Movatterモバイル変換


[0]ホーム

URL:


CN112836192B - Portrait characteristic data issuing method and device - Google Patents

Portrait characteristic data issuing method and device
Download PDF

Info

Publication number
CN112836192B
CN112836192BCN202011476392.0ACN202011476392ACN112836192BCN 112836192 BCN112836192 BCN 112836192BCN 202011476392 ACN202011476392 ACN 202011476392ACN 112836192 BCN112836192 BCN 112836192B
Authority
CN
China
Prior art keywords
characteristic data
security gateway
person
intelligent security
interest
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011476392.0A
Other languages
Chinese (zh)
Other versions
CN112836192A (en
Inventor
�田�浩
苗冬霜
贺占功
李金栋
于际超
王宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino CorpfiledCriticalAisino Corp
Priority to CN202011476392.0ApriorityCriticalpatent/CN112836192B/en
Publication of CN112836192ApublicationCriticalpatent/CN112836192A/en
Application grantedgrantedCritical
Publication of CN112836192BpublicationCriticalpatent/CN112836192B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The application discloses a method and a device for issuing portrait characteristic data, wherein an intelligent security gateway management platform is adopted to extract portrait characteristic data according to a portrait image and encrypt and issue the portrait characteristic data to an intelligent security gateway, so that the accuracy and the security of the portrait characteristic data are improved. The method comprises the following steps: the intelligent security gateway management platform acquires a character image of at least one person concerned, which is concerned by the intelligent security gateway; the intelligent security gateway management platform extracts the portrait characteristic data of at least one person concerned, which is concerned by the intelligent security gateway, according to the at least one portrait image; the intelligent security gateway management platform encrypts the portrait characteristic data of the at least one person of interest, and configures the encrypted portrait characteristic data of the at least one person of interest to the intelligent security gateway.

Description

Portrait characteristic data issuing method and device
Technical Field
The present application relates to the field of data processing, and in particular, to a method and apparatus for issuing portrait characteristic data.
Background
Currently, some unit seeking is a method of comparing a person image in a person-of-interest library with a collected image. Along with the gradual perfection of management systems in cities, in the process of searching for attention personnel, the requirement on the accuracy of determining the identity of the attention personnel is higher and higher. However, the number of images in the pool of people of interest for some units is large, so the comparison process is time consuming and inefficient.
Disclosure of Invention
The embodiment of the application provides a method and a device for issuing portrait characteristic data, which improve the accuracy and the safety of portrait characteristic data.
In a first aspect, an embodiment of the present application provides a method for issuing portrait feature data, including an intelligent security gateway management platform acquiring a portrait image of at least one person concerned, which needs to be concerned by an intelligent security gateway;
the intelligent security gateway management platform extracts the portrait characteristic data of at least one person concerned, which is concerned by the intelligent security gateway, according to the at least one portrait image;
the intelligent security gateway management platform encrypts the portrait characteristic data of the at least one person of interest;
and the intelligent security gateway management platform configures the encrypted portrait characteristic data of at least one person of interest to the intelligent security gateway.
In the design, the intelligent security gateway management platform configures the portrait characteristic data of at least one person concerned, which is concerned by the intelligent security gateway, to the intelligent security gateway, so that the intelligent security gateway combines the portrait characteristic data to perform comparison, one comparison with the portrait images in the person concerned library is not needed, and the recognition efficiency of the person concerned is improved. And the portrait characteristic data is firstly encrypted before configuration, so that the safety of the data is well ensured, and the problems of data leakage and the like are avoided.
In one possible implementation manner, the intelligent security gateway management platform configures the encrypted portrait characteristic data of the at least one person of interest to the intelligent security gateway, including:
the intelligent security gateway management platform sends the encrypted portrait characteristic data of at least one person of interest to the intelligent security gateway; or,
the intelligent security gateway management platform stores the encrypted portrait characteristic data of the at least one person of interest in a storage space, and sends configuration information to the intelligent security gateway, wherein the configuration information is used for indicating a storage address of the encrypted portrait characteristic data of the at least one person of interest in the storage space, so that the intelligent security gateway can acquire the encrypted portrait characteristic data of the at least one person of interest from the storage space according to the configuration information.
In the design, the intelligent security gateway management platform can configure the portrait characteristic data into the intelligent security gateway in two ways, can directly send the portrait characteristic data, or can firstly store the portrait characteristic data into a storage space and then acquire the portrait characteristic data from the storage space by the intelligent security gateway.
In one possible implementation, the encrypting, by the intelligent security gateway management platform, the image feature data of the at least one person includes:
The intelligent security gateway management platform operates N first threads;
the method comprises the steps that the ith group of characteristic data included in the portrait characteristic data of at least one person is obtained through the ith first thread in the N first threads, the ith group of characteristic data is obtained after encryption processing is carried out on the ith group of characteristic data through the ith first thread and the M second threads, wherein the portrait characteristic data of the at least one person comprises N groups of characteristic data, N is an integer larger than 1, and i is an integer smaller than or equal to N.
In the design, the configuration and encryption process of the portrait characteristic data is carried out in a multithreading mode, and optionally, the configuration and encryption efficiency is improved.
In a possible implementation manner, the intelligent security gateway management platform stores part of the figure feature data, which is not received by the intelligent security gateway, in a storage space when determining that the intelligent security gateway fails in the process of sending the encrypted figure feature data of at least one person of interest to the intelligent security gateway;
and when the intelligent security gateway fault recovery is detected, the stored partial portrait characteristic data is configured to the intelligent security gateway.
In the above design, the intelligent security gateway management platform has a fault tolerance mechanism when configuring or encrypting portrait characteristic data to the intelligent security gateway. When the intelligent security gateway fails, configured data are stored, so that data loss is avoided, and the comprehensiveness of portrait characteristic data is ensured.
In one possible implementation, the intelligent security gateway management platform determines that the person image of a first person of interest of at least one person of interest that the intelligent security gateway needs to be focused on is updated;
the intelligent security gateway management platform extracts the portrait characteristic data of the first person of interest according to the updated portrait image of the first person of interest;
the intelligent security gateway management platform encrypts the portrait characteristic data of the first person of interest and configures the encrypted portrait characteristic data of the first person of interest to the intelligent security gateway.
In the design, when the figure image of the person needing to be concerned in some units is updated, the intelligent security gateway management platform can extract the figure characteristic data corresponding to the updated figure image in real time and encrypt and configure the figure characteristic data to the intelligent security gateway, so that the accuracy of the figure characteristic data is ensured.
In one possible implementation manner, the intelligent security gateway management platform pays attention to the transmission rate of the encrypted portrait characteristic data of at least one person of interest configured to the intelligent security gateway, and when the average value of the transmission rates in a set duration is smaller than a preset threshold, prompt information is displayed, wherein the prompt information is used for prompting that the transmission rate of the intelligent security gateway is low.
Based on the design, the intelligent security gateway management platform can pay attention to the configuration speed in real time in the process of configuring the portrait characteristic data to the intelligent security gateway. The intelligent security gateway is prompted to have low speed, so that a manager can repair or replace the intelligent security gateway in time according to prompt information, and the speed of human figure characteristic data transmission is guaranteed.
In a second aspect, based on the same inventive concept as the first aspect, an embodiment of the present application provides a device for issuing portrait feature data, where the device for issuing portrait feature data may be used to implement any possible implementation manner of the first aspect, and the beneficial effects may be referred to in the first aspect and are not repeated herein. The device for issuing the portrait characteristic data comprises:
The acquisition module is used for acquiring the figure image of at least one person concerned, which is concerned by the intelligent security gateway;
the processing module is used for extracting the portrait characteristic data of at least one person concerned, which is concerned by the intelligent security gateway and is required to be concerned, according to the at least one portrait image;
the processing module is further used for encrypting the image characteristic data of the at least one person of interest;
and the communication module is used for configuring the encrypted portrait characteristic data of at least one person of interest to the intelligent security gateway.
In an exemplary embodiment, the communication module is specifically configured to, after the encrypting, configure the portrait characteristic data of the at least one person of interest to the smart security gateway:
sending the encrypted portrait characteristic data of at least one person of interest to the intelligent security gateway; or,
storing the encrypted portrait characteristic data of at least one person of interest in a storage space, and sending configuration information to the intelligent security gateway, wherein the configuration information is used for indicating a storage address of the encrypted portrait characteristic data of the at least one person of interest in the storage space, so that the intelligent security gateway can acquire the encrypted portrait characteristic data of the at least one person of interest from the storage space according to the configuration information.
In an exemplary embodiment, the processing module is specifically configured to, when encrypting the image feature data of the at least one person:
running N first threads;
acquiring the ith group of characteristic data included in the portrait characteristic data of the at least one person through the ith first thread in the N first threads;
the ith first thread runs M second threads to encrypt the ith group of characteristic data to obtain encrypted ith group of characteristic data; wherein the portrait characteristic data of the at least one person comprises N groups of characteristic data, N is an integer greater than 1, and i is an integer less than or equal to N;
in an exemplary embodiment, the processing module, after storing the encrypted portrait characteristic data of the at least one person of interest in a storage space, includes:
storing the encrypted ith group of characteristic data into a storage space through the ith first thread in the N first threads;
the portrait characteristic data of at least one person comprises N groups of characteristic data, N is an integer greater than 1, and i is an integer smaller than or equal to N.
In an exemplary embodiment, the processing module is further configured to:
When the intelligent security gateway management platform determines that the intelligent security gateway fails in the process of sending the encrypted portrait characteristic data of at least one person of interest to the intelligent security gateway, storing partial portrait characteristic data which is not received by the intelligent security gateway in a storage space;
the communication module is further configured to configure the stored part of portrait characteristic data to the intelligent security gateway when the processing module detects that the intelligent security gateway is recovered from faults.
In an exemplary embodiment, the processing module is further configured to determine that the person image of a first person of interest among the at least one person of interest for which the smart security gateway is required is updated; extracting the portrait characteristic data of the first attention person according to the updated portrait image of the first attention person; encrypting the portrait characteristic data of the first person of interest;
the communication module is further configured to configure the encrypted portrait characteristic data of the first person of interest to the intelligent security gateway.
In an exemplary embodiment, the processing module is further configured to:
Focusing on configuring the transmission rate of the encrypted portrait characteristic data of at least one focusing person to the intelligent security gateway;
further comprises:
and the display module is used for displaying prompt information when the average value of the transmission rate in the set duration is smaller than a preset threshold value, wherein the prompt information is used for prompting that the transmission rate of the intelligent security gateway is low.
In a third aspect, an electronic device is provided that includes a processor and a memory. The memory is used for storing computer-executable instructions, and the processor executes the computer-executable instructions in the memory to perform the operational steps of the method of the first aspect or any one of the possible implementations of the first aspect using hardware resources in the controller.
In a fourth aspect, the present application provides a computer readable storage medium having instructions stored therein which, when run on a computer, cause the computer to perform the methods of the above aspects.
In addition, the advantages of the second aspect to the fourth aspect may be referred to as the advantages of the first aspect, and will not be described here.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the description below are only some embodiments of the present application.
Fig. 1 is a schematic diagram of a management network architecture according to an embodiment of the present application;
FIG. 2A is a flowchart of a method for issuing image feature data according to an embodiment of the present application;
FIG. 2B is a flowchart of another method for issuing image feature data according to an embodiment of the present application;
FIG. 3 is a flowchart of an exemplary method for issuing portrait characteristic data according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a device for issuing portrait characteristic data according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described in further detail below with reference to the accompanying drawings, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be noted that, as used herein, reference to "a plurality of" or "a plurality of" means two or more. "and/or", describes an association relationship of an association object, and indicates that there may be three relationships, for example, a and/or B, and may indicate: a exists alone, A and B exist together, and B exists alone. The character "three kinds generally indicates that the front-rear association object is an or relationship.
The terms first, second and the like in the description and in the claims and in the above-described figures, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented in sequences other than those illustrated or otherwise described herein.
For the sake of understanding the embodiments of the present application, a specific description will be given by taking the management network system architecture shown in fig. 1 as an example.
In the management network system architecture shown in fig. 1, an intelligent security gateway management platform 101 and at least one intelligent security gateway 102 are specifically included. It should be noted that the management network system architecture may include one or more intelligent security gateways 102, where n is a positive integer in fig. 1 as an example. Fig. 1 is provided as an example only, and is not intended to limit the number of intelligent security gateway management platforms and the specific architecture of the network architecture. The functionality of the intelligent security gateway management platform 101 may be implemented by one or more servers. For example, the smart security gateway management platform 101 may be a server cluster made up of a plurality of servers. For example, the server cluster may include an extraction server, an encryption server, a monitoring server, a transmission server, and the like. Different servers may perform different functions, e.g. an encryption server is responsible for encrypting the portrait characteristic data. A library of people of interest may also be included in the intelligent security network management platform. In the present application, the attention person library stores at least portrait images of attention persons. For convenience of description, the intelligent security gateway management platform will be hereinafter simply referred to as a management platform.
The intelligent security gateway management platform 101 is configured to manage each intelligent security gateway 102, such as access management of the intelligent security gateway 102, and provide the personal characteristic data of the person of interest to each intelligent security gateway 102. The intelligent security gateway 102 is configured to collect a person image, and identify the collected person image in combination with the person image feature data of the person of interest provided by the intelligent security gateway management platform 101.
In order to solve the problem of low efficiency caused by comparing the acquired images with the images included in the attention personnel library, the application provides a method and a device for issuing the portrait characteristic data.
Referring to fig. 2A, a schematic flow chart of a method for issuing image feature data is provided. The method may be implemented by the management platform or by one or more servers in the management platform.
201A, the management platform obtains the person image of at least one person of interest that needs to be focused by the intelligent security gateway.
In one possible implementation, the management platform may obtain an image of the person of at least one person of interest that is of interest to the intelligent security gateway from a library of persons of interest.
The attention person library may include administrative region information to which the attention person belongs or administrative region or intelligent security gateway identification information to which the attention person needs to be focused, in addition to the portrait image of the attention person.
202A, the management platform extracts the portrait characteristic data of at least one person concerned, which is concerned by the intelligent security gateway, according to the at least one portrait image.
Illustratively, the management platform may include one or more servers, each of which may deploy a portrait engine. The management platform is also used for calling interfaces on one or more portrait engines for extracting portrait characteristic data to perform characteristic extraction on the portrait image of at least one person of interest to obtain portrait characteristic data of at least one person of interest.
Optionally, the extraction algorithm used by the management platform to extract the portrait characteristic data is obtained from the intelligent security gateway, and may also be preconfigured in the management platform. The extraction algorithm employed by each intelligent security gateway included in the network system of interest may be the same or different, and in one approach, the management platform is configured with the extraction algorithm employed by each intelligent security gateway when the network system is deployed. In another mode, in the process of establishing connection between the intelligent security gateway and the management platform, the intelligent security gateway can send an extraction algorithm adopted by the intelligent security gateway to the management platform.
Optionally, when the extraction algorithm of the intelligent security gateway is updated, the intelligent security gateway may notify the management platform of the updated extraction algorithm, and further, the management platform uses the updated extraction algorithm to extract the portrait characteristic data of the person of interest for the intelligent security gateway.
As one example, the portrait characteristic data may include characteristic data of five sense organs, face shape data, and the like. The portrait characteristic data may be text data in a text format.
203A, the management platform encrypts the portrait characteristic data of the at least one person of interest, and sends the encrypted portrait characteristic data of the at least one person of interest to the intelligent security gateway.
And after receiving the encrypted portrait characteristic data, the intelligent security gateway stores the data in a local database. And when the portrait characteristic data is applied subsequently, decrypting the portrait characteristic data by using the encryption card. The security of the portrait characteristic data is ensured, and the portrait characteristic data is prevented from being leaked. Further, the encryption card may be a removable storage device. For example, after receiving the encrypted portrait characteristic data, the intelligent security gateway inserts an encryption card to decrypt the encrypted portrait characteristic data.
As a possible implementation, in case the function of extracting the portrait characteristic data is performed by an extraction server in the server cluster, the extraction server may detect whether to connect with the encryption server before encrypting the portrait characteristic data. And when the connection is determined, sending the image characteristic data of the at least one person of interest to an encryption server for encryption.
In one possible implementation, both the process of encrypting the portrait characteristic data and the process of sending the portrait characteristic data may take the form of a thread pool.
In one mode, the processing module runs N first threads; acquiring an ith group of characteristic data included in the portrait characteristic data of the at least one person through an ith first thread in the N first threads, encrypting the ith group of characteristic data through the ith first thread running M second threads to obtain the encrypted ith group of characteristic data, and sending the encrypted ith group of characteristic data; the portrait characteristic data of at least one person comprises N groups of characteristic data, N is an integer greater than 1, and i is an integer smaller than or equal to N.
In another mode, the processing module runs N threads; the jth thread in the N threads encrypts the jth group of characteristic data included in the portrait characteristic data of the at least one person to obtain encrypted jth group of characteristic data, and sends the encrypted jth group of characteristic data; the portrait characteristic data of at least one person comprises N groups of characteristic data, N is an integer greater than 1, and j is an integer less than or equal to N.
Alternatively, the grouping of the ith group of feature data and the jth group of feature data may be performed according to different persons of interest, for example, the portrait feature data of one person of interest may be grouped into one group; the group may be made based on the data of the same part in the portrait characteristic data, for example, the characteristic data of the five sense organs of all the people may be divided into a group.
In one possible implementation, the management platform may have multiple encryption methods when encrypting the image feature data, for example, the encryption may be performed using an SDK (Software Development Kit ). After encrypting the portrait characteristic data of at least one person of interest, the management platform may package the encrypted portrait characteristic data of at least one person of interest, for example, may use an XML data packet form or may use other data packets form to package, which is not specifically limited in the embodiment of the present application.
In one possible implementation, each thread may have a counting function, and the data amounts of the data packets sent by different threads may be preconfigured, so that each thread may count the number of data packets sent, thereby determining whether the number of data packets of the sent portrait characteristic data is accurate.
In a possible implementation manner, when determining that the intelligent security gateway fails in the process of sending the encrypted portrait characteristic data of at least one person of interest to the intelligent security gateway, the management platform stores part of portrait characteristic data, which is not received by the intelligent security gateway, in the encrypted portrait characteristic data of at least one person; and when the intelligent security gateway fault recovery is detected, the stored partial portrait characteristic data are sent to the intelligent security gateway.
Optionally, when the encryption failure or the transmission failure occurs in the process of encrypting or transmitting the portrait characteristic data, the management platform may record the event of the encryption failure or the transmission failure through the system log. Optionally, the thread responsible for encryption can configure a timeout mechanism, and when the thread responsible for encryption detects the encryption timeout, an alarm page of the encryption timeout is popped up on the display screen; or when the transmission fails, the thread responsible for the transmission can pop up the warning page of the transmission failure on the display screen. After the management platform determines that the problem is solved, the portrait characteristic data can be continuously encrypted or sent in a breakpoint continuous transmission mode.
The breakpoint continuous transmission function refers to that after a thread for encrypting or transmitting portrait characteristic data fails, the intelligent security gateway management platform can find out a time point when a problem occurs by looking up a management platform system log, and after the problem is solved, encryption or transmission is continued based on the time point. Further, after the management platform finishes successful sending, a prompt page for successful sending can be displayed on a display screen. Similarly, when the management platform determines that the transmission fails, a prompt page of the transmission failure can be displayed on the display screen. And, the management platform may further record the event of successful or failed transmission in the system log.
In one possible implementation manner, the management platform detects a transmission rate of the encrypted portrait characteristic data of at least one person sent to the intelligent security gateway, and displays prompt information when an average value of the transmission rates in a set duration is smaller than a preset threshold value, where the prompt information is used for prompting that the transmission rate of the intelligent security gateway is low. For example, a warning page can be popped up on a display screen of the intelligent security gateway management platform to prompt that the transmission rate is low. Further, the manager can analyze the reason for the low transmission rate in time to resume transmission.
Referring to fig. 2B, a flowchart of another method for issuing image feature data according to the present application is shown.
201B, the management platform acquires the character image of at least one person of interest who needs to be focused by the intelligent security gateway.
See step 201A for a specific process.
202B, the management platform extracts the portrait characteristic data of at least one person concerned, which is concerned by the intelligent security gateway, according to the at least one portrait image.
See step 202A for a specific process.
203B, the management platform encrypts the image characteristic data of the at least one person of interest.
See step 203A for a specific encryption process.
204B, the management platform stores the encrypted portrait characteristic data of the at least one person of interest in a storage space and sends configuration information to the intelligent security gateway.
The configuration information is used for indicating the storage address of the encrypted portrait characteristic data of the at least one person of interest in the storage space, so that the intelligent security gateway can acquire the encrypted portrait characteristic data of the at least one person of interest from the storage space according to the configuration information.
In a possible implementation manner, the time for sending the configuration information to the intelligent security gateway by the management platform and the time sequence for storing the encrypted portrait characteristic data of at least one person of interest in the storage space are not specifically limited in the embodiment of the present application. For example, the management platform may send configuration information to the smart security gateway prior to extracting the portrait characteristic data; then, the management platform may store the encrypted portrait characteristic data of the at least one person of interest in a storage space indicated by the configuration information.
For another example, the management platform may send configuration information to the intelligent security gateway when the portrait characteristic data is stored in the storage space, for example, when the management platform stores the encrypted portrait characteristic data in the storage space for the first time, the management platform sends the configuration information to the intelligent security gateway.
Optionally, after receiving the configuration information, the intelligent security gateway may detect whether there is portrait feature data in the storage space indicated by the configuration information, and if so, perform an extraction operation.
The storage space may be regarded as a temporary database in the management platform, and the encrypted characteristic data may be stored in the storage space in time sequence. Alternatively, there may be multiple storage spaces, with different storage spaces having different storage addresses. Different storage spaces are used for storing different portrait characteristic data, or different storage addresses store the same portrait characteristic data.
In one possible implementation, the process of storing portrait characteristic data may take the form of a thread pool. For example, the processing module runs N first threads; storing the encrypted ith group of characteristic data into a storage space through the ith first thread in the N first threads; the portrait characteristic data of at least one person comprises N groups of characteristic data, N is an integer greater than 1, and i is an integer smaller than or equal to N.
In one possible implementation, each thread may have a counting function, and the data amounts of the data packets that are sent by different threads may be preconfigured, so that each thread may count the number of stored data packets, thereby determining whether the number of data packets of the stored portrait characteristic data is accurate.
Specifically, the intelligent security gateway extracts the portrait characteristic data of at least one person concerned after encryption in the storage space according to the storage address of the storage space indicated in the received configuration information.
In one possible implementation, after the intelligent security gateway successfully extracts the portrait feature data, the management platform may record an event in the system log that the portrait feature data was configured successfully.
In one possible implementation manner, after the intelligent security gateway extracts the portrait characteristic data of at least one person of interest, the management platform may configure the updated portrait characteristic data of the person of interest to the intelligent security gateway in the following manner, where the image of the person of interest in the person library of interest may be updated or the person of interest may be increased, and so on:
in one mode: the management platform determines that a first person image included in at least one person image to be focused by the intelligent security gateway is updated; the management platform extracts the portrait characteristic data of the first person according to the updated first portrait image; the management platform encrypts the portrait characteristic data of the first person, stores the encrypted portrait characteristic data of the first person into a storage space, and sends configuration information to the intelligent security gateway. And the intelligent security gateway acquires the encrypted portrait characteristic data of the first person from the storage space according to the configuration information.
In another mode: when the number of people needing to be concerned by the intelligent security gateway is increased, the management platform extracts the figure characteristic data of the newly added people according to the figure image of the newly added people; the management platform encrypts the portrait characteristic data of the newly-added attention person, stores the encrypted portrait characteristic data of the newly-added attention person into a storage space, and sends configuration information to the intelligent security gateway. And the intelligent security gateway acquires the encrypted figure characteristic data of the newly-added attention person from the storage space according to the configuration information.
As an example, the management network system may include n intelligent security gateways, and the management platform performs extraction and encryption issuing of the image feature data for each intelligent security gateway.
Illustratively, the kth smart security gateway is initially established to complete, e.g., one smart security gateway newly installed by a unit of a county. After the management platform is connected with the kth intelligent security gateway, the person image of the person concerned, which needs to be concerned by the kth intelligent security gateway, and the extraction algorithm of the kth intelligent security gateway can be obtained. And further extracting the portrait characteristic data aiming at an extraction algorithm of the kth intelligent security gateway, and encrypting and issuing the extracted portrait characteristic data to the kth intelligent security gateway. For convenience of description, the portrait characteristic data initially issued by the management platform is referred to as full-scale characteristic data. Optionally, after the configuration of the full feature data is successful, the management platform may record the event of successful configuration in the system log according to the method described in step 204B. Optionally, the management platform may also record the issue status of the full-scale feature data of each intelligent security gateway, such as issued, not issued, or being issued, and so on.
Aiming at the kth intelligent security gateway, after the management platform determines that the configuration of the full-quantity feature data of the kth intelligent security gateway is successful, the issuing state of the full-quantity feature data of the kth intelligent security gateway is changed from an undelivered state to an issued state.
In another possible manner, the person of interest k in the kth smart security gateway1 Person image update of (e.g. person of interest k)1 The character image is updated due to the hairstyle change. The management platform acquires the attention person k1 The updated character image is used for paying attention to the person k aiming at the extraction algorithm of the kth intelligent security gateway1 And encrypting and issuing the extracted portrait characteristic data to a kth intelligent security gateway. It should be noted that, on the kth intelligent security gateway, the updated attention person k1 The portrait characteristic data of (a) will be overlaid with the portrait characteristic data before update.
It should be noted that, in the embodiment of the present application, there may be overlapping among the attention personnel required to be paid attention to by multiple smart security gateways, for example, the attention personnel required to be paid attention to by the kth smart security gateway and the kth+1th smart security gateway each include the attention personnel k1 . Further, when the person image of a person of interest in the person-of-interest library is updated, for example, person of interest k1 The management platform needs to configure the updated attention person k to both the kth intelligent security gateway and the kth+1th intelligent security gateway1 Is of figure characteristic data of (a). Specifically, the k+1th intelligent security gateway is configured with the updated attention person k1 Means for human figure characteristic data and configuration of the updated attention person k to k intelligent security gateways1 The manner of the portrait characteristic data is similar and will not be described in detail here.
In another possible manner, the kth smart security gateway adds a person of interest k that needs attentionn . The management platform acquires the attention person kn Aiming at the person image of the kth intelligent security gateway, carrying out attention person k according to the extraction algorithm of the kth intelligent security gatewayn And encrypting and issuing the extracted portrait characteristic data to a kth intelligent security gateway.
For convenience of description, in the embodiment of the present application, the updated and newly added portrait characteristic data may be referred to as incremental characteristic data.
Referring to FIG. 3, a detailed description is provided in connection with a flow chart for configuring incremental feature data.
The following specifically describes an example in which the management platform is a server cluster composed of a plurality of servers. For example, an extraction server included in the server cluster is responsible for extracting incremental feature data, an encryption server is responsible for encrypting portrait feature data, a monitoring server is responsible for detecting a portrait image of a person of interest in a person-of-interest library, and so on.
301, a monitoring server in the management platform determines that the intelligent security gateway has been configured with the full amount of feature data.
The monitoring server of the management platform can perform periodic detection on the person images of the attention personnel in the attention personnel library or on the changes of the attention personnel required to be focused by the intelligent security gateway. For example, the detection period may be one day or 12 hours or one week, etc.
Here, the management platform is used for periodically detecting the person images of the attention person in the attention person library, and specifically, the increase of the attention person or the change of the person images of the attention person can be detected, so that the management platform generates the incremental characteristic data.
302, an extraction server in the management platform determines an intelligent security gateway needing to be configured with incremental feature data, acquires an extraction algorithm of the intelligent security gateway, and extracts the incremental feature data.
For a specific extraction process, see step 202B.
303, the extraction server in the management platform detects whether the connection with the encryption server is successful.
And if the connection is successful, the management platform sends the incremental characteristic data to the encryption server for encryption.
See step 203B for a specific encryption process.
304, a sending server in the management platform sends configuration information to the intelligent security gateway and stores the encrypted incremental feature data into the storage space.
See step 204B for specific storage procedures and transmit configuration information procedures.
And 305, the intelligent security gateway acquires the incremental characteristic data according to the configuration information.
See step 204B for a specific process.
306, it is determined whether the configuration was successful.
In one possible implementation manner, after the configuration is successful, a prompt page for the successful configuration appears on a display screen of the intelligent security gateway management platform; similarly, the configuration failure can also occur a prompt page of the configuration failure on a display screen of the intelligent security gateway management platform.
307, if the configuration is successful, the configuration is recorded in a system log of the management platform, and the state of the intelligent security gateway incremental feature data issuing is modified.
See step 204B for a specific process.
308, if the configuration fails, checking the system log of the management platform, finding out the failure reason, continuing the configuration through the breakpoint continuous transmission function after the problem is solved, and repeating the step 306.
309, the management platform determines whether there is a next smart security gateway that needs to be configured with incremental feature data.
If so, steps 302-309 are repeated.
In one possible implementation, after the incremental feature data is obtained by the smart security gateway, the data is saved in a local database. And when the portrait characteristic data is applied subsequently, decrypting the incremental characteristic data by using the encryption card. See step 203A for a specific decryption process.
Based on the same concept as the above-described portrait characteristic data issuing method, as shown in fig. 4, a portrait characteristic data issuing apparatus 400 is provided. The apparatus 400 comprises: an acquisition module 401, a processing module 402, and a communication module 403.
An acquiring module 401, configured to acquire a person image of at least one person of interest that needs to be focused by the intelligent security gateway;
a processing module 402, configured to extract, according to the at least one person image, portrait characteristic data of at least one person of interest that needs to be focused by the smart security gateway;
the processing module 402 is further configured to encrypt the image feature data of the at least one person of interest;
and the communication module 403 is configured to configure the encrypted portrait characteristic data of the at least one person of interest to the intelligent security gateway.
In an exemplary embodiment, the communication module 403 is configured to, after the encrypting, configure the portrait characteristic data of the at least one person of interest to the smart security gateway, specifically:
Sending the encrypted portrait characteristic data of at least one person of interest to the intelligent security gateway; or,
storing the encrypted portrait characteristic data of at least one person of interest in a storage space, and sending configuration information to the intelligent security gateway, wherein the configuration information is used for indicating a storage address of the encrypted portrait characteristic data of the at least one person of interest in the storage space, so that the intelligent security gateway can acquire the encrypted portrait characteristic data of the at least one person of interest from the storage space according to the configuration information.
In an exemplary embodiment, the processing module 402 is configured to encrypt the image feature data of the at least one person, specifically:
running N first threads;
acquiring the ith group of characteristic data included in the portrait characteristic data of the at least one person through the ith first thread in the N first threads;
the ith first thread runs M second threads to encrypt the ith group of characteristic data to obtain encrypted ith group of characteristic data; wherein the portrait characteristic data of the at least one person comprises N groups of characteristic data, N is an integer greater than 1, and i is an integer less than or equal to N;
In an exemplary embodiment, the processing module 402, after storing the encrypted portrait characteristic data of the at least one person of interest in a storage space, includes:
storing the encrypted ith group of characteristic data into a storage space through the ith first thread in the N first threads;
the portrait characteristic data of at least one person comprises N groups of characteristic data, N is an integer greater than 1, and i is an integer smaller than or equal to N.
In an exemplary embodiment, the processing module 402 is further configured to:
in the process that the intelligent security gateway management platform configures the encrypted portrait characteristic data of at least one person concerned to the intelligent security gateway, when the intelligent security gateway is determined to be faulty, partial portrait characteristic data which is not received by the intelligent security gateway in the encrypted portrait characteristic data of at least one person is stored;
the communication module 403 is further configured to configure the stored part of portrait characteristic data to the intelligent security gateway when the processing module 402 detects that the intelligent security gateway is recovered from a fault.
In an exemplary embodiment, the processing module 402 is further configured to determine that the person image of a first person of interest among the at least one person of interest for which the smart security gateway is required is updated; extracting the portrait characteristic data of the first attention person according to the updated portrait image of the first attention person; encrypting the portrait characteristic data of the first person of interest;
The communication module 403 is further configured to configure the encrypted portrait characteristic data of the first person of interest to the intelligent security gateway.
In an exemplary embodiment, the processing module 402 is further configured to:
detecting the transmission rate of the portrait characteristic data of at least one person concerned after the encryption is configured to the intelligent security gateway;
the apparatus 400 may also include a display module (not shown in fig. 4). And the display module is used for displaying prompt information when the average value of the transmission rate in the set duration is smaller than a preset threshold value, wherein the prompt information is used for prompting that the transmission rate of the intelligent security gateway is low.
Fig. 5 shows a schematic structural diagram of an electronic device according to an embodiment of the present application. The electronic device may include a processor 501 and a memory 502.
Further, the electronic device may also include a communication interface 503. The communication interface 503 is configured to acquire an audio signal of the device to be detected, and send the audio signal to the processor 501.
The processor 501 may be a general purpose processor such as a Central Processing Unit (CPU), digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, and may implement or perform the methods, steps, and logic blocks disclosed in embodiments of the present application. The general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the noise evaluation method disclosed in connection with the embodiments of the present application may be directly embodied as a hardware processor executing or may be executed by a combination of hardware and software modules in the processor.
The memory 502, as a non-volatile computer readable storage medium, may be used to store non-volatile software programs, non-volatile computer executable programs, and modules. The Memory may include at least one type of storage medium, which may include, for example, flash Memory, hard disk, multimedia card, card Memory, random access Memory (Random Access Memory, RAM), static random access Memory (Static Random Access Memory, SRAM), programmable Read-Only Memory (Programmable Read Only Memory, PROM), read-Only Memory (ROM), charged erasable programmable Read-Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), magnetic Memory, magnetic disk, optical disk, and the like. The memory is any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to such. The memory 502 in embodiments of the present application may also be circuitry or any other device capable of performing storage functions for storing program instructions and/or data.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware associated with program instructions, where the foregoing program may be stored in a computer readable storage medium, and when executed, the program performs steps including the above method embodiments; such computer storage media can be any available media or data storage device that can be accessed by a computer including, but not limited to: various media that can store program code, such as a mobile storage device, a random access memory (RAM, random Access Memory), a magnetic memory (e.g., a floppy disk, a hard disk, a magnetic tape, a magneto-optical disk (MO), etc.), an optical memory (e.g., CD, DVD, BD, HVD, etc.), and a semiconductor memory (e.g., ROM, EPROM, EEPROM, a nonvolatile memory (NAND FLASH), a Solid State Disk (SSD)), etc.
Alternatively, the above-described integrated modules of the present application, if implemented in the form of software functional modules and sold or used as a stand-alone product, may also be stored in a computer-readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be embodied in essence or a part contributing to the prior art in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media that can store program code, such as a mobile storage device, a random access memory (RAM, random Access Memory), a magnetic memory (e.g., a floppy disk, a hard disk, a magnetic tape, a magneto-optical disk (MO), etc.), an optical memory (e.g., CD, DVD, BD, HVD, etc.), and a semiconductor memory (e.g., ROM, EPROM, EEPROM, a nonvolatile memory (NAND FLASH), a Solid State Disk (SSD)), etc.
The foregoing embodiments are only used for describing the technical scheme of the present application in detail, but the descriptions of the foregoing embodiments are only used for helping to understand the method of the embodiments of the present application, and should not be construed as limiting the embodiments of the present application. Variations or alternatives readily apparent to those skilled in the art are intended to be encompassed within the scope of the embodiments of the present application.

Claims (12)

CN202011476392.0A2020-12-142020-12-14Portrait characteristic data issuing method and deviceActiveCN112836192B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202011476392.0ACN112836192B (en)2020-12-142020-12-14Portrait characteristic data issuing method and device

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202011476392.0ACN112836192B (en)2020-12-142020-12-14Portrait characteristic data issuing method and device

Publications (2)

Publication NumberPublication Date
CN112836192A CN112836192A (en)2021-05-25
CN112836192Btrue CN112836192B (en)2023-10-31

Family

ID=75923600

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202011476392.0AActiveCN112836192B (en)2020-12-142020-12-14Portrait characteristic data issuing method and device

Country Status (1)

CountryLink
CN (1)CN112836192B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP2005027183A (en)*2003-07-042005-01-27Sony CorpGateway equipment and method for converting ciphering system
CN101957911A (en)*2010-09-292011-01-26汉王科技股份有限公司Face identification method and system
CN102142961A (en)*2010-06-302011-08-03华为技术有限公司Method, device and system for authenticating gateway, node and server
CN103067166A (en)*2011-10-192013-04-24海尔集团公司Grading mixing encryption method and device of intelligent family system
WO2014075495A1 (en)*2012-11-162014-05-22中兴通讯股份有限公司Face recognition tracking method and system
WO2019095221A1 (en)*2017-11-162019-05-23深圳前海达闼云端智能科技有限公司Method for searching for person, apparatus, terminal and cloud server
KR20200052465A (en)*2018-10-312020-05-15(주)성일이노텍Internet of things gateway and processing method the encrypted data of thereof
CN111681346A (en)*2020-05-292020-09-18软通动力信息技术有限公司Prevention and control passing processing method, device, equipment and medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7594236B2 (en)*2004-06-282009-09-22Intel CorporationThread to thread communication

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP2005027183A (en)*2003-07-042005-01-27Sony CorpGateway equipment and method for converting ciphering system
CN102142961A (en)*2010-06-302011-08-03华为技术有限公司Method, device and system for authenticating gateway, node and server
CN101957911A (en)*2010-09-292011-01-26汉王科技股份有限公司Face identification method and system
CN103067166A (en)*2011-10-192013-04-24海尔集团公司Grading mixing encryption method and device of intelligent family system
WO2014075495A1 (en)*2012-11-162014-05-22中兴通讯股份有限公司Face recognition tracking method and system
CN103824045A (en)*2012-11-162014-05-28中兴通讯股份有限公司Face recognition and tracking method and face recognition and tracking system
WO2019095221A1 (en)*2017-11-162019-05-23深圳前海达闼云端智能科技有限公司Method for searching for person, apparatus, terminal and cloud server
KR20200052465A (en)*2018-10-312020-05-15(주)성일이노텍Internet of things gateway and processing method the encrypted data of thereof
CN111681346A (en)*2020-05-292020-09-18软通动力信息技术有限公司Prevention and control passing processing method, device, equipment and medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于网络传输的实时图像融合系统设计;杨锋;崔东旭;张俊举;许辉;陆刘兵;;应用光学(第05期);全文*

Also Published As

Publication numberPublication date
CN112836192A (en)2021-05-25

Similar Documents

PublicationPublication DateTitle
US9836600B2 (en)Method and apparatus for detecting a multi-stage event
Saxena et al.General study of intrusion detection system and survey of agent based intrusion detection system
CN110290522B (en)Risk identification method and device for mobile equipment and computer system
CN108989150A (en)A kind of login method for detecting abnormality and device
EP2479698A1 (en)Systems and methods for detecting fraud associated with systems application processing
CN109325010B (en)Log checking method, device, computer equipment and storage medium
US20220092178A1 (en)Computer security
CN108259202A (en)A kind of CA monitoring and pre-alarming methods and CA monitoring and warning systems
CN110245077A (en)A kind of response method and equipment of program exception
CN107181721A (en)A kind of information processing method and device based on daily record
CN114707159A (en)Multi-party data joint analysis system, method, equipment and medium
US20220092177A1 (en)Adaptive computer security
CN111209339A (en)Block synchronization method, device, computer and storage medium
CN120200830B (en) An industrial Internet encryption method and system based on blockchain evidence storage
CN110247796A (en)Monitoring alarm method, apparatus and relevant device
Wang et al.Maddc: Multi-scale anomaly detection, diagnosis and correction for discrete event logs
CN114422186A (en)Attack detection method and device, electronic equipment and storage medium
CN114979109B (en)Behavior track detection method, behavior track detection device, computer equipment and storage medium
CN112836192B (en)Portrait characteristic data issuing method and device
WO2022222623A1 (en)Composite event estimation through temporal logic
CN113449269B (en)Core module activation method and device and storage medium
CN112882892B (en)Data processing method and device, electronic equipment and storage medium
CN119512855A (en) Abnormal data monitoring method, device, equipment and medium
CN116663026B (en)Block chain-based data processing method and device, electronic equipment and medium
EP3816782A1 (en)Data reconstruction method, apparatus, electronic device, and storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp