CN110569389A - Environment monitoring method and device, computer equipment and storage medium - Google Patents

Environment monitoring method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN110569389A
CN110569389A CN201910676750.3A CN201910676750A CN110569389A CN 110569389 A CN110569389 A CN 110569389A CN 201910676750 A CN201910676750 A CN 201910676750A CN 110569389 A CN110569389 A CN 110569389A
Authority
CN
China
Prior art keywords
data
environment
node
result
detection result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910676750.3A
Other languages
Chinese (zh)
Inventor
刘恩科
王梦寒
高建欣
张宝
赵达悦
王瑞雪
查璐琰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201910676750.3A priority Critical patent/CN110569389A/en
Publication of CN110569389A publication Critical patent/CN110569389A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/71Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/73Querying
    • G06F16/732Query formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Mathematical Physics (AREA)
  • Computational Linguistics (AREA)
  • Bioethics (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The present application relates to storage of tile data in a blockchain storage, and more particularly, to an environment monitoring method, apparatus, computer device, and storage medium. The method comprises the following steps: inquiring and acquiring uploaded data to be analyzed from a block chain system; acquiring a query field, extracting a field to be matched corresponding to data to be analyzed, extracting a field to be matched corresponding to the data to be analyzed according to the query field, extracting environmental data from the data to be analyzed, and obtaining a first environmental detection result according to the environmental data; inquiring a data format, extracting video data from the data to be analyzed according to the data format, acquiring a standard video, and comparing the video data with the standard video to obtain a second detection result of the environment corresponding to the video data; and inputting the first detection result of the environment and the second detection result of the environment into the detection model to obtain an environment monitoring result.

Description

Environment monitoring method and device, computer equipment and storage medium
Technical Field
the present application relates to the field of computer technologies, and in particular, to a method and an apparatus for monitoring environmental protection data, a computer device, and a storage medium.
Background
with the development of society, environmental protection is a focus of attention, and therefore, enterprises with potential environmental pollution need to be supervised.
Traditionally, when the enterprise to be monitored is subjected to environment monitoring, the environment monitoring device arranged under the environment to be monitored is used for detecting and obtaining detection data, then the detection data is transmitted to an environment monitoring system by the environment monitoring device, the reliability of the detection data is manually inquired, and then the environment is evaluated according to the reliable detection data, so that the efficiency of environment monitoring is low.
disclosure of Invention
in view of the above, it is necessary to provide an environment monitoring method, an apparatus, a computer device and a storage medium capable of improving the environment monitoring efficiency.
A method of environmental monitoring, the method comprising:
Inquiring and acquiring uploaded data to be analyzed from a block chain system;
acquiring a query field, extracting a field to be matched corresponding to the data to be analyzed, extracting environmental data from the data to be analyzed according to the query field and a matching result of the field to be matched, and obtaining a first environmental detection result according to the environmental data;
Inquiring a data format, extracting video data from the data to be analyzed according to the data format, acquiring a standard video, comparing the video data with the standard video to obtain a second detection result of the environment corresponding to the video data, and obtaining a second detection result of the environment according to the video data;
And acquiring a standard video, and comparing the video data with the standard video to obtain a second detection result of the environment corresponding to the video data.
In one embodiment, after the inputting the environment first detection result and the environment second detection result into the detection model to obtain the environment monitoring result, the method includes:
Receiving an acquisition request for acquiring the environment monitoring result sent by an inquiry node;
Acquiring a communication protocol according to the acquisition request, inquiring verification data corresponding to the communication protocol, and sending the verification data to the inquiry node for verification;
and receiving feedback information which is returned by the query node and passes the verification corresponding to the verification data, and sending the environment monitoring result to the query node according to the feedback information.
In one embodiment, the extracting video data from the data to be analyzed according to the data format to obtain a standard video, and comparing the video data with the standard video to obtain a second detection result of an environment corresponding to the video data includes:
extracting an image to be verified from the video data;
Inquiring an uploading identity corresponding to the video data, and acquiring a standard image according to the uploading identity;
and comparing the image to be verified with the standard image, and inquiring whether the image to be verified contains an abnormal image or not to obtain a second detection result of the environment.
In one embodiment, the obtaining an environmental first detection result according to the environmental data includes:
Extracting an environment evaluation index from the environment data, obtaining an environment evaluation model, and inputting the environment evaluation index into the environment evaluation model to obtain an initial environment evaluation result;
acquiring an evaluation time period, and inquiring a historical environment evaluation result corresponding to the evaluation time period;
and obtaining a first environment detection result according to the initial environment evaluation result and the historical environment evaluation result.
In one embodiment, the inputting the first detection result of the environment and the second detection result of the environment into a detection model to obtain an environment monitoring result includes:
Extracting a first result feature from the environmental first detection result and a second result feature from the second detection result;
And obtaining an environment monitoring result according to the first result characteristic and the second result characteristic through the detection model. In one embodiment, the data to be analyzed is generated by acquiring detailed environment data through a first node, querying a lookup range corresponding to the detailed environment data, and encrypting the detailed environment data according to an encryption logic corresponding to the lookup range.
In one embodiment, the detailed environment data is data obtained by acquiring an endorsement node identifier through the first node, sending the endorsement node identifier to an endorsement node, and acquiring data verification logic for verification through the endorsement node.
An environmental monitoring device, the device comprising:
the acquisition module is used for inquiring and acquiring uploaded data to be analyzed from the block chain system;
The environment data evaluation module is used for acquiring a query field, extracting a field to be matched corresponding to the data to be analyzed, extracting environment data from the data to be analyzed according to the query field and the matching result of the field to be matched, and obtaining a first environment detection result according to the environment data;
The video data evaluation module is used for inquiring a data format, extracting video data from the data to be analyzed according to the data format, acquiring a standard video, and comparing the video data with the standard video to obtain a second detection result of the environment corresponding to the video data;
and the generating module is used for inputting the first detection result of the environment and the second detection result of the environment into a detection model to obtain an environment monitoring result.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
inquiring and acquiring uploaded data to be analyzed from a block chain system;
Acquiring a query field, extracting a field to be matched corresponding to the data to be analyzed, extracting environmental data from the data to be analyzed according to the query field and a matching result of the field to be matched, and obtaining a first environmental detection result according to the environmental data;
inquiring a data format, extracting video data from the data to be analyzed according to the data format, acquiring a standard video, and comparing the video data with the standard video to obtain a second detection result of the environment corresponding to the video data; and inputting the first detection result of the environment and the second detection result of the environment into a detection model to obtain an environment monitoring result.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
inquiring and acquiring uploaded data to be analyzed from a block chain system;
acquiring a query field, extracting a field to be matched corresponding to the data to be analyzed, extracting environmental data from the data to be analyzed according to the query field and a matching result of the field to be matched, and obtaining a first environmental detection result according to the environmental data;
inquiring a data format, extracting video data from the data to be analyzed according to the data format, acquiring a standard video, and comparing the video data with the standard video to obtain a second detection result of the environment corresponding to the video data;
And inputting the first detection result of the environment and the second detection result of the environment into a detection model to obtain an environment monitoring result.
the environment monitoring method, the device, the computer equipment and the storage medium do not need to manually check corresponding detection data or manually analyze the detection data, only need to inquire and acquire uploaded data to be analyzed from a block chain system, further acquire the data to be analyzed from the block chain system, further acquire an inquiry field, further extract a field to be matched corresponding to the data to be analyzed, extract environment data from the data to be analyzed according to the inquiry field and the matching result of the field to be matched, obtain a first detection result of an environment according to the environment data, further inquire a data format, extract video data from the data to be analyzed according to the data format, further acquire a standard video, compare the video data with the standard video, obtain a second detection result of the environment corresponding to the video data, and obtain a second detection result of the environment according to the video data, and obtaining an environment monitoring result according to the first environment detection result and the second environment detection result, so that the environment monitoring efficiency can be improved.
drawings
FIG. 1 is a diagram of an exemplary environment monitoring method;
FIG. 2 is a flow diagram of an environmental monitoring method in one embodiment;
FIG. 3 is a flowchart of the result query step in one embodiment;
FIG. 4 is a block diagram of an environment monitoring apparatus according to an embodiment;
FIG. 5 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
in order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The environment monitoring method provided by the application can be applied to the application environment shown in fig. 1. The blockchain system 100 includes different nodes, which may include a first node 102 and a second node 104, the first node 102 uploads data to be analyzed to the blockchain system, the second node 104 queries the uploaded data to be analyzed from the blockchain system and obtains the data to be analyzed from the blockchain system, the second node 104 obtains a query field and extracts a field to be matched corresponding to the data to be analyzed, according to a matching result between the query field and the field to be matched, the environmental data is extracted from the data to be analyzed, a first environmental detection result is obtained according to the environmental data, the second node 104 queries a data format, according to the data format, video data is extracted from the data to be analyzed, a standard video is obtained, the video data is compared with the standard video, a second environmental detection result corresponding to the video data is obtained, and a second environmental detection result is obtained according to the video data, and the second node 104 obtains an environment monitoring result according to the environment first detection result and the environment second detection result. The first node 102 and the second node 104 may use independent servers, and the blockchain system 100 may be a distributed storage system including different nodes, and may connect blocks generated by different nodes to form a blockchain.
In one embodiment, as shown in fig. 2, an environment monitoring method is provided, which is described by taking the method as an example applied to the second node in fig. 1, and includes the following steps:
S202: and inquiring and acquiring the uploaded data to be analyzed from the block chain system.
Specifically, the blockchain system refers to a distributed storage system including different nodes, and the blockchain system may connect blockchains generated by different nodes. The data to be analyzed is data that can represent an environmental condition after being evaluated, and the data to be analyzed is data that the second node has a corresponding right to view, and may include environmental data obtained by monitoring, such as an environmental index, or may include video data shot in a monitored environment.
Specifically, the second node queries whether the uploaded data to be analyzed is stored in the blockchain system, that is, the second node may query the corresponding block generation time in the blocks included in the blockchain system, and then the second node queries the data identifier sent by the first node, acquires the corresponding block generation time from the data identifier, and matches the block generation time acquired from the data identifier with the different block generation times included in the blockchain generated by the blockchain system, and when the matching is successful, that is, the second node queries the data to be analyzed uploaded by the first node in the blockchain system.
When the second node inquires from the block chain system that the data to be analyzed uploaded by the first node is stored, the second node sends an acquisition request of the data to be analyzed to the block chain system, and then the block chain system inquires whether the first node performs data acquisition permission configuration on a second node identifier of the second node, namely the block chain system inquires the acquisition permission corresponding to the data to be analyzed, and when the block chain system inquires that the first node configures the data acquisition permission on the second node identifier corresponding to the second node, the second node is allowed to acquire the data to be analyzed; when the block chain system inquires that the first node does not configure the data acquisition right for the second node identity corresponding to the second node, the prompt information rejecting to acquire the data to be analyzed is returned to the second node, when the second node receives the prompt information, the configuration request requesting the configuration right is sent to the first node, when the first node receives the configuration request, whether the second node identity of the second node is a credible identity is verified, that is, whether the second node identity is stored in a credible identity library can be inquired, when the second identity is stored in the credible identity library, the first node sends the second identity to the block chain system, so that the block chain system adds the data acquisition right to the second identity, and the first node returns the successful information of the right configuration to the second node, and the second node sends an acquisition request of the data to be analyzed to the blockchain system after receiving the return information, so that the second node acquires the data to be analyzed from the blockchain system.
s204: acquiring a query field, extracting a field to be matched corresponding to the data to be analyzed, extracting environmental data from the data to be analyzed according to the query field and a matching result of the field to be matched, and obtaining a first environmental detection result according to the environmental data.
Specifically, the query field refers to a keyword corresponding to the environment data, that is, when the second node obtains the data to be analyzed, the corresponding environment data may be queried according to the query field. The environmental data refers to relevant environmental indexes obtained by detecting the environment to be monitored. The environmental first score is a score obtained by evaluating environmental data, and the score can be used as one of indexes for monitoring the environment. The field to be matched refers to keywords corresponding to different data contained in the data to be analyzed.
specifically, when the second node acquires the data to be analyzed from the blockchain system, whether the data to be analyzed carries the encryption identifier is inquired, when the second node inquires that the data to be analyzed carries the encryption identifier, the second node acquires the pre-stored decryption logic, the encrypted field to be analyzed is decrypted according to the decryption logic, when the second node decrypts the field to be analyzed successfully, the second node can read the detailed data in the data to be analyzed, then the second node acquires the pre-stored query field, matches the query field with the field to be matched contained in the data to be analyzed, extracts the data corresponding to the successfully matched field as the environmental data, and then the second node acquires the evaluation logic corresponding to the environment data, and the second node detects the environment data by adopting the evaluation logic to acquire a first detection result corresponding to the environment data.
the second node may query whether the data to be analyzed carries the encrypted identifier when the second node obtains the data to be analyzed from the blockchain system, and when the data to be analyzed carries the encrypted identifier, the second node decrypts the data to be analyzed by using a pre-stored private key to obtain the data to be analyzed which can be directly read, and further queries a pre-stored query field, which may be a query keyword or the like, which may be a corresponding index keyword, for the second node, and then matches the query field with the field to be matched included in the data to be analyzed according to the query field, so as to extract the data associated with the successfully matched field to be matched as the environmental data, and further the second node obtains the evaluation logic corresponding to the environmental data, which is expressed as the evaluation model for evaluation, and then the second node obtains the pre-stored evaluation model, and inputs the environmental data into the evaluation model, thereby outputting a corresponding first detection result through the evaluation model.
It should be noted that the evaluation model is a correlation model obtained by training a sample evaluation index and a sample result, and when the input data is a determined value, a determined detection result may be output.
S206; and querying a data format, extracting video data from the data to be analyzed according to the data format, acquiring a standard video, and comparing the video data with the standard video to obtain a second detection result of the environment corresponding to the video data.
Specifically, the data format refers to different data forms in the data to be analyzed, and may be a character format, a video format, or the like. The video data refers to relevant videos which are contained in the data to be analyzed and collect the environment to be monitored. The second detection result of the environment refers to a detection result of the video data obtained by evaluating the video data by the second node.
Specifically, when the second node acquires the data to be analyzed, since the data to be analyzed may include video data, the data format of the data to be extracted is acquired, the data format of the data to be extracted is queried, the second node extracts the video data from the data to be analyzed according to the data format, the second node queries whether an abnormal image occurs in the video data according to the extracted video data, where querying whether the abnormal image occurs in the video data by the second node may be querying a standard video, and then comparing the standard video with the video data extracted from the data to be analyzed, and may be comparing video frames at the same time, so as to query whether an image inconsistent with the standard video exists in the video data, where the image is an abnormal image, and the second node further, according to the abnormal image in the video data, and querying a corresponding image verification result as an environment second detection result, wherein the image verification result queried by the second node may be the number of the abnormal images queried, a preset number range is queried according to the number, and then a number range corresponding to the number of the abnormal images is queried, and the second node obtains the detection result corresponding to the number range as a second environment detection result, if the second environment detection result is that the detection is passed or not passed, and carries the number of the abnormal images and the number of the abnormal images.
s208: and inputting the first detection result and the second detection result into a detection model to obtain an environment monitoring result. .
specifically, the environment monitoring result refers to a target result obtained by evaluating, by the second node, the data to be analyzed acquired from the blockchain system, where the target result may be an environment monitoring result in a preset time period. The detection model is a model of an environment monitoring result obtained by calculation according to a first environment detection result and a second environment detection result corresponding to the environment data, and the detection model can be a model obtained by training according to a first sample result, a second sample result and a target sample result, that is, the trained detection model can respectively obtain weights corresponding to different environment detection results, so that the environment monitoring result can be obtained according to the input determined first environment detection result and the second environment detection result.
Specifically, when the second node obtains a first environment detection result and a second environment detection result, the detection model is obtained, and then the second node inputs the obtained first environment detection result and the obtained second environment detection result into the corresponding detection model, and the environment monitoring result can be obtained through model calculation. And when the second node obtains the environment monitoring result, the obtained environment monitoring result can be encrypted, and the second result uploads the encrypted environment monitoring result to the blockchain system, so that the first node can inquire the result through the blockchain system.
In this embodiment, the second node queries the data to be analyzed uploaded by the first node from the blockchain system, and obtaining the data to be analyzed from the blockchain system, uploading the data to the blockchain system through the first node to ensure that the data to be analyzed is not tampered, therefore, the obtained environment monitoring result is accurate, in the environment monitoring process, the data does not need to be checked, the environment monitoring does not need to be carried out manually, only the query field needs to be obtained, extracting environment data from the data to be analyzed according to the query field, obtaining a first detection result of the environment according to the environment data, further querying the data format, video data are extracted from the data to be analyzed according to the data format, the second node obtains an environment second detection result according to the video data, and the second node obtains an environment monitoring result according to the environment first detection result and the environment second detection result, so that the efficiency of obtaining the environment monitoring result can be improved.
In an embodiment, referring to fig. 3, a flow chart of a result query step is provided, where the result query step, namely after inputting the environment first detection result and the environment second detection result into the detection model to obtain the environment monitoring result, includes: receiving an acquisition request for acquiring an environment monitoring result sent by an inquiry node; acquiring a communication protocol according to the acquisition request, inquiring verification data corresponding to the communication protocol, and sending the verification data to an inquiry node for verification; and receiving feedback information which is returned by the query node and corresponds to the verification data and passes the verification, and sending the environment monitoring result to the query node according to the feedback information.
specifically, the query node refers to a node included in the blockchain system for querying a corresponding environment monitoring result. The obtaining request is a request which is sent by the query node to the second node to obtain the environment monitoring result, and the request carries corresponding first request data, so that the second node can send corresponding verification data to the verification node according to the first request data, and the verification node can verify whether the identity of the second node is credible or not. The communication protocol refers to a preset communication identity which is used between different nodes and can verify that the communication identity of a counterpart is a credible identity, so that when detailed data is not required to be acquired, a final result corresponding to the received data can be confirmed to be a credible result. The verification data refers to related data which is generated by the second node according to a preset communication protocol and is verified by the inquiring node, and may be generated random numbers and the like as verification data.
specifically, the second node receives an acquisition request for acquiring an environment monitoring result sent by the query node, the acquisition request carries first request data, and the second node does not need to feed back all the data to the query node, but in order to enable the query node to confirm that the received environment monitoring result is a reliable result, the second node generates corresponding verification data according to the queried communication protocol according to a pre-stored communication protocol obtained by the acquisition request according to the first request data carried by the acquisition request, and then sends the calculated verification data to the query node for verification, when the query node receives the verification data, the query node can obtain a preset query range and inquire whether the verification data is in the query range, and when the verification data is in the query range, the verification node confirms that the second node adopts the preset communication protocol for calculation, and the verification data obtained by calculation is correct verification data, the inquiry node calculates again by adopting a preset communication protocol according to the verification data to obtain second request data again, and sends the second request data to the second node again, when the second node receives the second request data, the same verification method can be used for verifying whether the second request data is in a preset inquiry range, when the second request data falls into the inquiry range, the second node continues to adopt the same method, adopts the communication protocol to send the second verification data corresponding to the second request data again, and then sends the second verification data to the inquiry node for verification, so that the inquiry node counts the times of receiving all the verification data, passes the times of passing all the verification data as verification, when the times of passing the verification data exceeds the preset times, and if the second node passes the identity verification through the query node, the query node sends the feedback information passing the verification to the second node, and if the second node receives the feedback information passing the verification corresponding to the verification data and the second node passes the verification on the query node, the second node directly sends the environment monitoring result to the query node only without sending all the environment data to the query node.
it should be noted that, when the query node receives the verification data sent by the second node at any time and the verification data sent by the second node is not passed, the query node sends the corresponding prompt information indicating that the authentication fails to the second node, and when the second node receives the verification data sent by the query node at any time and the verification data is not passed, the second node directly feeds back rejection information for rejecting obtaining the environment monitoring result to the query order receiving.
In this embodiment, the second node receives an acquisition request for acquiring the environment monitoring result sent by the query node, acquires the communication protocol according to the acquisition request, further queries verification data corresponding to the communication protocol, and sends the verification data to the query node for verification, further the second node receives feedback information, corresponding to the verification data, returned by the query node and passing the verification, and sends the environment monitoring result to the query node according to the feedback information, thereby ensuring that the second node does not need to send complete data to the query node, and the query node confirms that the received environment monitoring result is a reliable result, so as to ensure the security of the data.
In one embodiment, extracting video data from data to be analyzed according to a data format, obtaining a standard video, and comparing the video data with the standard video to obtain a second detection result of an environment corresponding to the video data, includes: extracting an image to be verified from the video data; inquiring an uploading identity corresponding to the video data, and acquiring a standard image according to the uploading identity; and comparing the image to be verified with the standard image, and inquiring whether the image to be verified contains the abnormal image or not to obtain a second environment detection result.
specifically, the images to be verified refer to different frame images contained in the video data. The uploading identity refers to the identity of the node corresponding to the node uploading the relevant data to be analyzed. The standard image is an initially acquired and stored image corresponding to a node uploading related data to be analyzed. The abnormal image is an image that is included in the image to be verified and is inconsistent with the standard image.
Specifically, when the second node extracts video data from the data to be analyzed in a data format, extracting the image to be verified from the video data, wherein the image to be verified can be extracted from each frame of image to be verified, the second node inquires the uploading identity, according to the uploading identification, the standard image corresponding to the uploading identification is inquired from the video repository, the standard image may be a validated image that is acquired and stored prior to environmental monitoring, the second node can compare each extracted frame of image to be verified with the standard image respectively, and inquire whether the image to be verified contains abnormal images, when the image to be verified contains abnormal images, the second node obtains the image verification result as the second environment verification result according to the frame number containing the abnormal image, that is, the second environment detection result may be a result containing a specific frame number and a specific abnormal image.
the second node extracts each frame of image to be verified from the video data when extracting the video data from the data to be analyzed, then the second node inquires that the uploading node of the data to be analyzed is the first node, extracts the first node identity, further extracts the standard image from the video database according to the first node identity, further the second node inputs the image to be verified and the standard image into the image comparison model, extracts different images to be verified and the characteristic points corresponding to the standard image through the image comparison model, compares the characteristic points, thereby obtaining whether the image to be verified is the same as the standard image, when the image to be verified is different from the standard image, the image to be verified is taken as an abnormal image, further the second node counts the number of frames of the abnormal image, and generates an image verification result according to the number of frames, and a corresponding pass or fail result is obtained as an environmental second detection result. It should be noted that, when the second node compares the image to be verified with the standard image, the pixel values of the image to be verified and the standard image may also be used for comparing, that is, the second node queries a first pixel value including a first pixel point in each frame of the image to be verified, further queries a second pixel value of a second pixel point corresponding to the first pixel point in the standard image, compares the first pixel value with the second pixel value, and when the first pixel value is inconsistent with the second pixel value, the image to be verified is different from the standard image. The video repository is a database storing videos or images of different environments to be monitored.
In this embodiment, the second node verifies the video data, that is, the second node may extract an image to be verified from the video data, further query an upload identity corresponding to the video data, obtain a standard image according to the upload identity, compare the image to be verified with the standard image, query whether the image to be verified includes an abnormal image or not, obtain a second detection result of the environment, obtain the second detection result of the environment, and improve the environment monitoring efficiency.
In one embodiment, obtaining the environmental first detection result according to the environmental data includes: extracting an environment evaluation index from the environment data, obtaining an environment evaluation model, and inputting the environment evaluation index into the environment evaluation model to obtain an initial environment evaluation result; acquiring an evaluation time period, and inquiring a historical environment evaluation result corresponding to the evaluation time period; and obtaining a first environment detection result according to the initial environment evaluation result and the historical environment evaluation result. Specifically, the environment evaluation index refers to an available index included in the environment data and used for evaluating the corresponding environment quality. The environment evaluation model is a model obtained by training and capable of outputting a corresponding environment evaluation result according to a corresponding environment evaluation index, and the environment evaluation model can be a model obtained by training by adopting a sample index and a sample evaluation result, so that when the input index is a determined index, the determined evaluation result can be output. The initial environment evaluation result is an evaluation result obtained by calculation according to an environment evaluation model and an environment evaluation index extracted from environment data. The historical environment evaluation result refers to an evaluation result obtained within a preset time period.
specifically, the second node extracts environmental data from the data to be analyzed, compares the environmental data with different indexes contained in the environmental data according to index keywords corresponding to the environmental data, extracts the indexes successfully compared from the environmental data as environmental evaluation indexes when the comparison is successful, acquires an environmental evaluation model from the second node, inputs the environmental evaluation indexes into the environmental evaluation model, calculates an initial environmental evaluation result according to the environmental evaluation indexes through the environmental evaluation model, and when the initial environmental evaluation result is acquired, acquires an environmental second detection result in combination with a corresponding historical environmental evaluation result, that is, the second node acquires an evaluation time period, queries the historical environmental evaluation result corresponding to the evaluation time period, that is, the second node can acquire a time period for comprehensively considering the environmental second detection result, the first detection result of the environment is a detection failure and a failure reason is output when the historical environment monitoring result is lower than the initial environment detection result, and the initial environment detection result is directly used as the first detection result of the environment.
in addition, it should be noted that the initial environment evaluation result may be an initial environment score calculated by the environment evaluation model, and the historical environment evaluation result may be a historical environment score, a difference between the initial environment score and the historical environment score is calculated, the difference is compared with a preset value, and when the difference exceeds the preset value, in order to avoid that data with too large difference has an influence on the final environment first score, the second node directly takes the initial environment score as the environment first score; when the difference does not exceed the preset value, the initial environment score weight corresponding to the initial environment score can be obtained, the historical environment score weight corresponding to the historical environment score can be obtained, the first environment score is obtained through calculation according to the initial environment score, the initial environment score weight, the historical environment score and the historical environment score weight and serves as a first environment detection result, in addition, when the difference exceeds the preset value, a target score range is obtained, the target score range corresponding to the difference is inquired, when the evaluation result corresponding to the target score range is monitoring time reduction, the second node directly feeds back corresponding monitoring information to the first node, and the monitoring information can prompt the first node to upload corresponding data to be analyzed in a preset time period, namely the monitoring time is shortened
In this embodiment, when the second node obtains the first detection result of the environment, the second node may extract the environment evaluation index from the environment data, and then obtain the environment evaluation model, and input the environment evaluation index into the environment evaluation model to obtain the initial environment evaluation result, which may ensure that the obtained initial environment evaluation result is accurate, and then the second node may obtain the historical environment evaluation result corresponding to the evaluation time period, and then obtain the first detection result of the environment according to the historical environment evaluation result and the initial environment evaluation result, thereby comprehensively considering the evaluation result corresponding to the historical environment, and improving the monitoring comprehensiveness.
In one embodiment, obtaining the environment monitoring result according to the environment first score and the environment second score includes: extracting a first result feature from the environmental first detection result and extracting a second result feature from the second detection result; and obtaining an environment monitoring result according to the first result characteristic and the second result characteristic through the detection model. .
specifically, the first result feature refers to a feature included in the first detection result for calculation by the detection model. The second result feature refers to a feature included in the second detection result and used for calculation by the detection model.
Specifically, when the second node obtains the first detection result of the environment, the first result feature is extracted from the first detection result of the environment, the corresponding detection result and the detection information may be extracted from the first detection result of the environment as the first result feature, the detection result may be a result of passing or failing to pass the detection of the specific environment data, and the detection information refers to detailed evaluation information, such as a failure reason. And then the second node obtains a second detection result of the environment, and extracts a corresponding detection result and detection information from the second detection result of the environment as a second result characteristic, where the detection result may be a result that specific video data passes or does not pass, the detection information refers to specific information corresponding to the video data, such as the number of frames of abnormal images and the like as the second result characteristic, the second node inputs the first result characteristic and the second result characteristic to the detection model, and obtains an environment monitoring result through the detection model, where the second node obtains the environment monitoring result through the detection model and may obtain a level of the environment quality, such as the environment quality is good, the environment quality is medium, or the environment quality is poor.
In this embodiment, the second node extracts the first result feature from the first detection result, extracts the second result feature from the second detection result, and obtains the environment monitoring result according to the first result feature and the second result feature through the detection model, so that the environment monitoring result can be obtained through the detection model, the environment monitoring result is simple and easy to obtain, and the efficiency is improved.
In one embodiment, the data to be analyzed is generated by acquiring detailed environment data through the first node, querying a lookup range corresponding to the detailed environment data, and encrypting the detailed environment data according to an encryption logic corresponding to the lookup range.
specifically, the detailed environment data refers to all environment-related data monitored by the first node. The reference range refers to a data range which can be queried and corresponds to the reference authority of the second node. Specifically, the first node may be a monitoring server corresponding to the corresponding monitoring device, and when the first node monitors the environment to obtain detailed environment data, the first node may obtain a reference permission of the second node, and the first node obtains a corresponding encryption logic according to a reference range of the second node, and then the first node encrypts the detailed environment data by using the encryption logic, and uploads the encrypted detailed environment data to the block chain system.
in this embodiment, the second node may acquire the encrypted detailed environment data uploaded by the first node, and the encrypted detailed data is data corresponding to the reference permission of the second node, so that it is ensured that the data to be analyzed acquired by the second node is safe and reliable, and the first node may select data with the reference permission of the second node, thereby ensuring privacy of the data.
in one embodiment, the detailed environment data is data obtained by obtaining an endorsement node identifier through a first node, sending the endorsement node identifier to an endorsement node, and obtaining data verification logic for verification through the endorsement node.
specifically, the endorsement node is a relevant node that can verify data to be uploaded to the blockchain and verify the identity of the node that uploads the data, and the node is also included in the blockchain system. The endorsement node identifier is a mark of the endorsement node queried by the second node, such as a network address corresponding to the endorsement node. The data verification logic refers to logic which is stored in the endorsement node and can verify corresponding detailed data.
Specifically, when the first node acquires detailed environment data, an endorsement node identifier is queried, the detailed environment data is sent to the endorsement node for verification according to the endorsement node identifier, when the endorsement node receives the detailed environment data sent by the first node, an identity corresponding to the first node is queried, whether the identity corresponding to the first node is stored in a trusted identity library is further queried, and when the identity corresponding to the first node is stored in the trusted identity library, the identity of the first node is a trusted identity, so that the endorsement node queries a private key corresponding to the detailed environment data, decrypts the detailed environment data by using the private key, further acquires a corresponding verification logic, verifies the detailed environment data according to the verification logic, that is, whether the detailed environment data can be queried to have complete environment evaluation indexes, that is, all the standard index fields contained in the verification logic may be matched with the environment evaluation index fields contained in the detailed environment data, and whether the environment evaluation index fields are consistent with the standard index fields or not is inquired, so that whether the environment data is complete or not is obtained, and further, the video data contained in the detailed environment data is verified according to the verification logic, that is, whether the video data is complete or not, whether the time is complete or not and the like can be read, when the second node passes the verification of both the environment data and the video data, the detailed environment data is verified, the endorsement node sends corresponding verification passing information to the first node, and when the first node receives the verification passing information sent by the endorsement node, the detailed environment data which is verified is uploaded to the block chain system.
In this embodiment, when the first node queries the detailed environment data, the first node may send the corresponding detailed data to the endorsement node for verification, and then upload the verified detailed data to the block chain system, thereby ensuring that the uploaded data is reliable.
In one embodiment, a first node disposed in the blockchain system is taken as a server associated with a device monitoring an enterprise environment, and a second node is taken as a server corresponding to an organization that needs to perform environment assessment, such as a server corresponding to an environmental protection organization. When the first node acquires corresponding detailed environment data, in order to avoid tampering with the acquired detailed environment data, the first node may upload the detailed environment data to the block chain system, that is, the first node transmits the detailed environment data to the endorsement node, the endorsement node acquires a node identity of the first node, such as a network address corresponding to the first node, and queries that the first node is a trusted node according to the node identity of the first node, and acquires a verification logic of the acquired detailed environment data, such as verifying whether the environment data included in the detailed environment data lacks an environment evaluation index, verifying whether an image frame is absent in the video data, and the like, and when the endorsement node verifies the detailed environment data, the endorsement node transmits a prompt message that the verification is passed to the first node, the prompt message being added with an endorsement node identity of the endorsement node, and when the first node receives the prompt information that the verification passes, the first node acquires a second node identity of the second node, queries a lookup range corresponding to the second node according to the second node identity, if the lookup range can query environmental data and video data, and further acquires corresponding encryption logic according to the lookup range, and if a corresponding encryption algorithm is acquired, encrypts the detailed environmental data according to the lookup range through the encryption algorithm, and further uploads the encrypted detailed environmental data to the block chain system as the data to be analyzed.
The second node inquires whether data to be analyzed exists or not from the block chain system, when the data to be analyzed exists, the data to be analyzed is acquired, when the data to be analyzed is successfully acquired, the corresponding private key is used for decryption, when the decryption is successful, the environmental data is extracted from the data to be analyzed, then the second node acquires an environmental evaluation model according to an environmental evaluation index contained in the environmental data, then the environmental evaluation index is input into the environmental evaluation model for calculation to obtain an initial environmental detection result, then the second node acquires a previous evaluation time period, a historical environmental detection result corresponding to the previous evaluation time period is inquired, a first environmental detection result is calculated according to the initial environmental detection result and the historical environmental detection result, and then the second node extracts video data from the data to be analyzed, and then the second node extracts a corresponding image to be verified from the video data, acquires a standard image, compares the image to be verified with the standard image to inquire whether an abnormal image exists, and further generates an environment second detection result according to whether the abnormal image exists, and the second node can obtain a target environment score according to the environment first detection result and the environment second detection result, so as to obtain an environment monitoring result. When the second node obtains the environment monitoring result, the environment monitoring result can be directly sent to the corresponding query node under the condition that all data are not displayed, namely the query node and the second node mutually perform identity authentication, and when the authentication is passed, the query node confirms that the received environment monitoring result is an accurate result.
it should be understood that although the various steps in the flow charts of fig. 2-3 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-3 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, as shown in FIG. 4, an environmental monitoring device 400 is provided: an acquisition module 410, an environmental data evaluation module 420, a video data evaluation module 430, and a generation module 440, wherein:
An obtaining module 410, configured to query and obtain uploaded data to be analyzed from the blockchain system;
the environment data evaluation module 420 is configured to obtain a query field, extract a field to be matched corresponding to the data to be analyzed, extract environment data from the data to be analyzed according to the query field and a matching result of the field to be matched, and obtain a first environment detection result according to the environment data;
The video data evaluation module 430 is configured to query a data format, extract video data from data to be analyzed according to the data format, acquire a standard video, and compare the video data with the standard video to obtain a second detection result of an environment corresponding to the video data;
The generating module 440 is configured to input the first detection result of the environment and the second detection result of the environment into the detection model to obtain an environment monitoring result. In one embodiment, the environment monitoring apparatus 400 may further include:
the receiving module is used for receiving an acquisition request for acquiring an environment monitoring result, which is sent by the query node;
the query module is used for acquiring the communication protocol according to the acquisition request, querying verification data corresponding to the communication protocol and sending the verification data to the query node for verification;
And the sending module is used for receiving feedback information which is returned by the query node and passes the verification corresponding to the verification data, and sending the environment monitoring result to the query node according to the feedback information.
In one embodiment, the video data evaluation module 430 includes:
The extraction unit is used for extracting an image to be verified from the video data;
The acquisition unit is used for inquiring the uploading identity corresponding to the video data and acquiring a standard image according to the uploading identity;
and the comparison unit is used for comparing the image to be verified with the standard image and inquiring whether the image to be verified contains the abnormal image or not to obtain a second detection result of the environment.
In one embodiment, the environmental data evaluation module 420 includes:
the first computing unit is used for extracting an environment evaluation index from the environment data, acquiring an environment evaluation model, and inputting the environment evaluation index into the environment evaluation model to obtain an initial environment evaluation result;
The query unit is used for acquiring an evaluation time period and querying a historical environment evaluation result corresponding to the evaluation time period;
and the second calculation unit is used for obtaining a first environment detection result according to the initial environment evaluation result and the historical environment evaluation result. In one embodiment, the generation module 440 includes:
the characteristic extraction module is used for extracting a first result characteristic from the first detection result of the environment and extracting a second result characteristic from the second detection result;
And the result obtaining module is used for obtaining an environment monitoring result according to the first result characteristic and the second result characteristic through the detection model.
in an embodiment, the obtaining module 410 is configured to query the uploaded data to be analyzed from the blockchain system, where the data to be analyzed is obtained by the first node, and queries a lookup range corresponding to the detailed environment data, and encrypts the detailed environment data according to an encryption logic corresponding to the lookup range.
In an embodiment, the obtaining module 410 is configured to query data to be analyzed uploaded from a block chain system, where the data to be analyzed is obtained from a first node, and queries a lookup range corresponding to the detailed environment data, and encrypts the detailed environment data according to encryption logic corresponding to the lookup range, where the detailed environment data is generated by obtaining an endorsement node identifier through the first node, sending the endorsement node identifier to an endorsement node, and obtaining data verified by the data verification logic through the endorsement node.
For the specific definition of the environment monitoring device, reference may be made to the above definition of the environment monitoring method, which is not described herein again. The modules in the environment monitoring device can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
in one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 5. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing environment monitoring data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of environmental monitoring.
Those skilled in the art will appreciate that the architecture shown in fig. 5 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, there is provided a computer device comprising a memory storing a computer program and a processor implementing the following steps when the processor executes the computer program: and inquiring and acquiring the uploaded data to be analyzed from the block chain system. Acquiring a query field, extracting a field to be matched corresponding to the data to be analyzed, extracting environmental data from the data to be analyzed according to the query field and the matching result of the field to be matched, and obtaining a first environmental detection result according to the environmental data. And querying a data format, extracting video data from the data to be analyzed according to the data format, acquiring a standard video, and comparing the video data with the standard video to obtain a second detection result of the environment corresponding to the video data. And inputting the first detection result of the environment and the second detection result of the environment into the detection model to obtain an environment monitoring result. In one embodiment, the processor, when executing the computer program, after inputting the first detection result of the environment and the second detection result of the environment into the detection model to obtain the environment monitoring result, includes: and receiving an acquisition request for acquiring the environment monitoring result sent by the query node. And acquiring the communication protocol according to the acquisition request, inquiring verification data corresponding to the communication protocol, and sending the verification data to the inquiry node for verification. And receiving feedback information which is returned by the query node and corresponds to the verification data and passes the verification, and sending the environment monitoring result to the query node according to the feedback information.
In one embodiment, when the processor executes the computer program, the method includes extracting video data from data to be analyzed according to a data format, acquiring a standard video, and comparing the video data with the standard video to obtain a second detection result of an environment corresponding to the video data, including: and extracting an image to be verified from the video data. And inquiring an uploading identity corresponding to the video data, and acquiring a standard image according to the uploading identity. And comparing the image to be verified with the standard image, and inquiring whether the image to be verified contains the abnormal image or not to obtain a second environment detection result. In one embodiment, the processor, when executing the computer program, implements obtaining a first detection result of the environment based on the environment data, including: and extracting an environment evaluation index from the environment data, obtaining an environment evaluation model, and inputting the environment evaluation index into the environment evaluation model to obtain an initial environment evaluation result. And acquiring an evaluation time period, and inquiring a historical environment evaluation result corresponding to the evaluation time period. And obtaining a first environment detection result according to the initial environment evaluation result and the historical environment evaluation result.
in one embodiment, the processor, when executing the computer program, implements the input of the environment first detection result and the environment second detection result into the detection model to obtain the environment monitoring result, including: a first resultant feature is extracted from the environmental first detection result, and a second resultant feature is extracted from the second detection result. And obtaining an environment monitoring result according to the first result characteristic and the second result characteristic through the detection model. In one embodiment, when the processor executes the computer program, the to-be-analyzed data uploaded from the blockchain system is queried, the to-be-analyzed data is generated by acquiring detailed environment data through the first node, querying a query range corresponding to the detailed environment data, and encrypting the detailed environment data according to an encryption logic corresponding to the query range.
In one embodiment, when the processor executes the computer program, the to-be-analyzed data uploaded from the blockchain system is queried, the to-be-analyzed data is generated by acquiring detailed environment data through the first node, querying a query range corresponding to the detailed environment data, and encrypting the detailed environment data according to an encryption logic corresponding to the query range. The detailed environment data is data which is obtained through the first node, carries a endorsement node identification, is sent to the endorsement node according to the endorsement node identification and is verified through the data verification logic obtained through the endorsement node.
in one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: and inquiring and acquiring the uploaded data to be analyzed from the block chain system. Acquiring a query field, extracting a field to be matched corresponding to the data to be analyzed, extracting environmental data from the data to be analyzed according to the query field and the matching result of the field to be matched, and obtaining a first environmental detection result according to the environmental data. And querying a data format, extracting video data from the data to be analyzed according to the data format, acquiring a standard video, and comparing the video data with the standard video to obtain a second detection result of the environment corresponding to the video data. In an embodiment, after the computer program is executed by the processor to implement the first detection result of the environment and the second detection result of the environment are input into the detection model to obtain the environment monitoring result, the method includes: and receiving an acquisition request for acquiring the environment monitoring result sent by the query node. And acquiring the communication protocol according to the acquisition request, inquiring verification data corresponding to the communication protocol, and sending the verification data to the inquiry node for verification. And receiving feedback information which is returned by the query node and corresponds to the verification data and passes the verification, and sending the environment monitoring result to the query node according to the feedback information.
in one embodiment, the computer program when executed by the processor implements extracting video data from the data to be analyzed according to a data format, deriving an environmental second score from the video data, comprising: and extracting an image to be verified from the video data. And inquiring an uploading identity corresponding to the video data, and acquiring a standard image according to the uploading identity. And comparing the image to be verified with the standard image, and inquiring whether the image to be verified contains the abnormal image or not to obtain a second environment detection result. In one embodiment, a computer program that when executed by a processor implements obtaining a first detection result of an environment from environment data, comprises: and extracting an environment evaluation index from the environment data, obtaining an environment evaluation model, and inputting the environment evaluation index into the environment evaluation model to obtain an initial environment evaluation result. And acquiring an evaluation time period, and inquiring a historical environment evaluation result corresponding to the evaluation time period. And obtaining a first environment detection result according to the initial environment evaluation result and the historical environment evaluation result. In one embodiment, the computer program, when executed by the processor, implements the first detection result of the environment and the second detection result of the environment into the detection model to obtain the environment monitoring result, including: extracting a first result feature from the environmental first detection result and extracting a second result feature from the second detection result; and obtaining an environment monitoring result according to the first result characteristic and the second result characteristic through the detection model. In one embodiment, when being executed by a processor, the computer program realizes the query of the uploaded data to be analyzed from the blockchain system, the data to be analyzed is generated by acquiring the detailed environment data through the first node, querying a query range corresponding to the detailed environment data, and encrypting the detailed environment data according to an encryption logic corresponding to the query range.
in one embodiment, when being executed by a processor, the computer program realizes the query of the uploaded data to be analyzed from the blockchain system, the data to be analyzed is generated by acquiring the detailed environment data through the first node, querying a query range corresponding to the detailed environment data, and encrypting the detailed environment data according to an encryption logic corresponding to the query range. The detailed environment data is data which is obtained through the first node, carries a endorsement node identification, is sent to the endorsement node according to the endorsement node identification and is verified through the data verification logic obtained through the endorsement node.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
the technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. a method of environmental monitoring, the method comprising:
Inquiring and acquiring uploaded data to be analyzed from a block chain system;
Acquiring a query field, extracting a field to be matched corresponding to the data to be analyzed, extracting environmental data from the data to be analyzed according to the query field and a matching result of the field to be matched, and obtaining a first environmental detection result according to the environmental data;
Inquiring a data format, extracting video data from the data to be analyzed according to the data format, acquiring a standard video, and comparing the video data with the standard video to obtain a second detection result of the environment corresponding to the video data;
and inputting the first detection result of the environment and the second detection result of the environment into a detection model to obtain an environment monitoring result.
2. The method of claim 1, wherein inputting the environmental first test result and the environmental second test result into a test model to obtain an environmental monitoring result comprises:
Receiving an acquisition request for acquiring the environment monitoring result sent by an inquiry node;
acquiring a communication protocol according to the acquisition request, inquiring verification data corresponding to the communication protocol, and sending the verification data to the inquiry node for verification;
And receiving feedback information which is returned by the query node and passes the verification corresponding to the verification data, and sending the environment monitoring result to the query node according to the feedback information.
3. The method according to claim 1, wherein the extracting video data from the data to be analyzed according to the data format to obtain a standard video, and comparing the video data with the standard video to obtain a second detection result of the environment corresponding to the video data comprises:
Extracting an image to be verified from the video data;
Inquiring an uploading identity corresponding to the video data, and acquiring a standard image according to the uploading identity;
and comparing the image to be verified with the standard image, and inquiring whether the image to be verified contains an abnormal image or not to obtain a second detection result of the environment.
4. The method of claim 1, wherein obtaining the environmental first detection result according to the environmental data comprises:
Extracting an environment evaluation index from the environment data, obtaining an environment evaluation model, and inputting the environment evaluation index into the environment evaluation model to obtain an initial environment evaluation result;
Obtaining an evaluation time period, and inquiring a historical environment evaluation result corresponding to the evaluation time period
And obtaining a first environment detection result according to the initial environment evaluation result and the historical environment evaluation result.
5. The method of claim 1, wherein inputting the environmental first test result and the environmental second test result into a test model to obtain an environmental monitoring result comprises:
extracting a first result feature from the environmental first detection result and a second result feature from the second detection result;
and obtaining an environment monitoring result according to the first result characteristic and the second result characteristic through the detection model.
6. the method according to claims 1 to 5, wherein the data to be analyzed is generated by acquiring detailed environment data through a first node, querying a lookup range corresponding to the detailed environment data, and encrypting the detailed environment data according to an encryption logic corresponding to the lookup range.
7. The method according to claim 6, wherein the detailed environment data is data obtained by the first node to obtain an endorsement node identifier, sending the endorsement node identifier to an endorsement node, and obtaining data verification logic for verification through the endorsement node.
8. an environmental monitoring device, the device comprising:
The acquisition module is used for inquiring and acquiring uploaded data to be analyzed from the block chain system;
The environment data evaluation module is used for acquiring a query field, extracting a field to be matched corresponding to the data to be analyzed, extracting environment data from the data to be analyzed according to the query field and the matching result of the field to be matched, and obtaining a first environment detection result according to the environment data;
The video data evaluation module is used for inquiring a data format, extracting video data from the data to be analyzed according to the data format, acquiring a standard video, and comparing the video data with the standard video to obtain a second detection result of the environment corresponding to the video data;
And the generating module is used for inputting the first detection result of the environment and the second detection result of the environment into a detection model to obtain an environment monitoring result.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN201910676750.3A 2019-07-25 2019-07-25 Environment monitoring method and device, computer equipment and storage medium Pending CN110569389A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910676750.3A CN110569389A (en) 2019-07-25 2019-07-25 Environment monitoring method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910676750.3A CN110569389A (en) 2019-07-25 2019-07-25 Environment monitoring method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110569389A true CN110569389A (en) 2019-12-13

Family

ID=68773034

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910676750.3A Pending CN110569389A (en) 2019-07-25 2019-07-25 Environment monitoring method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110569389A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111241199A (en) * 2020-01-08 2020-06-05 河北先河环保科技股份有限公司 Block chain-based environmental data storage method and terminal
CN112633126A (en) * 2020-12-18 2021-04-09 联通物联网有限责任公司 Video processing method and device
CN113014652A (en) * 2021-03-03 2021-06-22 福建碧霞环保科技有限公司 Environment-friendly online monitoring method and system based on cloud computing and block chain technology
CN113051330A (en) * 2021-04-13 2021-06-29 福州外语外贸学院 Real-time environment monitoring method and device based on big data and computer equipment
CN113259213A (en) * 2021-06-28 2021-08-13 广州市威士丹利智能科技有限公司 Intelligent home information monitoring method based on edge computing intelligent gateway
CN113706351A (en) * 2021-08-10 2021-11-26 海南君麟环境科技有限公司 Block chain-based environmental control judgment method and system
CN115208616A (en) * 2022-05-20 2022-10-18 深圳铸泰科技有限公司 Internet of things safety monitoring method and system based on double engines

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103778566A (en) * 2014-01-17 2014-05-07 广东电网公司电力科学研究院 Heat-engine plant monitoring and measuring method based on three-dimensional visualization demonstration
US20160124501A1 (en) * 2014-10-31 2016-05-05 The United States Of America As Represented By The Secretary Of The Navy Secured mobile maintenance and operator system including wearable augmented reality interface, voice command interface, and visual recognition systems and related methods
CN109147293A (en) * 2018-07-18 2019-01-04 成都嘉泽兴业科技有限责任公司 A kind of working method of environment monitoring data acquisition analysis system
WO2019067357A1 (en) * 2017-09-29 2019-04-04 Alibaba Group Holding Limited Fourth Floor, One Capital Place Data storage method, data query method and apparatuses
CN109815851A (en) * 2019-01-03 2019-05-28 深圳壹账通智能科技有限公司 Kitchen hygiene detection method, device, computer equipment and storage medium
CN109976986A (en) * 2017-12-28 2019-07-05 阿里巴巴集团控股有限公司 The detection method and device of warping apparatus

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103778566A (en) * 2014-01-17 2014-05-07 广东电网公司电力科学研究院 Heat-engine plant monitoring and measuring method based on three-dimensional visualization demonstration
US20160124501A1 (en) * 2014-10-31 2016-05-05 The United States Of America As Represented By The Secretary Of The Navy Secured mobile maintenance and operator system including wearable augmented reality interface, voice command interface, and visual recognition systems and related methods
WO2019067357A1 (en) * 2017-09-29 2019-04-04 Alibaba Group Holding Limited Fourth Floor, One Capital Place Data storage method, data query method and apparatuses
CN109976986A (en) * 2017-12-28 2019-07-05 阿里巴巴集团控股有限公司 The detection method and device of warping apparatus
CN109147293A (en) * 2018-07-18 2019-01-04 成都嘉泽兴业科技有限责任公司 A kind of working method of environment monitoring data acquisition analysis system
CN109815851A (en) * 2019-01-03 2019-05-28 深圳壹账通智能科技有限公司 Kitchen hygiene detection method, device, computer equipment and storage medium

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111241199A (en) * 2020-01-08 2020-06-05 河北先河环保科技股份有限公司 Block chain-based environmental data storage method and terminal
CN112633126A (en) * 2020-12-18 2021-04-09 联通物联网有限责任公司 Video processing method and device
CN113014652A (en) * 2021-03-03 2021-06-22 福建碧霞环保科技有限公司 Environment-friendly online monitoring method and system based on cloud computing and block chain technology
CN113051330A (en) * 2021-04-13 2021-06-29 福州外语外贸学院 Real-time environment monitoring method and device based on big data and computer equipment
CN113259213A (en) * 2021-06-28 2021-08-13 广州市威士丹利智能科技有限公司 Intelligent home information monitoring method based on edge computing intelligent gateway
CN113259213B (en) * 2021-06-28 2021-09-14 广州市威士丹利智能科技有限公司 Intelligent home information monitoring method based on edge computing intelligent gateway
CN113706351A (en) * 2021-08-10 2021-11-26 海南君麟环境科技有限公司 Block chain-based environmental control judgment method and system
CN115208616A (en) * 2022-05-20 2022-10-18 深圳铸泰科技有限公司 Internet of things safety monitoring method and system based on double engines
CN115208616B (en) * 2022-05-20 2023-06-23 深圳铸泰科技有限公司 Internet of things safety monitoring method and system based on double engines

Similar Documents

Publication Publication Date Title
CN110569389A (en) Environment monitoring method and device, computer equipment and storage medium
CN110365670B (en) Blacklist sharing method and device, computer equipment and storage medium
CN110555779A (en) data processing method, data processing device, computer equipment and storage medium
TW202011242A (en) Blockchain cross-chain authentication method and system, and server and readable storage medium
CN110781509B (en) Data verification method and device, storage medium and computer equipment
CN110727949B (en) Data storage method and device, computer equipment and storage medium
CN111107073B (en) Application automatic login method and device, computer equipment and storage medium
CN111159779A (en) Customs clearance data processing method and device, computer equipment and storage medium
CN108365958B (en) Account login verification method and device, computer equipment and storage medium
CN110602455B (en) Video storage system, video processing method, device, equipment and storage medium
CN110555698A (en) data processing method, data processing device, computer equipment and storage medium
CN111553710B (en) Enterprise data processing method, device, equipment and storage medium based on block chain
CN111563365B (en) Method and device for processing modification information of test standard worksheet and computer equipment
CN109347813B (en) Internet of things equipment login method and system, computer equipment and storage medium
CN109101841B (en) Data processing method, device and system, computer equipment and storage medium
CN112836206A (en) Login method, device, storage medium and computer equipment
CN112685721A (en) Electric energy meter authority authentication method and device, computer equipment and storage medium
CN110311783B (en) User attribution verification method and device based on group signature and computer equipment
CN111835710A (en) Method and device for checking request body, computer equipment and storage medium
CN110766845A (en) Identification method and device for power construction user information and computer equipment
CN109561093B (en) Unauthorized behavior detection method and device, computer equipment and storage medium
WO2012067487A1 (en) A system and method for providing integrity verification in radio frequency identification (rfid)
CN115208616A (en) Internet of things safety monitoring method and system based on double engines
CN111814145A (en) Request verification method and device based on log acquisition and computer equipment
CN106130996A (en) A kind of website attack protection checking system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination