CN111079121A - Equipment resource management method and device - Google Patents

Equipment resource management method and device Download PDF

Info

Publication number
CN111079121A
CN111079121A CN201811223886.0A CN201811223886A CN111079121A CN 111079121 A CN111079121 A CN 111079121A CN 201811223886 A CN201811223886 A CN 201811223886A CN 111079121 A CN111079121 A CN 111079121A
Authority
CN
China
Prior art keywords
security
place
places
equipment
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811223886.0A
Other languages
Chinese (zh)
Other versions
CN111079121B (en
Inventor
孔令爽
任溯
杨亚辉
曹中胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision System Technology Co Ltd
Original Assignee
Hangzhou Hikvision System Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision System Technology Co Ltd filed Critical Hangzhou Hikvision System Technology Co Ltd
Priority to CN201811223886.0A priority Critical patent/CN111079121B/en
Publication of CN111079121A publication Critical patent/CN111079121A/en
Application granted granted Critical
Publication of CN111079121B publication Critical patent/CN111079121B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Abstract

The disclosure relates to a device resource management method and device, and belongs to the technical field of security and protection. The method comprises the following steps: acquiring a pre-stored position range of a security place and position information of a plurality of security devices; determining security equipment contained in the security place in the plurality of security equipment based on the position range of the security place and the position information of the plurality of security equipment; and uniformly managing the security equipment contained in the security place. By adopting the method and the device, under the condition that the number of the security equipment is huge, the management authority of the security equipment can be automatically distributed according to the position information of the security equipment, and the efficiency of distribution operation is greatly improved.

Description

Equipment resource management method and device
Technical Field
The present disclosure relates to the field of security technologies, and in particular, to a method and an apparatus for managing device resources.
Background
In order to construct a harmonious society, security and protection are indispensable. In the security field, security devices such as monitors and alarms can be arranged in various security places such as schools, banks, bus stops, explosive units, various traffic intersections and the like to ensure the security of the security places.
Because the number of the security devices is huge, the management authorities of all the security devices can be distributed to the same or different management accounts according to the geographic positions of the security devices to perform management operation. The administrator can log in the management account to perform management operation on the distributed security equipment, for example, view pictures acquired by the monitor in real time, or review recorded pictures.
Generally, the management authority of the security device is assigned manually. For example, a map may be displayed in the terminal, the position of each security device is marked in the map, and the distributor may click an option corresponding to a certain security device on the map; then, the terminal can pop up a dialog window according to the clicking operation of the distributor, and prompt the user to input the ID of the target management account into the dialog window so as to distribute the management authority of the security device to the target management account. The above operations may be repeated for each security device to assign the management permissions of all security devices to the same or different management accounts.
In carrying out the present disclosure, the inventors found that at least the following problems exist:
the number of security devices is huge, and if the management authority of the security devices is distributed in a manual mode, the distribution operation efficiency is low.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides the following technical solutions:
according to a first aspect of the embodiments of the present disclosure, there is provided a device resource management method, the method including:
acquiring a pre-stored position range of a security place and position information of a plurality of security devices;
determining security equipment contained in the security place in the plurality of security equipment based on the position range of the security place and the position information of the plurality of security equipment;
and uniformly managing the security equipment contained in the security place.
Optionally, the obtaining of the pre-stored location range of the security location and the location information of the plurality of security devices includes:
the method comprises the steps of obtaining pre-stored position ranges of a plurality of security places and position information of a plurality of security devices;
based on the position range of the security place and the position information of a plurality of security devices, in the plurality of security devices, the security device contained in the security place is determined, and the method comprises the following steps:
respectively determining security equipment contained in each security place in the plurality of security equipment based on the position ranges of the plurality of security places and the position information of the plurality of security equipment;
carry out unified management to the security protection equipment that the security protection place contains includes:
and distributing the management authority of the security equipment belonging to the same security place to the same management account.
Optionally, the determining, in the plurality of security devices, the security devices included in each security place based on the position ranges of the plurality of security places and the position information of the plurality of security devices respectively includes:
determining extended position ranges of the plurality of security places based on preset buffer distances and position ranges of the plurality of security places, wherein the extended position ranges include a buffer area;
and respectively determining the security equipment contained in each security place in the plurality of security equipment based on the extended position ranges of the plurality of security places and the position information of the plurality of security equipment.
Optionally, the determining, in the multiple security devices, the security devices included in each security location based on the extended position ranges of the multiple security locations and the position information of the multiple security devices respectively includes:
if the extended position ranges of a first security place and a second security place in the plurality of security places are overlapped, removing an overlapped area from the extended position ranges of the first security place and the second security place, and adding a third security place, wherein the position range of the third security place is the overlapped area;
and respectively determining the security equipment contained in each security place in the plurality of security equipment based on the extended position ranges of the plurality of security places, the position range of the third security place and the position information of the plurality of security equipment.
Optionally, the allocating the management authority of the security devices belonging to the same security location to the same management account includes:
and distributing the management authority of the security equipment of the security places with the incidence relation to the same management account.
Optionally, the allocating the management authority of the security devices in the security places having the association relationship to the same management account includes:
and determining the category of each security place, and distributing the management authority of the security devices belonging to the same category of security places to the same management account.
Optionally, the allocating the management authority of the security devices in the security places having the association relationship to the same management account includes:
and determining boundary distances among different security places, and distributing the management authority of the security equipment of the security places with the boundary distances smaller than a preset distance threshold value to the same management account.
Optionally, the determining, in the plurality of security devices, the security devices included in each security place based on the position ranges of the plurality of security places and the position information of the plurality of security devices respectively includes:
determining extended position ranges of the plurality of security places based on preset buffer distances and position ranges of the plurality of security places, wherein the extended position ranges include a buffer area;
respectively determining security equipment contained in each security place in the plurality of security equipment based on the extended position ranges of the plurality of security places and the position information of the plurality of security equipment;
the allocating the management authority of the security equipment in the security places with the incidence relation to the same management account comprises the following steps:
and determining whether the extended position ranges of different security places are overlapped, and distributing the management authority of the security equipment of the security places with the overlapped extended position ranges to the same management account.
According to a second aspect of the embodiments of the present disclosure, there is provided an apparatus for device resource management, the apparatus including:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring the position range of a pre-stored security place and the position information of a plurality of security devices;
the determining module is used for determining the security equipment contained in the security place in the plurality of security equipment based on the position range of the security place and the position information of the plurality of security equipment;
and the management module is used for uniformly managing the security equipment contained in the security place.
Optionally, the obtaining module is configured to obtain pre-stored position ranges of a plurality of security places and position information of a plurality of security devices;
the determining module is used for respectively determining the security equipment contained in each security place in the plurality of security equipment based on the position ranges of the plurality of security places and the position information of the plurality of security equipment;
and the management module is used for distributing the management authority of the security equipment belonging to the same security place to the same management account.
Optionally, the determining module is configured to:
determining extended position ranges of the plurality of security places based on preset buffer distances and position ranges of the plurality of security places, wherein the extended position ranges include a buffer area;
and respectively determining the security equipment contained in each security place in the plurality of security equipment based on the extended position ranges of the plurality of security places and the position information of the plurality of security equipment.
Optionally, the determining module is configured to:
if the extended position ranges of a first security place and a second security place in the plurality of security places are overlapped, removing an overlapped area from the extended position ranges of the first security place and the second security place, and adding a third security place, wherein the position range of the third security place is the overlapped area;
and respectively determining the security equipment contained in each security place in the plurality of security equipment based on the extended position ranges of the plurality of security places, the position range of the third security place and the position information of the plurality of security equipment.
Optionally, the management module is configured to:
and distributing the management authority of the security equipment of the security places with the incidence relation to the same management account.
Optionally, the management module is configured to:
and determining the category of each security place, and distributing the management authority of the security devices belonging to the same category of security places to the same management account.
Optionally, the management module is configured to:
and determining boundary distances among different security places, and distributing the management authority of the security equipment of the security places with the boundary distances smaller than a preset distance threshold value to the same management account.
Optionally, the determining module is configured to determine an extended position range of the multiple security places based on a preset buffer distance and position ranges of the multiple security places, where the extended position range is a position range including a buffer area; respectively determining security equipment contained in each security place in the plurality of security equipment based on the extended position ranges of the plurality of security places and the position information of the plurality of security equipment;
the management module is used for determining whether the extended position ranges of different security places are overlapped, and distributing the management authority of the security equipment of the security places with the overlapped extended position ranges to the same management account.
According to a third aspect of the embodiments of the present disclosure, there is provided a terminal, which includes a processor and a memory, where at least one instruction, at least one program, a code set, or an instruction set is stored in the memory, and the at least one instruction, the at least one program, the code set, or the instruction set is loaded and executed by the processor to implement the above device resource management method.
According to a fourth aspect of the embodiments of the present disclosure, there is provided a computer-readable storage medium having at least one instruction, at least one program, a set of codes, or a set of instructions stored therein, which is loaded and executed by a processor to implement the above device resource management method.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
according to the method provided by the embodiment, under the condition that the number of the security equipment is large, the management authority of the security equipment can be automatically distributed according to the position information of the security equipment, and the efficiency of distribution operation is greatly improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. In the drawings:
FIG. 1 is a flow diagram illustrating a method of device resource management in accordance with an exemplary embodiment;
FIG. 2 is a schematic diagram illustrating a method of device resource management in accordance with an example embodiment;
FIG. 3 is a schematic diagram illustrating a method of device resource management in accordance with an example embodiment;
FIG. 4 is a schematic diagram illustrating a method of device resource management in accordance with an example embodiment;
FIG. 5 is a schematic diagram illustrating a method of device resource management in accordance with an example embodiment;
FIG. 6 is a block diagram illustrating an apparatus for device resource management in accordance with an illustrative embodiment;
fig. 7 is a schematic diagram illustrating a structure of a terminal according to an exemplary embodiment.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The embodiment of the disclosure provides a device resource management method, which can be implemented by a terminal. The terminal can be a mobile phone, a tablet computer, a desktop computer, a notebook computer and the like.
The terminal may include a processor, memory, etc. The processor, which may be a Central Processing Unit (CPU), may be configured to determine security devices included in each security location based on the location ranges of the multiple security locations and the location information of the multiple security devices, and perform processing, for example. The memory may be a RAM (Random access memory), a Flash memory, and the like, and may be configured to store received data, data required by a processing procedure, data generated in the processing procedure, and the like, such as location ranges of multiple security places and location information of multiple security devices.
The terminal may also include a transceiver, an input component, a display component, and the like. The transceiver may be configured to perform data transmission with the server, for example, the management authority assignment result may be sent to the server, and the transceiver may include a bluetooth component, a WiFi (Wireless-Fidelity) component, an antenna, a matching circuit, a modem, and the like. The input means may be a touch screen, keyboard, mouse, etc.
The terminal may have a system program and an application program installed therein. A user uses various applications based on his/her own different needs while using the terminal. The terminal may have an application program having a map viewing function and a management authority assignment function installed therein.
An exemplary embodiment of the present disclosure provides a device resource management method, as shown in fig. 1, a processing flow of the method may include the following steps:
step S110, the position range of the pre-stored security place and the position information of a plurality of security devices are obtained.
In implementation, the security places can be places such as schools, banks, bus stops, explosive units, various traffic intersections and the like, the security places can be places which are mainly managed by public security institutions, and the places which are mainly managed by the public security institutions are generally high-incidence places for illegal criminal behaviors and public security disaster accidents. If the security and protection place is marked in the map, as shown in fig. 2, a graph formed by the occupied area of the security and protection place can be marked in the map. Each security place can be regarded as a planar ground object in the geographic concept in the map, and each planar ground object corresponds to a corresponding position range.
Taking the security place 4 in fig. 2 as an example, the graph formed by the floor area of the security place is a rectangle. As shown in fig. 3, if a coordinate system is established with the road center point as the origin, 4 vertices of the security location 4 correspond to 4 coordinates, which are marked as (x1, y1), (x2, y2), (x3, y3), and (x4, y 4). The location range of the security place 4 may be marked by (x1, y1), (x2, y2), (x3, y3), (x4, y4) coordinates. For the situation that the graph formed by the floor area of the security place is irregular, the coordinates of a plurality of vertexes of the irregular graph can be recorded. In the case of circles, semi-circles, arcs, the radius may be recorded, as well as the coordinates of the arc endpoints. Or, when the figure formed by the occupied area of the security place is a polygon, the line where each side in the polygon is located can be recorded.
The location information of the security device may be coordinates, such as coordinates recorded from the actual location of the security device, again with reference to the coordinate system in fig. 3.
A security place can be selected, the position range of the security place is obtained, and the position information of a plurality of security devices is obtained. Besides, the position ranges of a plurality of pre-stored security places can be acquired simultaneously, and the position information of a plurality of security devices can be acquired. As shown in fig. 2, the position ranges of the security place 1, the security place 2, the security place 3, and the security place 4 are respectively obtained, and the position information of all the security devices in the map is obtained, and the management authority of the security devices is respectively allocated to the 4 security places. The manner of obtaining the pre-stored position ranges of multiple security places is similar to the manner of obtaining the position range of one security place, and is not described herein again.
And S120, determining the security equipment contained in the security place in the plurality of security equipment based on the position range of the security place and the position information of the plurality of security equipment.
In implementation, the position information of a plurality of security protection devices can be traversed one by one, and whether each security protection device falls into the position range of the current security protection place or not is judged. For example, the location range of the security location may be (3, 28), (49, 10), (3, 10). If the location information of the security device is (12,15), it can be determined that (12,15) falls within the range surrounded by (3, 28), (49, 10), (3, 10), and therefore the security device whose location information is (12,15) belongs to the security location whose location range may be (3, 28), (49, 10), (3, 10).
The security equipment contained in each security place can be determined in the plurality of security equipment based on the position ranges of the plurality of security places and the position information of the plurality of security equipment. And each security device can be judged to fall into the position range of which security place. Finally, the set of security devices included in each security site can be determined respectively.
Optionally, based on the position ranges of the multiple security places and the position information of the multiple security devices, in the multiple security devices, the step of determining the security devices included in each security place respectively may include: determining extended position ranges of the plurality of security places based on preset buffer distances and position ranges of the plurality of security places, wherein the extended position ranges include a buffer area; and respectively determining the security equipment contained in each security place in the plurality of security equipment based on the extended position ranges of the plurality of security places and the position information of the plurality of security equipment.
In implementation, the buffer area range analysis can be performed on the position range of each security place based on the preset buffer distance, so as to determine the extended position ranges of the plurality of security places. As shown in fig. 4, buffer area analysis is performed on the security places 1 to 4 in fig. 2, that is, a preset buffer distance is extended outwards along the position area of each security place, and the extended position area of the security places 1 to 4 is obtained as shown by the area enclosed by the dotted line in fig. 4. Alternatively, the buffer distance may be set to a smaller range, and the buffer distance may be set to a larger range.
The reason why the location range of the security and protection place is expanded to the expanded location range of the security and protection place is that, in practice, the vicinity of the security and protection place is also a high-occurrence place of the illegal criminal act and the public security disaster accident, for example, the school and the bank are themselves high-occurrence places of the illegal criminal act and the public security disaster accident, and the surroundings of the school and the bank are also high-occurrence places of the illegal criminal act and the public security disaster accident. Therefore, the buffer area range analysis can be performed on the position range of each security place to determine the extended position ranges of the plurality of security places.
Optionally, based on the extended position ranges of the multiple security places and the position information of the multiple security devices, in the multiple security devices, the step of determining the security devices included in each security place respectively may include: if the extended position ranges of the first security place and the second security place in the plurality of security places are overlapped, removing the overlapped area from the extended position ranges of the first security place and the second security place, and adding a third security place, wherein the position range of the third security place is the overlapped area; and respectively determining the security equipment contained in each security place based on the extended position ranges of the plurality of security places, the position range of the third security place and the position information of the plurality of security equipment.
In implementation, as shown in fig. 5, when performing buffer area analysis on the first security place and the second security place, there may be an overlap between the extended position ranges of the first security place and the second security place, and the overlapping area is a triangular area of a shaded portion in fig. 5. At this time, the overlapping area may be removed in the extended position range of the first security place and the second security place, and a third security place may be added. The position range of the third security place is an overlapping area. The reason for this is that since the region within the extended position range is the object of key security, and one region falls within two objects of key security at the same time, it can be regarded as being of key importance, and can be singly divided for security.
And S130, uniformly managing the security equipment contained in the security place.
In implementation, after the sets of the security devices included in each security place are determined respectively, the security devices can be used as one set, and the security devices in the set are managed in a unified mode. For example, the security device is a monitor, and all monitors in a set can be uniformly turned on to shoot video data. Or, the security equipment is an entrance guard, and all entrance guards in one set can be closed uniformly. Of course, the management authorities of the security devices belonging to the same security place can also be allocated to the same management account, so that the user who successfully logs in the management account can uniformly manage the security devices of the same security place under the management account.
Each security place can be used as an independent security place, the management authority of the security equipment belonging to the independent security place is allocated to one management account, the security places with the association relationship can also be determined, and the management authority of the security equipment of the security places with the association relationship is allocated to the same management account.
Alternatively, the category of each security location may be determined, and the management authority of the security devices belonging to the same category of security locations may be assigned to the same management account. The security places may be classified in advance, for example, two security places, i.e., school a and school B, are classified into school classes, and the management authority of the security device is assigned according to the class of the security place.
Taking school classes as an example, an array DATAS can be set for a security place of the school classes, a plurality of elements exist in the array DATAS, each element represents a school, and the data of the elements is specifically the position range of the security place. First, each element in the array DATAS may be traversed, and buffer analysis may be performed on each element to obtain the extended position range. The extended position range may then be treated as an element in the new array BufferDataList. Then, each element in the array buffer datalist is taken out, and the inclusion relation between each element and the position information of the security equipment is judged, so that the position information of any security equipment is determined to fall into the range of which element in the array buffer datalist. Finally, a set of security devices belonging to a school class of security places (including near schools) can be obtained.
Optionally, in addition to allocating the management authority of the security devices belonging to the same category of security places to the same management account according to the category of each security place, the boundary distance between different security places may be determined, and the management authority of the security devices of security places whose boundary distance is smaller than the preset distance threshold may be allocated to the same management account.
In implementation, the boundary distance between different security places may be determined, for example, the distance between the nearest boundaries between different security places is determined as the boundary distance, and if the boundary distance is smaller than a preset distance threshold, the management authority of the security device in the security place whose boundary distance is smaller than the preset distance threshold is allocated to the same management account. In this way, the management authority of the security devices of the adjacent security places can be assigned to the same management account.
Besides the two modes, the extended position ranges of the multiple security places can be determined based on the preset buffer distance and the position ranges of the multiple security places. And respectively determining the security equipment contained in each security place in the plurality of security equipment based on the extended position ranges of the plurality of security places and the position information of the plurality of security equipment. And determining whether the extended position ranges of different security places are overlapped, and distributing the management authority of the security equipment of the security places with the overlapped extended position ranges to the same management account.
Wherein the extended position range is a position range including the buffer.
The management authority of the security equipment in the security place with the overlapped position ranges after the position range expansion can be distributed to the same management account. The specific way of extending the location range of the security location has been introduced above, and is not described herein again. Of course, besides the above several ways, the security places having the association relationship may also be determined in other ways, and the management authority of the security devices in the security places having the association relationship is allocated to the same management account.
Optionally, the method provided in this embodiment further includes: when a viewing instruction for the security equipment of the security place belonging to the target category is detected, displaying a pre-stored map area corresponding to the position range of the security place belonging to the target category, and marking the security equipment of the security place belonging to the target category in the map area of the security place belonging to the target category according to the position information of the security equipment of the security place belonging to the target category.
In implementation, different base maps or layers can be made in advance according to the types of security places. Then, when the user needs to view a certain type of security places, the option of the security place of the target type can be selected. Subsequently, the terminal can detect a viewing instruction of the security equipment of the security place belonging to the target category, acquire and display a map area which is stored in advance and corresponds to the position range of the security place of the target category. And finally, according to the position information of the security equipment of the security place belonging to the target category, marking the security equipment of the security place belonging to the target category in a map area of the security place belonging to the target category. Therefore, if the security places are many, the security equipment is many, and the efficiency is low when the user finds a certain object. Map areas of the type of security places that the user cares about and the positions of the security devices belonging to the type of security places can be displayed for the user.
According to the method provided by the embodiment, under the condition that the number of the security equipment is large, the management authority of the security equipment can be automatically distributed according to the position information of the security equipment, and the efficiency of distribution operation is greatly improved.
Yet another exemplary embodiment of the present disclosure provides a device resource management apparatus, as shown in fig. 6, the apparatus including:
the acquiring module 610 is configured to acquire a pre-stored position range of a security place and position information of a plurality of security devices;
a determining module 620, configured to determine, based on the position range of the security location and position information of multiple security devices, a security device included in the security location among the multiple security devices;
and the management module 630 is configured to perform unified management on the security devices included in the security places.
Optionally, the obtaining module 610 is configured to obtain pre-stored position ranges of a plurality of security places and position information of a plurality of security devices;
the determining module 620 is configured to determine, based on the position ranges of the multiple security places and the position information of the multiple security devices, security devices included in each security place in the multiple security devices respectively;
the management module 630 is configured to assign the management authorities of the security devices belonging to the same security location to the same management account.
Optionally, the determining module 620 is configured to:
determining extended position ranges of the plurality of security places based on preset buffer distances and position ranges of the plurality of security places, wherein the extended position ranges include a buffer area;
and respectively determining the security equipment contained in each security place in the plurality of security equipment based on the extended position ranges of the plurality of security places and the position information of the plurality of security equipment.
Optionally, the determining module 620 is configured to:
if the extended position ranges of a first security place and a second security place in the plurality of security places are overlapped, removing an overlapped area from the extended position ranges of the first security place and the second security place, and adding a third security place, wherein the position range of the third security place is the overlapped area;
and respectively determining the security equipment contained in each security place in the plurality of security equipment based on the extended position ranges of the plurality of security places, the position range of the third security place and the position information of the plurality of security equipment.
Optionally, the management module 630 is configured to:
and distributing the management authority of the security equipment of the security places with the incidence relation to the same management account.
Optionally, the management module 630 is configured to:
and determining the category of each security place, and distributing the management authority of the security devices belonging to the same category of security places to the same management account.
Optionally, the management module 630 is configured to:
and determining boundary distances among different security places, and distributing the management authority of the security equipment of the security places with the boundary distances smaller than a preset distance threshold value to the same management account.
Optionally, the determining module 620 is configured to determine an extended position range of the multiple security places based on a preset buffer distance and position ranges of the multiple security places, where the extended position range is a position range including a buffer area; respectively determining security equipment contained in each security place in the plurality of security equipment based on the extended position ranges of the plurality of security places and the position information of the plurality of security equipment;
the management module 630 is configured to determine whether the extended position ranges of different security places overlap, and allocate the management authority of the security device in the security place whose extended position ranges overlap to the same management account.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Under the condition that the number of the security protection devices is large, the management authority of the security protection devices can be automatically distributed according to the position information of the security protection devices, and the efficiency of distribution operation is greatly improved.
It should be noted that: in the device resource management apparatus provided in the above embodiment, when allocating security devices, only the division of the functional modules is illustrated, and in practical applications, the function allocation may be completed by different functional modules as needed, that is, the internal structure of the terminal is divided into different functional modules, so as to complete all or part of the functions described above. In addition, the device resource management apparatus provided in the foregoing embodiment and the device resource management method embodiment belong to the same concept, and specific implementation processes thereof are described in the method embodiment and are not described herein again.
Fig. 7 is a schematic diagram illustrating a structure of a terminal 1800 according to an exemplary embodiment of the present invention. The terminal 1800 may be: a smart phone, a tablet computer, an MP3 player (Moving Picture Experts Group Audio layer iii, motion video Experts compression standard Audio layer 3), an MP4 player (Moving Picture Experts Group Audio layer IV, motion video Experts compression standard Audio layer 4), a notebook computer, or a desktop computer. The terminal 1800 may also be referred to by other names such as user equipment, portable terminal, laptop terminal, desktop terminal, and the like.
Generally, the terminal 1800 includes: a processor 1801 and a memory 1802.
The processor 1801 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and so on. The processor 1801 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 1801 may also include a main processor and a coprocessor, where the main processor is a processor for processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 1801 may be integrated with a GPU (Graphics Processing Unit), which is responsible for rendering and drawing content required to be displayed on the display screen. In some embodiments, the processor 1801 may further include an AI (Artificial Intelligence) processor for processing computing operations related to machine learning.
Memory 1802 may include one or more computer-readable storage media, which may be non-transitory. Memory 1802 may also include high speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in the memory 1802 is used to store at least one instruction for execution by the processor 1801 to implement the device resource management methods provided by the method embodiments herein.
In some embodiments, the terminal 1800 may further optionally include: a peripheral interface 1803 and at least one peripheral. The processor 1801, memory 1802, and peripheral interface 1803 may be connected by a bus or signal line. Each peripheral device may be connected to the peripheral device interface 1803 by a bus, signal line, or circuit board. Specifically, the peripheral device includes: at least one of radio frequency circuitry 1804, touch screen display 1805, camera 1806, audio circuitry 1807, positioning components 1808, and power supply 1809.
The peripheral interface 1803 may be used to connect at least one peripheral associated with I/O (Input/Output) to the processor 1801 and the memory 1802. In some embodiments, the processor 1801, memory 1802, and peripheral interface 1803 are integrated on the same chip or circuit board; in some other embodiments, any one or two of the processor 1801, the memory 1802, and the peripheral device interface 1803 may be implemented on separate chips or circuit boards, which is not limited in this embodiment.
The Radio Frequency circuit 1804 is used for receiving and transmitting RF (Radio Frequency) signals, also called electromagnetic signals. The radio frequency circuitry 1804 communicates with communication networks and other communication devices via electromagnetic signals. The rf circuit 1804 converts electrical signals into electromagnetic signals for transmission, or converts received electromagnetic signals into electrical signals. Optionally, the radio frequency circuitry 1804 includes: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so forth. The radio frequency circuitry 1804 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocols include, but are not limited to: the world wide web, metropolitan area networks, intranets, generations of mobile communication networks (2G, 3G, 4G, and 5G), Wireless local area networks, and/or WiFi (Wireless Fidelity) networks. In some embodiments, the rf circuit 1804 may also include NFC (Near Field Communication) related circuits, which are not limited in this application.
The display screen 1805 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When the display screen 1805 is a touch display screen, the display screen 1805 also has the ability to capture touch signals on or over the surface of the display screen 1805. The touch signal may be input to the processor 1801 as a control signal for processing. At this point, the display 1805 may also be used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In some embodiments, the display 1805 may be one, providing a front panel of the terminal 1800; in other embodiments, the number of the display screens 1805 may be at least two, and each of the display screens is disposed on a different surface of the terminal 1800 or is in a foldable design; in still other embodiments, the display 1805 may be a flexible display disposed on a curved surface or on a folded surface of the terminal 1800. Even more, the display 1805 may be arranged in a non-rectangular irregular figure, i.e. a shaped screen. The Display 1805 may be made of LCD (Liquid Crystal Display), OLED (Organic Light-Emitting Diode), or the like.
The camera assembly 1806 is used to capture images or video. Optionally, the camera assembly 1806 includes a front camera and a rear camera. Generally, a front camera is disposed at a front panel of the terminal, and a rear camera is disposed at a rear surface of the terminal. In some embodiments, the number of the rear cameras is at least two, and each rear camera is any one of a main camera, a depth-of-field camera, a wide-angle camera and a telephoto camera, so that the main camera and the depth-of-field camera are fused to realize a background blurring function, and the main camera and the wide-angle camera are fused to realize panoramic shooting and VR (Virtual Reality) shooting functions or other fusion shooting functions. In some embodiments, camera assembly 1806 may also include a flash. The flash lamp can be a monochrome temperature flash lamp or a bicolor temperature flash lamp. The double-color-temperature flash lamp is a combination of a warm-light flash lamp and a cold-light flash lamp, and can be used for light compensation at different color temperatures.
The audio circuitry 1807 may include a microphone and a speaker. The microphone is used for collecting sound waves of a user and the environment, converting the sound waves into electric signals, and inputting the electric signals to the processor 1801 for processing or inputting the electric signals to the radio frequency circuit 1804 to achieve voice communication. The microphones may be provided in a plurality, respectively, at different positions of the terminal 1800 for the purpose of stereo sound collection or noise reduction. The microphone may also be an array microphone or an omni-directional pick-up microphone. The speaker is used to convert electrical signals from the processor 1801 or the radio frequency circuitry 1804 to sound waves. The loudspeaker can be a traditional film loudspeaker or a piezoelectric ceramic loudspeaker. When the speaker is a piezoelectric ceramic speaker, the speaker can be used for purposes such as converting an electric signal into a sound wave audible to a human being, or converting an electric signal into a sound wave inaudible to a human being to measure a distance. In some embodiments, audio circuitry 1807 may also include a headphone jack.
The positioning component 1808 is used to locate a current geographic location of the terminal 1800 for navigation or LBS (location based Service). The positioning component 1808 may be a positioning component based on a GPS (global positioning System) in the united states, a beidou System in china, or a galileo System in russia.
The power supply 1809 is used to power various components within the terminal 1800. The power supply 1809 may be ac, dc, disposable or rechargeable. When the power supply 1809 includes a rechargeable battery, the rechargeable battery may be a wired rechargeable battery or a wireless rechargeable battery. The wired rechargeable battery is a battery charged through a wired line, and the wireless rechargeable battery is a battery charged through a wireless coil. The rechargeable battery may also be used to support fast charge technology.
In some embodiments, the terminal 1800 also includes one or more sensors 1810. The one or more sensors 1810 include, but are not limited to: acceleration sensor 1811, gyro sensor 1812, pressure sensor 1813, fingerprint sensor 1814, optical sensor 1815, and proximity sensor 1816.
The acceleration sensor 1811 may detect the magnitude of acceleration on three coordinate axes of a coordinate system established with the terminal 1800. For example, the acceleration sensor 1811 may be used to detect components of gravitational acceleration in three coordinate axes. The processor 1801 may control the touch display 1805 to display the user interface in a landscape view or a portrait view according to the gravitational acceleration signal collected by the acceleration sensor 1811. The acceleration sensor 1811 may also be used for acquisition of motion data of a game or a user.
The gyro sensor 1812 may detect a body direction and a rotation angle of the terminal 1800, and the gyro sensor 1812 may cooperate with the acceleration sensor 1811 to collect a 3D motion of the user on the terminal 1800. The processor 1801 may implement the following functions according to the data collected by the gyro sensor 1812: motion sensing (such as changing the UI according to a user's tilting operation), image stabilization at the time of photographing, game control, and inertial navigation.
The pressure sensors 1813 may be disposed on a side bezel of the terminal 1800 and/or on a lower layer of the touch display 1805. When the pressure sensor 1813 is disposed on a side frame of the terminal 1800, a user's grip signal on the terminal 1800 can be detected, and the processor 1801 performs left-right hand recognition or shortcut operation according to the grip signal collected by the pressure sensor 1813. When the pressure sensor 1813 is disposed at the lower layer of the touch display screen 1805, the processor 1801 controls the operability control on the UI interface according to the pressure operation of the user on the touch display screen 1805. The operability control comprises at least one of a button control, a scroll bar control, an icon control and a menu control.
The fingerprint sensor 1814 is used to collect the fingerprint of the user, and the processor 1801 identifies the user according to the fingerprint collected by the fingerprint sensor 1814, or the fingerprint sensor 1814 identifies the user according to the collected fingerprint. Upon recognizing that the user's identity is a trusted identity, the processor 1801 authorizes the user to perform relevant sensitive operations, including unlocking a screen, viewing encrypted information, downloading software, paying, and changing settings, etc. The fingerprint sensor 1814 may be disposed on the front, back, or side of the terminal 1800. When a physical key or vendor Logo is provided on the terminal 1800, the fingerprint sensor 1814 may be integrated with the physical key or vendor Logo.
The optical sensor 1815 is used to collect the ambient light intensity. In one embodiment, the processor 1801 may control the display brightness of the touch display 1805 based on the ambient light intensity collected by the optical sensor 1815. Specifically, when the ambient light intensity is high, the display brightness of the touch display screen 1805 is increased; when the ambient light intensity is low, the display brightness of the touch display 1805 is turned down. In another embodiment, the processor 1801 may also dynamically adjust the shooting parameters of the camera assembly 1806 according to the intensity of the ambient light collected by the optical sensor 1815.
A proximity sensor 1816, also known as a distance sensor, is typically provided on the front panel of the terminal 1800. The proximity sensor 1816 is used to collect the distance between the user and the front surface of the terminal 1800. In one embodiment, when the proximity sensor 1816 detects that the distance between the user and the front surface of the terminal 1800 gradually decreases, the processor 1801 controls the touch display 1805 to switch from the bright screen state to the dark screen state; when the proximity sensor 1816 detects that the distance between the user and the front surface of the terminal 1800 becomes gradually larger, the processor 1801 controls the touch display 1805 to switch from the breath screen state to the bright screen state.
Those skilled in the art will appreciate that the configuration shown in fig. 7 is not intended to be limiting of terminal 1800 and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components may be used.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (18)

1. A method for device resource management, the method comprising:
acquiring a pre-stored position range of a security place and position information of a plurality of security devices;
determining security equipment contained in the security place in the plurality of security equipment based on the position range of the security place and the position information of the plurality of security equipment;
and uniformly managing the security equipment contained in the security place.
2. The method of claim 1, wherein the obtaining of the pre-stored location ranges of the security location and the location information of the plurality of security devices comprises:
the method comprises the steps of obtaining pre-stored position ranges of a plurality of security places and position information of a plurality of security devices;
based on the position range of the security place and the position information of a plurality of security devices, in the plurality of security devices, the security device contained in the security place is determined, and the method comprises the following steps:
respectively determining security equipment contained in each security place in the plurality of security equipment based on the position ranges of the plurality of security places and the position information of the plurality of security equipment;
carry out unified management to the security protection equipment that the security protection place contains includes:
and distributing the management authority of the security equipment belonging to the same security place to the same management account.
3. The method of claim 2, wherein the determining, among the plurality of security devices, the security device included in each security place based on the position ranges of the plurality of security places and the position information of the plurality of security devices respectively comprises:
determining extended position ranges of the plurality of security places based on preset buffer distances and position ranges of the plurality of security places, wherein the extended position ranges include a buffer area;
and respectively determining the security equipment contained in each security place in the plurality of security equipment based on the extended position ranges of the plurality of security places and the position information of the plurality of security equipment.
4. The method of claim 3, wherein the determining, among the plurality of security devices, the security device included in each security location based on the extended position ranges of the plurality of security locations and the position information of the plurality of security devices respectively comprises:
if the extended position ranges of a first security place and a second security place in the plurality of security places are overlapped, removing an overlapped area from the extended position ranges of the first security place and the second security place, and adding a third security place, wherein the position range of the third security place is the overlapped area;
and respectively determining the security equipment contained in each security place in the plurality of security equipment based on the extended position ranges of the plurality of security places, the position range of the third security place and the position information of the plurality of security equipment.
5. The method of claim 2, wherein assigning the administrative rights of the security devices belonging to the same security location to the same administrative account comprises:
and distributing the management authority of the security equipment of the security places with the incidence relation to the same management account.
6. The method of claim 5, wherein the assigning the management authority of the security devices of the security places with the association relationship to the same management account comprises:
and determining the category of each security place, and distributing the management authority of the security devices belonging to the same category of security places to the same management account.
7. The method of claim 5, wherein the assigning the management authority of the security devices of the security places with the association relationship to the same management account comprises:
and determining boundary distances among different security places, and distributing the management authority of the security equipment of the security places with the boundary distances smaller than a preset distance threshold value to the same management account.
8. The method of claim 5, wherein the determining, among the plurality of security devices, the security device included in each security place based on the position ranges of the plurality of security places and the position information of the plurality of security devices respectively comprises:
determining extended position ranges of the plurality of security places based on preset buffer distances and position ranges of the plurality of security places, wherein the extended position ranges include a buffer area;
respectively determining security equipment contained in each security place in the plurality of security equipment based on the extended position ranges of the plurality of security places and the position information of the plurality of security equipment;
the allocating the management authority of the security equipment in the security places with the incidence relation to the same management account comprises the following steps:
and determining whether the extended position ranges of different security places are overlapped, and distributing the management authority of the security equipment of the security places with the overlapped extended position ranges to the same management account.
9. An apparatus for device resource management, the apparatus comprising:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring the position range of a pre-stored security place and the position information of a plurality of security devices;
the determining module is used for determining the security equipment contained in the security place in the plurality of security equipment based on the position range of the security place and the position information of the plurality of security equipment;
and the management module is used for uniformly managing the security equipment contained in the security place.
10. The device of claim 9, wherein the obtaining module is configured to obtain pre-stored location ranges of a plurality of security places and location information of a plurality of security devices;
the determining module is used for respectively determining the security equipment contained in each security place in the plurality of security equipment based on the position ranges of the plurality of security places and the position information of the plurality of security equipment;
and the management module is used for distributing the management authority of the security equipment belonging to the same security place to the same management account.
11. The apparatus of claim 10, wherein the determining module is configured to:
determining extended position ranges of the plurality of security places based on preset buffer distances and position ranges of the plurality of security places, wherein the extended position ranges include a buffer area;
and respectively determining the security equipment contained in each security place in the plurality of security equipment based on the extended position ranges of the plurality of security places and the position information of the plurality of security equipment.
12. The apparatus of claim 11, wherein the determining module is configured to:
if the extended position ranges of a first security place and a second security place in the plurality of security places are overlapped, removing an overlapped area from the extended position ranges of the first security place and the second security place, and adding a third security place, wherein the position range of the third security place is the overlapped area;
and respectively determining the security equipment contained in each security place in the plurality of security equipment based on the extended position ranges of the plurality of security places, the position range of the third security place and the position information of the plurality of security equipment.
13. The apparatus of claim 10, wherein the management module is configured to:
and distributing the management authority of the security equipment of the security places with the incidence relation to the same management account.
14. The apparatus of claim 13, wherein the management module is configured to:
and determining the category of each security place, and distributing the management authority of the security devices belonging to the same category of security places to the same management account.
15. The apparatus of claim 13, wherein the management module is configured to:
and determining boundary distances among different security places, and distributing the management authority of the security equipment of the security places with the boundary distances smaller than a preset distance threshold value to the same management account.
16. The apparatus of claim 13, wherein the determining module is configured to determine an extended position range of the plurality of security locations based on a preset buffer distance and position ranges of the plurality of security locations, wherein the extended position range is a position range including a buffer area; respectively determining security equipment contained in each security place in the plurality of security equipment based on the extended position ranges of the plurality of security places and the position information of the plurality of security equipment;
the management module is used for determining whether the extended position ranges of different security places are overlapped, and distributing the management authority of the security equipment of the security places with the overlapped extended position ranges to the same management account.
17. A terminal, characterized in that the terminal comprises a processor and a memory, in which at least one instruction, at least one program, a set of codes, or a set of instructions is stored, which is loaded and executed by the processor to implement the device resource management method according to any one of claims 1-8.
18. A computer readable storage medium having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by a processor to implement the device resource management method according to any one of claims 1 to 8.
CN201811223886.0A 2018-10-19 2018-10-19 Equipment resource management method and device Active CN111079121B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811223886.0A CN111079121B (en) 2018-10-19 2018-10-19 Equipment resource management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811223886.0A CN111079121B (en) 2018-10-19 2018-10-19 Equipment resource management method and device

Publications (2)

Publication Number Publication Date
CN111079121A true CN111079121A (en) 2020-04-28
CN111079121B CN111079121B (en) 2022-08-05

Family

ID=70309439

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811223886.0A Active CN111079121B (en) 2018-10-19 2018-10-19 Equipment resource management method and device

Country Status (1)

Country Link
CN (1) CN111079121B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060190588A1 (en) * 2003-07-11 2006-08-24 Nippon Telegraph And Telephone Corp. System management method, system management device, system management program, and storage medium containing system management program
CN102708517A (en) * 2011-12-29 2012-10-03 中华电信股份有限公司 Computer room power equipment management system and method
CN102932423A (en) * 2012-09-29 2013-02-13 周万荣 Method for controlling limited area and equipment
CN104732122A (en) * 2015-03-20 2015-06-24 深圳市科漫达智能管理科技有限公司 Authority setting method and device
CN106254385A (en) * 2016-09-18 2016-12-21 合肥视尔信息科技有限公司 A kind of control terminal for safety-protection system
CN107465687A (en) * 2017-08-31 2017-12-12 深圳英飞拓科技股份有限公司 A kind of implementation method of authority configuration, device and terminal
CN108052526A (en) * 2017-11-07 2018-05-18 深圳云天励飞技术有限公司 Monitoring area right management method, device and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060190588A1 (en) * 2003-07-11 2006-08-24 Nippon Telegraph And Telephone Corp. System management method, system management device, system management program, and storage medium containing system management program
CN102708517A (en) * 2011-12-29 2012-10-03 中华电信股份有限公司 Computer room power equipment management system and method
CN102932423A (en) * 2012-09-29 2013-02-13 周万荣 Method for controlling limited area and equipment
CN104732122A (en) * 2015-03-20 2015-06-24 深圳市科漫达智能管理科技有限公司 Authority setting method and device
CN106254385A (en) * 2016-09-18 2016-12-21 合肥视尔信息科技有限公司 A kind of control terminal for safety-protection system
CN107465687A (en) * 2017-08-31 2017-12-12 深圳英飞拓科技股份有限公司 A kind of implementation method of authority configuration, device and terminal
CN108052526A (en) * 2017-11-07 2018-05-18 深圳云天励飞技术有限公司 Monitoring area right management method, device and storage medium

Also Published As

Publication number Publication date
CN111079121B (en) 2022-08-05

Similar Documents

Publication Publication Date Title
CN113204298B (en) Method and device for displaying release progress, electronic equipment and storage medium
CN108897597B (en) Method and device for guiding configuration of live broadcast template
CN110288689B (en) Method and device for rendering electronic map
CN111897465B (en) Popup display method, device, equipment and storage medium
CN109660876B (en) Method and device for displaying list
CN112396076A (en) License plate image generation method and device and computer storage medium
CN112241987B (en) System, method, device and storage medium for determining defense area
CN111383251B (en) Method, device, monitoring equipment and storage medium for tracking target object
CN111754564B (en) Video display method, device, equipment and storage medium
CN113240784B (en) Image processing method, device, terminal and storage medium
CN111383243A (en) Method, device, equipment and storage medium for tracking target object
CN111079121B (en) Equipment resource management method and device
CN112637624B (en) Live stream processing method, device, equipment and storage medium
CN112764824B (en) Method, device, equipment and storage medium for triggering identity verification in application program
CN111191254B (en) Access verification method, device, computer equipment and storage medium
CN114594885A (en) Application icon management method, device and equipment and computer readable storage medium
CN110570123B (en) Resource information management method, system and device based on block chain
CN113076452A (en) Application classification method, device, equipment and computer readable storage medium
CN111984755A (en) Method and device for determining target parking point, electronic equipment and storage medium
CN112699906A (en) Method, device and storage medium for acquiring training data
CN113393608B (en) Service processing method, device, terminal and storage medium
CN112990424B (en) Neural network model training method and device
CN110134393B (en) Method and device for processing operation signal
CN111375204B (en) Display data acquisition method, device, equipment and storage medium
CN111008381B (en) Terminal detection method, device, terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant