WO2018161339A1 - Procédé et appareil d'application pour la recherche de mégadonnées dans une surveillance de sécurité - Google Patents
Procédé et appareil d'application pour la recherche de mégadonnées dans une surveillance de sécurité Download PDFInfo
- Publication number
- WO2018161339A1 WO2018161339A1 PCT/CN2017/076277 CN2017076277W WO2018161339A1 WO 2018161339 A1 WO2018161339 A1 WO 2018161339A1 CN 2017076277 W CN2017076277 W CN 2017076277W WO 2018161339 A1 WO2018161339 A1 WO 2018161339A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- avatar
- data
- database
- library
- sub
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Definitions
- the invention relates to the field of security, and in particular relates to a method and a device for applying big data search in security monitoring.
- the security monitoring system is a system that uses optical fibers, coaxial cables or microwaves to transmit video signals in its closed loop and from camera to image display and recording. It can reflect the monitored object in real time, image and reality. It can be used for long-term monitoring instead of manual in harsh environments and recorded by video recorder. At the same time, the alarm system equipment alarms for illegal intrusion.
- the existing security monitoring is not continuous in big data search and cannot meet the user's data search requirements.
- a method for applying big data search in security monitoring is provided, which solves the defect that the search results of the prior art are discontinuous.
- a method for applying big data search in security monitoring includes the following steps:
- the monitoring system receives the big data search condition input by the user
- the monitoring system extracts the first avatar data from all the video data, and compares the first avatar data with the existing avatar database;
- the first avatar data sub-library is created, the first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is sorted by time. Output search results.
- the method further includes:
- the data corresponding to the first avatar data is added to the first avatar data sub-bank by time.
- the method further includes:
- the monitoring system deletes data that does not contain an avatar from the data search library.
- an application device for big data search in security monitoring includes:
- a transceiver unit configured to receive a big data search condition input by a user
- the processing unit is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data sub-library is established.
- the first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is sorted by time, and the search result is output.
- the processing unit is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-bank by time.
- the processing unit is configured to delete data that does not include an avatar from the data search library.
- a third aspect provides an application device for big data search in security monitoring, the device comprising: a processor, a transceiver, a memory, and a bus, wherein the processor, the transceiver, and the memory are connected by using a bus;
- a transceiver for receiving a big data search condition input by a user for receiving a big data search condition input by a user.
- the processor is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data sub-library is established.
- the first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is sorted by time, and the search result is output.
- the processor is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-bank by time.
- the processor is configured to delete data that does not include an avatar from the data search library.
- the technical solution provided by the specific embodiments of the present invention has the advantages of satisfying the current continuous search of security monitoring data.
- FIG. 1 is a schematic flowchart diagram of a method for applying big data search in security monitoring according to the present invention.
- FIG. 2 is a schematic structural diagram of an apparatus for applying big data search in security monitoring according to the present invention.
- FIG. 3 is a schematic structural diagram of an apparatus for applying big data search in security monitoring according to the present invention.
- FIG. 1 is a schematic diagram of a method for applying big data search in security monitoring according to a first preferred embodiment of the present invention.
- the method is implemented by a security system.
- the method is as shown in FIG. 1 and includes the following steps:
- Step S101 The monitoring system receives a big data search condition input by the user.
- Step S102 The monitoring system extracts the first avatar data from all the video data, and compares the first avatar data with the existing avatar database.
- Step S103 If the first avatar data is not stored in the avatar database, the first avatar data sub-library is established, and the first avatar data sub-library is added to the avatar database, and all the data in the first avatar data sub-library is pressed. The search results are output after the time is sorted.
- the technical solution provided by the invention can establish an avatar data sub-library according to the same avatar data, and then sort the avatar data by time in the sub-library, thereby realizing the advantage of continuous avatar data.
- the foregoing method may further include:
- the data corresponding to the first avatar data is added to the first avatar data sub-bank by time.
- the foregoing method may further include:
- the monitoring system deletes data that does not contain an avatar from the data search library.
- FIG. 2 is a schematic diagram of an apparatus for applying big data search in security monitoring according to a second preferred embodiment of the present invention.
- the transceiver unit 201 is configured to receive a big data search condition input by the user;
- the processing unit 202 is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data is created.
- the library adds the first avatar data sub-library to the avatar database, and sorts the data in all the first avatar data sub-libraries by time to output the search result.
- the processing unit 202 is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-bank by time.
- processing unit 202 is configured to delete data that does not include an avatar from the data search library.
- the present invention also provides an application device 30 for big data search in security monitoring, the device comprising: a processor 301, a transceiver 302, a memory 303 and a bus 304, wherein the processor, the transceiver, and the memory are connected by a bus;
- the transceiver 302 is configured to receive a big data search condition input by a user.
- the processor 301 is configured to extract the first avatar data from all the video data, and compare the first avatar data with the existing avatar database; if the first avatar data is not stored in the avatar database, the first avatar data is created.
- the library adds the first avatar data sub-library to the avatar database, and sorts the data in all the first avatar data sub-libraries by time to output the search result.
- the processor 301 is further configured to: when the first avatar data is stored in the avatar database, add the data corresponding to the first avatar data to the first avatar data sub-account by time.
- the processor 301 is configured to delete data that does not include an avatar from the data search library.
- Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
- a storage medium may be any available media that can be accessed by a computer.
- the computer readable medium may include random access memory (Random) Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium.
- a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
La présente invention concerne un procédé et un appareil d'application pour la recherche de mégadonnées dans une surveillance de sécurité, le procédé comprenant les étapes suivantes : un système de surveillance reçoit des conditions de recherche de mégadonnées entrées par un utilisateur ; le système de surveillance extrait des premières données d'avatar de toutes les données vidéo et compare les premières données d'avatar à une base de données d'avatars existante ; si les premières données d'avatar ne sont pas stockées dans la base de données d'avatars, alors une première sous-base de données d'avatars est établie et la première sous-base de données d'avatars est ajoutée à la base de données d'avatars, et, après le tri en ordre chronologique de toutes les données dans la première sous-base de données d'avatars, des résultats de recherche sont délivrés. La solution technique de la présente invention a l'avantage de permettre une recherche continue.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2017/076277 WO2018161339A1 (fr) | 2017-03-10 | 2017-03-10 | Procédé et appareil d'application pour la recherche de mégadonnées dans une surveillance de sécurité |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2017/076277 WO2018161339A1 (fr) | 2017-03-10 | 2017-03-10 | Procédé et appareil d'application pour la recherche de mégadonnées dans une surveillance de sécurité |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2018161339A1 true WO2018161339A1 (fr) | 2018-09-13 |
Family
ID=63448103
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2017/076277 Ceased WO2018161339A1 (fr) | 2017-03-10 | 2017-03-10 | Procédé et appareil d'application pour la recherche de mégadonnées dans une surveillance de sécurité |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2018161339A1 (fr) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114817265A (zh) * | 2022-04-28 | 2022-07-29 | 北京辰行科技有限公司 | 一种利用大数据服务器的金融信息获取方法 |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1260934A2 (fr) * | 2001-05-22 | 2002-11-27 | Matsushita Electric Industrial Co., Ltd. | Dispositif et procédé d'enregistrement de données de surveillance |
| CN102467659A (zh) * | 2010-11-16 | 2012-05-23 | 金奈科技股份有限公司 | 高清影像式人脸辨识及监控系统 |
| CN106254494A (zh) * | 2016-08-17 | 2016-12-21 | 浙江诚名智能工程有限公司 | 人流监控系统 |
| CN106331589A (zh) * | 2015-06-26 | 2017-01-11 | 神讯电脑(昆山)有限公司 | 网络摄影机系统及其远程监控方法 |
-
2017
- 2017-03-10 WO PCT/CN2017/076277 patent/WO2018161339A1/fr not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1260934A2 (fr) * | 2001-05-22 | 2002-11-27 | Matsushita Electric Industrial Co., Ltd. | Dispositif et procédé d'enregistrement de données de surveillance |
| CN102467659A (zh) * | 2010-11-16 | 2012-05-23 | 金奈科技股份有限公司 | 高清影像式人脸辨识及监控系统 |
| CN106331589A (zh) * | 2015-06-26 | 2017-01-11 | 神讯电脑(昆山)有限公司 | 网络摄影机系统及其远程监控方法 |
| CN106254494A (zh) * | 2016-08-17 | 2016-12-21 | 浙江诚名智能工程有限公司 | 人流监控系统 |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114817265A (zh) * | 2022-04-28 | 2022-07-29 | 北京辰行科技有限公司 | 一种利用大数据服务器的金融信息获取方法 |
| CN114817265B (zh) * | 2022-04-28 | 2023-08-18 | 深圳市领航财富教育科技有限公司 | 一种利用大数据服务器的金融信息获取方法 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2018218806A1 (fr) | Procédé et système de protection de la confidentialité d'un terminal | |
| WO2018161339A1 (fr) | Procédé et appareil d'application pour la recherche de mégadonnées dans une surveillance de sécurité | |
| WO2018152669A1 (fr) | Procédé et dispositif de contrôle de sécurité permettant une surveillance de sécurité | |
| WO2018035663A1 (fr) | Procédé et système de détection de nourrisson pour housse de couette de l'internet des objets | |
| WO2018148958A1 (fr) | Procédé et dispositif de transmission de données destinés à la protection et la surveillance de sécurité | |
| WO2017107205A1 (fr) | Procédé et système de transmission de logiciel vidéo | |
| WO2018152670A1 (fr) | Procédé et dispositif de gestion de mégadonnées pour surveillance de sécurité | |
| WO2018165863A1 (fr) | Procédé et appareil de classification de données en surveillance de sécurité et de protection | |
| WO2018027557A1 (fr) | Procédé et système d'enregistrement de présence wi-fi en matière de sécurité | |
| WO2018027576A1 (fr) | Procédé et système de collecte de durée de fonctionnement dans des statistiques dans l'internet des objets | |
| WO2018148957A1 (fr) | Procédé et dispositif d'application de mégadonnées dans un système de protection de sécurité | |
| WO2018161341A1 (fr) | Procédé et appareil pour mettre en oeuvre une surveillance de sécurité sur la base d'une technologie en nuage | |
| WO2018027466A1 (fr) | Procédé et système de mémorisation de données volumineuses dans un système distribué | |
| WO2018148956A1 (fr) | Procédé et système de sauvegarde en nuage pour une protection et une surveillance de la sécurité | |
| WO2018209646A1 (fr) | Procédé et système de surveillance de domicile intelligent | |
| WO2018027577A1 (fr) | Procédé et système d'application pour une application de télévision dans l'internet des objets | |
| WO2018023710A1 (fr) | Procédé et système de lecture sécurisée d'une vidéo | |
| WO2018027456A1 (fr) | Procédé et système de spécification d'application à partager dans des mégadonnées | |
| WO2018205141A1 (fr) | Procédé et système d'assemblage et d'agencement de clips vidéo | |
| WO2018027458A1 (fr) | Procédé et système permettant de partager des mégadonnées en temps réel | |
| WO2018023711A1 (fr) | Procédé et système de surveillance en temps réel dans un réseau de diffusion audio | |
| WO2018027470A1 (fr) | Procédé et système de partage de mégadonnées dans wechat | |
| WO2018027457A1 (fr) | Procédé et système de partage de mégadonnées mobiles | |
| WO2018023709A1 (fr) | Procédé et système permettant de surveiller et de demander la consommation d'énergie dans un réseau de diffusion | |
| WO2018027564A1 (fr) | Procédé et système d'affichage d'écran partagé basés sur la sécurité pour une visioconférence |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17899725 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22/01/2020) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 17899725 Country of ref document: EP Kind code of ref document: A1 |