
Topwalk Video and Image Application Security Audit System (Topwalk-PDS) is a security audit product that fully records, comprehensively analyzes, warns and disposes of, and centrally audits image-based application operations such as person-to-image search, vehicle-to-image search, image-to-image search, identity verification, ID number retrieval, and license plate number retrieval, as well as behaviors such as deployment and withdrawal of control over view objects. The records include information such as operating terminals, operating accounts, operation time, image retrieval conditions (images and structured tag data), and retrieval results (result images and structured tag data). It solves the problem of difficult audit and restoration of video and image privacy leakage behaviors in image application systems, vehicle application systems, etc.

-Behavior Statistical Analysis: Supports ranking display of active operating terminals and active users, proportion statistical display of alarm categories and behavior categories, and ranking display of images with the most retrieval condition inputs and images with the most retrieval results.
-Alarm Strategy Management: Supports setting alarm rules based on single or combined conditions such as sensitive keywords (e.g., searching for police cars, searching for official vehicles, etc.), user accounts, terminal IP addresses, operation types, operation time, and operation frequency to promptly detect irregular operations and issue early warning prompts.

-User Profiling: Supports statistics on user assets of the image application platform and marks newly discovered users as "newly accessed" to prompt administrators to confirm user account information. It supports analysis of each user's operation profile, including the operation volume trend of the user at various time nodes, the proportion of various operation behaviors of the user, frequently logged-in terminal information, hot search keywords, hot search images, etc.
-Terminal Profiling: Supports statistics on terminal assets of the image application platform and marks newly discovered terminals as "newly accessed" to prompt administrators to confirm terminal IP information. It supports analysis of each terminal's operation profile, including the operation volume trend of the terminal at various time nodes, the proportion of various operation behaviors, frequently logged-in user account information, hot search keywords, hot search images, etc.

Audits structured condition retrieval behaviors through the image application platform, such as ID number retrieval, name retrieval, license plate number retrieval, etc., and records retrieval conditions, retrieval results (images and attached structured tag information), retrieval time, operating user accounts, operating terminals, etc.

Records behaviors such as user-defined uploaded image retrieval, face image retrieval, and vehicle image retrieval by users through the image application platform, and records information such as original retrieval images, retrieval result images and attached structured tag information, operating user accounts, terminal IPs, image application platform IPs, and operation time.
Includes more than 300 standard structures including police data, covering business data of various police services organized according to the five public security elements of population, items, cases, addresses, and organizations. It collects and aggregates data from all businesses such as police comprehensive services, criminal cases, public security cases, drug control, economic investigation, 110 emergency response, population management, and checkpoints.)
Adopts distributed in-memory computing, partitioned indexing technology, columnar storage technology and caching technology, which can fully utilize the characteristics of multi-CPU and large memory of modern machines. It has PB-level data processing capabilities, supports dynamic real-time index updates of massive data, and high-concurrency and fast access to massive data, serving as technical support for complex calculations such as big data analysis, mining, correlation query, and comparison collision.
Adopting the design concept of Scale-Out, it uses flat architecture design and automatic data slicing technology to realize complete peer-to-peer between nodes, and can realize dynamic expansion of the system by adding nodes online.
The system's underlying layer adopts multi-replica mechanism and access control mechanism to ensure data security from the data bottom. The application layer is seamlessly connected with the police PKI permission management system, tightening the security loop from the source of data. The security audit module automatically reviews the access logs of police officers, realizing statistical analysis of user access and early warning of abnormal query behaviors.
01

Through big data technology, massive and multi-type business data of public security and other government departments are integrated, then analyzed and mined, which completely changes the current situation that massive data in the public security industry cannot be effectively used, and injects new vitality into its practical business. On the one hand, it will greatly improve the work efficiency of government business departments; on the other hand, it will benefit the general public more. Moreover, the typical application of big data technology in government business departments will promote the application of big data in various fields of society.
Contact number: +8613810035865
Enterprise Email: liuyl@topwalk.com
Address: Building 3, Courtyard 6, Jianfeng Road (South Extension), Haidian District, Beijing
All Rights Reserved by TRS Topwalk Information Technology Co., Ltd.