CN112527934B - Visitor trip analysis method and device, electronic equipment and storage medium - Google Patents
Visitor trip analysis method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN112527934B CN112527934B CN202011431994.4A CN202011431994A CN112527934B CN 112527934 B CN112527934 B CN 112527934B CN 202011431994 A CN202011431994 A CN 202011431994A CN 112527934 B CN112527934 B CN 112527934B
- Authority
- CN
- China
- Prior art keywords
- visitor
- data
- analysis
- information
- visit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/29—Geographical information databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2457—Query processing with adaptation to user needs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10544—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
- G06K7/10821—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Electromagnetism (AREA)
- Data Mining & Analysis (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Health & Medical Sciences (AREA)
- Computational Linguistics (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- General Health & Medical Sciences (AREA)
- Remote Sensing (AREA)
- Collating Specific Patterns (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application relates to the technical field of artificial intelligence, and particularly discloses a visitor trip analysis method, a visitor trip analysis device, electronic equipment and a storage medium, wherein the visitor trip analysis method comprises the following steps: receiving identity information of a visitor from user equipment, wherein the identity information is obtained by scanning a preset two-dimensional code by an application program installed on the user equipment, and the application program is used for controlling functions of the user equipment; inquiring a first database according to the identity information, and acquiring a visit record of the visitor, wherein the visit record comprises a history visit place; determining visitor visit times according to the historical visit places; if the visit times are greater than a preset threshold value, carrying out first analysis on the current journey information of the visitor to determine whether the current journey information is legal or not; and if the visit times are smaller than or equal to the threshold value, performing second analysis on the current journey information of the visitor to determine whether the current journey information is legal or not.
Description
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to a visitor trip analysis method and device based on user equipment control, electronic equipment and a storage medium.
Background
Due to social demands, there is an inevitable existence of a family of specific sites requiring information confidentiality or strict regulation, for example: prisons, highly confidential offices, enterprise-core venues, and the like. But even these specific places requiring information confidentiality or strict regulation cannot completely reject some specific visit requests. Therefore, when the visitor visit is finished, the visit journey of the visitor is usually required to be analyzed, so that the visitor is ensured not to make forbidden matters of the visit place or to carry out related information of the visit place.
At present, a professional is generally adopted to analyze video when a visitor accesses, and meanwhile, the visit journey of the visitor is managed and controlled by collecting the electronic equipment of the visitor and dispatching the accompanying mode of the special person. But this way has low treatment efficiency and high requirement for accompanying personnel, and has huge manpower cost.
Disclosure of Invention
In order to solve the problems in the prior art, the embodiment of the application provides a visitor trip analysis method, a visitor trip analysis device, electronic equipment and a storage medium, which can realize automatic analysis of visitor trips and reduce labor cost.
In a first aspect, an embodiment of the present application provides a guest trip analysis method, including:
Receiving identity information of a visitor from user equipment, wherein the identity information is obtained by scanning a preset two-dimensional code by an application program installed on the user equipment, and the application program is used for controlling functions of the user equipment;
Inquiring a first database according to the identity information, and acquiring a visit record of the visitor, wherein the visit record comprises a history visit place;
Determining the visit times of the visitor according to the history visit place;
if the visit times are greater than a preset threshold value, carrying out first analysis on the current journey information of the visitor to determine whether the current journey information is legal or not;
And if the visit times are smaller than or equal to the threshold value, performing second analysis on the current journey information of the visitor to determine whether the current journey information is legal.
In a second aspect, an embodiment of the present application provides a visitor trip analysis device including:
The system comprises a data acquisition module, a user equipment and a data processing module, wherein the data acquisition module is used for receiving identity information of a visitor from the user equipment, the identity information is obtained by scanning a preset two-dimensional code by an application program installed on the user equipment, and the application program is used for controlling functions of the user equipment;
The data query module is used for querying a first database according to the identity information and acquiring a visit record of the visitor, wherein the visit record comprises a history visit place;
The data analysis module is used for determining the visit times of the visitor according to the history visit place;
if the visit times are greater than a preset threshold value, carrying out first analysis on the current journey information of the visitor to determine whether the current journey information is legal or not;
And if the visit times are smaller than or equal to the threshold value, performing second analysis on the current journey information of the visitor to determine whether the current journey information is legal.
In a third aspect, an embodiment of the present application provides an electronic device, including: and a processor connected to a memory for storing a computer program, the processor being configured to execute the computer program stored in the memory, to cause the electronic device to perform the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium storing a computer program, the computer program causing a computer to perform the method according to the first aspect.
In a fifth aspect, embodiments of the present application provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program, the computer being operable to cause a computer to perform the method according to the first aspect.
The implementation of the embodiment of the application has the following beneficial effects:
It can be seen that, in the embodiment of the present application, by acquiring the number of visits of the visitor, different journey analysis processes are performed on the visitor with the larger number of visits and the visitor with the smaller number of visits, respectively. The automatic analysis of the current journey of the visitor is realized, and the labor cost is reduced. Meanwhile, different journey analysis modes are determined based on the visit record, so that the journey analysis efficiency is further improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a visitor trip analysis method according to an embodiment of the present application;
FIG. 2 is a schematic flow chart of a behavior analysis according to an embodiment of the present application;
Fig. 3 is a functional block diagram of a visitor trip analysis device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the present application. All other embodiments, based on the embodiments of the application, which are apparent to those of ordinary skill in the art without inventive faculty, are intended to be within the scope of the application.
The terms "first," "second," "third," and "fourth" and the like in the description and in the claims and drawings are used for distinguishing between different objects and not necessarily for describing a particular sequential or chronological order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, result, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those skilled in the art will explicitly and implicitly understand that the embodiments described herein may be combined with other embodiments.
Referring to fig. 1, fig. 1 is a schematic flow chart of a visitor trip analysis method according to an embodiment of the present application. The visitor trip analysis method comprises the following steps:
101: identity information of a visitor is received from a user device.
In this embodiment, the identity information is sent by an application installed on the user equipment, and the application is used to control the functions of the user equipment.
By way of example, the user device may be an electronic device such as a cell phone, tablet computer, etc. that may be provided with an application. When a visitor enters a specific place needing information confidentiality or strict control, the visitor downloads the application program in a mode of scanning a two-dimensional code, and after registration and identity verification, the control function of the application program is started, so that the control of the functions of user equipment is realized, and information stealing behaviors such as shooting, recording and video recording are prevented.
When the visitor finishes visiting and applies for leaving, the application program can scan the two-dimensional code to fill in personal information during registration, for example: visitor name, ID card number and facial information are submitted to the system background for identity verification. Of course, the authentication may also be performed by other means, such as: the present application is not limited to such modes as face recognition, fingerprint recognition, NFC communication, and the like.
102: And inquiring a first database according to the identity information, and acquiring the visit record of the visitor.
In this embodiment, the visit record may include a history visit location.
103: And determining the visit times of the visitor according to the historical visit places.
For example, the historical visit location may be filtered according to the address of the visit location, and the number of visits by the visitor to the visit location may be determined. In an alternative embodiment, the visit record may further include a historical visit time, the historical visit time corresponding one-to-one to the historical visit location. Therefore, a time period can be defined according to the historical visit time, and screening is carried out according to the historical visit place, so that the visit times of the visitor to the visit place in a certain time period are obtained.
Therefore, by combining the historical visit time, the visit times of the visitor in a relatively short time period can be determined, and invalid visit records with relatively long time can be removed, so that the selection of a subsequent analysis mode is more accurate and scientific.
104: If the number of visits is greater than a preset threshold, then processing 105 is performed, otherwise processing 106 is performed.
105: And carrying out first analysis on the current journey information of the visitor.
The visit times are larger than a preset threshold value, which indicates that the visitor is a frequent visitor, and the previous visit processes all follow the requirements. Therefore, the visitor is considered to have a high safety factor, and only needs to perform some simple visit trip analysis.
In this embodiment, the first analysis mainly analyzes the travel path of the visitor. Firstly, requesting the user equipment to acquire the current journey information of the visitor, and determining the journey path of the visitor according to the current journey information.
For example, after the visitor enters the access location, the system background sends a simple map of the access location to the user equipment carried by the visitor through the application program, where the simple map is marked with an entry as a starting point. In the visiting process of the visitor, an application program installed on the user equipment determines the specific position of the visitor in the visiting place by receiving a wireless signal preset in the visiting place, and marks the specific position on a simple map. Based on this, when the visitor finishes the visit, the path that he walks upon the visit is drawn on the simple map.
For example, for a wireless signal preset in the access location, a WiFi signal may be used. In this embodiment, wiFi signal transmitters may be provided in advance at some specific locations of the visiting place. When a visitor enters, the application program is downloaded by scanning the two-dimension code and is installed and registered, and meanwhile, the system background sends the registration number of the application program to the WiFi signal transmitter. And the WiFi signal transmitter transmits a WiFi signal to the user equipment of the visitor through the registration number, and the angle information and the distance information of the visitor relative to the WiFi signal transmitter are determined according to the signal fed back by the user equipment. Therefore, the current position of the visitor can be determined by integrating the positioning information of the WiFi signal transmitters. Of course, determining the current location information of the passenger may also be performed in other ways, such as: the modes such as GPS signal and monitoring image pickup are not limited in this application.
In the present embodiment, the simple map on which the travel route of the visitor is recorded may be marked with an overlay mark, and after the simple map including the travel route of the visitor is acquired, the simple map and the map of the visiting place may be overlaid on the basis of the overlay mark, thereby obtaining the map of the visiting place including the travel route of the visitor. The map of the access place is marked with a forbidden area, namely an area in the access place, which is forbidden to be accessed. And finally, determining whether the visitor accesses the forbidden zone by determining whether the travel path of the visitor overlaps the forbidden zone. If the visitor does not access the forbidden zone, the first analysis is passed, and the current journey information is judged to be legal.
Therefore, the journey path of the visitor can be quickly generated, and whether the visitor enters the forbidden zone or not is determined, so that the journey analysis efficiency is improved.
106: And carrying out second analysis on the current journey information of the visitor.
The visit times are smaller than or equal to a preset threshold value, which indicates that the visitor is a visitor with a visit less frequently or a new visitor, and the database contains fewer visit records. Therefore, the security coefficient of the visitor cannot be determined, and a more complex journey analysis needs to be performed on the visitor.
In this embodiment, the second analysis mainly analyzes the journey path, stay and behavior of the visitor, and may include path analysis, stay analysis and behavior analysis, and when the path analysis, stay analysis and behavior analysis pass, it is determined that the current journey information of the visitor is legal.
The path analysis, the stay analysis, and the behavior analysis will be described in detail below, respectively.
(1) Path analysis:
In this embodiment, the path analysis is similar to the first analysis described above, and will not be described here again.
(2) Residence analysis:
in general, stay too long in one place is suspected, and stay too long is more suspected for a specific place where information confidentiality or strict control is required. Therefore, analysis of the stay behavior of the visitor is required.
In this embodiment, the at least one residence place and the at least one residence time of the visitor may be acquired by an application installed on a user device carried by the visitor, where the at least one residence place and the at least one residence time are in one-to-one correspondence.
For example, a determination time may be preset, and when the location information of the visitor exceeds the determination time without being changed, the visitor is determined to enter the stay state. At this point, the application records the location information and starts a timer to record the dwell time.
In the present embodiment, the stay time threshold is set for each area in advance according to the importance of each area for the access place. For each of the at least one stay location, determining an area where the stay location is located according to the position information of each stay location, and then acquiring a corresponding stay time threshold. If the residence time corresponding to each residence point does not exceed the residence time threshold corresponding to each residence point, the residence analysis is passed.
(3) Behavioral analysis:
referring to fig. 2, fig. 2 is a flow chart of a behavior analysis according to an embodiment of the present application. The act includes the steps of:
201: and acquiring at least one record data according to the user equipment.
For example, an application installed on the user device may turn on a listening function to record the entire access. In an alternative embodiment, the part of the visitor communication in the whole recording can be intercepted, and the time information is added for independent storage. Thereby facilitating subsequent analysis and further improving the efficiency of stroke analysis.
202: Face information in the identity information of the visitor is matched with faces of videos in the video database, and at least one video data containing the visitor is screened out.
In this embodiment, the video database is connected to all video devices in the access location, and is used to store video captured by the video devices. Through face recognition matching, pictures shot by video equipment in the access process of the visitor can be rapidly found out. In an alternative embodiment, the video recording devices in each area may be queried according to the travel path and the travel time of the visitor, to obtain video recording data containing the visitor. The application is not limited in the manner in which video data including a visitor is obtained.
203: And analyzing whether the at least one record data and the at least one record data contain sensitive information or not according to the sensitive database.
In this embodiment, the sensitive information includes sensitive actions and sensitive words.
Meanwhile, because of simple sensitive action or sensitive word judgment, misjudgment is likely to exist, in the embodiment, the judgment is performed after the audio data and the video data are matched according to time.
For example, first, for each of at least one recording data, first time data of each recording data is acquired, respectively, the first time data being used to mark a recording time of each recording data. And respectively acquiring second time data of each video data for each video data in the at least one video data, wherein the second time data is used for marking the video time of each video data.
And then, comparing each first time data in the at least one first time data with each second time data in the at least one second time data respectively, and if a coincident time segment exists between each first time data and each second time data, matching the recording data corresponding to each first time data with the recording data corresponding to each second time to obtain at least one behavior data.
And finally, analyzing whether the at least one behavior data contains the sensitive information according to a sensitive database. Therefore, the judgment result of the sensitive word and the judgment result of the sensitive action are mutually verified, and the accuracy of the sensitive judgment is improved.
For example, for each behavior data in the at least one behavior data, each behavior data may be analyzed frame by frame, to obtain an image of each sub-action of each behavior data, and the image of each sub-action may be compared with the action image of the sensitive action to obtain at least one first similarity.
Meanwhile, for each behavior data in at least one behavior data, respectively performing voice segmentation on each behavior data to obtain each sub-audio of each behavior data, and comparing each sub-audio with the audio of the sensitive word to obtain at least one second similarity.
If a first similarity greater than a first threshold exists in the at least one first similarity and/or a second similarity greater than a second threshold exists in the at least one second similarity, the behavior data is determined to contain sensitive information.
204: If the at least one recording data and the at least one recording data have no sensitive information, the behavior analysis is passed.
In summary, according to the visitor trip analysis method provided by the invention, by acquiring the visit times of the visitor, different trip analysis processes are respectively executed for the visitor with more visit times and the visitor with less visit times, specifically, for the visitor with more visit times, a simple first analysis is performed, and for the visitor with less visit times, a complex second analysis is performed. The automatic analysis of the current journey of the visitor is realized, and the labor cost is reduced. Meanwhile, different journey analysis modes are determined based on the visit record, so that the journey analysis efficiency is further improved.
Referring to fig. 3, fig. 3 is a functional block diagram of a visitor trip analysis device according to an embodiment of the present application. As shown in fig. 3, the visitor trip analysis device 1 includes:
The data acquisition module 11 is configured to receive identity information of a visitor from a user device, where the identity information is obtained by scanning a preset two-dimensional code by an application program installed on the user device, and the application program is configured to control a function of the user device;
The data query module 12 is configured to query the first database according to the identity information, and obtain a visit record of the visitor, where the visit record includes a history visit location;
And the data analysis module 13 is used for determining the visit times of the visitor according to the historical visit places. If the visit times are greater than a preset threshold value, carrying out first analysis on the current journey information of the visitor to determine whether the current journey information is legal or not. And if the visit times are smaller than or equal to the threshold value, performing second analysis on the current journey information of the visitor to determine whether the current journey information is legal or not.
In the embodiment of the present invention, in performing the first analysis on the current trip information of the visitor to determine whether the current trip information is legal, the data analysis module 13 is specifically configured to:
Receiving current trip information of a visitor from user equipment;
Acquiring a map of an access place, wherein a forbidden zone is marked in the map, and the forbidden zone is a zone which is forbidden to be accessed in the access place;
acquiring a journey path of the visitor according to the current journey information;
overlapping the travel path with the map according to the overlapping mark in the travel path;
If no journey path exists in the restricted area, the fact that the visitor does not visit the restricted area is judged, the first analysis is passed, and the fact that the current journey information is legal is judged.
In the embodiment of the present invention, in performing the second analysis on the current trip information of the visitor to determine whether the current trip information is legal, the data analysis module 13 is specifically configured to:
Carrying out path analysis, stay analysis and behavior analysis on the journey information of the visitor;
And if the path analysis, the stay analysis and the behavior analysis are all passed, judging that the current journey information is legal.
In an embodiment of the present invention, the data analysis module 13 is specifically configured to:
According to the application program, at least one stay place and at least one stay time of the visitor are obtained, wherein the at least one stay place and the at least one stay time are in one-to-one correspondence;
for each of the at least one dwell-time points, respectively acquiring a dwell-time threshold corresponding to each dwell-time point;
if the residence time corresponding to each residence point does not exceed the residence time threshold corresponding to each residence point, the residence analysis is passed.
In an embodiment of the present invention, the data analysis module 13 is specifically configured to:
acquiring at least one recording data according to user equipment;
Face information in the identity information of the visitor is matched with a video in a video database in a face mode, at least one video data containing the visitor is screened out, and the video database is connected with all video equipment in an access place and used for storing videos shot by the video equipment;
Analyzing whether the at least one recording data and the at least one video data contain sensitive information according to a sensitive database, wherein the sensitive information comprises: sensitive actions and sensitive words;
if the at least one recording data and the at least one recording data have no sensitive information, the behavior analysis is passed.
In an embodiment of the present invention, the data analysis module 13 is specifically configured to, in analyzing, according to the sensitive database, whether the at least one recording data and the at least one video data contain sensitive information:
for each recording data in at least one recording data, respectively acquiring first time data of each recording data, wherein the first time data is used for marking the recording time of each recording data;
For each video data in at least one video data, respectively acquiring second time data of each video data, wherein the second time data is used for marking the video time of each video data;
comparing each first time data in at least one first time data with each second time data in at least one second time data respectively, and if a coincident time segment exists between each first time data and each second time data, matching recording data corresponding to each first time data with recording data corresponding to each second time to obtain at least one behavior data;
and analyzing whether the at least one behavior data contains sensitive information according to the sensitive database.
In an embodiment of the present invention, the data analysis module 13 is specifically configured to, in analyzing whether the at least one behavior data includes sensitive information according to the sensitive database:
For each behavior data in at least one behavior data, respectively carrying out frame-by-frame analysis on each behavior data to obtain images of each sub-action of each behavior data, and comparing the images of each sub-action with action images of sensitive actions to obtain at least one first similarity;
For each behavior data in at least one behavior data, respectively carrying out voice segmentation on each behavior data to obtain each sub-audio of each behavior data, and comparing each sub-audio with the audio of the sensitive word to obtain at least one second similarity;
and if at least one first similarity exists in which the first similarity is larger than a first threshold value, and/or at least one second similarity exists in which the second similarity is larger than a second threshold value, judging that the behavior data contains sensitive information.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 4, the electronic device 400 includes a transceiver 401, a processor 402, and a memory 403. Which are connected by a bus 404. The memory 403 is used for storing computer programs and data, and the data stored in the memory 403 can be transferred to the processor 402.
The processor 402 is configured to read a computer program in the memory 403 to perform the following operations:
Receiving identity information of a visitor from user equipment, wherein the identity information is obtained by scanning a preset two-dimensional code by an application program installed on the user equipment, and the application program is used for controlling functions of the user equipment;
Inquiring a first database according to the identity information, and acquiring a visit record of the visitor, wherein the visit record comprises a history visit place;
determining visitor visit times according to the historical visit places;
If the visit times are greater than a preset threshold value, carrying out first analysis on the current journey information of the visitor to determine whether the current journey information is legal or not;
and if the visit times are smaller than or equal to the threshold value, performing second analysis on the current journey information of the visitor to determine whether the current journey information is legal or not.
In an embodiment of the present invention, the processor 402 is specifically configured to perform the following operations in performing a first analysis on the current trip information of the visitor to determine whether the current trip information is legal or not:
Receiving current trip information of a visitor from user equipment;
Acquiring a map of an access place, wherein a forbidden zone is marked in the map, and the forbidden zone is a zone which is forbidden to be accessed in the access place;
acquiring a journey path of the visitor according to the current journey information;
overlapping the travel path with the map according to the overlapping mark in the travel path;
If no journey path exists in the restricted area, the fact that the visitor does not visit the restricted area is judged, the first analysis is passed, and the fact that the current journey information is legal is judged.
In an embodiment of the present invention, the processor 402 is specifically configured to perform the following operations in performing a second analysis on the current trip information of the visitor to determine whether the current trip information is legal or not:
Carrying out path analysis, stay analysis and behavior analysis on the journey information of the visitor;
And if the path analysis, the stay analysis and the behavior analysis are all passed, judging that the current journey information is legal.
In an embodiment of the present invention, the processor 402 is specifically configured to perform the following operations in terms of dwell analysis:
According to the application program, at least one stay place and at least one stay time of the visitor are obtained, wherein the at least one stay place and the at least one stay time are in one-to-one correspondence;
for each of the at least one dwell-time points, respectively acquiring a dwell-time threshold corresponding to each dwell-time point;
if the residence time corresponding to each residence point does not exceed the residence time threshold corresponding to each residence point, the residence analysis is passed.
In an embodiment of the present invention, the processor 402 is specifically configured to perform the following operations in terms of behavioral analysis:
acquiring at least one recording data according to user equipment;
Face information in the identity information of the visitor is matched with a video in a video database in a face mode, at least one video data containing the visitor is screened out, and the video database is connected with all video equipment in an access place and used for storing videos shot by the video equipment;
Analyzing whether the at least one recording data and the at least one video data contain sensitive information according to a sensitive database, wherein the sensitive information comprises: sensitive actions and sensitive words;
if the at least one recording data and the at least one recording data have no sensitive information, the behavior analysis is passed.
In an embodiment of the present invention, the processor 402 is specifically configured to perform the following operations in analyzing, according to the sensitive database, whether the at least one recording data and the at least one video data contain sensitive information:
for each recording data in at least one recording data, respectively acquiring first time data of each recording data, wherein the first time data is used for marking the recording time of each recording data;
For each video data in at least one video data, respectively acquiring second time data of each video data, wherein the second time data is used for marking the video time of each video data;
comparing each first time data in at least one first time data with each second time data in at least one second time data respectively, and if a coincident time segment exists between each first time data and each second time data, matching recording data corresponding to each first time data with recording data corresponding to each second time to obtain at least one behavior data;
and analyzing whether the at least one behavior data contains sensitive information according to the sensitive database.
In an embodiment of the present invention, the processor 402 is specifically configured to perform the following operations in analyzing whether the at least one behavior data includes sensitive information according to the sensitive database:
For each behavior data in at least one behavior data, respectively carrying out frame-by-frame analysis on each behavior data to obtain images of each sub-action of each behavior data, and comparing the images of each sub-action with action images of sensitive actions to obtain at least one first similarity;
For each behavior data in at least one behavior data, respectively carrying out voice segmentation on each behavior data to obtain each sub-audio of each behavior data, and comparing each sub-audio with the audio of the sensitive word to obtain at least one second similarity;
and if at least one first similarity exists in which the first similarity is larger than a first threshold value, and/or at least one second similarity exists in which the second similarity is larger than a second threshold value, judging that the behavior data contains sensitive information.
It should be understood that the visitor trip analysis device in the present application may include a smart Phone (such as an Android Phone, an iOS Phone, a Windows Phone, etc.), a tablet computer, a palm computer, a notebook computer, a Mobile internet device MID (Mobile INTERNET DEVICES, abbreviated as MID), a wearable device, etc. The above-described guest trip analysis device is merely exemplary and not exhaustive and includes, but is not limited to, the above-described guest trip analysis device. In practical application, the visitor trip analysis device may further include: intelligent vehicle terminals, computer devices, etc.
From the above description of embodiments, it will be apparent to those skilled in the art that the present invention may be implemented in software in combination with a hardware platform. With such understanding, all or part of the technical solution of the present invention contributing to the background art may be embodied in the form of a software product, which may be stored in a storage medium, such as ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform the methods described in the various embodiments or parts of the embodiments of the present invention.
Accordingly, embodiments of the present application also provide a computer readable storage medium storing a computer program for execution by a processor to perform some or all of the steps of any one of the guest trip analysis methods described in the above method embodiments. For example, the storage medium may include a hard disk, a floppy disk, an optical disk, a magnetic tape, a magnetic disk, a flash memory, etc.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any one of the guest trip analysis methods described in the method embodiments above.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present application is not limited by the order of acts described, as some steps may be performed in other orders or concurrently in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are alternative embodiments, and that the acts and modules involved are not necessarily required for the present application.
In the foregoing embodiments, the descriptions of the embodiments are focused on, and for those portions of one embodiment that are not described in detail, reference may be made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, such as the division of the units, merely a logical function division, and there may be additional divisions when actually implemented, such as multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, or may be in electrical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units described above may be implemented either in hardware or in software program modules.
The integrated units, if implemented in the form of software program modules, may be stored in a computer-readable memory for sale or use as a stand-alone product. Based on this understanding, the technical solution of the present application may be embodied essentially or partly in the form of a software product or all or part of the technical solution, which is stored in a memory, and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned memory includes: a usb disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Those of ordinary skill in the art will appreciate that all or a portion of the steps in the various methods of the above embodiments may be implemented by a program that instructs associated hardware, and the program may be stored in a computer readable memory, and the memory may include: flash disk, read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), magnetic disk or optical disk.
The foregoing has outlined rather broadly the more detailed description of the embodiments of the application in order that the detailed description of the principles and embodiments of the application may be implemented in conjunction with the detailed description of the embodiments that follows, the claims being merely intended to facilitate the understanding of the method and concepts underlying the application; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present application, the present description should not be construed as limiting the present application in view of the above.
Claims (8)
1. A visitor trip analysis method, the method comprising:
Receiving identity information of a visitor from user equipment, wherein the identity information is obtained by scanning a preset two-dimensional code by an application program installed on the user equipment, and the application program is used for controlling functions of the user equipment;
Inquiring a first database according to the identity information, and acquiring a visit record of the visitor, wherein the visit record comprises a history visit place;
Determining the visit times of the visitor according to the history visit place;
if the visit times are greater than a preset threshold value, carrying out first analysis on the current journey information of the visitor to determine whether the current journey information is legal or not;
If the visit times are smaller than or equal to the threshold value, carrying out second analysis on the current journey information of the visitor to determine whether the current journey information is legal or not;
the first analyzing the current journey information of the visitor to determine whether the current journey information is legal or not includes:
receiving current trip information of the visitor from the user equipment;
Acquiring a map of an access place, wherein a forbidden zone is marked in the map, and the forbidden zone is an area which is forbidden to be accessed in the access place;
Acquiring a travel path of the visitor according to the current travel information;
overlapping the travel path with the map according to the overlapping mark in the travel path;
if the restricted area does not have the journey path, judging that the visitor does not access the restricted area, and judging that the current journey information is legal through the first analysis;
The second analyzing the current journey information of the visitor to determine whether the current journey information is legal, including:
carrying out path analysis, stay analysis and behavior analysis on the journey information of the visitor;
and if the path analysis, the stay analysis and the behavior analysis are all passed, judging that the current journey information is legal.
2. The method of claim 1, wherein the dwell analysis comprises:
Acquiring at least one stay place and at least one stay time of the visitor according to the application program, wherein the at least one stay place and the at least one stay time are in one-to-one correspondence;
For each stay place in the at least one stay place, respectively acquiring a stay time threshold value corresponding to each stay place;
And if the residence time corresponding to each residence place does not exceed the residence time threshold corresponding to each residence place, the residence analysis is passed.
3. The method of claim 1, wherein the behavioral analysis comprises:
Acquiring at least one recording data according to the user equipment;
Face information in the identity information of the visitor is matched with a video in a video database in a face mode, at least one video data containing the visitor is screened out, and the video database is connected with all video equipment in an access place and used for storing videos shot by the video equipment;
analyzing whether the at least one recording data and the at least one video data contain sensitive information according to a sensitive database, wherein the sensitive information comprises: sensitive actions and sensitive words;
And if the sensitive information is not contained in the at least one recording data and the at least one recording data, the behavior analysis is passed.
4. The method of claim 3, wherein said analyzing whether the at least one recording data and the at least one video data contain sensitive information based on a sensitive database comprises:
For each recording data in the at least one recording data, respectively acquiring first time data of each recording data, wherein the first time data is used for marking the recording time of each recording data;
for each video data in the at least one video data, respectively obtaining second time data of each video data, wherein the second time data is used for marking the video time of each video data;
comparing each first time data in the at least one first time data with each second time data in the at least one second time data respectively, and if a coincident time slice exists between each first time data and each second time data, matching the recording data corresponding to each first time data with the recording data corresponding to each second time to obtain at least one behavior data;
analyzing whether the at least one behavior data contains the sensitive information according to a sensitive database.
5. The method of claim 4, wherein said analyzing whether said at least one behavioral data includes said sensitive information based on a sensitive database comprises:
For each behavior data in the at least one behavior data, respectively analyzing each behavior data frame by frame to obtain images of each sub-action of each behavior data, and comparing the images of each sub-action with the action images of the sensitive action to obtain at least one first similarity;
For each behavior data in the at least one behavior data, respectively performing voice segmentation on each behavior data to obtain each sub-audio of each behavior data, and comparing each sub-audio with the audio of the sensitive word to obtain at least one second similarity;
And if a first similarity larger than a first threshold exists in the at least one first similarity and/or a second similarity larger than a second threshold exists in the at least one second similarity, judging that the behavior data contains the sensitive information.
6. A visitor trip analysis device, said device comprising:
The system comprises a data acquisition module, a user equipment and a data processing module, wherein the data acquisition module is used for receiving identity information of a visitor from the user equipment, the identity information is obtained by scanning a preset two-dimensional code by an application program installed on the user equipment, and the application program is used for controlling functions of the user equipment;
The data query module is used for querying a first database according to the identity information and acquiring a visit record of the visitor, wherein the visit record comprises a history visit place;
The data analysis module is used for determining the visit times of the visitor according to the history visit place;
if the visit times are greater than a preset threshold value, carrying out first analysis on the current journey information of the visitor to determine whether the current journey information is legal or not;
If the visit times are smaller than or equal to the threshold value, carrying out second analysis on the current journey information of the visitor to determine whether the current journey information is legal or not;
wherein, in the aspect of performing a first analysis on the current trip information of the visitor to determine whether the current trip information is legal, the data analysis module is configured to:
receiving current trip information of the visitor from the user equipment;
Acquiring a map of an access place, wherein a forbidden zone is marked in the map, and the forbidden zone is an area which is forbidden to be accessed in the access place;
Acquiring a travel path of the visitor according to the current travel information;
overlapping the travel path with the map according to the overlapping mark in the travel path;
if the restricted area does not have the journey path, judging that the visitor does not access the restricted area, and judging that the current journey information is legal through the first analysis;
In the aspect of performing second analysis on the current journey information of the visitor to determine whether the current journey information is legal, the data analysis module is used for:
carrying out path analysis, stay analysis and behavior analysis on the journey information of the visitor;
and if the path analysis, the stay analysis and the behavior analysis are all passed, judging that the current journey information is legal.
7. An electronic device comprising a processor, a memory, a communication interface, and one or more programs, wherein the one or more programs are stored in the memory and configured for execution by the processor, the one or more programs comprising instructions for performing the steps of the method of any of claims 1-5.
8. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program, which is executed by a processor to implement the method of any of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011431994.4A CN112527934B (en) | 2020-12-09 | 2020-12-09 | Visitor trip analysis method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011431994.4A CN112527934B (en) | 2020-12-09 | 2020-12-09 | Visitor trip analysis method and device, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112527934A CN112527934A (en) | 2021-03-19 |
CN112527934B true CN112527934B (en) | 2024-08-16 |
Family
ID=74999772
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011431994.4A Active CN112527934B (en) | 2020-12-09 | 2020-12-09 | Visitor trip analysis method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112527934B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114022988B (en) * | 2021-11-05 | 2022-10-25 | 西南交通大学 | A system and method for visitor information management and verification based on artificial intelligence |
CN114864102A (en) * | 2022-04-28 | 2022-08-05 | 中国银行股份有限公司 | User data analysis method, device, equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105357216A (en) * | 2015-11-30 | 2016-02-24 | 上海斐讯数据通信技术有限公司 | Secure access method and system |
CN107018121A (en) * | 2016-10-13 | 2017-08-04 | 阿里巴巴集团控股有限公司 | The method and device of subscriber authentication |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120130817A1 (en) * | 2010-11-20 | 2012-05-24 | Robert Bousaleh | Method for Delivery of Relevant Consumer Content Based on Consumer Journey Patterns |
US9646439B2 (en) * | 2012-03-14 | 2017-05-09 | Autoconnect Holdings Llc | Multi-vehicle shared communications network and bandwidth |
CN107895414A (en) * | 2017-10-31 | 2018-04-10 | 成都起能起重设备技术服务有限公司 | A kind of visitor's concierge system based on Quick Response Code |
WO2020033354A2 (en) * | 2018-08-06 | 2020-02-13 | Olive Seed Industries, Llc | Methods and systems for personalizing visitor experience at a venue |
CN110491008A (en) * | 2019-08-29 | 2019-11-22 | 恒大智慧科技有限公司 | A kind of community-based managing caller side and system, storage medium |
CN211506527U (en) * | 2020-03-23 | 2020-09-15 | 深圳市商汤科技有限公司 | Face recognition device |
CN111477341A (en) * | 2020-06-18 | 2020-07-31 | 杭州数梦工场科技有限公司 | Epidemic situation monitoring method and device, electronic equipment and storage medium |
CN111666510A (en) * | 2020-06-30 | 2020-09-15 | 成都新潮传媒集团有限公司 | Statistical method and device for customer visit data |
CN111798342A (en) * | 2020-07-07 | 2020-10-20 | 德能森智能科技(无锡)有限公司 | A smart community system based on cloud platform |
CN112040418A (en) * | 2020-09-01 | 2020-12-04 | 日立楼宇技术(广州)有限公司 | Visitor positioning method, device, server, storage medium and system |
-
2020
- 2020-12-09 CN CN202011431994.4A patent/CN112527934B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105357216A (en) * | 2015-11-30 | 2016-02-24 | 上海斐讯数据通信技术有限公司 | Secure access method and system |
CN107018121A (en) * | 2016-10-13 | 2017-08-04 | 阿里巴巴集团控股有限公司 | The method and device of subscriber authentication |
Also Published As
Publication number | Publication date |
---|---|
CN112527934A (en) | 2021-03-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109389723B (en) | Visitor management method and device using face recognition and computer equipment | |
US11776083B2 (en) | Passenger-related item loss mitigation | |
EP3716141B1 (en) | Identity authentication method, system, device and apparatus | |
EP3457322B1 (en) | Identity authentication by using specific human biological characteristics collection algorithms | |
CN109920174B (en) | Book borrowing method and device, electronic equipment and storage medium | |
KR101982686B1 (en) | Method for registration and identity verification of using companion animal’s muzzle pattern | |
CN102646190B (en) | A kind of authentication method based on biological characteristic, apparatus and system | |
CN107483416A (en) | The method and device of authentication | |
CN109766755B (en) | Face recognition method and related product | |
EP2863339A2 (en) | Methods and systems for determing user liveness | |
CA2611379A1 (en) | Electronic vehicle identification | |
CN104182671A (en) | Method and device for protecting privacy information of browser | |
CN107622246B (en) | Face recognition method and related product | |
JP2020524928A (en) | Method of providing a device with an information element that allows identifying an unauthorized user in a restricted area | |
CN108494778A (en) | Identity identifying method and device | |
CN112527934B (en) | Visitor trip analysis method and device, electronic equipment and storage medium | |
US9633272B2 (en) | Real time object scanning using a mobile phone and cloud-based visual search engine | |
CN108959884B (en) | Human authentication verification device and method | |
CN109146629B (en) | Target object locking method and device, computer equipment and storage medium | |
CN104933791A (en) | Intelligent security control method and equipment | |
CN107832598B (en) | Unlocking control method and related product | |
CN105590113A (en) | Information-acquiring method based on law enforcement recorder | |
CN109815669A (en) | Authentication method and server based on face recognition | |
CN105635041A (en) | Integration registration system and method on the basis of face identification | |
CN111738199B (en) | Image information verification method, device, computing device and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |