[go: up one dir, main page]

WO2018161339A1 - Procédé et appareil d'application pour la recherche de mégadonnées dans une surveillance de sécurité - Google Patents

Procédé et appareil d'application pour la recherche de mégadonnées dans une surveillance de sécurité Download PDF

Info

Publication number
WO2018161339A1
WO2018161339A1 PCT/CN2017/076277 CN2017076277W WO2018161339A1 WO 2018161339 A1 WO2018161339 A1 WO 2018161339A1 CN 2017076277 W CN2017076277 W CN 2017076277W WO 2018161339 A1 WO2018161339 A1 WO 2018161339A1
Authority
WO
WIPO (PCT)
Prior art keywords
avatar
data
database
library
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2017/076277
Other languages
English (en)
Chinese (zh)
Inventor
马岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Boxinnuoda Economic Relations & Trade Consultants Co Ltd
Original Assignee
Shenzhen Boxinnuoda Economic Relations & Trade Consultants Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Boxinnuoda Economic Relations & Trade Consultants Co Ltd filed Critical Shenzhen Boxinnuoda Economic Relations & Trade Consultants Co Ltd
Priority to PCT/CN2017/076277 priority Critical patent/WO2018161339A1/fr
Publication of WO2018161339A1 publication Critical patent/WO2018161339A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Definitions

  • the invention relates to the field of security, and in particular relates to a method and a device for applying big data search in security monitoring.
  • the security monitoring system is a system that uses optical fibers, coaxial cables or microwaves to transmit video signals in its closed loop and from camera to image display and recording. It can reflect the monitored object in real time, image and reality. It can be used for long-term monitoring instead of manual in harsh environments and recorded by video recorder. At the same time, the alarm system equipment alarms for illegal intrusion.
  • the existing security monitoring is not continuous in big data search and cannot meet the user's data search requirements.
  • a method for applying big data search in security monitoring is provided, which solves the defect that the search results of the prior art are discontinuous.
  • a method for applying big data search in security monitoring includes the following steps:
  • the monitoring system receives the big data search condition input by the user
  • the monitoring system extracts the first avatar data from all the video data, and compares the first avatar data with the existing avatar database;
  • the first avatar data sub-library is created, the first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is sorted by time. Output search results.
  • the method further includes:
  • the data corresponding to the first avatar data is added to the first avatar data sub-bank by time.
  • the method further includes:
  • the monitoring system deletes data that does not contain an avatar from the data search library.
  • an application device for big data search in security monitoring includes:
  • a transceiver unit configured to receive a big data search condition input by a user
  • the processing unit is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data sub-library is established.
  • the first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is sorted by time, and the search result is output.
  • the processing unit is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-bank by time.
  • the processing unit is configured to delete data that does not include an avatar from the data search library.
  • a third aspect provides an application device for big data search in security monitoring, the device comprising: a processor, a transceiver, a memory, and a bus, wherein the processor, the transceiver, and the memory are connected by using a bus;
  • a transceiver for receiving a big data search condition input by a user for receiving a big data search condition input by a user.
  • the processor is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data sub-library is established.
  • the first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is sorted by time, and the search result is output.
  • the processor is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-bank by time.
  • the processor is configured to delete data that does not include an avatar from the data search library.
  • the technical solution provided by the specific embodiments of the present invention has the advantages of satisfying the current continuous search of security monitoring data.
  • FIG. 1 is a schematic flowchart diagram of a method for applying big data search in security monitoring according to the present invention.
  • FIG. 2 is a schematic structural diagram of an apparatus for applying big data search in security monitoring according to the present invention.
  • FIG. 3 is a schematic structural diagram of an apparatus for applying big data search in security monitoring according to the present invention.
  • FIG. 1 is a schematic diagram of a method for applying big data search in security monitoring according to a first preferred embodiment of the present invention.
  • the method is implemented by a security system.
  • the method is as shown in FIG. 1 and includes the following steps:
  • Step S101 The monitoring system receives a big data search condition input by the user.
  • Step S102 The monitoring system extracts the first avatar data from all the video data, and compares the first avatar data with the existing avatar database.
  • Step S103 If the first avatar data is not stored in the avatar database, the first avatar data sub-library is established, and the first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is pressed. The search results are output after the time is sorted.
  • the technical solution provided by the invention can establish an avatar data sub-library according to the same avatar data, and then sort the avatar data by time in the sub-library, thereby realizing the advantage of continuous avatar data.
  • the foregoing method may further include:
  • the data corresponding to the first avatar data is added to the first avatar data sub-bank by time.
  • the foregoing method may further include:
  • the monitoring system deletes data that does not contain an avatar from the data search library.
  • FIG. 2 is a schematic diagram of an apparatus for applying big data search in security monitoring according to a second preferred embodiment of the present invention.
  • the transceiver unit 201 is configured to receive a big data search condition input by the user;
  • the processing unit 202 is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data is created.
  • the library adds the first avatar data sub-library to the avatar database, and sorts the data in all the first avatar data sub-libraries by time to output the search result.
  • the processing unit 202 is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-bank by time.
  • processing unit 202 is configured to delete data that does not include an avatar from the data search library.
  • the present invention also provides an application device 30 for big data search in security monitoring, the device comprising: a processor 301, a transceiver 302, a memory 303 and a bus 304, wherein the processor, the transceiver, and the memory are connected by a bus;
  • the transceiver 302 is configured to receive a big data search condition input by a user.
  • the processor 301 is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data is created.
  • the library adds the first avatar data sub-library to the avatar database, and sorts the data in all the first avatar data sub-libraries by time to output the search result.
  • the processor 301 is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-account by time.
  • the processor 301 is configured to delete data that does not include an avatar from the data search library.
  • Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
  • a storage medium may be any available media that can be accessed by a computer.
  • the computer readable medium may include random access memory (Random) Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium.
  • a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

La présente invention concerne un procédé et un appareil d'application pour la recherche de mégadonnées dans une surveillance de sécurité, le procédé comprenant les étapes suivantes : un système de surveillance reçoit des conditions de recherche de mégadonnées entrées par un utilisateur ; le système de surveillance extrait des premières données d'avatar de toutes les données vidéo et compare les premières données d'avatar à une base de données d'avatars existante ; si les premières données d'avatar ne sont pas stockées dans la base de données d'avatars, alors une première sous-base de données d'avatars est établie et la première sous-base de données d'avatars est ajoutée à la base de données d'avatars, et, après le tri en ordre chronologique de toutes les données dans la première sous-base de données d'avatars, des résultats de recherche sont délivrés. La solution technique de la présente invention a l'avantage de permettre une recherche continue.
PCT/CN2017/076277 2017-03-10 2017-03-10 Procédé et appareil d'application pour la recherche de mégadonnées dans une surveillance de sécurité Ceased WO2018161339A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/076277 WO2018161339A1 (fr) 2017-03-10 2017-03-10 Procédé et appareil d'application pour la recherche de mégadonnées dans une surveillance de sécurité

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/076277 WO2018161339A1 (fr) 2017-03-10 2017-03-10 Procédé et appareil d'application pour la recherche de mégadonnées dans une surveillance de sécurité

Publications (1)

Publication Number Publication Date
WO2018161339A1 true WO2018161339A1 (fr) 2018-09-13

Family

ID=63448103

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/076277 Ceased WO2018161339A1 (fr) 2017-03-10 2017-03-10 Procédé et appareil d'application pour la recherche de mégadonnées dans une surveillance de sécurité

Country Status (1)

Country Link
WO (1) WO2018161339A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114817265A (zh) * 2022-04-28 2022-07-29 北京辰行科技有限公司 一种利用大数据服务器的金融信息获取方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1260934A2 (fr) * 2001-05-22 2002-11-27 Matsushita Electric Industrial Co., Ltd. Dispositif et procédé d'enregistrement de données de surveillance
CN102467659A (zh) * 2010-11-16 2012-05-23 金奈科技股份有限公司 高清影像式人脸辨识及监控系统
CN106254494A (zh) * 2016-08-17 2016-12-21 浙江诚名智能工程有限公司 人流监控系统
CN106331589A (zh) * 2015-06-26 2017-01-11 神讯电脑(昆山)有限公司 网络摄影机系统及其远程监控方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1260934A2 (fr) * 2001-05-22 2002-11-27 Matsushita Electric Industrial Co., Ltd. Dispositif et procédé d'enregistrement de données de surveillance
CN102467659A (zh) * 2010-11-16 2012-05-23 金奈科技股份有限公司 高清影像式人脸辨识及监控系统
CN106331589A (zh) * 2015-06-26 2017-01-11 神讯电脑(昆山)有限公司 网络摄影机系统及其远程监控方法
CN106254494A (zh) * 2016-08-17 2016-12-21 浙江诚名智能工程有限公司 人流监控系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114817265A (zh) * 2022-04-28 2022-07-29 北京辰行科技有限公司 一种利用大数据服务器的金融信息获取方法
CN114817265B (zh) * 2022-04-28 2023-08-18 深圳市领航财富教育科技有限公司 一种利用大数据服务器的金融信息获取方法

Similar Documents

Publication Publication Date Title
WO2018218806A1 (fr) Procédé et système de protection de la confidentialité d'un terminal
WO2018161339A1 (fr) Procédé et appareil d'application pour la recherche de mégadonnées dans une surveillance de sécurité
WO2018152669A1 (fr) Procédé et dispositif de contrôle de sécurité permettant une surveillance de sécurité
WO2018035663A1 (fr) Procédé et système de détection de nourrisson pour housse de couette de l'internet des objets
WO2018148958A1 (fr) Procédé et dispositif de transmission de données destinés à la protection et la surveillance de sécurité
WO2017107205A1 (fr) Procédé et système de transmission de logiciel vidéo
WO2018152670A1 (fr) Procédé et dispositif de gestion de mégadonnées pour surveillance de sécurité
WO2018165863A1 (fr) Procédé et appareil de classification de données en surveillance de sécurité et de protection
WO2018027557A1 (fr) Procédé et système d'enregistrement de présence wi-fi en matière de sécurité
WO2018027576A1 (fr) Procédé et système de collecte de durée de fonctionnement dans des statistiques dans l'internet des objets
WO2018148957A1 (fr) Procédé et dispositif d'application de mégadonnées dans un système de protection de sécurité
WO2018161341A1 (fr) Procédé et appareil pour mettre en oeuvre une surveillance de sécurité sur la base d'une technologie en nuage
WO2018027466A1 (fr) Procédé et système de mémorisation de données volumineuses dans un système distribué
WO2018148956A1 (fr) Procédé et système de sauvegarde en nuage pour une protection et une surveillance de la sécurité
WO2018209646A1 (fr) Procédé et système de surveillance de domicile intelligent
WO2018027577A1 (fr) Procédé et système d'application pour une application de télévision dans l'internet des objets
WO2018023710A1 (fr) Procédé et système de lecture sécurisée d'une vidéo
WO2018027456A1 (fr) Procédé et système de spécification d'application à partager dans des mégadonnées
WO2018205141A1 (fr) Procédé et système d'assemblage et d'agencement de clips vidéo
WO2018027458A1 (fr) Procédé et système permettant de partager des mégadonnées en temps réel
WO2018023711A1 (fr) Procédé et système de surveillance en temps réel dans un réseau de diffusion audio
WO2018027470A1 (fr) Procédé et système de partage de mégadonnées dans wechat
WO2018027457A1 (fr) Procédé et système de partage de mégadonnées mobiles
WO2018023709A1 (fr) Procédé et système permettant de surveiller et de demander la consommation d'énergie dans un réseau de diffusion
WO2018027564A1 (fr) Procédé et système d'affichage d'écran partagé basés sur la sécurité pour une visioconférence

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17899725

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22/01/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17899725

Country of ref document: EP

Kind code of ref document: A1