be generated.
  • the alarm information corresponding to each abnormal behavior has different alarm levels.
  • the alarm level is level one.
  • the video data of the target area in the first preset time period can be obtained. If the video data contains video data related to the abnormal behavior handler, the alarm information corresponding to multiple abnormal behaviors will be automatically eliminated in batches.
  • the abnormal behaviors when a certain camera device generates multiple abnormal behavior alarms on the same day, at least one of the abnormal behaviors requires security personnel to arrive at the scene to deal with it. Other abnormal behaviors can be cleared online or without manual alarms, corresponding to The time for firefighting can be on the same day or within three days. This disclosure does not specifically limit this.
  • the video collected by the camera device can be analyzed in real time. If the video shows that security personnel have arrived at the scene, all alarm information that occurred before the security personnel arrived at the scene can be automatically eliminated. After security personnel arrive at the scene, they can also batch eliminate all alarm information that occurred before they arrived at the scene online.
  • the second level alarm information may be processed according to step S410 and step S420.
  • Step S410 Eliminate the alarm information within the second preset time period.
  • the second level of alarm information is an important alarm.
  • Alarm information with a lower urgency than the first level requires abnormal behavior handling personnel to arrive at the scene within the second preset time period for processing.
  • the second preset time period is the second level.
  • the alarm information corresponding to the fire alarm time such as the day of the incident or within three days of the incident, etc. Alternatively, you can also submit a picture of the abnormal behavior handling personnel arriving at the scene within the second preset time for online alarm.
  • Second-level alarm information you can pre-configure alarm information in the target area and/or alarm information about abnormal target behavior to be eliminated in batches. For example, you can set the alarm information corresponding to the camera devices installed in the target area to be eliminated in batches, or you can set the alarm information corresponding to a certain abnormal behavior to be eliminated in batches. For example, the alarm information corresponding to the trampling on the lawn can be eliminated in batches, further realizing the detection of abnormalities. Behavioral flexibility.
  • Step S420 If the alarm information is not eliminated within the second preset time period, send reminder information to the abnormal behavior handler and the superior of the abnormal behavior handler.
  • abnormal behavior handler fails to eliminate the alarm information within the second preset time period, feedback will be given to the abnormal behavior handler's superior, and a reminder message will be sent to the abnormal behavior handler and the abnormal behavior handler's superior to eliminate the alarm in a timely manner.
  • Alarm information For example, abnormal behavior handlers and their superiors can be reminded through system messages, phone calls, and text messages to ensure the efficiency of abnormal behavior handling.
  • the alarm information can be stored in the database.
  • This type of alarm information can be used for at least one of data analysis, statistics, burying, troubleshooting, etc., the third level
  • the alarm information does not require manual alarm elimination. For example, after detecting the abnormal behavior of employees playing with mobile phones during work and generating corresponding alarm information, the alarm information can be recorded without processing the abnormal behavior.
  • the stored alarm information can be used to analyze the company's Effective working hours of employees to facilitate enhanced management.
  • the alarm levels of abnormal behaviors, alarm information, and fire alarm rules are configured in advance. Abnormal behaviors with a higher degree of urgency can be prioritized, and flexible processing of multiple abnormal behaviors in different scenarios can be achieved. , which improves the processing efficiency of alarm information.
  • information processing may be performed according to steps S501 to S505.
  • Step S501 The camera obtains monitoring data. Obtain monitoring data in the target area through the cameras installed in the target area;
  • Step S502 Analyze the monitoring data. Analyze the surveillance data in the target area and filter out video data/image data containing behavioral characteristics;
  • Step S503 Determine whether there is abnormal behavior. Determine whether the video data/image data contains abnormal behavior according to the behavioral characteristics in the video data/image data. If the video data/image data contains abnormal behavior, execute the step Step S504, if the video data/image data does not contain abnormal behavior, jump back to step S501 to obtain the latest monitoring data in the target area;
  • Step S504. Generate alarm information.
  • the alarm information includes information such as the type of abnormal behavior, the time and location of the abnormal behavior, the identification of the camera, etc.;
  • Step S505 Perform alarm elimination processing.
  • the alarm level of the alarm information can be determined according to the abnormal behavior type in the alarm information, and the alarm processing can be performed according to the alarm rules that match the alarm level of the alarm information.
  • the information processing method provided by the exemplary embodiment of the present disclosure, by configuring the mapping relationship between multiple abnormal behaviors and multiple alarm levels, and presetting the alarm rules corresponding to each alarm level; when a target area is detected.
  • alarm information corresponding to the abnormal behavior is generated; the current alarm level of the alarm information is determined according to the mapping relationship; and the alarm information is responded to according to the alarm rule corresponding to the current alarm level.
  • the present disclosure improves the processing efficiency of alarm information by flexibly processing alarm information of different alarm levels.
  • an information processing device is also provided.
  • the device can be applied to a terminal device or a server.
  • the information processing device 600 may include an alarm rule configuration module 610, an alarm information generation module 620, an alarm level determination module 630, and an alarm information response module 640, wherein:
  • the alarm rule configuration module 610 is used to configure the mapping relationships between multiple abnormal behaviors and multiple alarm levels, and preset the alarm rules corresponding to each alarm level;
  • the alarm information generation module 620 is used to generate alarm information corresponding to the abnormal behavior when an abnormal behavior is detected in the target area;
  • Alarm level determination module 630 configured to determine the current alarm level of the alarm information according to the mapping relationship
  • the alarm information response module 640 is configured to respond to the alarm information according to the alarm elimination rules corresponding to the current alarm level.
  • the alarm information generation module 610 includes:
  • a video data acquisition submodule used to acquire video data of the target area collected in real time by a camera device installed in the target area;
  • An alarm information generation submodule is configured to generate alarm information corresponding to the abnormal behavior when it is detected that the video data in the target area contains abnormal behavior.
  • the current alarm level of the alarm information is the first level; the alarm information response module 630 includes:
  • a first response module for alarm information configured to eliminate the alarm information when receiving image data that an abnormal behavior handler appears in the target area within a first preset time period
  • the second response module for alarm information is used to obtain the video data of the target area within the first preset time period; if the video data contains video data related to the abnormal behavior handler, it is automatically eliminated The alarm information; if the video data does not include video data related to the abnormal behavior handler, then sending reminder information to the superior of the abnormal behavior handler.
  • the alarm information response module 630 also includes:
  • the third response module for alarm information is used to generate alarm information corresponding to each abnormal behavior when multiple abnormal behaviors occur in the target area.
  • the alarm information corresponding to each abnormal behavior has different alarm levels.
  • the alarm level of the alarm information corresponding to at least one of the abnormal behaviors is the first level; obtain the video data of the target area in the first preset time period; if the video data contains the abnormality
  • the video data related to the behavior processing personnel will automatically eliminate the alarm information corresponding to the multiple abnormal behaviors in batches.
  • the current alarm level of the alarm information is the second level; the alarm information response module 630 includes:
  • the fourth response module for alarm information is used to eliminate the alarm information within the second preset time period; if the alarm information is not eliminated within the second preset time period, notify the abnormal behavior handling personnel and The superior of the person handling the abnormal behavior sends a reminder message.
  • the fourth response module for alarm information includes:
  • a configuration module configured to pre-configure the alarm information of the target area and/or the alarm information of the target abnormal behavior to be eliminated in batches.
  • the current alarm level of the alarm information is the third level; the alarm information response module 630 includes:
  • the fifth response module for alarm information is used to store the alarm information in a database, and the alarm information is used for at least any one of data analysis, statistics, and hidden points.
  • Each module in the above device can be a general-purpose processor, including a central processing unit, a network processor, etc.; it can also be a digital signal processor, an application-specific integrated circuit, a field programmable gate array or other programmable logic devices, discrete gates or transistors Logic devices, discrete hardware components. Each module can also be implemented by software, firmware, etc. Each processor in the above device can be an independent processor or can be integrated together.
  • Exemplary embodiments of the present disclosure also provide a computer-readable storage medium on which a program product capable of implementing the method described above in this specification is stored.
  • various aspects of the present disclosure can also be implemented in the form of a program product, which includes program code.
  • the program product When the program product is run on an electronic device, the program code is used to cause the electronic device to execute the above-mentioned instructions in this specification.
  • the steps according to various exemplary embodiments of the present disclosure are described in the "Exemplary Methods" section.
  • the program product may take the form of a portable compact disk read-only memory (CD-ROM) and include the program code, and may be run on an electronic device, such as a personal computer.
  • CD-ROM portable compact disk read-only memory
  • the program product of the present disclosure is not limited thereto.
  • a readable storage medium may be any tangible medium containing or storing a program that can be instructed to execute a system, Devices or devices used or used in combination with them.
  • the Program Product may take the form of one or more readable media in any combination.
  • the readable medium may be a readable signal medium or a readable storage medium.
  • the readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device or device, or any combination thereof. More specific examples (non-exhaustive list) of readable storage media include: electrical connection with one or more conductors, portable disk, hard disk, random access memory (RAM), read only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
  • a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave carrying readable program code therein. Such propagated data signals may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the above.
  • a readable signal medium may also be any readable medium other than a readable storage medium that can send, propagate, or transport the program for use by or in connection with an instruction execution system, apparatus, or device.
  • Program code embodied on a readable medium may be transmitted using any suitable medium, including but not limited to wireless, wireline, optical cable, RF, etc., or any suitable combination of the foregoing.
  • Program code for performing the operations of the present disclosure may be written in any combination of one or more programming languages, including object-oriented programming languages such as Java, C++, etc., as well as conventional procedural programming. Language—such as "C” or a similar programming language.
  • the program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server execute on.
  • the remote computing device may be connected to the user computing device through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computing device, such as provided by an Internet service. (business comes via Internet connection).
  • LAN local area network
  • WAN wide area network
  • Exemplary embodiments of the present disclosure also provide an electronic device capable of implementing the above method.
  • An electronic device 700 according to such an exemplary embodiment of the present disclosure is described below with reference to FIG. 7 .
  • the electronic device 700 shown in FIG. 7 is only an example and should not bring any limitations to the functions and scope of use of the embodiments of the present disclosure.
  • electronic device 700 may take the form of a general-purpose computing device.
  • the components of the electronic device 700 may include, but are not limited to: at least one processing unit 710, at least one storage unit 720, a bus 730 connecting different system components (including the storage unit 720 and the processing unit 710), and a display unit 740.
  • the storage unit 720 stores program code, and the program code can be executed by the processing unit 710, so that the processing unit 710 performs the steps according to various exemplary embodiments of the present disclosure described in the above-mentioned "Example Method" section of this specification.
  • the processing unit 710 may perform any one or more method steps in FIGS. 2 to 5 .
  • the storage unit 720 may include a readable medium in the form of a volatile storage unit, such as a random access storage unit (RAM) 721 and/or a cache storage unit 722, and may further include a read-only storage unit (ROM) 723.
  • RAM random access storage unit
  • ROM read-only storage unit
  • Storage unit 720 may also include a program/utility 724 having a set of (at least one) program modules 725 including, but not limited to: an operating system, one or more application programs, other program modules, and and program data, each of these examples or some combination may include an implementation of a network environment.
  • program/utility 724 having a set of (at least one) program modules 725 including, but not limited to: an operating system, one or more application programs, other program modules, and and program data, each of these examples or some combination may include an implementation of a network environment.
  • Bus 730 may be a local area representing one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, a graphics acceleration port, a processing unit, or using any of a variety of bus structures. bus.
  • Electronic device 700 may also communicate with one or more external devices 800 (e.g., keyboard, pointing device, Bluetooth device, etc.), may also communicate with one or more devices that enable a user to interact with electronic device 700, and/or with Any device (eg, router, modem, etc.) that enables the electronic device 700 to communicate with one or more other computing devices. This communication may occur through input/output (I/O) interface 750.
  • the electronic device 700 may also communicate with one or more networks (eg, a local area network (LAN), a wide area network (WAN), and/or a public network, such as the Internet) through the network adapter 760. As shown in FIG. 7 , network adapter 760 communicates with other modules of electronic device 700 through bus 730 .
  • network adapter 760 communicates with other modules of electronic device 700 through bus 730 .
  • the example embodiments described here can be implemented by software, or can be implemented by software combined with necessary hardware. Therefore, the technical solution according to the embodiment of the present disclosure can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, U disk, mobile hard disk, etc.) or on the network , including several instructions to cause a computing device (which may be a personal computer, a server, a terminal device, a network device, etc.) to execute a method according to an exemplary embodiment of the present disclosure.
  • a computing device which may be a personal computer, a server, a terminal device, a network device, etc.

Abstract

The present disclosure relates to the technical field of computers. Provided are an information processing method and apparatus, a storage medium, and an electronic device. The method comprises: configuring a mapping relationship between multiple abnormal behaviors and multiple alarm levels, and presetting an alarm disposal rule corresponding to each alarm level; when it is detected that abnormal behavior occurs in a target area, generating alarm information corresponding to the abnormal behavior; determining the current alarm level of the alarm information according to the mapping relationship; and responding to the alarm information according to the alarm disposal rule corresponding to the current alarm level. In the present disclosure, alarm information of different alarm levels is flexibly processed, such that the processing efficiency of the alarm information is improved. (FIG. 2)

Description

信息处理方法、装置、存储介质及电子设备Information processing methods, devices, storage media and electronic equipment
交叉引用cross reference
本申请要求于2022年07月25日提交的申请号为202210878034.5、名称为“信息处理方法、装置、存储介质及电子设备”的中国专利申请的优先权,该中国专利申请的全部内容通过引用全部并入全文。This application claims priority to the Chinese patent application with application number 202210878034.5 and titled "Information processing method, device, storage medium and electronic equipment" submitted on July 25, 2022. The entire content of this Chinese patent application is fully incorporated by reference. Incorporated into full text.
技术领域Technical field
本公开涉及计算机技术领域,具体而言,涉及一种信息处理方法、信息处理装置、计算机可读存储介质以及电子设备。The present disclosure relates to the field of computer technology, and specifically, to an information processing method, an information processing device, a computer-readable storage medium, and an electronic device.
背景技术Background technique
随着摄像监控设备在公共区域的广泛部署,基于视频监控数据的智能化监测已经成为公共安全领域不可或缺的常态化监控方法。With the widespread deployment of camera surveillance equipment in public areas, intelligent monitoring based on video surveillance data has become an indispensable normalized monitoring method in the field of public security.
异常检测技术可通过对监控场景下的人员行为进行智能化分析,从而自动发现并报警人员入侵、徘徊逗留等异常行为,实现监控系统主动发现异常的能力。目前,在实际应用中,监测到大量告警信息后,通常是通过人工批量消警,使得消警效率存在一定的局限性。Anomaly detection technology can automatically detect and alert abnormal behaviors such as intrusion and loitering by intelligently analyzing human behavior in monitoring scenarios, thereby enabling the monitoring system to proactively detect abnormalities. At present, in practical applications, after a large amount of alarm information is detected, alarms are usually eliminated manually in batches, which results in certain limitations in alarm elimination efficiency.
需要说明的是,在上述背景技术部分公开的信息仅用于加强对本公开的背景的理解,因此可以包括不构成对本领域普通技术人员已知的现有技术的信息。It should be noted that the information disclosed in the above background section is only used to enhance understanding of the background of the present disclosure, and therefore may include information that does not constitute prior art known to those of ordinary skill in the art.
发明内容Contents of the invention
本公开提供一种信息处理方法、信息处理装置、计算机可读存储介质以及电子设备。The present disclosure provides an information processing method, an information processing device, a computer-readable storage medium, and an electronic device.
本公开提供一种信息处理方法,包括:The present disclosure provides an information processing method, including:
配置多个异常行为与多个告警等级之间的映射关系,并预设各告警等级对应的消警规则;Configure the mapping relationship between multiple abnormal behaviors and multiple alarm levels, and preset the alarm rules corresponding to each alarm level;
当检测到目标区域内有异常行为发生时,生成所述异常行为对应的告警信息;When an abnormal behavior is detected in the target area, alarm information corresponding to the abnormal behavior is generated;
根据所述映射关系确定所述告警信息的当前告警等级;Determine the current alarm level of the alarm information according to the mapping relationship;
根据所述当前告警等级对应的消警规则对所述告警信息进行响应。Respond to the alarm information according to the alarm elimination rules corresponding to the current alarm level.
在本公开的一种示例性实施例中,所述当检测到目标区域内有异常行为发生时,生成所述异常行为对应的告警信息,包括:In an exemplary embodiment of the present disclosure, when an abnormal behavior is detected in the target area, alarm information corresponding to the abnormal behavior is generated, including:
获取所述目标区域内设置的摄像装置实时采集的所述目标区域的视频数据;Obtain video data of the target area collected in real time by a camera device installed in the target area;
当检测到所述目标区域内的视频数据中包含异常行为时,生成所述异常行为对应的告警信息。When it is detected that the video data in the target area contains abnormal behavior, alarm information corresponding to the abnormal behavior is generated.
在本公开的一种示例性实施例中,所述告警信息的当前告警等级为第一等级;所述根据所述当前告警等级对应的消警规则对所述告警信息进行响应,包括:In an exemplary embodiment of the present disclosure, the current alarm level of the alarm information is the first level; and responding to the alarm information according to the alarm rule corresponding to the current alarm level includes:
接收到异常行为处理人员在第一预设时间段内出现在所述目标区域内的图像数据时, 消除所述告警信息;或者,When receiving the image data that the abnormal behavior handler appears in the target area within the first preset time period, Eliminate the alarm information; or,
获取所述目标区域在所述第一预设时间段内的视频数据;Obtain video data of the target area within the first preset time period;
若所述视频数据中包含与所述异常行为处理人员相关的视频数据,则自动消除所述告警信息;If the video data contains video data related to the abnormal behavior handler, the alarm information is automatically eliminated;
若所述视频数据中未包含与所述异常行为处理人员相关的视频数据,则向所述异常行为处理人员的上级发送提醒信息。If the video data does not include video data related to the abnormal behavior handler, a reminder message is sent to the superior of the abnormal behavior handler.
在本公开的一种示例性实施例中,所述方法还包括:In an exemplary embodiment of the present disclosure, the method further includes:
当所述目标区域内有多个异常行为发生时,生成各所述异常行为对应的告警信息,各所述异常行为对应的告警信息的告警等级不同,各所述异常行为中至少有一个异常行为对应的告警信息的告警等级为第一等级;When multiple abnormal behaviors occur in the target area, alarm information corresponding to each of the abnormal behaviors is generated. The alarm information corresponding to each of the abnormal behaviors has different alarm levels. There is at least one abnormal behavior in each of the abnormal behaviors. The alarm level of the corresponding alarm information is level one;
获取所述目标区域在所述第一预设时间段的视频数据;Obtain video data of the target area in the first preset time period;
若所述视频数据中包含与所述异常行为处理人员相关的视频数据,则自动批量消除所述多个异常行为对应的告警信息。If the video data includes video data related to the abnormal behavior handler, the alarm information corresponding to the multiple abnormal behaviors is automatically eliminated in batches.
在本公开的一种示例性实施例中,所述告警信息的当前告警等级为第二等级;所述根据所述当前告警等级对应的消警规则对所述告警信息进行响应,包括:In an exemplary embodiment of the present disclosure, the current alarm level of the alarm information is the second level; and responding to the alarm information according to the alarm rule corresponding to the current alarm level includes:
在第二预设时间段内消除所述告警信息;Eliminate the alarm information within the second preset time period;
若在所述第二预设时间段内未消除所述告警信息,则向所述异常行为处理人员和所述异常行为处理人员的上级发送提醒信息。If the alarm information is not eliminated within the second preset time period, reminder information is sent to the abnormal behavior handler and the superior of the abnormal behavior handler.
在本公开的一种示例性实施例中,在第二预设时间段内消除所述告警信息前,所述方法还包括:In an exemplary embodiment of the present disclosure, before eliminating the alarm information within the second preset time period, the method further includes:
预先配置可将所述目标区域的告警信息和/或目标异常行为的告警信息进行批量消除。The pre-configuration can eliminate the alarm information of the target area and/or the alarm information of the abnormal target behavior in batches.
在本公开的一种示例性实施例中,所述告警信息的当前告警等级为第三等级;所述根据所述告警信息的告警等级对应的消警规则,对所述告警信息进行响应,包括:In an exemplary embodiment of the present disclosure, the current alarm level of the alarm information is the third level; and responding to the alarm information according to the alarm rule corresponding to the alarm level of the alarm information includes: :
将所述告警信息存储至数据库中,所述告警信息用于数据分析、统计、埋点中的至少任一项。The alarm information is stored in a database, and the alarm information is used for at least any one of data analysis, statistics, and hidden points.
本公开一种信息处理装置,包括:The present disclosure is an information processing device, including:
消警规则配置模块,用于配置多个异常行为与多个告警等级之间的映射关系,并预设各告警等级对应的消警规则;The fire alarm rule configuration module is used to configure the mapping relationship between multiple abnormal behaviors and multiple alarm levels, and presets the fire alarm rules corresponding to each alarm level;
告警信息生成模块,用于当检测到目标区域内有异常行为发生时,生成所述异常行为对应的告警信息;An alarm information generation module, used to generate alarm information corresponding to the abnormal behavior when an abnormal behavior is detected in the target area;
告警等级确定模块,用于根据所述映射关系确定所述告警信息的当前告警等级;An alarm level determination module, configured to determine the current alarm level of the alarm information according to the mapping relationship;
告警信息响应模块,用于根据所述当前告警等级对应的消警规则对所述告警信息进行响应。An alarm information response module is configured to respond to the alarm information according to the alarm rules corresponding to the current alarm level.
本公开提供一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现上述任意一项所述的方法。 The present disclosure provides a computer-readable storage medium on which a computer program is stored. When the computer program is executed by a processor, any one of the methods described above is implemented.
本公开提供一种电子设备,包括:处理器;以及存储器,用于存储所述处理器的可执行指令;其中,所述处理器配置为经由执行所述可执行指令来执行上述任意一项所述的方法。The present disclosure provides an electronic device, including: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform any of the above by executing the executable instructions. method described.
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。It should be understood that the foregoing general description and the following detailed description are exemplary and explanatory only, and do not limit the present disclosure.
附图说明Description of drawings
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。显而易见地,下面描述中的附图仅仅是本公开的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure. Obviously, the drawings in the following description are only some embodiments of the present disclosure. For those of ordinary skill in the art, other drawings can be obtained based on these drawings without exerting creative efforts.
图1示出了可以应用本公开实施例的信息处理方法及装置的系统架构示意图;Figure 1 shows a schematic diagram of a system architecture to which information processing methods and devices according to embodiments of the present disclosure can be applied;
图2示意性示出了本公开实施例中一种信息处理方法的流程图;Figure 2 schematically shows a flow chart of an information processing method in an embodiment of the present disclosure;
图3示意性示出了根据本公开实施例中一种告警信息处理的流程图;Figure 3 schematically shows a flow chart of alarm information processing according to an embodiment of the present disclosure;
图4示意性示出了根据本公开实施例中另一种告警信息处理的流程图;Figure 4 schematically shows a flow chart of another alarm information processing according to an embodiment of the present disclosure;
图5示意性示出了本公开实施例中的另一种信息处理方法的流程图;Figure 5 schematically shows a flow chart of another information processing method in an embodiment of the present disclosure;
图6示意性示出了根据本公开实施例中的一种信息处理装置的框图;Figure 6 schematically shows a block diagram of an information processing device according to an embodiment of the present disclosure;
图7示意性示出了适于用来实现本公开实施例的电子设备的结构示意图。FIG. 7 schematically shows a structural diagram of an electronic device suitable for implementing embodiments of the present disclosure.
具体实施方式Detailed ways
现在将参考附图更全面地描述示例实施方式。然而,示例实施方式能够以多种形式实施,且不应被理解为限于在此阐述的范例;相反,提供这些实施方式使得本公开将更加全面和完整,并将示例实施方式的构思全面地传达给本领域的技术人员。所描述的特征、结构或特性可以以任何合适的方式结合在一个或更多实施方式中。在下面的描述中,提供许多具体细节从而给出对本公开的实施方式的充分理解。然而,本领域技术人员将意识到,可以实践本公开的技术方案而省略所述特定细节中的一个或更多,或者可以采用其它的方法、组元、装置、步骤等。在其它情况下,不详细示出或描述公知技术方案以避免喧宾夺主而使得本公开的各方面变得模糊。Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in various forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concepts of the example embodiments. To those skilled in the art. The described features, structures or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to provide a thorough understanding of embodiments of the disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details described, or other methods, components, devices, steps, etc. may be adopted. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the disclosure.
此外,附图仅为本公开的示意性图解,并非一定是按比例绘制。图中相同的附图标记表示相同或类似的部分,因而将省略对它们的重复描述。附图中所示的一些方框图是功能实体,不一定必须与物理或逻辑上独立的实体相对应。可以采用软件形式来实现这些功能实体,或在一个或多个硬件模块或集成电路中实现这些功能实体,或在不同网络和/或处理器装置和/或微控制器装置中实现这些功能实体。Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings represent the same or similar parts, and thus their repeated description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in software form, or implemented in one or more hardware modules or integrated circuits, or implemented in different networks and/or processor devices and/or microcontroller devices.
图1示出了可以应用本公开实施例的一种信息处理方法及装置的示例性应用环境的系统架构的示意图。FIG. 1 shows a schematic diagram of the system architecture of an exemplary application environment in which an information processing method and apparatus according to embodiments of the present disclosure can be applied.
如图1所示,系统架构100可以包括多个摄像装置101、网络102和数据处理设备103。 摄像装置101可以是设置在公共区域/固定区域的监控摄像头,用于采集公共区域/固定区域的现场数据。数据处理设备103可以是终端设备,如各种电子设备,包括但不限于台式计算机、便携式计算机、智能手机和平板电脑等等;数据处理设备103也可以是一个服务器,也可以是多个服务器组成的服务器集群,还可以是云计算平台或者虚拟化中心。网络102用以摄像装置101与数据分析设备103之间提供通信链路的介质,网络102可以包括各种连接类型,例如有线、无线通信链路或者光纤电缆等等。具体地,数据处理设备103可以用于执行:配置多个异常行为与多个告警等级之间的映射关系,并预设各告警等级对应的消警规则;当检测到目标区域内有异常行为发生时,生成所述异常行为对应的告警信息;根据所述映射关系确定所述告警信息的当前告警等级;根据所述当前告警等级对应的消警规则对所述告警信息进行响应。应该理解,图1中各装置的数目仅仅是示例性的,根据实现需要,可以具有任意数目的摄像装置101、网络102和数据处理设备103。As shown in FIG. 1 , a system architecture 100 may include multiple camera devices 101 , a network 102 and a data processing device 103 . The camera device 101 may be a surveillance camera installed in a public area/fixed area, and is used to collect on-site data in the public area/fixed area. The data processing device 103 can be a terminal device, such as various electronic devices, including but not limited to desktop computers, portable computers, smart phones, tablets, etc.; the data processing device 103 can also be a server, or it can be composed of multiple servers. The server cluster can also be a cloud computing platform or virtualization center. The network 102 is used as a medium to provide a communication link between the camera device 101 and the data analysis device 103. The network 102 may include various connection types, such as wired, wireless communication links, optical fiber cables, and so on. Specifically, the data processing device 103 can be used to: configure mapping relationships between multiple abnormal behaviors and multiple alarm levels, and preset alarm rules corresponding to each alarm level; when abnormal behaviors are detected in the target area when, generating alarm information corresponding to the abnormal behavior; determining the current alarm level of the alarm information according to the mapping relationship; and responding to the alarm information according to the alarm rule corresponding to the current alarm level. It should be understood that the number of each device in Figure 1 is only exemplary, and there may be any number of camera devices 101, networks 102 and data processing devices 103 according to implementation requirements.
以下对本公开实施例的技术方案进行详细阐述:The technical solutions of the embodiments of the present disclosure are described in detail below:
目前,可以通过异常检测技术对监控场景下的人员行为进行智能化分析,从而自动发现并报警人员入侵、徘徊逗留等异常行为,实现监控系统主动发现异常的能力。目前,在实际应用中,监测到大量告警信息后,通常是通过人工批量消警,通过人工处理可能会存在告警信息处理不及时的情况,从而降低了消警效率。At present, anomaly detection technology can be used to intelligently analyze human behavior in monitoring scenarios, so as to automatically detect and alert abnormal behaviors such as human intrusion and loitering, and realize the monitoring system's ability to proactively detect abnormalities. At present, in practical applications, after a large amount of alarm information is detected, alarms are usually eliminated manually in batches. Through manual processing, the alarm information may not be processed in a timely manner, thus reducing the alarm elimination efficiency.
基于上述一个或多个问题,本示例实施方式提供了一种信息处理方法,参考图2所示,该信息处理方法可以包括步骤S210至步骤S240:Based on one or more of the above problems, this example implementation provides an information processing method. Referring to Figure 2, the information processing method may include steps S210 to S240:
步骤S210.配置多个异常行为与多个告警等级之间的映射关系,并预设各告警等级对应的消警规则;Step S210. Configure mapping relationships between multiple abnormal behaviors and multiple alarm levels, and preset alarm rules corresponding to each alarm level;
步骤S220.当检测到目标区域内有异常行为发生时,生成所述异常行为对应的告警信息;Step S220. When an abnormal behavior is detected in the target area, generate alarm information corresponding to the abnormal behavior;
步骤S230.根据所述映射关系确定所述告警信息的当前告警等级;Step S230. Determine the current alarm level of the alarm information according to the mapping relationship;
步骤S240.根据所述当前告警等级对应的消警规则对所述告警信息进行响应。Step S240. Respond to the alarm information according to the alarm elimination rule corresponding to the current alarm level.
在本公开示例实施方式所提供的信息处理方法中,通过配置多个异常行为与多个告警等级之间的映射关系,并预设各告警等级对应的消警规则;当检测到目标区域内有异常行为发生时,生成所述异常行为对应的告警信息;根据所述映射关系确定所述告警信息的当前告警等级;根据所述当前告警等级对应的消警规则对所述告警信息进行响应。本公开通过对不同告警等级的告警信息进行灵活处理,提高了告警信息的处理效率。In the information processing method provided by the exemplary embodiment of the present disclosure, by configuring the mapping relationship between multiple abnormal behaviors and multiple alarm levels, and presetting the alarm rules corresponding to each alarm level; when a target area is detected. When abnormal behavior occurs, alarm information corresponding to the abnormal behavior is generated; the current alarm level of the alarm information is determined according to the mapping relationship; and the alarm information is responded to according to the alarm rule corresponding to the current alarm level. The present disclosure improves the processing efficiency of alarm information by flexibly processing alarm information of different alarm levels.
下面,对于本示例实施方式的上述步骤进行更加详细的说明。Below, the above-mentioned steps of this exemplary embodiment will be described in more detail.
在步骤S210中,配置多个异常行为与多个告警等级之间的映射关系,并预设各告警等级对应的消警规则。In step S210, mapping relationships between multiple abnormal behaviors and multiple alarm levels are configured, and alarm rules corresponding to each alarm level are preset.
本公开示例实施方式中,可以预先配置多个异常行为与多个告警等级之间的映射关系,并预设各告警等级对应的消警规则。可以理解的是,在不同场景下,某一异常行为对应的告警等级可能不同。示例性的,如表1所示,给出了某一场景中的多个异常行为与告警等 级之间的映射关系,以及每个告警等级对应的消警规则。其中,告警等级可以至少包括三个等级,分别为第一等级、第二等级和第三等级,且第一等级为紧急告警,第二等级为重要告警,第三等级为一般告警。当发出第一等级的告警信息时,需要异常行为处理人员及时到达现场进行紧急处理,异常行为人员可以是安保人员等相关工作人员;当发出第二等级的告警信息时,告警情况不紧迫,异常行为处理人员在预设时间内如事发当天到达现场即可,也可以直接进行线上消警;当发出第三等级的告警信息时,该等级的告警信息不需要人工消警,只需将告警信息进行记录。其他示例中,可以灵活地定义告警等级的级别,本公开对此不做限定。In the exemplary embodiment of the present disclosure, mapping relationships between multiple abnormal behaviors and multiple alarm levels can be pre-configured, and alarm rules corresponding to each alarm level can be preset. It is understandable that in different scenarios, the alarm levels corresponding to a certain abnormal behavior may be different. For example, as shown in Table 1, multiple abnormal behaviors and alarms in a certain scenario are given. The mapping relationship between levels, and the alarm rules corresponding to each alarm level. The alarm levels may include at least three levels, namely the first level, the second level and the third level. The first level is an emergency alarm, the second level is an important alarm, and the third level is a general alarm. When the first-level alarm information is issued, abnormal behavior handling personnel need to arrive at the scene in time for emergency treatment. The abnormal behavior personnel can be security personnel and other related staff; when the second-level alarm information is issued, the alarm situation is not urgent and abnormal. The behavior handling personnel can arrive at the scene within the preset time on the day of the incident, or they can directly conduct online firefighting; when the third level of alarm information is issued, this level of alarm information does not require manual alarming, and only needs to be Alarm information is recorded. In other examples, the level of the alarm level can be flexibly defined, and this disclosure does not limit this.
表1
Table 1
另外,除了根据异常行为的类型设置对应的消警规则外,也可以针对某一摄像装置设置对应的消警规则。例如,在公园湖边周围安装多个摄像装置后,可以将该区域内每个摄像装置发出的所有告警信息均设置为第一等级,当发出告警信息后,需要安保人员及时到达现场。In addition, in addition to setting corresponding fire alarm rules according to the type of abnormal behavior, corresponding fire alarm rules can also be set for a certain camera device. For example, after installing multiple camera devices around the park lake, all alarm information issued by each camera device in the area can be set to the first level. When the alarm information is issued, security personnel are required to arrive at the scene in time.
该示例中,根据异常行为的紧急程度配置了对应的告警等级,便于异常处理人员对紧急程度较高的异常行为进行优先处理,在保证消警效率的基础上,实现了对不同场景下的多种异常行为的灵活处理,提高了用户的服务质量。In this example, the corresponding alarm level is configured according to the urgency of the abnormal behavior, so that the abnormality handling personnel can prioritize the abnormal behavior with a higher degree of urgency. On the basis of ensuring the efficiency of firefighting, it is possible to implement multiple alarms in different scenarios. Flexible handling of abnormal behaviors improves user service quality.
在步骤S220中,当检测到目标区域内有异常行为发生时,生成所述异常行为对应的告警信息。In step S220, when an abnormal behavior is detected in the target area, alarm information corresponding to the abnormal behavior is generated.
其中,目标区域可以是根据用户需求确定的任意区域,该目标区域内安装有至少一个摄像装置,用于获取包含人员行为的视频数据或图像数据。举例而言,某博物馆在场馆未开放时,需要实时监控是否有陌生人员进入场馆内,或者,当场馆开放时,需要监控参观人员是否有不文明行为等。对应的,可以将博物馆内安装有摄像装置的多个分区作为目标区域,目标区域可以是多个分区,也可以是多个分区中的一个分区,本公开对此不做限定。博物馆未开放时,异常行为可以是违规进入场馆、场馆内徘徊逗留等行为;博物馆开放时,异常行为可以是移动展览物品、抽烟、打架斗殴等行为,也可以是其他异常行为,在此不做一一限定。可以理解的是,可以针对不同的场景认定不同的异常行为。The target area may be any area determined according to user needs, and at least one camera device is installed in the target area for acquiring video data or image data containing human behavior. For example, a museum needs to monitor in real time whether strangers enter the venue when it is not open, or it needs to monitor whether visitors have uncivilized behavior when the venue is open. Correspondingly, multiple partitions in the museum where camera devices are installed can be used as target areas. The target area can be multiple partitions, or one of the multiple partitions. This disclosure does not limit this. When the museum is not open, abnormal behavior can include illegal entry into the venue, loitering in the venue, etc.; when the museum is open, abnormal behavior can include moving exhibit items, smoking, fighting, etc., or other abnormal behaviors, which will not be discussed here. Limited one by one. It is understandable that different abnormal behaviors can be identified for different scenarios.
示例性的,可以获取目标区域内设置的摄像装置实时采集的目标区域的视频数据,当检测到目标区域内的视频数据中包含异常行为时,可以生成异常行为对应的告警信息,告 警信息可以至少包括异常行为类型、异常行为发生时间、异常行为发生地点、摄像装置标识等信息。其中,可以根据用户的实际需求对摄像装置进行布控。例如,摄像装置可以是智能摄像头,可以用于拍摄某一角度下的画面,也可以用于拍摄目标区域内的全景画面,并对每个全景画面进行提取。通过目标区域的摄像装置采集到该目标区域内的视频数据后,可以将视频数据存储在摄像装置本地,也可以将视频数据存储至服务器中,如AI(Artificial Intelligence,人工智能)服务器、边缘服务器等。进一步的,可以通过拉流实时获取该目标区域内的视频数据。例如,可以通过指定地址拉取AI服务器中已有的视频数据,以对视频数据进行分析。For example, the video data of the target area collected in real time by the camera device installed in the target area can be obtained. When it is detected that the video data in the target area contains abnormal behavior, alarm information corresponding to the abnormal behavior can be generated. The alarm information may at least include information such as the type of abnormal behavior, the time when the abnormal behavior occurs, the location where the abnormal behavior occurs, and the identification of the camera device. Among them, the camera device can be deployed and controlled according to the actual needs of the user. For example, the camera device can be a smart camera, which can be used to capture images from a certain angle, or can be used to capture panoramic images in a target area, and extract each panoramic image. After the video data in the target area is collected through the camera device in the target area, the video data can be stored locally on the camera device, or the video data can be stored in a server, such as an AI (Artificial Intelligence) server or an edge server. wait. Furthermore, the video data in the target area can be obtained in real time by pulling the stream. For example, you can pull existing video data from the AI server by specifying an address to analyze the video data.
获取目标区域的视频数据后,可以将目标区域的视频数据分解为图像帧,并筛选出包含行为特征的图像帧。通过对包含行为特征的图像帧进行检测,以识别该图像帧中是否包含异常行为。本公开示例中,可以通过深度学习的方式识别视频数据中是否包含异常行为。例如,可以将该区域摄像装置获取的历史异常行为输入行为识别模型中进行训练,通过训练好的行为识别模型对图像帧中的行为特征进行判断。也可以将待识别的图像帧与异常行为库中存储的包含异常行为的图像进行匹配,若匹配一致,则表明目标区域内的视频数据中包含异常行为。After obtaining the video data of the target area, the video data of the target area can be decomposed into image frames, and the image frames containing behavioral characteristics can be filtered out. By detecting image frames containing behavioral characteristics, it is possible to identify whether the image frames contain abnormal behaviors. In this public example, deep learning can be used to identify whether the video data contains abnormal behavior. For example, the historical abnormal behaviors acquired by the camera device in the area can be input into the behavior recognition model for training, and the behavioral characteristics in the image frames can be judged through the trained behavior recognition model. The image frames to be identified can also be matched with images containing abnormal behaviors stored in the abnormal behavior library. If the matches are consistent, it indicates that the video data in the target area contains abnormal behaviors.
举例而言,目标区域为公园内的某一区域,针对该区域需要监测的异常行为至少包括践踏草坪、抽烟等行为。对该区域的视频数据进行分析,当检测到视频数据中包含抽烟行为时,可以生成对应的告警信息。例如,告警信息中可以包括Warnning_Type:smoking、Time:202062910、Warnning_CamID:10000001等。需要说明的是,可以根据用户需求设置生成告警信息的频率,例如,可以每分钟生成一次告警信息,也可以每5分钟生成一次告警信息,本公开不做具体限定。For example, the target area is a certain area in the park, and the abnormal behaviors that need to be monitored in this area include at least trampling on the lawn, smoking, etc. Analyze the video data in this area. When it is detected that the video data contains smoking behavior, corresponding alarm information can be generated. For example, the alarm information may include Warning_Type: smoking, Time: 202062910, Warning_CamID: 10000001, etc. It should be noted that the frequency of generating alarm information can be set according to user needs. For example, the alarm information can be generated once every minute or every 5 minutes. This disclosure does not make a specific limit.
该示例中,通过对目标区域内的视频数据进行实时分析,可以更快更准确的识别出目标区域内发生的异常行为。进一步的,可以根据检测到的异常行为生成对应的告警信息,便于异常行为处理人员根据告警信息及时消警,提高了消警效率。In this example, through real-time analysis of video data in the target area, abnormal behaviors occurring in the target area can be identified faster and more accurately. Furthermore, corresponding alarm information can be generated based on the detected abnormal behavior, which facilitates abnormal behavior handling personnel to promptly clear alarms based on the alarm information, thereby improving alarm elimination efficiency.
在步骤S230中,根据所述映射关系确定所述告警信息的当前告警等级。In step S230, the current alarm level of the alarm information is determined according to the mapping relationship.
示例性的,可以根据告警信息中包含的异常行为类型确定该告警信息的当前告警等级。例如,检测到目标区域的视频数据中包含湖面落水行为,生成的告警信息中包括Warnning_Type:drowning,由预设的异常行为与告警等级之间的映射关系可知,湖面落水行为的当前告警等级为第一等级。For example, the current alarm level of the alarm information can be determined according to the abnormal behavior type contained in the alarm information. For example, it is detected that the video data of the target area contains the behavior of falling into the lake, and the generated alarm information includes Warning_Type: drowning. From the mapping relationship between the preset abnormal behavior and the alarm level, it can be seen that the current warning level of the behavior of falling into the lake is the One level.
在步骤S240中,根据所述当前告警等级对应的消警规则对所述告警信息进行响应。In step S240, respond to the alarm information according to the alarm elimination rule corresponding to the current alarm level.
当确定告警信息的当前告警等级为第一等级时,参考图3所示,可以根据步骤S310至步骤S340对第一等级的告警信息进行处理。When it is determined that the current alarm level of the alarm information is the first level, with reference to FIG. 3 , the first level alarm information may be processed according to steps S310 to S340.
步骤S310.接收到异常行为处理人员在第一预设时间段内出现在所述目标区域内的图像数据时,消除所述告警信息。Step S310. When receiving the image data that the abnormal behavior handler appears in the target area within the first preset time period, eliminate the alarm information.
其中,异常行为处理人员可以是安保人员等相关工作人员,第一预设时间段为第一等 级的告警信息对应的消警时间,如10分钟或30分钟等。对于第一等级的告警信息,需要异常行为处理人员在第一预设时间段内出现在目标区域内消警,例如,可以提交异常行为处理人员在第一预设时间段内出现在目标区域内的图像数据,线上消除该告警信息。Among them, the abnormal behavior handlers can be security personnel and other related staff, and the first preset time period is the first class The alarm time corresponding to the level of alarm information, such as 10 minutes or 30 minutes, etc. For first-level alarm information, abnormal behavior handling personnel are required to appear in the target area within the first preset time period to dispel the alarm. For example, you can submit abnormal behavior handling personnel to appear in the target area within the first preset time period. image data and eliminate the alarm information online.
步骤S320.获取所述目标区域在所述第一预设时间段内的视频数据。Step S320. Obtain the video data of the target area within the first preset time period.
如步骤S310,可以通过提交异常行为处理人员在第一预设时间段内出现在目标区域内的图像数据,实现线上消警外,还可以获取目标区域在第一预设时间段内的视频数据,以通过对视频数据进行分析,确定异常行为处理人员是否在第一预设时间段内到达现场,进行判断是否消除该告警信息。As shown in step S310, in addition to realizing online alarm removal by submitting the image data of the abnormal behavior handling personnel appearing in the target area within the first preset time period, the video of the target area within the first preset time period can also be obtained. The data is used to analyze the video data to determine whether the abnormal behavior handling personnel arrived at the scene within the first preset time period, and to determine whether to eliminate the alarm information.
步骤S330.若所述视频数据中包含与所述异常行为处理人员相关的视频数据,则自动消除所述告警信息。Step S330. If the video data includes video data related to the abnormal behavior handler, automatically eliminate the alarm information.
对该目标区域的视频数据进行分析后,若视频数据包括异常行为处理人员在第一预设时间段内到达目标区域,并进行处理的视频数据,则可以自动消除该告警信息。After analyzing the video data of the target area, if the video data includes video data in which the abnormal behavior handler arrived at the target area and processed it within the first preset time period, the alarm information can be automatically eliminated.
步骤S340.若所述视频数据中未包含与所述异常行为处理人员相关的视频数据,则向所述异常行为处理人员的上级发送提醒信息。Step S340. If the video data does not include video data related to the abnormal behavior handler, send reminder information to the superior of the abnormal behavior handler.
对该目标区域的视频数据进行分析后,若视频数据未包括异常行为处理人员在第一预设时间段内到达目标区域的视频数据,则升级该告警信息的告警等级,并向异常行为处理人员的上级发送提醒信息,以及时消除该告警信息。After analyzing the video data of the target area, if the video data does not include the video data of the abnormal behavior handler arriving at the target area within the first preset time period, the alarm level of the alarm information will be upgraded and the abnormal behavior handler will be informed. Send a reminder message to your superior to eliminate the alarm message in a timely manner.
举例而言,当检测到湖面落水行为,并生成第一等级的告警信息时,需要安保人员及时到达现场进行紧急处理,如第一预设时间段为10分钟,即接收到告警后,安保人员需要在10分钟内到达现场。当现场采集到的视频显示安保人员在事发后10分钟内到达现场时,自动消除该告警信息。也可以在事发当天提交安保人员在事发后10分钟内到达现场的图片,线上消除该告警信息。若安保人员在事发后十分钟内未到达现场,则向安保人员的上级发送提醒信息,如以电话或短信的方式进行提醒。另外,安保人员还可以通过线上提交未到达现场的原因。For example, when a falling into the lake is detected and a first-level alarm message is generated, security personnel need to arrive at the scene in time for emergency treatment. For example, if the first preset time period is 10 minutes, that is, after receiving the alarm, the security personnel Need to arrive at the scene within 10 minutes. When the video collected at the scene shows that security personnel arrived at the scene within 10 minutes after the incident, the alarm information is automatically eliminated. You can also submit pictures of security personnel arriving at the scene within 10 minutes of the incident on the day of the incident to eliminate the alarm information online. If the security personnel do not arrive at the scene within ten minutes after the incident, a reminder message will be sent to the security personnel's superior, such as by phone or text message. In addition, security personnel can also submit the reasons for not arriving at the scene online.
该示例中,当异常行为发生时,生成告警信息,同时系统发出告警,若异常行为在某一时间段内持续发生,则可以配置摄像装置发出告警的频率,如摄像装置可以每分钟发出一次告警,以提醒异常行为处理人员及时到达现场进行紧急处理,从而保证消警效率。In this example, when abnormal behavior occurs, alarm information is generated and the system issues an alarm. If the abnormal behavior continues to occur within a certain period of time, you can configure the frequency of the camera device to send alarms. For example, the camera device can send an alarm once every minute. , to remind abnormal behavior handling personnel to arrive at the scene in time for emergency treatment, thereby ensuring firefighting efficiency.
当目标区域内有多个异常行为发生时,可以生成各异常行为对应的告警信息,其中,各异常行为对应的告警信息的告警等级不同,各异常行为中至少有一个异常行为对应的告警信息的告警等级为第一等级。可以获取目标区域在第一预设时间段的视频数据,若视频数据中包含与异常行为处理人员相关的视频数据,则自动批量消除多个异常行为对应的告警信息。When multiple abnormal behaviors occur in the target area, alarm information corresponding to each abnormal behavior can be generated. The alarm information corresponding to each abnormal behavior has different alarm levels. There is at least one alarm information corresponding to the abnormal behavior in each abnormal behavior. The alarm level is level one. The video data of the target area in the first preset time period can be obtained. If the video data contains video data related to the abnormal behavior handler, the alarm information corresponding to multiple abnormal behaviors will be automatically eliminated in batches.
举例而言,某一个摄像装置在同一天内发生多个异常行为告警时,其中,至少有一个异常行为需要安保人员到达现场进行处理,其他异常行为可以通过线上消警或者无需人工消警,对应的消警时间可以是当天消警,也可以是三天内消警,本公开对此不做具体限定。 可以对该摄像装置采集到的视频进行实时分析,若视频显示安保人员已到达现场,则可以自动消除安保人员到达现场前发生的所有告警信息。安保人员到达现场后,也可以通过线上批量消除其到达现场前发生的所有告警信息。For example, when a certain camera device generates multiple abnormal behavior alarms on the same day, at least one of the abnormal behaviors requires security personnel to arrive at the scene to deal with it. Other abnormal behaviors can be cleared online or without manual alarms, corresponding to The time for firefighting can be on the same day or within three days. This disclosure does not specifically limit this. The video collected by the camera device can be analyzed in real time. If the video shows that security personnel have arrived at the scene, all alarm information that occurred before the security personnel arrived at the scene can be automatically eliminated. After security personnel arrive at the scene, they can also batch eliminate all alarm information that occurred before they arrived at the scene online.
当确定告警信息的当前告警等级为第二等级时,参考图4所示,可以根据步骤S410和步骤S420对第二等级的告警信息进行处理。When it is determined that the current alarm level of the alarm information is the second level, with reference to FIG. 4 , the second level alarm information may be processed according to step S410 and step S420.
步骤S410.在第二预设时间段内消除所述告警信息。Step S410. Eliminate the alarm information within the second preset time period.
第二等级的告警信息为重要告警,紧急程度低于第一等级的告警信息,要求异常行为处理人员在第二预设时间段内到达现场处理即可,第二预设时间段为第二等级的告警信息对应的消警时间,如事发当天或事发三天内等。或者,也可以通过提交异常行为处理人员在第二预设时间内到达现场的图片进行线上消警。The second level of alarm information is an important alarm. Alarm information with a lower urgency than the first level requires abnormal behavior handling personnel to arrive at the scene within the second preset time period for processing. The second preset time period is the second level. The alarm information corresponding to the fire alarm time, such as the day of the incident or within three days of the incident, etc. Alternatively, you can also submit a picture of the abnormal behavior handling personnel arriving at the scene within the second preset time for online alarm.
对于第二等级的告警信息,可以预先配置可将目标区域的告警信息和/或目标异常行为的告警信息进行批量消除。例如,可以设置目标区域安装的摄像装置对应的告警信息可以批量消除,也可以设置某一异常行为对应的告警信息可以批量消除,如可以将践踏草坪对应的告警信息批量消除,进一步实现了对异常行为的灵活处理。For second-level alarm information, you can pre-configure alarm information in the target area and/or alarm information about abnormal target behavior to be eliminated in batches. For example, you can set the alarm information corresponding to the camera devices installed in the target area to be eliminated in batches, or you can set the alarm information corresponding to a certain abnormal behavior to be eliminated in batches. For example, the alarm information corresponding to the trampling on the lawn can be eliminated in batches, further realizing the detection of abnormalities. Behavioral flexibility.
步骤S420.若在所述第二预设时间段内未消除所述告警信息,则向所述异常行为处理人员和所述异常行为处理人员的上级发送提醒信息。Step S420. If the alarm information is not eliminated within the second preset time period, send reminder information to the abnormal behavior handler and the superior of the abnormal behavior handler.
若异常行为处理人员未在第二预设时间段内消除告警信息,则会向异常行为处理人员的上级反馈,并向异常行为处理人员以及异常行为处理人员的上级发送提醒信息,以及时消除该告警信息。例如,可以以系统消息、电话、短信的方式提醒异常行为处理人员以及异常行为处理人员的上级,以保证异常行为处理的效率。If the abnormal behavior handler fails to eliminate the alarm information within the second preset time period, feedback will be given to the abnormal behavior handler's superior, and a reminder message will be sent to the abnormal behavior handler and the abnormal behavior handler's superior to eliminate the alarm in a timely manner. Alarm information. For example, abnormal behavior handlers and their superiors can be reminded through system messages, phone calls, and text messages to ensure the efficiency of abnormal behavior handling.
当确定告警信息的当前告警等级为第三等级时,可以将告警信息存储至数据库中,该类型的告警信息可以用于数据分析、统计、埋点、排查等中的至少一项,第三等级的告警信息不需要人工消警。举例而言,检测到员工在上班期间玩手机的异常行为,并生成对应的告警信息后,可以将告警信息进行记录,无需对该异常行为进行处理,例如,存储的告警信息可以用来分析公司员工的有效工作时间,以便于加强管理。When it is determined that the current alarm level of the alarm information is the third level, the alarm information can be stored in the database. This type of alarm information can be used for at least one of data analysis, statistics, burying, troubleshooting, etc., the third level The alarm information does not require manual alarm elimination. For example, after detecting the abnormal behavior of employees playing with mobile phones during work and generating corresponding alarm information, the alarm information can be recorded without processing the abnormal behavior. For example, the stored alarm information can be used to analyze the company's Effective working hours of employees to facilitate enhanced management.
本公开示例中,预先对异常行为、告警信息的告警等级和消警规则进行了配置,可以对紧急程度较高的异常行为进行优先处理,实现了对不同场景下的多种异常行为的灵活处理,提高了告警信息的处理效率。In this public example, the alarm levels of abnormal behaviors, alarm information, and fire alarm rules are configured in advance. Abnormal behaviors with a higher degree of urgency can be prioritized, and flexible processing of multiple abnormal behaviors in different scenarios can be achieved. , which improves the processing efficiency of alarm information.
一种示例实施方式中,参考图5所示,可以根据步骤S501至步骤S505进行信息处理。In an example implementation, referring to FIG. 5 , information processing may be performed according to steps S501 to S505.
步骤S501.摄像头获取监控数据。通过目标区域安装的摄像头获取目标区域内的监控数据;Step S501. The camera obtains monitoring data. Obtain monitoring data in the target area through the cameras installed in the target area;
步骤S502.对监控数据进行分析。对目标区域内的监控数据进行分析,筛选出包含行为特征的视频数据/图像数据;Step S502. Analyze the monitoring data. Analyze the surveillance data in the target area and filter out video data/image data containing behavioral characteristics;
步骤S503.判断是否有异常行为。根据视频数据/图像数据中的行为特征判断该视频数据/图像数据中是否包含有异常行为,若该视频数据/图像数据中包含有异常行为,则执行步 骤S504,若该视频数据/图像数据中未包含有异常行为,则跳回步骤S501,获取该目标区域内的最新监控数据;Step S503. Determine whether there is abnormal behavior. Determine whether the video data/image data contains abnormal behavior according to the behavioral characteristics in the video data/image data. If the video data/image data contains abnormal behavior, execute the step Step S504, if the video data/image data does not contain abnormal behavior, jump back to step S501 to obtain the latest monitoring data in the target area;
步骤S504.生成告警信息。当获取的视频数据/图像数据中包含有异常行为时,生成对应的告警信息,告警信息中包括异常行为类型、异常行为发生时间和地点、该摄像头的标识等信息;Step S504. Generate alarm information. When the acquired video data/image data contains abnormal behavior, corresponding alarm information is generated. The alarm information includes information such as the type of abnormal behavior, the time and location of the abnormal behavior, the identification of the camera, etc.;
步骤S505.进行消警处理。可以根据告警信息中的异常行为类型确定该告警信息的告警等级,并根据与该告警信息的告警等级匹配的消警规则进行消警处理。Step S505: Perform alarm elimination processing. The alarm level of the alarm information can be determined according to the abnormal behavior type in the alarm information, and the alarm processing can be performed according to the alarm rules that match the alarm level of the alarm information.
在本公开示例实施方式所提供的信息处理方法中,通过配置多个异常行为与多个告警等级之间的映射关系,并预设各告警等级对应的消警规则;当检测到目标区域内有异常行为发生时,生成所述异常行为对应的告警信息;根据所述映射关系确定所述告警信息的当前告警等级;根据所述当前告警等级对应的消警规则对所述告警信息进行响应。本公开通过对不同告警等级的告警信息进行灵活处理,提高了告警信息的处理效率。In the information processing method provided by the exemplary embodiment of the present disclosure, by configuring the mapping relationship between multiple abnormal behaviors and multiple alarm levels, and presetting the alarm rules corresponding to each alarm level; when a target area is detected. When abnormal behavior occurs, alarm information corresponding to the abnormal behavior is generated; the current alarm level of the alarm information is determined according to the mapping relationship; and the alarm information is responded to according to the alarm rule corresponding to the current alarm level. The present disclosure improves the processing efficiency of alarm information by flexibly processing alarm information of different alarm levels.
应当注意,尽管在附图中以特定顺序描述了本公开中方法的各个步骤,但是,这并非要求或者暗示必须按照该特定顺序来执行这些步骤,或是必须执行全部所示的步骤才能实现期望的结果。附加的或备选的,可以省略某些步骤,将多个步骤合并为一个步骤执行,以及/或者将一个步骤分解为多个步骤执行等。It should be noted that although various steps of the methods of the present disclosure are depicted in a specific order in the drawings, this does not require or imply that these steps must be performed in that specific order, or that all of the illustrated steps must be performed to achieve the desired results. the result of. Additionally or alternatively, certain steps may be omitted, multiple steps may be combined into one step for execution, and/or one step may be decomposed into multiple steps for execution, etc.
进一步的,本示例实施方式中,还提供了一种信息处理装置。该装置可以应用于一终端设备或服务器。参考图6所示,该信息处理装置600可以包括消警规则配置模块610、告警信息生成模块620、告警等级确定模块630和告警信息响应模块640,其中:Further, in this exemplary embodiment, an information processing device is also provided. The device can be applied to a terminal device or a server. Referring to Figure 6, the information processing device 600 may include an alarm rule configuration module 610, an alarm information generation module 620, an alarm level determination module 630, and an alarm information response module 640, wherein:
消警规则配置模块610,用于配置多个异常行为与多个告警等级之间的映射关系,并预设各告警等级对应的消警规则;The alarm rule configuration module 610 is used to configure the mapping relationships between multiple abnormal behaviors and multiple alarm levels, and preset the alarm rules corresponding to each alarm level;
告警信息生成模块620,用于当检测到目标区域内有异常行为发生时,生成所述异常行为对应的告警信息;The alarm information generation module 620 is used to generate alarm information corresponding to the abnormal behavior when an abnormal behavior is detected in the target area;
告警等级确定模块630,用于根据所述映射关系确定所述告警信息的当前告警等级;Alarm level determination module 630, configured to determine the current alarm level of the alarm information according to the mapping relationship;
告警信息响应模块640,用于根据所述当前告警等级对应的消警规则对所述告警信息进行响应。The alarm information response module 640 is configured to respond to the alarm information according to the alarm elimination rules corresponding to the current alarm level.
在一种可选的实施方式中,告警信息生成模块610包括:In an optional implementation, the alarm information generation module 610 includes:
视频数据获取子模块,用于获取所述目标区域内设置的摄像装置实时采集的所述目标区域的视频数据;A video data acquisition submodule, used to acquire video data of the target area collected in real time by a camera device installed in the target area;
告警信息生成子模块,用于当检测到所述目标区域内的视频数据中包含异常行为时,生成所述异常行为对应的告警信息。An alarm information generation submodule is configured to generate alarm information corresponding to the abnormal behavior when it is detected that the video data in the target area contains abnormal behavior.
在一种可选的实施方式中,所述告警信息的当前告警等级为第一等级;告警信息响应模块630包括:In an optional implementation, the current alarm level of the alarm information is the first level; the alarm information response module 630 includes:
告警信息第一响应模块,用于接收到异常行为处理人员在第一预设时间段内出现在所述目标区域内的图像数据时,消除所述告警信息; A first response module for alarm information, configured to eliminate the alarm information when receiving image data that an abnormal behavior handler appears in the target area within a first preset time period;
告警信息第二响应模块,用于获取所述目标区域在所述第一预设时间段内的视频数据;若所述视频数据中包含与所述异常行为处理人员相关的视频数据,则自动消除所述告警信息;若所述视频数据中未包含与所述异常行为处理人员相关的视频数据,则向所述异常行为处理人员的上级发送提醒信息。The second response module for alarm information is used to obtain the video data of the target area within the first preset time period; if the video data contains video data related to the abnormal behavior handler, it is automatically eliminated The alarm information; if the video data does not include video data related to the abnormal behavior handler, then sending reminder information to the superior of the abnormal behavior handler.
在一种可选的实施方式中,告警信息响应模块630还包括:In an optional implementation, the alarm information response module 630 also includes:
告警信息第三响应模块,用于当所述目标区域内有多个异常行为发生时,生成各所述异常行为对应的告警信息,各所述异常行为对应的告警信息的告警等级不同,各所述异常行为中至少有一个异常行为对应的告警信息的告警等级为第一等级;获取所述目标区域在所述第一预设时间段的视频数据;若所述视频数据中包含与所述异常行为处理人员相关的视频数据,则自动批量消除所述多个异常行为对应的告警信息。The third response module for alarm information is used to generate alarm information corresponding to each abnormal behavior when multiple abnormal behaviors occur in the target area. The alarm information corresponding to each abnormal behavior has different alarm levels. The alarm level of the alarm information corresponding to at least one of the abnormal behaviors is the first level; obtain the video data of the target area in the first preset time period; if the video data contains the abnormality The video data related to the behavior processing personnel will automatically eliminate the alarm information corresponding to the multiple abnormal behaviors in batches.
在一种可选的实施方式中,所述告警信息的当前告警等级为第二等级;告警信息响应模块630包括:In an optional implementation, the current alarm level of the alarm information is the second level; the alarm information response module 630 includes:
告警信息第四响应模块,用于在第二预设时间段内消除所述告警信息;若在所述第二预设时间段内未消除所述告警信息,则向所述异常行为处理人员和所述异常行为处理人员的上级发送提醒信息。The fourth response module for alarm information is used to eliminate the alarm information within the second preset time period; if the alarm information is not eliminated within the second preset time period, notify the abnormal behavior handling personnel and The superior of the person handling the abnormal behavior sends a reminder message.
在一种可选的实施方式中,告警信息第四响应模块包括:In an optional implementation, the fourth response module for alarm information includes:
配置模块,用于预先配置可将所述目标区域的告警信息和/或目标异常行为的告警信息进行批量消除。A configuration module configured to pre-configure the alarm information of the target area and/or the alarm information of the target abnormal behavior to be eliminated in batches.
在一种可选的实施方式中,所述告警信息的当前告警等级为第三等级;告警信息响应模块630包括:In an optional implementation, the current alarm level of the alarm information is the third level; the alarm information response module 630 includes:
告警信息第五响应模块,用于将所述告警信息存储至数据库中,所述告警信息用于数据分析、统计、埋点中的至少任一项。The fifth response module for alarm information is used to store the alarm information in a database, and the alarm information is used for at least any one of data analysis, statistics, and hidden points.
上述信息处理装置中各模块的具体细节已经在对应的信息处理方法中进行了详细的描述,因此此处不再赘述。The specific details of each module in the above information processing device have been described in detail in the corresponding information processing method, so they will not be described again here.
上述装置中各模块可以是通用处理器,包括:中央处理器、网络处理器等;还可以是数字信号处理器、专用集成电路、现场可编程门阵列或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。各模块也可以由软件、固件等形式来实现。上述装置中的各处理器可以是独立的处理器,也可以集成在一起。Each module in the above device can be a general-purpose processor, including a central processing unit, a network processor, etc.; it can also be a digital signal processor, an application-specific integrated circuit, a field programmable gate array or other programmable logic devices, discrete gates or transistors Logic devices, discrete hardware components. Each module can also be implemented by software, firmware, etc. Each processor in the above device can be an independent processor or can be integrated together.
本公开的示例性实施方式还提供了一种计算机可读存储介质,其上存储有能够实现本说明书上述方法的程序产品。在一些可能的实施方式中,本公开的各个方面还可以实现为一种程序产品的形式,其包括程序代码,当程序产品在电子设备上运行时,程序代码用于使电子设备执行本说明书上述“示例性方法”部分中描述的根据本公开各种示例性实施方式的步骤。该程序产品可以采用便携式紧凑盘只读存储器(CD-ROM)并包括程序代码,并可以在电子设备,例如个人电脑上运行。然而,本公开的程序产品不限于此,在本文件中,可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、 装置或者器件使用或者与其结合使用。Exemplary embodiments of the present disclosure also provide a computer-readable storage medium on which a program product capable of implementing the method described above in this specification is stored. In some possible implementations, various aspects of the present disclosure can also be implemented in the form of a program product, which includes program code. When the program product is run on an electronic device, the program code is used to cause the electronic device to execute the above-mentioned instructions in this specification. The steps according to various exemplary embodiments of the present disclosure are described in the "Exemplary Methods" section. The program product may take the form of a portable compact disk read-only memory (CD-ROM) and include the program code, and may be run on an electronic device, such as a personal computer. However, the program product of the present disclosure is not limited thereto. In this document, a readable storage medium may be any tangible medium containing or storing a program that can be instructed to execute a system, Devices or devices used or used in combination with them.
程序产品可以采用一个或多个可读介质的任意组合。可读介质可以是可读信号介质或者可读存储介质。可读存储介质例如可以为但不限于电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。可读存储介质的更具体的例子(非穷举的列表)包括:具有一个或多个导线的电连接、便携式盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。The Program Product may take the form of one or more readable media in any combination. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device or device, or any combination thereof. More specific examples (non-exhaustive list) of readable storage media include: electrical connection with one or more conductors, portable disk, hard disk, random access memory (RAM), read only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
计算机可读信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了可读程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。可读信号介质还可以是可读存储介质以外的任何可读介质,该可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。A computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave carrying readable program code therein. Such propagated data signals may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the above. A readable signal medium may also be any readable medium other than a readable storage medium that can send, propagate, or transport the program for use by or in connection with an instruction execution system, apparatus, or device.
可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于无线、有线、光缆、RF等等,或者上述的任意合适的组合。Program code embodied on a readable medium may be transmitted using any suitable medium, including but not limited to wireless, wireline, optical cable, RF, etc., or any suitable combination of the foregoing.
可以以一种或多种程序设计语言的任意组合来编写用于执行本公开操作的程序代码,程序设计语言包括面向对象的程序设计语言—诸如Java、C++等,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算设备上执行、部分地在用户设备上执行、作为一个独立的软件包执行、部分在用户计算设备上部分在远程计算设备上执行、或者完全在远程计算设备或服务器上执行。在涉及远程计算设备的情形中,远程计算设备可以通过任意种类的网络,包括局域网(LAN)或广域网(WAN),连接到用户计算设备,或者,可以连接到外部计算设备(例如利用因特网服务提供商来通过因特网连接)。Program code for performing the operations of the present disclosure may be written in any combination of one or more programming languages, including object-oriented programming languages such as Java, C++, etc., as well as conventional procedural programming. Language—such as "C" or a similar programming language. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server execute on. In situations involving remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computing device, such as provided by an Internet service. (business comes via Internet connection).
本公开的示例性实施方式还提供了一种能够实现上述方法的电子设备。下面参照图7来描述根据本公开的这种示例性实施方式的电子设备700。图7显示的电子设备700仅仅是一个示例,不应对本公开实施方式的功能和使用范围带来任何限制。Exemplary embodiments of the present disclosure also provide an electronic device capable of implementing the above method. An electronic device 700 according to such an exemplary embodiment of the present disclosure is described below with reference to FIG. 7 . The electronic device 700 shown in FIG. 7 is only an example and should not bring any limitations to the functions and scope of use of the embodiments of the present disclosure.
如图7所示,电子设备700可以以通用计算设备的形式表现。电子设备700的组件可以包括但不限于:至少一个处理单元710、至少一个存储单元720、连接不同系统组件(包括存储单元720和处理单元710)的总线730和显示单元740。As shown in Figure 7, electronic device 700 may take the form of a general-purpose computing device. The components of the electronic device 700 may include, but are not limited to: at least one processing unit 710, at least one storage unit 720, a bus 730 connecting different system components (including the storage unit 720 and the processing unit 710), and a display unit 740.
存储单元720存储有程序代码,程序代码可以被处理单元710执行,使得处理单元710执行本说明书上述“示例性方法”部分中描述的根据本公开各种示例性实施方式的步骤。例如,处理单元710可以执行图2至图5中任意一个或多个方法步骤。The storage unit 720 stores program code, and the program code can be executed by the processing unit 710, so that the processing unit 710 performs the steps according to various exemplary embodiments of the present disclosure described in the above-mentioned "Example Method" section of this specification. For example, the processing unit 710 may perform any one or more method steps in FIGS. 2 to 5 .
存储单元720可以包括易失性存储单元形式的可读介质,例如随机存取存储单元(RAM)721和/或高速缓存存储单元722,还可以进一步包括只读存储单元(ROM)723。The storage unit 720 may include a readable medium in the form of a volatile storage unit, such as a random access storage unit (RAM) 721 and/or a cache storage unit 722, and may further include a read-only storage unit (ROM) 723.
存储单元720还可以包括具有一组(至少一个)程序模块725的程序/实用工具724,这样的程序模块725包括但不限于:操作系统、一个或者多个应用程序、其它程序模块以 及程序数据,这些示例中的每一个或某种组合中可能包括网络环境的实现。Storage unit 720 may also include a program/utility 724 having a set of (at least one) program modules 725 including, but not limited to: an operating system, one or more application programs, other program modules, and and program data, each of these examples or some combination may include an implementation of a network environment.
总线730可以为表示几类总线结构中的一种或多种,包括存储单元总线或者存储单元控制器、外围总线、图形加速端口、处理单元或者使用多种总线结构中的任意总线结构的局域总线。Bus 730 may be a local area representing one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, a graphics acceleration port, a processing unit, or using any of a variety of bus structures. bus.
电子设备700也可以与一个或多个外部设备800(例如键盘、指向设备、蓝牙设备等)通信,还可与一个或者多个使得用户能与该电子设备700交互的设备通信,和/或与使得该电子设备700能与一个或多个其它计算设备进行通信的任何设备(例如路由器、调制解调器等等)通信。这种通信可以通过输入/输出(I/O)接口750进行。并且,电子设备700还可以通过网络适配器760与一个或者多个网络(例如局域网(LAN),广域网(WAN)和/或公共网络,例如因特网)通信。如图7所示,网络适配器760通过总线730与电子设备700的其它模块通信。应当明白,尽管图7中未示出,可以结合电子设备700使用其它硬件和/或软件模块,包括但不限于:微代码、设备驱动器、冗余处理单元、外部磁盘驱动阵列、RAID系统、磁带驱动器以及数据备份存储系统等。Electronic device 700 may also communicate with one or more external devices 800 (e.g., keyboard, pointing device, Bluetooth device, etc.), may also communicate with one or more devices that enable a user to interact with electronic device 700, and/or with Any device (eg, router, modem, etc.) that enables the electronic device 700 to communicate with one or more other computing devices. This communication may occur through input/output (I/O) interface 750. Furthermore, the electronic device 700 may also communicate with one or more networks (eg, a local area network (LAN), a wide area network (WAN), and/or a public network, such as the Internet) through the network adapter 760. As shown in FIG. 7 , network adapter 760 communicates with other modules of electronic device 700 through bus 730 . It should be understood that, although not shown in Figure 7, other hardware and/or software modules may be used in conjunction with electronic device 700, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tapes drives and data backup storage systems, etc.
通过以上的实施方式的描述,本领域的技术人员易于理解,这里描述的示例实施方式可以通过软件实现,也可以通过软件结合必要的硬件的方式来实现。因此,根据本公开实施方式的技术方案可以以软件产品的形式体现出来,该软件产品可以存储在一个非易失性存储介质(可以是CD-ROM,U盘,移动硬盘等)中或网络上,包括若干指令以使得一台计算设备(可以是个人计算机、服务器、终端装置、或者网络设备等)执行根据本公开示例性实施方式的方法。Through the above description of the embodiments, those skilled in the art can easily understand that the example embodiments described here can be implemented by software, or can be implemented by software combined with necessary hardware. Therefore, the technical solution according to the embodiment of the present disclosure can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, U disk, mobile hard disk, etc.) or on the network , including several instructions to cause a computing device (which may be a personal computer, a server, a terminal device, a network device, etc.) to execute a method according to an exemplary embodiment of the present disclosure.
此外,上述附图仅是根据本公开示例性实施方式的方法所包括的处理的示意性说明,而不是限制目的。易于理解,上述附图所示的处理并不表明或限制这些处理的时间顺序。另外,也易于理解,这些处理可以是例如在多个模块中同步或异步执行的。In addition, the above-mentioned drawings are only schematic illustrations of processes included in the methods according to the exemplary embodiments of the present disclosure, and are not intended to be limiting. It is readily understood that the processes shown in the above figures do not indicate or limit the temporal sequence of these processes. In addition, it is also easy to understand that these processes may be executed synchronously or asynchronously in multiple modules, for example.
应当注意,尽管在上文详细描述中提及了用于动作执行的设备的若干模块或者单元,但是这种划分并非强制性的。实际上,根据本公开的实施方式,上文描述的两个或更多模块或者单元的特征和功能可以在一个模块或者单元中具体化。反之,上文描述的一个模块或者单元的特征和功能可以进一步划分为由多个模块或者单元来具体化。It should be noted that although several modules or units of equipment for action execution are mentioned in the above detailed description, this division is not mandatory. In fact, according to embodiments of the present disclosure, the features and functions of two or more modules or units described above may be embodied in one module or unit. Conversely, the features and functions of one module or unit described above may be further divided into being embodied by multiple modules or units.
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。 It is to be understood that the present disclosure is not limited to the precise structures described above and illustrated in the accompanying drawings, and various modifications and changes may be made without departing from the scope thereof. The scope of the disclosure is limited only by the appended claims.

Claims (10)

  1. 一种信息处理方法,其特征在于,包括:An information processing method, characterized by including:
    配置多个异常行为与多个告警等级之间的映射关系,并预设各告警等级对应的消警规则;Configure the mapping relationship between multiple abnormal behaviors and multiple alarm levels, and preset the alarm rules corresponding to each alarm level;
    当检测到目标区域内有异常行为发生时,生成所述异常行为对应的告警信息;When an abnormal behavior is detected in the target area, alarm information corresponding to the abnormal behavior is generated;
    根据所述映射关系确定所述告警信息的当前告警等级;Determine the current alarm level of the alarm information according to the mapping relationship;
    根据所述当前告警等级对应的消警规则对所述告警信息进行响应。Respond to the alarm information according to the alarm elimination rules corresponding to the current alarm level.
  2. 根据权利要求1所述的信息处理方法,其特征在于,所述当检测到目标区域内有异常行为发生时,生成所述异常行为对应的告警信息,包括:The information processing method according to claim 1, characterized in that when an abnormal behavior is detected in the target area, alarm information corresponding to the abnormal behavior is generated, including:
    获取所述目标区域内设置的摄像装置实时采集的所述目标区域的视频数据;Obtain video data of the target area collected in real time by a camera device installed in the target area;
    当检测到所述目标区域内的视频数据中包含异常行为时,生成所述异常行为对应的告警信息。When it is detected that the video data in the target area contains abnormal behavior, alarm information corresponding to the abnormal behavior is generated.
  3. 根据权利要求1所述的信息处理方法,其特征在于,所述告警信息的当前告警等级为第一等级;所述根据所述当前告警等级对应的消警规则对所述告警信息进行响应,包括:The information processing method according to claim 1, characterized in that the current alarm level of the alarm information is the first level; and responding to the alarm information according to the alarm rule corresponding to the current alarm level includes: :
    接收到异常行为处理人员在第一预设时间段内出现在所述目标区域内的图像数据时,消除所述告警信息;或者,When receiving the image data that the abnormal behavior handler appears in the target area within the first preset time period, eliminate the alarm information; or,
    获取所述目标区域在所述第一预设时间段内的视频数据;Obtain video data of the target area within the first preset time period;
    若所述视频数据中包含与所述异常行为处理人员相关的视频数据,则自动消除所述告警信息;If the video data contains video data related to the abnormal behavior handler, the alarm information is automatically eliminated;
    若所述视频数据中未包含与所述异常行为处理人员相关的视频数据,则向所述异常行为处理人员的上级发送提醒信息。If the video data does not include video data related to the abnormal behavior handler, a reminder message is sent to the superior of the abnormal behavior handler.
  4. 根据权利要求3所述的信息处理方法,其特征在于,所述方法还包括:The information processing method according to claim 3, characterized in that the method further includes:
    当所述目标区域内有多个异常行为发生时,生成各所述异常行为对应的告警信息,各所述异常行为对应的告警信息的告警等级不同,各所述异常行为中至少有一个异常行为对应的告警信息的告警等级为第一等级;When multiple abnormal behaviors occur in the target area, alarm information corresponding to each of the abnormal behaviors is generated. The alarm information corresponding to each of the abnormal behaviors has different alarm levels. There is at least one abnormal behavior in each of the abnormal behaviors. The alarm level of the corresponding alarm information is level one;
    获取所述目标区域在所述第一预设时间段的视频数据;Obtain video data of the target area in the first preset time period;
    若所述视频数据中包含与所述异常行为处理人员相关的视频数据,则自动批量消除所述多个异常行为对应的告警信息。If the video data includes video data related to the abnormal behavior handler, the alarm information corresponding to the multiple abnormal behaviors is automatically eliminated in batches.
  5. 根据权利要求1所述的信息处理方法,其特征在于,所述告警信息的当前告警等级为第二等级;所述根据所述当前告警等级对应的消警规则对所述告警信息进行响应,包括:The information processing method according to claim 1, characterized in that the current alarm level of the alarm information is the second level; and responding to the alarm information according to the alarm rule corresponding to the current alarm level includes: :
    在第二预设时间段内消除所述告警信息;Eliminate the alarm information within the second preset time period;
    若在所述第二预设时间段内未消除所述告警信息,则向所述异常行为处理 人员和所述异常行为处理人员的上级发送提醒信息。If the alarm information is not eliminated within the second preset time period, handle the abnormal behavior Reminder messages are sent to the personnel and the superiors of the personnel handling the abnormal behavior.
  6. 根据权利要求5所述的信息处理方法,其特征在于,在第二预设时间段内消除所述告警信息前,所述方法还包括:The information processing method according to claim 5, characterized in that, before eliminating the alarm information within the second preset time period, the method further includes:
    预先配置可将所述目标区域的告警信息和/或目标异常行为的告警信息进行批量消除。The pre-configuration can eliminate the alarm information of the target area and/or the alarm information of the target abnormal behavior in batches.
  7. 根据权利要求1所述的信息处理方法,其特征在于,所述告警信息的当前告警等级为第三等级;所述根据所述告警信息的告警等级对应的消警规则,对所述告警信息进行响应,包括:The information processing method according to claim 1, characterized in that the current alarm level of the alarm information is the third level; and the alarm information is processed according to the alarm rule corresponding to the alarm level of the alarm information. Response, including:
    将所述告警信息存储至数据库中,所述告警信息用于数据分析、统计、埋点中的至少任一项。The alarm information is stored in a database, and the alarm information is used for at least any one of data analysis, statistics, and hidden points.
  8. 一种信息处理装置,其特征在于,包括:An information processing device, characterized in that it includes:
    消警规则配置模块,用于配置多个异常行为与多个告警等级之间的映射关系,并预设各告警等级对应的消警规则;The fire alarm rule configuration module is used to configure the mapping relationship between multiple abnormal behaviors and multiple alarm levels, and presets the fire alarm rules corresponding to each alarm level;
    告警信息生成模块,用于当检测到目标区域内有异常行为发生时,生成所述异常行为对应的告警信息;An alarm information generation module, used to generate alarm information corresponding to the abnormal behavior when an abnormal behavior is detected in the target area;
    告警等级确定模块,用于根据所述映射关系确定所述告警信息的当前告警等级;An alarm level determination module, configured to determine the current alarm level of the alarm information according to the mapping relationship;
    告警信息响应模块,用于根据所述当前告警等级对应的消警规则对所述告警信息进行响应。An alarm information response module is configured to respond to the alarm information according to the alarm rules corresponding to the current alarm level.
  9. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现权利要求1-7任一项所述的方法。A computer-readable storage medium on which a computer program is stored, characterized in that when the computer program is executed by a processor, the method of any one of claims 1-7 is implemented.
  10. 一种电子设备,其特征在于,包括:An electronic device, characterized by including:
    处理器;以及processor; and
    存储器,用于存储所述处理器的可执行指令;Memory for storing executable instructions for the processor;
    其中,所述处理器配置为经由执行所述可执行指令来执行权利要求1-7任一项所述的方法。 Wherein, the processor is configured to perform the method of any one of claims 1-7 via execution of the executable instructions.
PCT/CN2023/108365 2022-07-25 2023-07-20 Information processing method and apparatus, storage medium, and electronic device WO2024022216A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210878034.5 2022-07-25
CN202210878034.5A CN115273231A (en) 2022-07-25 2022-07-25 Information processing method, information processing apparatus, storage medium, and electronic device

Publications (1)

Publication Number Publication Date
WO2024022216A1 true WO2024022216A1 (en) 2024-02-01

Family

ID=83769872

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/108365 WO2024022216A1 (en) 2022-07-25 2023-07-20 Information processing method and apparatus, storage medium, and electronic device

Country Status (2)

Country Link
CN (1) CN115273231A (en)
WO (1) WO2024022216A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115273231A (en) * 2022-07-25 2022-11-01 京东方科技集团股份有限公司 Information processing method, information processing apparatus, storage medium, and electronic device
CN116386295A (en) * 2022-12-02 2023-07-04 东土科技(宜昌)有限公司 Hierarchical linkage method and device for monitoring alarm, storage medium and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203169888U (en) * 2013-04-10 2013-09-04 广州市泰昌实业有限公司 Monitoring system for fire-fighting equipment
CN111756745A (en) * 2020-06-24 2020-10-09 Oppo(重庆)智能科技有限公司 Alarm method, alarm device and terminal equipment
CN113408464A (en) * 2021-06-30 2021-09-17 深圳市商汤科技有限公司 Behavior detection method and device, electronic equipment and storage medium
US20210365674A1 (en) * 2020-03-30 2021-11-25 Cherry Labs, Inc. System and method for smart monitoring of human behavior and anomaly detection
CN115273231A (en) * 2022-07-25 2022-11-01 京东方科技集团股份有限公司 Information processing method, information processing apparatus, storage medium, and electronic device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203169888U (en) * 2013-04-10 2013-09-04 广州市泰昌实业有限公司 Monitoring system for fire-fighting equipment
US20210365674A1 (en) * 2020-03-30 2021-11-25 Cherry Labs, Inc. System and method for smart monitoring of human behavior and anomaly detection
CN111756745A (en) * 2020-06-24 2020-10-09 Oppo(重庆)智能科技有限公司 Alarm method, alarm device and terminal equipment
CN113408464A (en) * 2021-06-30 2021-09-17 深圳市商汤科技有限公司 Behavior detection method and device, electronic equipment and storage medium
CN115273231A (en) * 2022-07-25 2022-11-01 京东方科技集团股份有限公司 Information processing method, information processing apparatus, storage medium, and electronic device

Also Published As

Publication number Publication date
CN115273231A (en) 2022-11-01

Similar Documents

Publication Publication Date Title
WO2024022216A1 (en) Information processing method and apparatus, storage medium, and electronic device
US20180150928A1 (en) Cognitive recommendations for first responders
CN202773015U (en) Image quality diagnosis device for video monitoring system
US20220181020A1 (en) System and method for remote patient monitoring
CN111752793A (en) System abnormity monitoring method and device, computer equipment and storage medium
US10397252B2 (en) Dynamic detection of unauthorized activity in multi-channel system
US10237546B2 (en) Videoconference equipment monitoring system
US20210365674A1 (en) System and method for smart monitoring of human behavior and anomaly detection
CN115103157A (en) Video analysis method and device based on edge cloud cooperation, electronic equipment and medium
US9769434B1 (en) Remote control of a user's wearable computing device in help desk applications
CN110362288B (en) Same-screen control method, device, equipment and storage medium
US20190045001A1 (en) Unsupervised anomaly detection using shadowing of human computer interaction channels
US7496212B2 (en) Change detecting method and apparatus
CN113468023A (en) Monitoring method, monitoring device, monitoring medium and electronic equipment
CN115766401B (en) Industrial alarm information analysis method and device, electronic equipment and computer medium
US11432746B2 (en) Method and system for detecting hearing impairment
CN113052788A (en) System, management apparatus, and computer-readable medium for abnormality detection
CN114758296B (en) Power grid equipment remote monitoring method and system based on VR technology
WO2023273151A1 (en) Patrol monitoring method and apparatus, electronic device, and computer-readable storage medium
CN113627412A (en) Target area detection method, target area detection device, electronic equipment and medium
CN112883816A (en) Information pushing method and device
US9955151B2 (en) Videoconference equipment monitoring system
CN112580390A (en) Security monitoring method and device based on intelligent sound box, sound box and medium
US20220207878A1 (en) Information acquisition support apparatus, information acquisition support method, and recording medium storing information acquisition support program
US20210375454A1 (en) Automated operators in human remote caregiving monitoring system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23845427

Country of ref document: EP

Kind code of ref document: A1