Unlock instant, AI-driven research and patent intelligence for your innovation.

View library security auditing system and method

A security audit and view technology, applied in the computer field, can solve the problems of complex unstructured data information, unable to solve unstructured data retrieval such as pictures and view library deployment and control behavior auditing, etc., to achieve proper processing and operation and maintenance burden small effect

Pending Publication Date: 2022-07-22
元清信息技术(武汉)有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] As an important means, portrait retrieval technology can accurately and quickly find the target person from massive video surveillance data by comparing a large number of videos and images, improving work efficiency. With the rapid development of multiple AI scenarios such as artificial intelligence and Internet of Things control With the development of applications, unstructured data information such as videos and pictures accumulated by the video image information system is becoming more and more complex. Traditional data security protection can only audit the query operations of some structured data, and cannot solve unstructured data such as pictures. The problem of auditing data retrieval and view database control behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • View library security auditing system and method
  • View library security auditing system and method
  • View library security auditing system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0062] A view library security audit system, comprising: a data acquisition module, a protocol analysis module and an alarm management module, wherein:

[0063] The data acquisition module is used to obtain the data traffic requested by all the view retrieval queries in the network, and forward the requested data traffic such as the view retrieval query to the protocol analysis module;

[0064] The protocol analysis module obtains th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A view library security auditing system comprises a data acquisition module, a protocol analysis module and an alarm management module, the data acquisition module is used for acquiring data traffic of all requests such as view retrieval and query in a network and forwarding the data traffic of the requests such as view retrieval and query to the protocol analysis module; and the protocol analysis module is used for restoring and analyzing an application layer protocol to obtain a view operation original signaling, restoring a detailed behavior record of an individual using application systems such as portraits and vehicles from the original control signaling, storing the detailed behavior record in a database in real time, and performing further statistical analysis on the analyzed data to form portraits. The view library safety auditing system which conforms to the application characteristics of images, vehicles and the like and has comprehensive auditing, multi-dimensional perception and intelligent analysis is established for the image data of the images, the vehicles and the like which have the characteristics of being unstructured, large in volume, high in timeliness and the like.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a view library security auditing system and method. Background technique [0002] In recent years, my country's economic strength has increased significantly, economic and cultural exchanges have become more frequent, and the floating population in cities is increasing. Surveillance cameras are installed in important locations in cities, and the video image data generated by them has entered a stage of rapid growth, making image retrieval technology in various industries. Various industries have played an important role, but at the same time, they also face the risk of data leakage in various industries. [0003] As an important means of portrait retrieval technology, by comparing a large number of videos and images, it can accurately and quickly find the target person from the massive video surveillance data, which improves work efficiency. With the rapid development of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/10G06F16/532G06F16/73H04L69/22
CPCG06Q10/103G06F16/532G06F16/73H04L69/22
Inventor 吕晶晶陈强
Owner 元清信息技术(武汉)有限公司