CN112527934A - Visitor travel analysis method and device, electronic equipment and storage medium - Google Patents

Visitor travel analysis method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112527934A
CN112527934A CN202011431994.4A CN202011431994A CN112527934A CN 112527934 A CN112527934 A CN 112527934A CN 202011431994 A CN202011431994 A CN 202011431994A CN 112527934 A CN112527934 A CN 112527934A
Authority
CN
China
Prior art keywords
visitor
data
analysis
information
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011431994.4A
Other languages
Chinese (zh)
Inventor
吴岩
侯怀德
孙中山
潘乐扬
戈东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Skycomm Co ltd
Original Assignee
Shenzhen Skycomm Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Skycomm Co ltd filed Critical Shenzhen Skycomm Co ltd
Priority to CN202011431994.4A priority Critical patent/CN112527934A/en
Publication of CN112527934A publication Critical patent/CN112527934A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/29Geographical information databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10544Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
    • G06K7/10821Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Electromagnetism (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Remote Sensing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to the technical field of artificial intelligence, and particularly discloses a visitor journey analysis method, a visitor journey analysis device, electronic equipment and a storage medium, wherein the visitor journey analysis method comprises the following steps: receiving identity information of the visitor from the user equipment, wherein the identity information is obtained by scanning a preset two-dimensional code by an application program installed on the user equipment, and the application program is used for controlling and controlling functions of the user equipment; inquiring a first database according to the identity information to obtain a visit record of the visitor, wherein the visit record comprises a historical visit place; determining the visiting times of the visitor according to the historical visiting place; if the visit times are larger than a preset threshold value, performing first analysis on the current travel information of the visitor to determine whether the current travel information is legal or not; and if the visiting times is less than or equal to the threshold value, carrying out second analysis on the current travel information of the visitor so as to determine whether the current travel information is legal or not.

Description

Visitor travel analysis method and device, electronic equipment and storage medium
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to a visitor journey analysis method and device based on user equipment control, electronic equipment and a storage medium.
Background
Due to social needs, there is a group of specific places that need information privacy or strict regulations, which are unavoidable in society, such as: prison, high-confidentiality research room, enterprise core site, etc. However, even in specific places where information is required to be kept secret or strictly regulated, some special access requests cannot be completely rejected. Therefore, when the visit of the visitor is finished, the visit journey of the visitor needs to be analyzed to ensure that the visitor does not make things forbidden by the visit place or bring relevant information of the visit place.
At present, adopt the video recording when professional visits the visitor to carry out the analysis usually, simultaneously, through the electronic equipment who collects the visitor to and the mode of dispatching the special messenger to accompany, carry out the management and control to the visitor's journey. However, the method has low treatment efficiency, high requirement on accompanying personnel and huge labor cost.
Disclosure of Invention
In order to solve the problems in the prior art, the embodiment of the application provides a visitor journey analysis method, a visitor journey analysis device, electronic equipment and a storage medium, so that automatic analysis of visitor journeys can be achieved, and labor cost is reduced.
In a first aspect, an embodiment of the present application provides a visitor journey analysis method, including:
receiving identity information of a visitor from user equipment, wherein the identity information is obtained by scanning a preset two-dimensional code by an application program installed on the user equipment, and the application program is used for managing and controlling functions of the user equipment;
inquiring a first database according to the identity information to obtain a visit record of the visitor, wherein the visit record comprises a historical visit place;
determining the visiting times of the visitor according to the historical visiting place;
if the visiting times is larger than a preset threshold value, performing first analysis on the current travel information of the visitor to determine whether the current travel information is legal or not;
and if the visiting times is less than or equal to the threshold value, performing second analysis on the current travel information of the visitor to determine whether the current travel information is legal.
In a second aspect, an embodiment of the present application provides a visitor journey analysis apparatus, including:
the system comprises a data acquisition module, a processing module and a processing module, wherein the data acquisition module is used for receiving identity information of a visitor from user equipment, the identity information is obtained by scanning a preset two-dimensional code through an application program installed on the user equipment, and the application program is used for controlling the function of the user equipment;
the data query module is used for querying a first database according to the identity information and acquiring the visit record of the visitor, wherein the visit record comprises a historical visit place;
the data analysis module is used for determining the visiting times of the visitor according to the historical visiting place;
if the visiting times is larger than a preset threshold value, performing first analysis on the current travel information of the visitor to determine whether the current travel information is legal or not;
and if the visiting times is less than or equal to the threshold value, performing second analysis on the current travel information of the visitor to determine whether the current travel information is legal.
In a third aspect, an embodiment of the present application provides an electronic device, including: a processor coupled to a memory, the memory configured to store a computer program, the processor configured to execute the computer program stored in the memory to cause the electronic device to perform the method of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium storing a computer program, the computer program causing a computer to execute the method according to the first aspect.
In a fifth aspect, embodiments of the present application provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program, the computer operable to cause a computer to perform a method according to the first aspect.
The implementation of the embodiment of the application has the following beneficial effects:
it can be seen that in the embodiment of the application, by acquiring the visit times of the visitors, different journey analysis processes are respectively executed for the visitors with more visit times and the visitors with less visit times. The automatic analysis of the current journey of the visitor is realized, and the labor cost is reduced. Meanwhile, different travel analysis modes are determined based on the visit records, and the travel analysis efficiency is further improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic flowchart of a visitor journey analysis method according to an embodiment of the present disclosure;
fig. 2 is a schematic flow chart of behavior analysis provided in the embodiment of the present application;
fig. 3 is a block diagram illustrating functional modules of a visitor travel analysis apparatus according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments obtained by a person of ordinary skill in the art without any inventive work based on the embodiments in the present application are within the scope of protection of the present application.
The terms "first," "second," "third," and "fourth," etc. in the description and claims of this application and in the accompanying drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, result, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Referring to fig. 1, fig. 1 is a schematic flowchart of a visitor travel analysis method according to an embodiment of the present disclosure. The visitor journey analysis method comprises the following steps:
101: identity information of the visitor is received from the user equipment.
In this embodiment, the identity information is sent by an application installed on the user equipment, and the application is used for controlling the functions of the user equipment.
Illustratively, the user device may be an electronic device such as a mobile phone, a tablet computer, etc. in which an application program may be installed. When a visitor enters a specific place needing information confidentiality or strict control, the application program is downloaded in a two-dimensional code scanning mode, and after registration and identity verification are carried out, the control function of the application program is started, so that the control on the functions of user equipment is realized, and information stealing behaviors such as shooting, sound recording and video recording are prevented.
After the visitor finishes visiting and applies for leaving, the application program can scan the two-dimensional code, and the personal information filled in during registration, such as: and submitting the name, the identity card number, the face information and the like of the visitor to a system background for identity verification. Of course, authentication may also be performed in other ways, such as: face identification, fingerprint identification, NFC communication etc. mode, this application is not restricted to this.
102: and inquiring the first database according to the identity information to obtain the visit record of the visitor.
In this embodiment, the call record may include a historical call location.
103: and determining the visiting times of the visitor according to the historical visiting place.
For example, the historical visiting place can be screened according to the address of the visiting place, and the visiting times of the visitor to the visiting place can be determined. In an alternative embodiment, the visit record may further include historical visit times, and the historical visit times correspond to historical visit locations one to one. Therefore, the time period can be defined according to the historical visiting time, and then the visitor can be screened according to the historical visiting place to obtain the visiting times of the visitor to the visiting place in a certain time period.
Therefore, by combining historical visiting time, the visiting times of the visitor in a relatively short time period can be determined, invalid visiting records with relatively long time are removed, and the selection of a subsequent analysis mode is more accurate and scientific.
104: and whether the visit times are greater than a preset threshold value or not, if so, executing the processing 105, and otherwise, executing the processing 106.
105: a first analysis is performed on current trip information for a visitor.
The visiting times is larger than the preset threshold value, which indicates that the visitor is a visitor visiting frequently, and the visiting process before the visitor complies with the requirement. Therefore, the safety factor of the visitor is high, and only some simple visit journey analysis is carried out on the visitor.
In the present embodiment, the first analysis mainly analyzes the travel route of the visitor. Firstly, requesting to obtain the current journey information of the visitor from the user equipment, and determining the journey path of the visitor according to the current journey information.
Illustratively, after a visitor enters an access place, a system background sends a simple map of the access place to user equipment carried by the visitor through an application program, and an entrance is marked on the simple map as a starting point. During the visiting process of the visitor, the application program installed on the user equipment receives the wireless signals preset in the visiting place, determines the specific position of the visitor in the visiting place and marks the specific position on the simple map. Based on this, when the visitor finishes the visit, the path that he or she walks while visiting is drawn on the simple map.
Illustratively, for the wireless signal preset in the visiting place, a WiFi signal may be used. In the present embodiment, a WiFi signal transmitter may be provided in advance at some specific location of the visiting place. When a visitor enters, the visitor downloads an application program through scanning the two-dimensional code, installs and registers the application program, and meanwhile, the system background sends the registration number of the application program to the WiFi signal transmitter. The WiFi signal transmitter sends WiFi signals to user equipment of the visitor through the registration number, and angle information and distance information of the visitor relative to the WiFi signal transmitter are determined according to signals fed back by the user equipment. Therefore, the current position of the visitor can be determined by integrating the positioning information of the plurality of WiFi signal transmitters. Of course, the current location information of the passenger may be determined in other ways, such as: GPS signals, surveillance cameras, and the like, but the present application is not limited thereto.
In this embodiment, the simple map for recording the route of the visitor may be marked with an overlap mark, so that after the simple map including the route of the visitor is acquired, the simple map and the map of the access place may be overlapped according to the overlap mark, and the map of the access place including the route of the visitor may be acquired. Wherein, the map of the visit place is marked with a forbidden zone, namely an area which is forbidden to visit in the visit place. And finally, determining whether the visitor visits the forbidden zone or not by confirming whether the travel path of the visitor is overlapped with the forbidden zone or not. If the visitor does not access the forbidden zone, the first analysis is passed, and the current journey information is judged to be legal.
Therefore, the journey path of the visitor can be generated quickly, and whether the visitor enters the forbidden zone or not can be determined, so that the efficiency of journey analysis is improved.
106: a second analysis is performed on the current itinerary information for the visitor.
The number of visits is less than or equal to a preset threshold, which indicates that the visitor is a less frequently visited visitor or a new visitor, and the database contains fewer visit records. Therefore, the security factor of the visitor cannot be determined, and a more complicated trip analysis is required for it.
In this embodiment, the second analysis mainly analyzes the travel path, the stay, and the behavior of the visitor, and may include path analysis, stay analysis, and behavior analysis, and when the path analysis, the stay analysis, and the behavior analysis all pass, it is determined that the current travel information of the visitor is legal.
Hereinafter, the path analysis, the stay analysis, and the behavior analysis will be described in detail, respectively.
(1) Path analysis:
in this embodiment, the path analysis is similar to the first analysis, and is not described herein again.
(2) And (3) residence analysis:
in general, leaving a place too long may be questionable, and leaving too long may be even more questionable for certain locations where information is to be kept secret or strictly regulated. Therefore, analysis of the stay behavior of the visitor is required.
In this embodiment, at least one place of stay and at least one time of stay of a visitor may be obtained through an application installed on a user equipment carried by the visitor, where the at least one place of stay and the at least one time of stay are in one-to-one correspondence.
For example, a determination time may be preset, and when the location information of the visitor has not changed beyond the determination time, the visitor is determined to enter the stay state. At this time, the application records the position information, starts a timer, and records the retention time.
In the present embodiment, a dwell time threshold is set for each area in advance according to the importance of each area for the visiting place. For each stopping place in the at least one stopping place, the area where the stopping place is located is determined according to the position information of each stopping place, and then the corresponding stopping time threshold value is obtained. And if the residence time corresponding to each residence point does not exceed the residence time threshold corresponding to each residence point, the residence analysis is passed.
(3) And (3) behavior analysis:
referring to fig. 2, fig. 2 is a schematic flow chart of behavior analysis according to an embodiment of the present disclosure. The acts include the steps of:
201: and acquiring at least one recording datum according to the user equipment.
For example, an application installed on the user equipment may start a monitoring function to record the whole access process. In an alternative embodiment, the part of the whole recording that the visitor communicates can be intercepted, and the time information can be added and stored separately. Therefore, subsequent analysis is facilitated, and the efficiency of stroke analysis is further improved.
202: and carrying out face matching on the face information in the identity information of the visitor and the video in the video database, and screening out at least one video data containing the visitor.
In the present embodiment, the video database is connected to all the video devices in the access place, and stores videos shot by the video devices. Through face recognition matching, the picture shot by the video equipment in the visiting process of the visitor can be quickly found out. In an optional embodiment, the recording devices in each area may also be queried according to the travel route of the visitor in combination with the travel time, so as to obtain the recording data including the visitor. The method for obtaining the video data containing the visitor is not limited.
203: and analyzing whether the at least one sound recording data and the at least one video recording data contain sensitive information according to the sensitive database.
In this embodiment, the sensitive information includes sensitive actions and sensitive words.
Meanwhile, since the judgment of the simple sensitive action or the sensitive word is likely to cause misjudgment, in the embodiment, the judgment is performed after the audio recording data and the video recording data are matched according to time.
For example, first, for each sound recording data of the at least one sound recording data, first time data of each sound recording data is acquired, and the first time data is used for marking a recording time of each sound recording data. And for each video data in the at least one video data, respectively acquiring second time data of each video data, wherein the second time data is used for marking the video time of each video data.
Then, comparing each first time data in the at least one first time data with each second time data in the at least one second time data, and matching the sound recording data corresponding to each first time data with the video recording data corresponding to each second time data to obtain at least one behavior data if a coincident time segment exists between each first time data and each second time data.
And finally, analyzing whether the at least one behavior data contains the sensitive information or not according to a sensitive database. Therefore, the sensitive word judgment result and the sensitive action judgment result are verified mutually, and the sensitive judgment accuracy is improved.
For example, for each behavior data in the at least one behavior data, each behavior data may be analyzed frame by frame to obtain an image of each sub-action of each behavior data, and the image of each sub-action may be compared with the action image of the sensitive action to obtain at least one first similarity.
Meanwhile, for each behavior data in the at least one behavior data, performing voice segmentation on each behavior data to obtain each sub-audio of each behavior data, and comparing each sub-audio with the audio of the sensitive word to obtain at least one second similarity.
And if one of the at least one first similarity is larger than a first threshold value and/or one of the at least one second similarity is larger than a second threshold value, judging that the behavior data contains the sensitive information.
204: and if the at least one sound recording data and the at least one video recording data have no sensitive information, the behavior analysis is passed.
In summary, the visitor itinerary analysis method provided by the present invention, by obtaining the visit times of visitors, performs different itinerary analysis processes for visitors with a high visit time and visitors with a low visit time, specifically, performs a simple first analysis for visitors with a high visit time, and performs a complex second analysis for visitors with a low visit time. The automatic analysis of the current journey of the visitor is realized, and the labor cost is reduced. Meanwhile, different travel analysis modes are determined based on the visit records, and the travel analysis efficiency is further improved.
Referring to fig. 3, fig. 3 is a block diagram illustrating functional modules of a visitor travel analysis apparatus according to an embodiment of the present disclosure. As shown in fig. 3, the visitor travel analysis apparatus 1 includes:
the data acquisition module 11 is configured to receive identity information of the visitor from the user equipment, where the identity information is obtained by scanning a preset two-dimensional code by an application installed on the user equipment, and the application is configured to manage and control functions of the user equipment;
the data query module 12 is configured to query the first database according to the identity information, and obtain a visit record of the visitor, where the visit record includes a historical visit location;
and the data analysis module 13 is used for determining the visiting times of the visitors according to the historical visiting places. If the visit times are larger than a preset threshold value, carrying out first analysis on the current travel information of the visitor so as to determine whether the current travel information is legal or not. And if the visiting times is less than or equal to the threshold value, carrying out second analysis on the current travel information of the visitor so as to determine whether the current travel information is legal or not.
In an embodiment of the present invention, in performing a first analysis on the current travel information of the visitor to determine whether the current travel information is legal, the data analysis module 13 is specifically configured to:
receiving current travel information of a visitor from a user device;
acquiring a map of an access place, wherein a forbidden zone is marked in the map, and the forbidden zone is an area forbidden to access in the access place;
acquiring a journey path of the visitor according to the current journey information;
overlapping the travel path with the map according to the overlapping mark in the travel path;
if the forbidden zone has no travel route, the visitor is judged not to access the forbidden zone, the first analysis is passed, and the current travel information is judged to be legal.
In an embodiment of the present invention, in performing the second analysis on the current travel information of the guest to determine whether the current travel information is legal, the data analysis module 13 is specifically configured to:
performing path analysis, stay analysis and behavior analysis on the journey information of the visitor;
and if the path analysis, the stopping analysis and the behavior analysis are passed, judging that the current travel information is legal.
In an embodiment of the present invention, in terms of the stay analysis, the data analysis module 13 is specifically configured to:
acquiring at least one stopping place and at least one stopping time of the visitor according to the application program, wherein the at least one stopping place and the at least one stopping time are in one-to-one correspondence;
respectively acquiring a residence time threshold corresponding to each residence point in at least one residence point;
and if the residence time corresponding to each residence point does not exceed the residence time threshold corresponding to each residence point, the residence analysis is passed.
In an embodiment of the present invention, in terms of behavior analysis, the data analysis module 13 is specifically configured to:
acquiring at least one recording data according to user equipment;
the method comprises the steps that face information in identity information of a visitor is matched with videos in a video database, and at least one piece of video data containing the visitor is screened out, wherein the video database is connected with all video devices in an access place and used for storing videos shot by the video devices;
analyzing whether the at least one sound recording data and the at least one video recording data contain sensitive information according to a sensitive database, wherein the sensitive information comprises: sensitive actions and sensitive words;
and if the at least one sound recording data and the at least one video recording data have no sensitive information, the behavior analysis is passed.
In an embodiment of the present invention, in analyzing whether the at least one audio recording data and the at least one video recording data include sensitive information according to the sensitive database, the data analysis module 13 is specifically configured to:
for each recording data in at least one recording data, respectively acquiring first time data of each recording data, wherein the first time data is used for marking the recording time of each recording data;
for each video data in at least one video data, respectively acquiring second time data of each video data, wherein the second time data is used for marking the video time of each video data;
comparing each first time data in the at least one first time data with each second time data in the at least one second time data, and matching the sound recording data corresponding to each first time data with the video recording data corresponding to each second time data to obtain at least one behavior data if a coincident time segment exists between each first time data and each second time data;
and analyzing whether the at least one behavior data contains sensitive information according to the sensitive database.
In an embodiment of the present invention, in analyzing whether at least one behavior data includes sensitive information according to a sensitive database, the data analysis module 13 is specifically configured to:
for each behavior data in the at least one behavior data, respectively carrying out frame-by-frame analysis on each behavior data to obtain an image of each sub-action of each behavior data, and comparing the image of each sub-action with the action image of the sensitive action to obtain at least one first similarity;
for each behavior data in the at least one behavior data, performing voice segmentation on each behavior data to obtain each sub-audio frequency of each behavior data, and comparing each sub-audio frequency with the audio frequency of the sensitive word to obtain at least one second similarity;
and if one of the at least one first similarity is larger than a first threshold value and/or one of the at least one second similarity is larger than a second threshold value, judging that the behavior data contains the sensitive information.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. As shown in fig. 4, the electronic device 400 includes a transceiver 401, a processor 402, and a memory 403. Connected to each other by a bus 404. The memory 403 is used for storing computer programs and data, and may transmit the data stored in the memory 403 to the processor 402.
The processor 402 is configured to read the computer program in the memory 403 to perform the following operations:
receiving identity information of the visitor from the user equipment, wherein the identity information is obtained by scanning a preset two-dimensional code by an application program installed on the user equipment, and the application program is used for controlling and controlling functions of the user equipment;
inquiring a first database according to the identity information to obtain a visit record of the visitor, wherein the visit record comprises a historical visit place;
determining the visiting times of the visitor according to the historical visiting place;
if the visit times are larger than a preset threshold value, performing first analysis on the current travel information of the visitor to determine whether the current travel information is legal or not;
and if the visiting times is less than or equal to the threshold value, carrying out second analysis on the current travel information of the visitor so as to determine whether the current travel information is legal or not.
In an embodiment of the present invention, in performing a first analysis on the current travel information of the guest to determine whether the current travel information is legal, the processor 402 is specifically configured to:
receiving current travel information of a visitor from a user device;
acquiring a map of an access place, wherein a forbidden zone is marked in the map, and the forbidden zone is an area forbidden to access in the access place;
acquiring a journey path of the visitor according to the current journey information;
overlapping the travel path with the map according to the overlapping mark in the travel path;
if the forbidden zone has no travel route, the visitor is judged not to access the forbidden zone, the first analysis is passed, and the current travel information is judged to be legal.
In an embodiment of the present invention, in performing the second analysis on the current travel information of the guest to determine whether the current travel information is legal, the processor 402 is specifically configured to:
performing path analysis, stay analysis and behavior analysis on the journey information of the visitor;
and if the path analysis, the stopping analysis and the behavior analysis are passed, judging that the current travel information is legal.
In an embodiment of the present invention, in terms of the stay analysis, the processor 402 is specifically configured to perform the following operations:
acquiring at least one stopping place and at least one stopping time of the visitor according to the application program, wherein the at least one stopping place and the at least one stopping time are in one-to-one correspondence;
respectively acquiring a residence time threshold corresponding to each residence point in at least one residence point;
and if the residence time corresponding to each residence point does not exceed the residence time threshold corresponding to each residence point, the residence analysis is passed.
In an embodiment of the present invention, in terms of behavior analysis, the processor 402 is specifically configured to perform the following operations:
acquiring at least one recording data according to user equipment;
the method comprises the steps that face information in identity information of a visitor is matched with videos in a video database, and at least one piece of video data containing the visitor is screened out, wherein the video database is connected with all video devices in an access place and used for storing videos shot by the video devices;
analyzing whether the at least one sound recording data and the at least one video recording data contain sensitive information according to a sensitive database, wherein the sensitive information comprises: sensitive actions and sensitive words;
and if the at least one sound recording data and the at least one video recording data have no sensitive information, the behavior analysis is passed.
In an embodiment of the present invention, in analyzing whether the at least one audio recording data and the at least one video recording data include sensitive information according to a sensitive database, the processor 402 is specifically configured to perform the following operations:
for each recording data in at least one recording data, respectively acquiring first time data of each recording data, wherein the first time data is used for marking the recording time of each recording data;
for each video data in at least one video data, respectively acquiring second time data of each video data, wherein the second time data is used for marking the video time of each video data;
comparing each first time data in the at least one first time data with each second time data in the at least one second time data, and matching the sound recording data corresponding to each first time data with the video recording data corresponding to each second time data to obtain at least one behavior data if a coincident time segment exists between each first time data and each second time data;
and analyzing whether the at least one behavior data contains sensitive information according to the sensitive database.
In an embodiment of the present invention, in analyzing whether the at least one behavior data includes sensitive information according to the sensitive database, the processor 402 is specifically configured to perform the following operations:
for each behavior data in the at least one behavior data, respectively carrying out frame-by-frame analysis on each behavior data to obtain an image of each sub-action of each behavior data, and comparing the image of each sub-action with the action image of the sensitive action to obtain at least one first similarity;
for each behavior data in the at least one behavior data, performing voice segmentation on each behavior data to obtain each sub-audio frequency of each behavior data, and comparing each sub-audio frequency with the audio frequency of the sensitive word to obtain at least one second similarity;
and if one of the at least one first similarity is larger than a first threshold value and/or one of the at least one second similarity is larger than a second threshold value, judging that the behavior data contains the sensitive information.
It should be understood that the visitor travel analyzing apparatus in the present application may include a smart Phone (e.g., an Android Phone, an iOS Phone, a Windows Phone, etc.), a tablet computer, a palm computer, a notebook computer, a Mobile Internet device MID (MID), a wearable device, or the like. The visitor journey analysis device is only an example, not an exhaustive list, and includes but is not limited to the visitor journey analysis device. In practical applications, the visitor journey analysis apparatus may further include: intelligent vehicle-mounted terminal, computer equipment and the like.
Through the above description of the embodiments, those skilled in the art will clearly understand that the present invention can be implemented by combining software and a hardware platform. With this understanding in mind, all or part of the technical solutions of the present invention that contribute to the background can be embodied in the form of a software product, which can be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes instructions for causing a computer device (which can be a personal computer, a server, or a network device, etc.) to execute the methods according to the embodiments or some parts of the embodiments.
Accordingly, the present application also provides a computer readable storage medium storing a computer program, which is executed by a processor to implement part or all of the steps of any one of the guest trip analysis methods as set forth in the above method embodiments. For example, the storage medium may include a hard disk, a floppy disk, an optical disk, a magnetic tape, a magnetic disk, a flash memory, and the like.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the guest trip analysis methods as recited in the above method embodiments.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are all alternative embodiments and that the acts and modules referred to are not necessarily required by the application.
In the above embodiments, the description of each embodiment has its own emphasis, and for parts not described in detail in a certain embodiment, reference may be made to the description of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is merely a logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit. The integrated unit may be implemented in the form of hardware, or may be implemented in the form of a software program module.
The integrated units, if implemented in the form of software program modules and sold or used as stand-alone products, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, and the memory may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the methods and their core ideas of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A visitor itinerary analysis method, the method comprising:
receiving identity information of a visitor from user equipment, wherein the identity information is obtained by scanning a preset two-dimensional code by an application program installed on the user equipment, and the application program is used for managing and controlling functions of the user equipment;
inquiring a first database according to the identity information to obtain a visit record of the visitor, wherein the visit record comprises a historical visit place;
determining the visiting times of the visitor according to the historical visiting place;
if the visiting times is larger than a preset threshold value, performing first analysis on the current travel information of the visitor to determine whether the current travel information is legal or not;
and if the visiting times is less than or equal to the threshold value, performing second analysis on the current travel information of the visitor to determine whether the current travel information is legal.
2. The method of claim 1, wherein the first analyzing the current travel information of the guest to determine whether the current travel information is legitimate comprises:
receiving current travel information for the guest from the user device;
acquiring a map of an access place, wherein a forbidden zone is marked in the map, and the forbidden zone is an area forbidden to access in the access place;
acquiring a travel path of the visitor according to the current travel information;
overlapping the travel path with the map according to an overlap mark in the travel path;
if the travel path does not exist in the forbidden zone, the visitor is judged not to access the forbidden zone, the first analysis is passed, and the current travel information is judged to be legal.
3. The method of claim 1, wherein the second analyzing the current travel information of the guest to determine whether the current travel information is legitimate comprises:
performing path analysis, stay analysis and behavior analysis on the visitor's travel information;
and if the path analysis, the stay analysis and the behavior analysis are passed, judging that the current travel information is legal.
4. The method of claim 3, wherein the dwell analysis comprises:
acquiring at least one stopping place and at least one stopping time of the visitor according to the application program, wherein the at least one stopping place and the at least one stopping time are in one-to-one correspondence;
for each stopping place in the at least one stopping place, respectively acquiring a stopping time threshold corresponding to each stopping place;
and if the residence time corresponding to each residence point does not exceed the residence time threshold corresponding to each residence point, the residence analysis is passed.
5. The method of claim 3, wherein the behavior analysis comprises:
acquiring at least one recording data according to the user equipment;
performing face matching on facial information in the identity information of the visitor and videos in a video database, and screening out at least one video data containing the visitor, wherein the video database is connected with all video devices in the access place and is used for storing the videos shot by the video devices;
analyzing whether the at least one sound recording data and the at least one video recording data contain sensitive information according to a sensitive database, wherein the sensitive information comprises: sensitive actions and sensitive words;
and if the sensitive information is not in the at least one sound recording data and the at least one video recording data, the behavior analysis is passed.
6. The method of claim 5, wherein said analyzing said at least one audio recording data and said at least one video recording data for the presence of sensitive information from a sensitive database comprises:
for each sound recording data in the at least one sound recording data, respectively obtaining first time data of each sound recording data, wherein the first time data is used for marking the sound recording time of each sound recording data;
for each video data in the at least one video data, respectively acquiring second time data of each video data, wherein the second time data is used for marking the video recording time of each video data;
comparing each first time data in the at least one first time data with each second time data in the at least one second time data, and matching the sound recording data corresponding to each first time data with the video recording data corresponding to each second time to obtain at least one behavior data if a coincident time segment exists between each first time data and each second time data;
and analyzing whether the at least one behavior data contains the sensitive information according to a sensitive database.
7. The method of claim 6, wherein analyzing whether the at least one behavior data includes the sensitive information according to a sensitive database comprises:
for each behavior data in the at least one behavior data, respectively performing frame-by-frame analysis on each behavior data to obtain an image of each sub-action of each behavior data, and comparing the image of each sub-action with the action image of the sensitive action to obtain at least one first similarity;
for each behavior data in the at least one behavior data, performing voice segmentation on each behavior data to obtain each sub-audio frequency of each behavior data, and comparing each sub-audio frequency with the audio frequency of the sensitive word to obtain at least one second similarity;
and if one first similarity larger than a first threshold exists in the at least one first similarity and/or one second similarity larger than a second threshold exists in the at least one second similarity, judging that the behavior data contains the sensitive information.
8. A visitor travel analysis apparatus, the apparatus comprising:
the system comprises a data acquisition module, a processing module and a processing module, wherein the data acquisition module is used for receiving identity information of a visitor from user equipment, the identity information is obtained by scanning a preset two-dimensional code through an application program installed on the user equipment, and the application program is used for controlling the function of the user equipment;
the data query module is used for querying a first database according to the identity information and acquiring the visit record of the visitor, wherein the visit record comprises a historical visit place;
the data analysis module is used for determining the visiting times of the visitor according to the historical visiting place;
if the visiting times is larger than a preset threshold value, performing first analysis on the current travel information of the visitor to determine whether the current travel information is legal or not;
and if the visiting times is less than or equal to the threshold value, performing second analysis on the current travel information of the visitor to determine whether the current travel information is legal.
9. An electronic device comprising a processor, a memory, a communication interface, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the processor, the one or more programs including instructions for performing the steps in the method of any of claims 1-7.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which is executed by a processor to implement the method according to any one of claims 1-7.
CN202011431994.4A 2020-12-09 2020-12-09 Visitor travel analysis method and device, electronic equipment and storage medium Pending CN112527934A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011431994.4A CN112527934A (en) 2020-12-09 2020-12-09 Visitor travel analysis method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011431994.4A CN112527934A (en) 2020-12-09 2020-12-09 Visitor travel analysis method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112527934A true CN112527934A (en) 2021-03-19

Family

ID=74999772

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011431994.4A Pending CN112527934A (en) 2020-12-09 2020-12-09 Visitor travel analysis method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112527934A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114022988A (en) * 2021-11-05 2022-02-08 西南交通大学 Visitor information management verification system and method based on artificial intelligence

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120130817A1 (en) * 2010-11-20 2012-05-24 Robert Bousaleh Method for Delivery of Relevant Consumer Content Based on Consumer Journey Patterns
CN105357216A (en) * 2015-11-30 2016-02-24 上海斐讯数据通信技术有限公司 Secure access method and system
US20160313730A1 (en) * 2012-03-14 2016-10-27 Autoconnect Holdings Llc Vehicle registration to enter automated control of vehicular traffic
CN107018121A (en) * 2016-10-13 2017-08-04 阿里巴巴集团控股有限公司 The method and device of subscriber authentication
CN107895414A (en) * 2017-10-31 2018-04-10 成都起能起重设备技术服务有限公司 A kind of visitor's concierge system based on Quick Response Code
CN110491008A (en) * 2019-08-29 2019-11-22 恒大智慧科技有限公司 A kind of community-based managing caller side and system, storage medium
CN111477341A (en) * 2020-06-18 2020-07-31 杭州数梦工场科技有限公司 Epidemic situation monitoring method and device, electronic equipment and storage medium
CN211506527U (en) * 2020-03-23 2020-09-15 深圳市商汤科技有限公司 Face recognition device
CN111666510A (en) * 2020-06-30 2020-09-15 成都新潮传媒集团有限公司 Statistical method and device for customer visit data
US20200322754A1 (en) * 2018-08-06 2020-10-08 Olive Seed Industries, Llc Methods and systems for developing a personalized non-profit venue experience and presenting personalized multimedia to a mobile computing device
CN111798342A (en) * 2020-07-07 2020-10-20 德能森智能科技(无锡)有限公司 Smart community system based on cloud platform
CN112040418A (en) * 2020-09-01 2020-12-04 日立楼宇技术(广州)有限公司 Visitor positioning method, visitor positioning device, visitor positioning server, visitor positioning storage medium and visitor positioning system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120130817A1 (en) * 2010-11-20 2012-05-24 Robert Bousaleh Method for Delivery of Relevant Consumer Content Based on Consumer Journey Patterns
US20160313730A1 (en) * 2012-03-14 2016-10-27 Autoconnect Holdings Llc Vehicle registration to enter automated control of vehicular traffic
CN105357216A (en) * 2015-11-30 2016-02-24 上海斐讯数据通信技术有限公司 Secure access method and system
CN107018121A (en) * 2016-10-13 2017-08-04 阿里巴巴集团控股有限公司 The method and device of subscriber authentication
CN107895414A (en) * 2017-10-31 2018-04-10 成都起能起重设备技术服务有限公司 A kind of visitor's concierge system based on Quick Response Code
US20200322754A1 (en) * 2018-08-06 2020-10-08 Olive Seed Industries, Llc Methods and systems for developing a personalized non-profit venue experience and presenting personalized multimedia to a mobile computing device
CN110491008A (en) * 2019-08-29 2019-11-22 恒大智慧科技有限公司 A kind of community-based managing caller side and system, storage medium
CN211506527U (en) * 2020-03-23 2020-09-15 深圳市商汤科技有限公司 Face recognition device
CN111477341A (en) * 2020-06-18 2020-07-31 杭州数梦工场科技有限公司 Epidemic situation monitoring method and device, electronic equipment and storage medium
CN111666510A (en) * 2020-06-30 2020-09-15 成都新潮传媒集团有限公司 Statistical method and device for customer visit data
CN111798342A (en) * 2020-07-07 2020-10-20 德能森智能科技(无锡)有限公司 Smart community system based on cloud platform
CN112040418A (en) * 2020-09-01 2020-12-04 日立楼宇技术(广州)有限公司 Visitor positioning method, visitor positioning device, visitor positioning server, visitor positioning storage medium and visitor positioning system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
WARCHOL, G 等: ""Exploring the dynamics of South Africa’s illegal abalone trade via routine activities theory"", 《TRENDS ORGAN CRIM 》, 28 January 2016 (2016-01-28), pages 21, XP035955067, DOI: 10.1007/s12117-016-9265-4 *
邓炜辉: ""电信运营企业对客户信息的社会义务"", 《中国电信业》, 30 April 2020 (2020-04-30), pages 64 - 67 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114022988A (en) * 2021-11-05 2022-02-08 西南交通大学 Visitor information management verification system and method based on artificial intelligence

Similar Documents

Publication Publication Date Title
CN109389723B (en) Visitor management method and device using face recognition and computer equipment
KR101988253B1 (en) System and method for auto managing entrance and exit of employee using high-pass type
CN109920174B (en) Book borrowing method and device, electronic equipment and storage medium
KR101982686B1 (en) Method for registration and identity verification of using companion animal’s muzzle pattern
CN111179484B (en) Visitor management method, device, system and storage medium
US11205312B2 (en) Applying image analytics and machine learning to lock systems in hotels
KR101507594B1 (en) Security entrance system using Identification means and Operating Method thereof
CN107622246B (en) Face recognition method and related product
CN108540755A (en) Personal identification method and device
US20210082217A1 (en) Method for provisioning a device with an information element allowing to identify unauthorized users in a restricted area
US11743684B2 (en) System and method for monitoring a former convict of an intoxication-related offense
US20200334429A1 (en) Alignment of Antennas on Near Field Communication Devices for Communication
WO2020106391A1 (en) A system of seamless automated customer id verification at the hotel entrance and releasing the hotel room key
US20230222843A1 (en) Method and device for registering biometric feature
CN114267105A (en) Doorbell control method, intelligent doorbell and related equipment
CN110077361B (en) Vehicle control method and device
CN112527934A (en) Visitor travel analysis method and device, electronic equipment and storage medium
KR102098936B1 (en) Smart access management system
CN114140838A (en) Image management method, device, terminal equipment and system
CN109819207B (en) Target searching method and related equipment
KR101671904B1 (en) System for tracing vehicle using blackbox for vehicle
JP6740784B2 (en) Authentication system, authentication method, and authentication program
CN112669509A (en) Access control management method, system, electronic device and storage medium
CN113271481B (en) Content updating method, device, system and storage medium
CN113223220B (en) Visitor request processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination