CN111737309A - User management method and related product - Google Patents

User management method and related product Download PDF

Info

Publication number
CN111737309A
CN111737309A CN202010445685.6A CN202010445685A CN111737309A CN 111737309 A CN111737309 A CN 111737309A CN 202010445685 A CN202010445685 A CN 202010445685A CN 111737309 A CN111737309 A CN 111737309A
Authority
CN
China
Prior art keywords
information
target
model
personnel
smuggler
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010445685.6A
Other languages
Chinese (zh)
Inventor
戈东
侯怀德
徐林峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Skycomm Co ltd
Original Assignee
Shenzhen Skycomm Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Skycomm Co ltd filed Critical Shenzhen Skycomm Co ltd
Priority to CN202010445685.6A priority Critical patent/CN111737309A/en
Publication of CN111737309A publication Critical patent/CN111737309A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2465Query processing support for facilitating data mining operations in structured databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/53Querying
    • G06F16/535Filtering based on additional data, e.g. user or group profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/29Graphical models, e.g. Bayesian networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Software Systems (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Evolutionary Biology (AREA)
  • Computational Linguistics (AREA)
  • Artificial Intelligence (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application discloses a user management method and a related product, which are applied to a police service information cloud platform; the method comprises the following steps: firstly, an initial data information of a field person entering and exiting a hall is obtained by a police information cloud platform, then a preset model is called by the police information cloud platform, and a target person is determined according to the initial data information and the preset model, wherein the preset model comprises a smuggler discovery model and a smuggler study and judgment model, the target person refers to a user which is detected by equipment and presents the characteristics of a person carrying smuggled articles, and finally the police information cloud platform sends related information of the target person to a manager, and the related information is used for the manager to manage the target person, so that the high efficiency and convenience of user management are improved.

Description

User management method and related product
Technical Field
The present application relates to the field of electronic device technologies, and in particular, to a user management method and a related product.
Background
The smuggling crime is the result of interaction of many social factors such as economy, politics, culture and the like. Therefore, in order to fundamentally prevent the smuggling crime, various means such as law, economy, administration, education and the like must be used to mobilize the social strength, carry out the overall battle and comprehensively treat the smuggling crime. Comprehensive management is an effective countermeasure for preventing and reducing all crimes in China, how to effectively find the whereabouts of smugglers or judge whether the smugglers are the smugglers is one of the problems to be solved at present, and meanwhile, through analysis of the reasons of the smuggling crimes, the smuggling crimes are complex phenomena caused by multi-level and multi-link reasons, and the phenomena must be used as a system to carry out comprehensive management to effectively control the smuggling crimes. The data value mining capability based on the public security service is not formed, and the value of the data is not really reflected.
Disclosure of Invention
The embodiment of the application provides a user management method and a related product, so that the high efficiency and convenience of user management are expected to be improved.
In a first aspect, an embodiment of the present application provides a user management method, which is applied to a police service intelligence cloud platform; the method comprises the following steps:
acquiring initial data information of field personnel entering and exiting a hall;
calling a preset model, and determining a target person according to the initial data information and the preset model, wherein the preset model comprises a smuggler discovery model and a smuggler study and judgment model, and the target person refers to a user who is detected by equipment and presents the characteristics of a person carrying smuggled articles;
and sending the related information of the target personnel to a manager, wherein the related information is used for the manager to manage the target personnel.
In a second aspect, an embodiment of the present application provides a user management apparatus, which is applied to a police service information cloud platform; the user management apparatus includes a processing unit, a communication unit, and a storage unit, wherein,
the processing unit is used for acquiring initial data information of field personnel entering and exiting the entrance hall; the system comprises a device and a system management module, wherein the device is used for calling a preset model and determining a target person according to the initial data information and the preset model, the preset model comprises a smuggler discovery model and a smuggler study and judgment model, and the target person refers to a user who is detected by the device and presents the characteristics of a person carrying smuggled articles; and the system is used for sending the related information of the target personnel to a manager, and the related information is used for the manager to manage the target personnel.
In a third aspect, an embodiment of the present application provides an electronic device, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for executing steps in any method of the first aspect of the embodiment of the present application.
In a fourth aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program makes a computer perform part or all of the steps described in any one of the methods in the second aspect of the present application.
In a fifth aspect, the present application provides a computer program product, wherein the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to perform some or all of the steps described in any one of the methods of the second aspect of the present application. The computer program product may be a software installation package.
It can be seen that, in the embodiment of the application, a user management method and related products are provided, which are applied to a police service information cloud platform; the method comprises the following steps: firstly, an police service information cloud platform acquires initial data information of field personnel entering and leaving an entrance hall, then the police service information cloud platform calls a preset model, then a target person is determined according to the initial data information and the preset model, wherein the preset model comprises a smuggler discovery model and a smuggler study and judgment model, the target person refers to a user which is detected by equipment and presents the characteristics of a person carrying smuggled articles, and finally the police service information cloud platform sends related information of the target person to a manager, and the related information is used for the manager to manage the target person. Therefore, initial data information is processed through the preset model, situation perception, dynamic management and control, prediction and early warning of target personnel are achieved, overall resultant force in the aspects of data total amount, storage capacity, processing capacity and the like is optimized, and high efficiency and convenience of user management are improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1A is a network architecture diagram of a police intelligence cloud platform according to an embodiment of the present disclosure;
fig. 1B is a schematic flowchart of a user management method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of another user management method provided in an embodiment of the present application;
fig. 3 is a schematic flowchart of another user management method provided in an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device provided in an embodiment of the present application;
fig. 5 is a block diagram illustrating functional units of a user management device according to an embodiment of the present disclosure.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The electronic device according to the embodiment of the present application may include various handheld devices, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem, which have wireless communication functions, and various forms of User Equipment (UE), Mobile Stations (MS), terminal devices (terminal device), and the like.
Hereinafter, some terms in the present application are explained to facilitate understanding by those skilled in the art.
As shown in fig. 1A, fig. 1A is a network architecture diagram of a police intelligence cloud platform provided in an embodiment of the present application, where the police intelligence cloud platform includes a data acquisition module and a data analysis module, the data acquisition module is configured to receive and store data information acquired by data acquisition equipment disposed in an entry and exit hall, and the data analysis module includes functions of calling a preset model to analyze the data information; the police affair information cloud platform can be connected with wearable equipment and a background command center which are worn by field personnel in a communication mode.
Referring to fig. 1B, fig. 1B is a schematic flowchart of a user management method provided in the embodiment of the present application, and is applied to a police intelligence cloud platform; the method comprises the following steps:
s101, the police service information cloud platform acquires initial data information of field personnel entering and exiting the entrance hall;
wherein the initial data information includes name information, age information, gender information, and behavior information.
S102, the police service intelligence cloud platform calls a preset model, and a target person is determined according to the initial data information and the preset model;
the preset model comprises a smuggler discovery model and a smuggler study and judgment model.
Wherein the target person refers to a user detected by the device presenting characteristics of a person carrying a smuggled item.
S103, the police service information cloud platform sends the related information of the target personnel to a manager, and the related information is used for the manager to manage the target personnel.
It can be seen that, in the embodiment of the application, a user management method and related products are provided, which are applied to a police service information cloud platform; the method comprises the following steps: firstly, an police service information cloud platform acquires initial data information of field personnel entering and leaving an entrance hall, then the police service information cloud platform calls a preset model, then a target person is determined according to the initial data information and the preset model, wherein the preset model comprises a smuggler discovery model and a smuggler study and judgment model, the target person refers to a user which is detected by equipment and presents the characteristics of a person carrying smuggled articles, and finally the police service information cloud platform sends related information of the target person to a manager, and the related information is used for the manager to manage the target person. Therefore, initial data information is processed through the preset model, situation perception, dynamic management and control, prediction and early warning of target personnel are achieved, overall resultant force in the aspects of data total amount, storage capacity, processing capacity and the like is optimized, and high efficiency and convenience of user management are improved.
In one possible example, the police intelligence cloud platform calls a preset model, and determines the target person according to the initial data information and the preset model, including: the police affair information cloud platform calls the smuggling person discovery model; the police affair information cloud platform extracts name information, gender information and age information in the initial data information; the police service information cloud platform substitutes the name information, the gender information and the age information into the smuggler discovery model to determine a first data matching value of each field worker; and the police service intelligence cloud platform determines the field personnel with the first data matching value larger than a first threshold value as target personnel according to the first data matching value.
Wherein each name information corresponds to one field person.
The initial data information includes data information acquired by a monitoring device and a person registration device of the entry and exit hall.
The smuggler discovery model comprises a preset list celebrity database, and the gender and age corresponding to the name information in the list celebrity database can be acquired by inputting the name information.
In the specific implementation, a police intelligence cloud platform acquires initial data information F1 and G1 of field personnel F and G entering and exiting a lobby, then calls a smuggling person discovery model, and extracts name information F11 and G11, gender information F12 and G12 and age information F13 and G13 in the initial data information; substituting the name information F11 and G11, the gender information F12 and G12 and the age information F13 and G13 into the smuggling person discovery model by the police service intelligence cloud platform, and determining that a first data matching value of F is 0 and a first data matching value of G is 1; and the police service intelligence cloud platform determines the field personnel G with the first data matching value larger than a first threshold value of 0.5 as target personnel according to the first data matching value.
As can be seen, in this example, the police intelligence cloud platform calls the smuggler discovery model; the police affair information cloud platform extracts name information, gender information and age information in the initial data information; the police service information cloud platform substitutes the name information, the gender information and the age information into the smuggler discovery model to determine a first data matching value of each field worker; the police service intelligence cloud platform determines the field personnel with the first data matching value larger than a first threshold value as target personnel according to the first data matching value; the method and the system are favorable for improving the management and control of the personnel with definite identity, namely the listed famous personnel, and are favorable for improving the efficiency and convenience of user management.
In one possible example, the police intelligence cloud platform substitutes the name information, the gender information, and the age information into the smuggler discovery model, determines a first data match value for each of the field personnel, including: the police affair information cloud platform queries a preset mapping relation table by taking the name information as a query identifier to obtain the target gender and the target age corresponding to the name information; the police affair information cloud platform compares the target gender with the gender information, compares the target age with the age information at the same time, and determines a gender parameter and an age parameter; the police service intelligence cloud platform determines a first data matching value according to a preset formula, the gender parameter and the age parameter.
Wherein the preset formula includes x ═ a × b, a denotes the gender parameter, b denotes the age parameter, and x denotes the first data match value.
Wherein, the target gender is compared with the gender information, the target age is compared with the age information at the same time, and if the gender parameter and the age parameter are determined to comprise that the target gender is the same as the gender information, the gender parameter is determined to be 1; if the target age is the same as the age information, determining that the age parameter is 1, if the target age is different from the age information by more than 1 year and less than 5 years, determining that the age parameter is b-1-0.2 | j-k |, wherein b represents the age parameter, j represents 1/5 of the difference between the target age and the age information, and if the target age is different from the age information by more than 5 years, determining that the age parameter is 0.
In specific implementation, the police service information cloud platform queries a preset mapping relation table by using the name information 'zhang san' as a query identifier, and obtains a target gender 'male' and a target age '35 year' corresponding to the name information; the police service information cloud platform compares the target sex 'male' with the sex information 'male', compares the target age '35 years' with the age information '33 years', and determines that a sex parameter is 1 and an age parameter is 0.6; the police service intelligence cloud platform determines that a first data matching value is x, a x, b, 0.6 according to a preset formula, the gender parameter and the age parameter.
As can be seen, in this example, the police intelligence cloud platform substitutes the name information, the gender information, and the age information into the smuggler discovery model to determine a first data matching value of each of the field personnel, including: the police affair information cloud platform queries a preset mapping relation table by taking the name information as a query identifier to obtain the target gender and the target age corresponding to the name information; the police affair information cloud platform compares the target gender with the gender information, compares the target age with the age information at the same time, and determines a gender parameter and an age parameter; the police service information cloud platform determines a first data matching value according to a preset formula, the gender parameter and the age parameter; and a preset formula is introduced, so that the data matching degree of the user is quantized, the accuracy of confirming the identity of the user is favorably improved, and the accuracy of user management is favorably improved.
In one possible example, the police intelligence cloud platform calls a preset model, and determines the target person according to the initial data information and the preset model, including: the police affair information cloud platform calls the smuggler studying and judging model; the police service intelligence cloud platform extracts behavior information in the initial data information; the police service information cloud platform determines a second data matching value of each field worker through the smuggler study and judgment model according to the behavior information; and the police service intelligence cloud platform determines the field personnel with the second data matching value larger than a second threshold value as target personnel according to the second data matching value.
Wherein the behavior information includes group behavior information and individual behavior information.
The police service information cloud platform determines a second data matching value of each field person through the smuggler study and judgment model according to the behavior information, further comprises the characteristic information and the entry and exit record information of the field person, which are acquired by the police service information cloud platform, and automatically studies and judges according to the behavior information of the field person to determine whether the field person is a target person.
The smuggler studying and judging model comprises the steps of analyzing according to user data in a database, and analyzing other potential targets having a group relationship with target personnel starting from communication duration, frequency, a communication graph network structure and the like according to an address list and a call bill communication record of a user; or mining other potential targets having group relations with the targets according to information such as friends and groups (water passenger groups, purchasing groups and the like) of target social software (such as QQ, WeChat, Facebook and Whats APP); or according to the entry and exit records, the portrait snapshot records, the electronic information acquisition records, the virtual identity acquisition records and the vehicle information acquisition records, by means of the same-row and collision operations of the data sets, target persons and/or target vehicles which have the same-row relationship or appear in a plurality of places simultaneously are found out; in an important place such as a port, a bonded area, a non-critical place, and the like, there are cases where there are continuous stays for many days, and there is a large temporal and spatial overlap in time of each stay target. Judging whether the possibility of a group exists between the sojourn persons or not by combining the comprehensive information of the portrait, the mobile phone attribution, the vehicle and the like, if Zhang III is suspected smuggling person, within the last 7 days, Liqu often appears in the same place, and judging whether Zhang III and Liqu are the group or not; or analyzing and extracting identity information of case-involved personnel in all cases according to historical case records, constructing a case-involved relationship network, and mining potential groups possibly associated through key personnel in the cases.
In the concrete implementation, the police service information cloud platform calls the smuggler studying and judging model; the police service information cloud platform extracts behavior information 'carrying illegal articles' in the initial data information of the field personnel H; the police service information cloud platform determines that a second data matching value of each field person is 8 through the smuggler study and judgment model according to the behavior information 'carrying illegal articles'; and the police service intelligence cloud platform determines the field personnel H with the second data matching value 8 larger than a second threshold value 5 as target personnel according to the second data matching value.
As can be seen, in this example, the police intelligence cloud platform calls the smuggler study and judgment model; the police service intelligence cloud platform extracts behavior information in the initial data information; the police service information cloud platform determines a second data matching value of each field worker through the smuggler study and judgment model according to the behavior information; the police service intelligence cloud platform determines the field personnel with the second data matching value larger than a second threshold value as target personnel according to the second data matching value; the behavior of the investigators is analyzed on site, the comprehensiveness and intelligence of personnel management are improved, manpower and material resources are saved, and site intervention and related control are performed on target personnel.
In one possible example, the police intelligence cloud platform determines a second data matching value of each of the field personnel through the smuggler study and judgment model according to the behavior information, and the method includes: the police service information cloud platform determines a plurality of first field personnel corresponding to the group behavior information through the smuggler study and judgment model according to the group behavior information; the police service information cloud platform identifies the face information of the plurality of first field personnel and acquires the personal behavior information of each first field personnel; and the police service intelligence cloud platform determines a second data matching value of each first field person according to the face information and the personal behavior information.
The group behavior information comprises a plurality of carried articles of the field personnel, entry and exit tracks and/or tax records.
In specific implementation, a police intelligence cloud platform determines that forbidden articles exist in a group according to group behavior information, determines a plurality of first field personnel M, N and L corresponding to the group behavior information through a smuggler study and judgment model, identifies face information M2, N2 and L2 of the first field personnel, and acquires personal behavior information M3, N3 and L3 of each first field personnel; the police intelligence cloud platform determines a second data matching value y of each of the first field personnel M, N and L according to the face information M2, N2 and L2 and the personal behavior information M3, N3 and L3M、yNAnd yL
As can be seen, in this example, the police service intelligence cloud platform determines, according to the group behavior information, a plurality of first field personnel corresponding to the group behavior information through the smuggler study and judgment model; the police service information cloud platform identifies the face information of the plurality of first field personnel and acquires the personal behavior information of each first field personnel; the police service intelligence cloud platform determines a second data matching value of each first field person according to the face information and the personal behavior information; the method is favorable for automatically discovering the personnel according to the characteristics of various control objects through big data, so that the automatically discovered target personnel are researched and judged, prediction early warning is realized, relevant control is favorably carried out on non-listed personnel, and further the comprehensiveness of user management is favorably improved.
In one possible example, the police intelligence cloud platform determines a second data matching value of each of the field personnel through the smuggler study and judgment model according to the behavior information, and the method includes: and the police service information cloud platform substitutes the personal behavior information into the smuggler studying and judging model to determine a second data matching value of the field personnel corresponding to the personal behavior information.
The smuggler studying and judging model comprises preset standard behaviors and violation behaviors, personal behavior information of field personnel is input to be matched with the standard behaviors and the violation behaviors, and the identity and the management and control requirements of the field personnel are determined according to a matching result.
In specific implementation, the police service intelligence cloud platform acquires personal behavior information T3 of a field person T, substitutes the personal behavior information T3 into the smuggler study and judgment model, and determines a second data matching value y of the field person T corresponding to the personal behavior information T3T
As can be seen, in this example, the police service intelligence cloud platform substitutes the personal behavior information into the smuggler study and judgment model, and determines a second data matching value of the field personnel corresponding to the personal behavior information; the accuracy of user management is improved.
In one possible example, the police intelligence cloud platform sends relevant information of the target person to a manager, and the relevant information is used for the manager to manage the target person, and the method includes the following steps: the police service information cloud platform determines the grade of the target person to be early-warned according to the relevant information of the target person; and the police service information cloud platform adopts a corresponding preset control means according to the grade to be pre-warned, so as to manage the target personnel.
And different levels to be early-warned correspond to different early-warning strategies, so that management personnel can conveniently manage and control the target personnel.
In the specific implementation, the police service information cloud platform determines the grade to be early-warned of the target personnel as first-stage early warning according to the related information of the target personnel; and the police service information cloud platform takes a corresponding preset control means according to the grade to be early-warned to take away and inquire the target personnel.
As can be seen, in this example, the police service intelligence cloud platform determines the level to be warned of the target person according to the relevant information of the target person; the police service information cloud platform adopts a corresponding preset control means according to the grade to be early warned, and then manages the target personnel; the method is beneficial to performing field intervention on target personnel, adopting control means, and achieving the purpose of accurately striking smuggling smuggled personnel through key investigation and other means.
Referring to fig. 2, fig. 2 is a schematic flow chart of another user management method provided in the embodiment of the present application, and the method is applied to a police intelligence cloud platform; as shown in the figure, the user management method includes:
s201, the police service information cloud platform acquires initial data information of field personnel entering and exiting the entrance hall;
s202, the police service intelligence cloud platform calls the smuggler discovery model;
s203, the police service intelligence cloud platform extracts name information, gender information and age information in the initial data information;
s204, the police service intelligence cloud platform substitutes the name information, the gender information and the age information into the smuggler discovery model to determine a first data matching value of each field worker;
s205, the police service intelligence cloud platform determines the field personnel with the first data matching value larger than a first threshold value as target personnel according to the first data matching value;
s206, the police service intelligence cloud platform sends the related information of the target personnel to a manager, and the related information is used for the manager to manage the target personnel.
It can be seen that, in the embodiment of the application, a user management method and related products are provided, which are applied to a police service information cloud platform; the method comprises the following steps: firstly, an police service information cloud platform acquires initial data information of field personnel entering and leaving an entrance hall, then the police service information cloud platform calls a preset model, then a target person is determined according to the initial data information and the preset model, wherein the preset model comprises a smuggler discovery model and a smuggler study and judgment model, the target person refers to a user which is detected by equipment and presents the characteristics of a person carrying smuggled articles, and finally the police service information cloud platform sends related information of the target person to a manager, and the related information is used for the manager to manage the target person. Therefore, initial data information is processed through the preset model, situation perception, dynamic management and control, prediction and early warning of target personnel are achieved, overall resultant force in the aspects of data total amount, storage capacity, processing capacity and the like is optimized, and high efficiency and convenience of user management are improved.
In addition, the police intelligence cloud platform calls the smuggler discovery model; the police affair information cloud platform extracts name information, gender information and age information in the initial data information; the police service information cloud platform substitutes the name information, the gender information and the age information into the smuggler discovery model to determine a first data matching value of each field worker; the police service intelligence cloud platform determines the field personnel with the first data matching value larger than a first threshold value as target personnel according to the first data matching value; the method and the system are favorable for improving the management and control of the personnel with definite identity, namely the listed famous personnel, and are favorable for improving the efficiency and convenience of user management.
Referring to fig. 3, please refer to fig. 3 in accordance with the embodiment shown in fig. 1B, where fig. 3 is a schematic flowchart of another user management method provided in the embodiment of the present application, and is applied to a police intelligence cloud platform; as shown in the figure, the user management method includes:
s301, the police service information cloud platform acquires initial data information of field personnel entering and exiting the entrance hall;
s302, the police service intelligence cloud platform calls the smuggler discovery model;
s303, the police service intelligence cloud platform extracts name information, gender information and age information in the initial data information;
s304, the police service intelligence cloud platform queries a preset mapping relation table by taking the name information as a query identifier to obtain the target gender and the target age corresponding to the name information;
s305, the police service information cloud platform compares the target gender with the gender information, compares the target age with the age information at the same time, and determines a gender parameter and an age parameter;
s306, the police service intelligence cloud platform determines a first data matching value according to a preset formula, the gender parameter and the age parameter;
s307, the police service intelligence cloud platform determines the field personnel with the first data matching value larger than a first threshold value as target personnel according to the first data matching value;
and S308, the police service information cloud platform sends the related information of the target personnel to a manager, and the related information is used for the manager to manage the target personnel.
It can be seen that, in the embodiment of the application, a user management method and related products are provided, which are applied to a police service information cloud platform; the method comprises the following steps: firstly, an police service information cloud platform acquires initial data information of field personnel entering and leaving an entrance hall, then the police service information cloud platform calls a preset model, then a target person is determined according to the initial data information and the preset model, wherein the preset model comprises a smuggler discovery model and a smuggler study and judgment model, the target person refers to a user which is detected by equipment and presents the characteristics of a person carrying smuggled articles, and finally the police service information cloud platform sends related information of the target person to a manager, and the related information is used for the manager to manage the target person. Therefore, initial data information is processed through the preset model, situation perception, dynamic management and control, prediction and early warning of target personnel are achieved, overall resultant force in the aspects of data total amount, storage capacity, processing capacity and the like is optimized, and high efficiency and convenience of user management are improved.
In addition, the police intelligence cloud platform substitutes the name information, the gender information and the age information into the smuggler discovery model, determines a first data matching value for each of the field personnel, including: the police affair information cloud platform queries a preset mapping relation table by taking the name information as a query identifier to obtain the target gender and the target age corresponding to the name information; the police affair information cloud platform compares the target gender with the gender information, compares the target age with the age information at the same time, and determines a gender parameter and an age parameter; the police service information cloud platform determines a first data matching value according to a preset formula, the gender parameter and the age parameter; and a preset formula is introduced, so that the data matching degree of the user is quantized, the accuracy of confirming the identity of the user is favorably improved, and the accuracy of user management is favorably improved.
Consistent with the embodiments shown in fig. 1B, fig. 2, and fig. 3, please refer to fig. 4, and fig. 4 is a schematic structural diagram of an electronic device 400 provided in an embodiment of the present application, as shown in the figure, the electronic device 400 includes an application processor 410, a memory 420, a communication interface 430, and one or more programs 421, where the one or more programs 421 are stored in the memory 420 and configured to be executed by the application processor 410, and the one or more programs 421 include instructions for performing the following steps;
acquiring initial data information of field personnel entering and exiting a hall;
calling a preset model, and determining a target person according to the initial data information and the preset model, wherein the preset model comprises a smuggler discovery model and a smuggler study and judgment model, and the target person refers to a user who is detected by equipment and presents the characteristics of a person carrying smuggled articles;
and sending the related information of the target personnel to a manager, wherein the related information is used for the manager to manage the target personnel.
It can be seen that, in the embodiment of the application, a user management method and related products are provided, which are applied to a police service information cloud platform; the method comprises the following steps: firstly, an police service information cloud platform acquires initial data information of field personnel entering and leaving an entrance hall, then the police service information cloud platform calls a preset model, then a target person is determined according to the initial data information and the preset model, wherein the preset model comprises a smuggler discovery model and a smuggler study and judgment model, the target person refers to a user which is detected by equipment and presents the characteristics of a person carrying smuggled articles, and finally the police service information cloud platform sends related information of the target person to a manager, and the related information is used for the manager to manage the target person. Therefore, initial data information is processed through the preset model, situation perception, dynamic management and control, prediction and early warning of target personnel are achieved, overall resultant force in the aspects of data total amount, storage capacity, processing capacity and the like is optimized, and high efficiency and convenience of user management are improved.
In one possible example, the preset model is called, and the target person is determined according to the initial data information and the preset model, and the instructions in the program are specifically configured to perform the following operations: calling the smuggling person discovery model; extracting name information, gender information and age information in the initial data information, wherein each name information corresponds to one field person; substituting the name information, the gender information and the age information into the smuggler discovery model to determine a first data matching value of each field person; and determining the field personnel with the first data matching value larger than a first threshold value as target personnel according to the first data matching value.
In one possible example, the substituting the name information, the gender information, and the age information into the smuggled people discovery model determines a first data match value for each of the field people, and the instructions in the program are specifically configured to: inquiring a preset mapping relation table by taking the name information as an inquiry identifier to obtain the target gender and the target age corresponding to the name information; comparing the target gender with the gender information, simultaneously comparing the target age with the age information, and determining a gender parameter and an age parameter; determining a first data matching value according to a preset formula, the gender parameter and the age parameter, wherein the preset formula comprises x ═ a × b, a represents the gender parameter, b represents the age parameter, and x represents the first data matching value.
In one possible example, the preset model is called, and the target person is determined according to the initial data information and the preset model, and the instructions in the program are specifically configured to perform the following operations: calling the smuggling personnel studying and judging model; extracting behavior information in the initial data information, wherein the behavior information comprises group behavior information and personal behavior information; determining a second data matching value of each field person through the smuggler study and judgment model according to the behavior information; and according to the second data matching value, determining the field personnel with the second data matching value larger than a second threshold value as target personnel.
In a possible example, the determining, according to the behavior information and through the smuggler study and judgment model, a second data matching value of each of the field personnel is specifically performed by instructions in the program: determining a plurality of first field personnel corresponding to the group behavior information through the smuggler study and judgment model according to the group behavior information; identifying the face information of the plurality of first field personnel, and acquiring the personal behavior information of each first field personnel; and determining a second data matching value of each first field person according to the face information and the personal behavior information.
In a possible example, the determining, according to the behavior information and through the smuggler study and judgment model, a second data matching value of each of the field personnel is specifically performed by instructions in the program: and substituting the personal behavior information into the study and judgment model of the smuggler, and determining a second data matching value of the field personnel corresponding to the personal behavior information.
In one possible example, the sending of the relevant information of the target person to the manager is performed, where the relevant information is used for the manager to manage the target person, and the instructions in the program are specifically used for performing the following operations: determining the grade to be pre-warned of the target person according to the relevant information of the target person; and adopting a corresponding preset control means according to the grade to be pre-warned, and further managing the target personnel.
The above description has introduced the solution of the embodiment of the present application mainly from the perspective of the method-side implementation process. It is understood that the electronic device comprises corresponding hardware structures and/or software modules for performing the respective functions in order to realize the above-mentioned functions. Those of skill in the art will readily appreciate that the present application is capable of hardware or a combination of hardware and computer software implementing the various illustrative elements and algorithm steps described in connection with the embodiments provided herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the electronic device may be divided into the functional units according to the method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Fig. 5 is a block diagram showing functional units of the user management apparatus 500 according to the embodiment of the present application. The user management device 500 is applied to a police intelligence cloud platform, and comprises a processing unit 501, a communication unit 502 and a storage unit 503, wherein,
the processing unit 501 is configured to obtain initial data information of field personnel entering and exiting the lobby; the system comprises a device and a system management module, wherein the device is used for calling a preset model and determining a target person according to the initial data information and the preset model, the preset model comprises a smuggler discovery model and a smuggler study and judgment model, and the target person refers to a user who is detected by the device and presents the characteristics of a person carrying smuggled articles; and the system is used for sending the related information of the target personnel to a manager, and the related information is used for the manager to manage the target personnel.
It can be seen that, in the embodiment of the application, a user management method and related products are provided, which are applied to a police service information cloud platform; the method comprises the following steps: firstly, an police service information cloud platform acquires initial data information of field personnel entering and leaving an entrance hall, then the police service information cloud platform calls a preset model, then a target person is determined according to the initial data information and the preset model, wherein the preset model comprises a smuggler discovery model and a smuggler study and judgment model, the target person refers to a user which is detected by equipment and presents the characteristics of a person carrying smuggled articles, and finally the police service information cloud platform sends related information of the target person to a manager, and the related information is used for the manager to manage the target person. Therefore, initial data information is processed through the preset model, situation perception, dynamic management and control, prediction and early warning of target personnel are achieved, overall resultant force in the aspects of data total amount, storage capacity, processing capacity and the like is optimized, and high efficiency and convenience of user management are improved.
It can be understood that, since the method embodiment and the apparatus embodiment are different presentation forms of the same technical concept, the content of the method embodiment portion in the present application should be synchronously adapted to the apparatus embodiment portion, and is not described herein again.
In a possible example, the preset model is called, and the target person is determined according to the initial data information and the preset model, and the processing unit 501 is specifically configured to: calling the smuggling person discovery model; extracting name information, gender information and age information in the initial data information, wherein each name information corresponds to one field person; substituting the name information, the gender information and the age information into the smuggler discovery model to determine a first data matching value of each field person; and determining the field personnel with the first data matching value larger than a first threshold value as target personnel according to the first data matching value.
In a possible example, the processing unit 501 is specifically configured to substitute the name information, the gender information, and the age information into the smuggling person discovery model to determine a first data matching value of each of the field persons: inquiring a preset mapping relation table by taking the name information as an inquiry identifier to obtain the target gender and the target age corresponding to the name information; comparing the target gender with the gender information, simultaneously comparing the target age with the age information, and determining a gender parameter and an age parameter; determining a first data matching value according to a preset formula, the gender parameter and the age parameter, wherein the preset formula comprises x ═ a × b, a represents the gender parameter, b represents the age parameter, and x represents the first data matching value.
In a possible example, the preset model is called, and the target person is determined according to the initial data information and the preset model, and the processing unit 501 is specifically configured to: calling the smuggling personnel studying and judging model; extracting behavior information in the initial data information, wherein the behavior information comprises group behavior information and personal behavior information; determining a second data matching value of each field person through the smuggler study and judgment model according to the behavior information; and according to the second data matching value, determining the field personnel with the second data matching value larger than a second threshold value as target personnel.
In a possible example, the processing unit 501 is specifically configured to determine, according to the behavior information, a second data matching value of each of the field personnel through the smuggler study and judgment model, and to: determining a plurality of first field personnel corresponding to the group behavior information through the smuggler study and judgment model according to the group behavior information; identifying the face information of the plurality of first field personnel, and acquiring the personal behavior information of each first field personnel; and determining a second data matching value of each first field person according to the face information and the personal behavior information.
In a possible example, the processing unit 501 is specifically configured to determine, according to the behavior information, a second data matching value of each of the field personnel through the smuggler study and judgment model, and to: and substituting the personal behavior information into the study and judgment model of the smuggler, and determining a second data matching value of the field personnel corresponding to the personal behavior information.
In a possible example, the sending of the relevant information of the target person to a manager is performed, where the relevant information is used for the manager to manage the target person, and the processing unit 501 is specifically configured to: determining the grade to be pre-warned of the target person according to the relevant information of the target person; and adopting a corresponding preset control means according to the grade to be pre-warned, and further managing the target personnel.
Embodiments of the present application also provide a computer storage medium, where the computer storage medium stores a computer program for electronic data exchange, the computer program enabling a computer to execute part or all of the steps of any one of the methods described in the above method embodiments, and the computer includes an electronic device.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as described in the above method embodiments. The computer program product may be a software installation package, the computer comprising an electronic device.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit may be stored in a computer readable memory if it is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above-mentioned method of the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A user management method is characterized in that the method is applied to a police affair information cloud platform; the method comprises the following steps:
acquiring initial data information of field personnel entering and exiting a hall;
calling a preset model, and determining a target person according to the initial data information and the preset model, wherein the preset model comprises a smuggler discovery model and a smuggler study and judgment model, and the target person refers to a user who is detected by equipment and presents the characteristics of a person carrying smuggled articles;
and sending the related information of the target personnel to a manager, wherein the related information is used for the manager to manage the target personnel.
2. The method of claim 1, wherein the invoking a preset model and determining a target person based on the initial data information and the preset model comprises:
calling the smuggling person discovery model;
extracting name information, gender information and age information in the initial data information, wherein each name information corresponds to one field person;
substituting the name information, the gender information and the age information into the smuggler discovery model to determine a first data matching value of each field person;
and determining the field personnel with the first data matching value larger than a first threshold value as target personnel according to the first data matching value.
3. The method of claim 2, wherein said substituting said name information, said gender information, and said age information into said smuggled people discovery model to determine a first data match value for each of said field people comprises:
inquiring a preset mapping relation table by taking the name information as an inquiry identifier to obtain the target gender and the target age corresponding to the name information;
comparing the target gender with the gender information, simultaneously comparing the target age with the age information, and determining a gender parameter and an age parameter;
determining a first data matching value according to a preset formula, the gender parameter and the age parameter, wherein the preset formula comprises y ═ a × b, a represents the gender parameter, b represents the age parameter, and y represents the first data matching value.
4. The method of claim 1, wherein the invoking a preset model and determining a target person based on the initial data information and the preset model comprises:
calling the smuggling personnel studying and judging model;
extracting behavior information in the initial data information, wherein the behavior information comprises group behavior information and personal behavior information;
determining a second data matching value of each field person through the smuggler study and judgment model according to the behavior information;
and according to the second data matching value, determining the field personnel with the second data matching value larger than a second threshold value as target personnel.
5. The method of claim 4, wherein determining a second data match value for each of the field personnel through the smuggler study model according to the behavior information comprises:
determining a plurality of first field personnel corresponding to the group behavior information through the smuggler study and judgment model according to the group behavior information;
identifying the face information of the plurality of first field personnel, and acquiring the personal behavior information of each first field personnel;
and determining a second data matching value of each first field person according to the face information and the personal behavior information.
6. The method of claim 4, wherein determining a second data match value for each of the field personnel through the smuggler study model according to the behavior information comprises:
and substituting the personal behavior information into the study and judgment model of the smuggler, and determining a second data matching value of the field personnel corresponding to the personal behavior information.
7. The method of claim 1, wherein the sending of the relevant information of the target person to a manager, the relevant information being used by the manager to manage the target person, comprises:
determining the grade to be pre-warned of the target person according to the relevant information of the target person;
and adopting a corresponding preset control means according to the grade to be pre-warned, and further managing the target personnel.
8. The user management device is characterized by being applied to a police affair information cloud platform; the user management apparatus includes a processing unit, a communication unit, and a storage unit, wherein,
the processing unit is used for acquiring initial data information of field personnel entering and exiting the entrance hall; the system comprises a device and a system management module, wherein the device is used for calling a preset model and determining a target person according to the initial data information and the preset model, the preset model comprises a smuggler discovery model and a smuggler study and judgment model, and the target person refers to a user who is detected by the device and presents the characteristics of a person carrying smuggled articles; and the system is used for sending the related information of the target personnel to a manager, and the related information is used for the manager to manage the target personnel.
9. An electronic device comprising a processor, a memory, a communication interface, and one or more programs stored in the memory and configured to be executed by the processor, the programs comprising instructions for performing the steps in the method of any of claims 1-7.
10. A computer-readable storage medium, characterized in that a computer program for electronic data exchange is stored, wherein the computer program causes a computer to perform the method according to any one of claims 1-7.
CN202010445685.6A 2020-05-22 2020-05-22 User management method and related product Pending CN111737309A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010445685.6A CN111737309A (en) 2020-05-22 2020-05-22 User management method and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010445685.6A CN111737309A (en) 2020-05-22 2020-05-22 User management method and related product

Publications (1)

Publication Number Publication Date
CN111737309A true CN111737309A (en) 2020-10-02

Family

ID=72647671

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010445685.6A Pending CN111737309A (en) 2020-05-22 2020-05-22 User management method and related product

Country Status (1)

Country Link
CN (1) CN111737309A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106960172A (en) * 2016-01-08 2017-07-18 中兴通讯股份有限公司 Personal identification processing method, apparatus and system
WO2018119599A1 (en) * 2016-12-26 2018-07-05 深圳前海达闼云端智能科技有限公司 Method and device for searching for person and communication system
CN108520438A (en) * 2018-03-30 2018-09-11 北京小米移动软件有限公司 Behavior type determines method and device
CN109522342A (en) * 2018-11-30 2019-03-26 北京百度网讯科技有限公司 Police affairs management method, device, equipment and storage medium
CN109800656A (en) * 2018-12-25 2019-05-24 深圳市天彦通信股份有限公司 Localization method and Related product
CN109886101A (en) * 2018-12-29 2019-06-14 江苏云天励飞技术有限公司 Posture identification method and relevant apparatus
CN110176117A (en) * 2019-06-17 2019-08-27 广东翔翼科技信息有限公司 A kind of monitoring device and monitoring method of Behavior-based control identification technology
CN110688931A (en) * 2019-09-20 2020-01-14 北京百分点信息科技有限公司 Abnormal behavior monitoring method and device, storage medium and electronic equipment
CN110795963A (en) * 2018-08-01 2020-02-14 深圳云天励飞技术有限公司 Monitoring method, device and equipment based on face recognition

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106960172A (en) * 2016-01-08 2017-07-18 中兴通讯股份有限公司 Personal identification processing method, apparatus and system
WO2018119599A1 (en) * 2016-12-26 2018-07-05 深圳前海达闼云端智能科技有限公司 Method and device for searching for person and communication system
CN108520438A (en) * 2018-03-30 2018-09-11 北京小米移动软件有限公司 Behavior type determines method and device
CN110795963A (en) * 2018-08-01 2020-02-14 深圳云天励飞技术有限公司 Monitoring method, device and equipment based on face recognition
CN109522342A (en) * 2018-11-30 2019-03-26 北京百度网讯科技有限公司 Police affairs management method, device, equipment and storage medium
CN109800656A (en) * 2018-12-25 2019-05-24 深圳市天彦通信股份有限公司 Localization method and Related product
CN109886101A (en) * 2018-12-29 2019-06-14 江苏云天励飞技术有限公司 Posture identification method and relevant apparatus
CN110176117A (en) * 2019-06-17 2019-08-27 广东翔翼科技信息有限公司 A kind of monitoring device and monitoring method of Behavior-based control identification technology
CN110688931A (en) * 2019-09-20 2020-01-14 北京百分点信息科技有限公司 Abnormal behavior monitoring method and device, storage medium and electronic equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张蕾华;牛红太;王仲妮;刘雪红;: "基于大数据的前科人员犯罪预警模型构建研究", 信息网络安全, no. 04, pages 88 - 95 *
王帅鹏;赵凯;: "基于图像处理的人员异常行为监测设计", 现代电子技术, no. 06, pages 119 - 122 *

Similar Documents

Publication Publication Date Title
CN106375331B (en) Attack organization mining method and device
CN107870983A (en) Vehicle peccancy approaches to IM, block chain and storage medium based on block chain
CN110414987B (en) Account set identification method and device and computer system
CN107808502B (en) A kind of image detection alarm method and device
CN110177255B (en) Case scheduling-based video information publishing method and system
CN106911670B (en) Privacy protection system and method in Internet of vehicles
CN109753848B (en) Method, device and system for executing face recognition processing
CN104836781A (en) Method distinguishing identities of access users, and device
WO2020125098A1 (en) Vehicle information management method, and related apparatus
CN110619277A (en) Multi-community intelligent deployment and control method and system
CN108053111B (en) Elevator shunting method and system
CN115348080B (en) Comprehensive analysis system and method for vulnerability of network equipment based on big data
CN110675252A (en) Risk assessment method and device, electronic equipment and storage medium
CN110796578A (en) Judgment method and device for grading rescue, computer equipment and storage medium
CN112184241A (en) Identity authentication method and device
CN111310612A (en) Behavior supervision method and device
CN114338915A (en) Caller ID risk identification method, caller ID risk identification device, caller ID risk identification equipment and storage medium
CN113254769A (en) Information technology consultation service system based on Internet
CN111737309A (en) User management method and related product
CN110365642A (en) Method, apparatus, computer equipment and the storage medium of monitoring information operation
CN110697518A (en) Method for matching elevator control authority, community server and storage medium
CN115603944A (en) Vehicle data safety management method based on Internet of vehicles
CN111489276B (en) Personnel management method and related device
Bogdanov et al. Risk model of application of lifting methods
CN113190200A (en) Exhibition data security protection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination