CN112818139A - Edge calculation data management method, device and equipment applied to security monitoring - Google Patents

Edge calculation data management method, device and equipment applied to security monitoring Download PDF

Info

Publication number
CN112818139A
CN112818139A CN202110047442.1A CN202110047442A CN112818139A CN 112818139 A CN112818139 A CN 112818139A CN 202110047442 A CN202110047442 A CN 202110047442A CN 112818139 A CN112818139 A CN 112818139A
Authority
CN
China
Prior art keywords
security monitoring
data
things data
monitoring internet
internet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110047442.1A
Other languages
Chinese (zh)
Inventor
张敏
高庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ennew Digital Technology Co Ltd
Original Assignee
Ennew Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ennew Digital Technology Co Ltd filed Critical Ennew Digital Technology Co Ltd
Priority to CN202110047442.1A priority Critical patent/CN112818139A/en
Publication of CN112818139A publication Critical patent/CN112818139A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/40Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
    • G06F16/41Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/40Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
    • G06F16/43Querying
    • G06F16/432Query formulation
    • G06F16/434Query formulation using image data, e.g. images, photos, pictures taken by a user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/40Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
    • G06F16/43Querying
    • G06F16/438Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/40Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
    • G06F16/45Clustering; Classification
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/10Detection; Monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Abstract

The embodiment of the invention discloses a method, a device and equipment for managing edge calculation data applied to security monitoring. The method comprises the following steps: collecting security monitoring internet of things data; the security monitoring internet of things data is transmitted back to the edge computing node; in response to the fact that the security monitoring internet of things data is successfully returned, controlling the edge computing node to perform data processing on the security monitoring internet of things data to obtain processed security monitoring internet of things data; and transmitting the processed security monitoring internet of things data to a target cloud, and managing the processed security monitoring internet of things data. According to the embodiment, automatic and intelligent data monitoring and unified centralized management for the security system are realized, the management cost is reduced, and the user experience is improved laterally.

Description

Edge calculation data management method, device and equipment applied to security monitoring
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to an edge computing data management method, device and equipment applied to security monitoring.
Background
The earliest manual security equipment is single, has no networking function and is supported by single equipment, such as a DVR (digital video recorder), an analog/digital monitoring camera and the like.
With the development of large-scale networking monitoring technology for streaming media distribution, the development of video browsing, storage and playback, encoding and decoding technology, video self-adaptive network transmission mechanism, mass storage technology and the like, certain help can be brought to safety production monitoring to a certain extent, but the investment cost is high, the technology is high in reliability and poor in compatibility, and the management is difficult.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary of the disclosure is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
The embodiment of the invention provides an edge calculation data management method, device and equipment applied to security monitoring, and aims to solve the technical problems mentioned in the background technology.
In a first aspect, an embodiment of the present disclosure provides an edge computing data management method applied to security monitoring, where the method includes: collecting security monitoring internet of things data; the security monitoring internet of things data is transmitted back to the edge computing node; in response to the fact that the security monitoring internet of things data is successfully returned, controlling the edge computing node to perform data processing on the security monitoring internet of things data to obtain processed security monitoring internet of things data; and transmitting the processed security monitoring internet of things data to a target cloud, and managing the processed security monitoring internet of things data.
In a second aspect, an embodiment of the present invention provides an edge computing data management apparatus for security monitoring, where the apparatus includes: the system comprises a collecting unit, a monitoring unit and a monitoring unit, wherein the collecting unit is configured to collect security monitoring internet of things data; a passback unit configured to pass back the security monitoring IOT data to an edge computing node; the processing unit is configured to control the edge computing node to perform data processing on the security monitoring internet of things data in response to the fact that the security monitoring internet of things data is successfully returned, and obtain the processed security monitoring internet of things data; and the management unit is configured to transmit the processed security monitoring internet of things data to a target cloud and manage the processed security monitoring internet of things data.
In a third aspect, an embodiment of the present disclosure provides an electronic device, including: one or more processors; a storage device having one or more programs stored thereon which, when executed by one or more processors, cause the one or more processors to implement the method as described in the first aspect.
In a fourth aspect, embodiments of the present disclosure provide a computer readable medium having a computer program stored thereon, wherein the program, when executed by a processor, implements the method as described in the first aspect.
One of the above embodiments disclosed by the invention has the following beneficial effects: the collected security monitoring internet of things data is transmitted back to the edge computing node, and then the security monitoring internet of things data is processed. And finally, transmitting the processed security monitoring internet of things data to a target cloud and managing the data. The data monitoring and unified centralized management of automation and intellectualization of the security system are realized, the management cost is reduced, and the user experience is improved on the side surface.
Drawings
The above and other features, advantages and aspects of the disclosed embodiments will become more apparent from the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and elements are not necessarily drawn to scale.
FIG. 1 is a schematic diagram of an application scenario of an edge computing data management method applied to security monitoring according to an embodiment of the disclosure;
FIG. 2 is a flowchart of an embodiment of an edge computing data management method applied to security monitoring according to the present disclosure;
FIG. 3 is a schematic structural diagram of an embodiment of an edge computing data management device applied to security monitoring according to the present disclosure;
FIG. 4 is a schematic block diagram of an electronic device suitable for use in implementing the disclosed embodiments of the invention.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure.
It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings. The embodiments and features of the embodiments disclosed in the present invention may be combined with each other without conflict.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules, or units, and are not used for limiting the order or interdependence of the functions performed by the devices, modules, or units.
It is noted that references to "a", "an", and "the" modifications in the disclosure are exemplary rather than limiting, and that those skilled in the art will understand that "one or more" unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the disclosed embodiments are for illustrative purposes only and are not intended to limit the scope of such messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 is a schematic diagram of an application scenario of an edge computing data management method applied to security monitoring according to some embodiments of the present disclosure.
In the application scenario of fig. 1, first, the computing device 101 may collect security monitoring internet of things data 102. The computing device 101 may then transmit the security monitoring internet of things data 102 back to the edge computing node 103. In response to determining that the security monitoring internet of things data 102 is successfully returned, the computing device 101 may control the edge computing node 103 to perform data processing on the security monitoring internet of things data 102, so as to obtain processed security monitoring internet of things data 104. Finally, the computing device 101 may transmit the processed security monitoring internet of things data 104 to the target cloud 105, and manage the processed security monitoring internet of things data 104.
The computing device 101 may be hardware or software. When the computing device is hardware, it may be implemented as a distributed cluster composed of multiple servers or terminal devices, or may be implemented as a single server or a single terminal device. When the computing device is embodied as software, it may be installed in the hardware devices enumerated above. It may be implemented, for example, as multiple software or software modules to provide distributed services, or as a single software or software module. And is not particularly limited herein.
It should be understood that the number of computing devices in FIG. 1 is merely illustrative. There may be any number of computing devices, as implementation needs dictate.
With continued reference to FIG. 2, a flowchart 200 of an embodiment of an edge computing data management method applied to security monitoring is shown, in accordance with the present disclosure. The method may be performed by the computing device 101 of fig. 1. The edge calculation data management method applied to security monitoring comprises the following steps:
step 201, collecting security monitoring internet of things data.
In an embodiment, an executing subject (such as the computing device 101 shown in fig. 1) of the edge computing data management method applied to security monitoring may install a sensing layer device terminal and various monitoring systems in a target security scene to record pedestrians and vehicles and acquire photos, videos and the like. The execution main body can be connected with the sensing layer equipment end and the monitoring system in a wired connection mode or a wireless connection mode to acquire security monitoring internet of things data. Here, the security monitoring internet of things data includes, but is not limited to, at least one of: photos, videos.
It should be noted that the wireless connection means may include, but is not limited to, a 3G/4G connection, a WiFi connection, a bluetooth connection, a WiMAX connection, a Zigbee connection, a uwb (ultra wideband) connection, and other wireless connection means now known or developed in the future.
And step 202, transmitting the security monitoring Internet of things data back to the edge computing node.
In an embodiment, the execution subject may access the security monitoring internet of things data by using a preset transmission mode. In response to determining that the access is successful, the executing agent may transmit the security monitoring data back to the edge computing node. Here, the preset transmission manner may be a signal transmission manner (e.g., 4G signal, 5G signal, WiFi signal).
Step 203, in response to determining that the security monitoring internet of things data is successfully returned, controlling the edge computing node to perform data processing on the security monitoring internet of things data to obtain the processed security monitoring internet of things data.
In an embodiment, in response to determining that the security monitoring internet of things data is successfully returned, the executing body may perform data processing on the security monitoring internet of things data through the following steps: firstly, the executing body can utilize a pre-installed intelligent judgment system to judge the security monitoring internet of things data to obtain abnormal data in the security monitoring internet of things data; secondly, the execution main body can carry out data cleaning on the abnormal data; and thirdly, in response to the fact that the data cleaning is finished, the execution main body can determine the cleaned data as the processed security monitoring internet of things data.
In an optional implementation manner of the embodiment, the method further includes: the execution main body can perform data caching on the processed security monitoring internet of things data.
And 204, transmitting the processed security monitoring internet of things data to a target cloud, and managing the processed security monitoring internet of things data.
In an embodiment, the executing body may transmit the processed security monitoring internet of things data to a target cloud. Then, the executing agent may manage the processed security monitoring internet of things data as follows: firstly, the executing body can classify the processed security monitoring internet of things data to obtain at least one classification. The executing agent may then store the data in the at least one category to a target database. Here, the classification may be a classification according to a data type of the security monitoring internet of things data. As an example, the classification may be performed by photo or video.
In an optional implementation manner of the embodiment, the executing entity may perform the following management on the processed security monitoring internet of things data: performing image retrieval on the processed security monitoring internet of things data to obtain a retrieval result; and transmitting the search result to target equipment with a display function, and controlling the target equipment to display the search result.
One of the above embodiments disclosed by the invention has the following beneficial effects: the collected security monitoring internet of things data is transmitted back to the edge computing node, and then the security monitoring internet of things data is processed. And finally, transmitting the processed security monitoring internet of things data to a target cloud and managing the data. The data monitoring and unified centralized management of automation and intellectualization of the security system are realized, the management cost is reduced, and the user experience is improved on the side surface.
With further reference to fig. 3, as an implementation of the foregoing methods for the foregoing drawings, the present disclosure provides some embodiments of an edge computing data management apparatus applied to security monitoring, where the embodiments of the apparatus correspond to those of the foregoing method embodiments in fig. 2, and the apparatus may be applied to various electronic devices in particular.
As shown in fig. 3, an edge computing data management apparatus 300 applied to security monitoring of an embodiment includes: an acquisition unit 301, a pass-back unit 302, a processing unit 303 and a management unit 304. The acquisition unit 301 is configured to acquire security monitoring internet of things data; a return unit 302 configured to return the security monitoring data to an edge computing node; the processing unit 303 is configured to control the edge computing node to perform data processing on the security monitoring internet of things data in response to determining that the security monitoring internet of things data is successfully returned, so as to obtain processed security monitoring internet of things data; the management unit 304 is configured to transmit the processed security monitoring internet of things data to a target cloud, and manage the processed security monitoring internet of things data.
In an optional implementation manner of the embodiment, the backhaul unit 302 of the edge computing data management apparatus 300 applied to security monitoring includes: the access subunit is configured to access the security monitoring internet of things data by using a preset transmission mode; a pass-back subunit configured to, in response to determining that the access is successful, pass back the security monitoring instrumented data to the edge computing node.
In an alternative implementation manner of the embodiment, the processing unit 303 of the edge computing data management apparatus 300 applied to security monitoring is further configured to: judging the security monitoring internet of things data to obtain abnormal data in the security monitoring internet of things data; performing data cleaning on the abnormal data; and in response to determining that the data cleaning is completed, determining the cleaned data as the processed security monitoring internet of things data.
In an alternative implementation manner of the embodiment, the edge computing data management apparatus 300 applied to security monitoring is further configured to: and performing data caching on the processed security monitoring internet of things data.
In an alternative implementation manner of the embodiment, the management unit 304 of the edge computing data management apparatus 300 applied to security monitoring is further configured to: classifying the processed security monitoring internet of things data to obtain at least one classification; storing the data in the at least one classification to a target database.
In an alternative implementation manner of the embodiment, the management unit 304 of the edge computing data management apparatus 300 applied to security monitoring is further configured to: performing image retrieval on the processed security monitoring internet of things data to obtain a retrieval result; and transmitting the retrieval result to target equipment with a display function, and controlling the target equipment to display the retrieval result.
It will be understood that the units described in the apparatus 300 correspond to the various steps in the method described with reference to fig. 2. Thus, the operations, features and resulting advantages described above with respect to the method are also applicable to the apparatus 300 and the units included therein, and are not described herein again.
Referring now to FIG. 4, a block diagram of an electronic device (e.g., computing device 101 of FIG. 1)400 suitable for use in implementing some embodiments of the present disclosure is shown. The server illustrated in fig. 4 is only an example and should not bring any limitations to the function and scope of use of the disclosed embodiments of the present invention.
As shown in fig. 4, electronic device 400 may include a processing device (e.g., central processing unit, graphics processor, etc.) 401 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)402 or a program loaded from a storage device 408 into a Random Access Memory (RAM) 403. In the RAM403, various programs and data necessary for the operation of the electronic apparatus 400 are also stored. The processing device 401, the ROM 402, and the RAM403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
Generally, the following devices may be connected to the I/O interface 405: input devices 406 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 407 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 408 including, for example, tape, hard disk, etc.; and a communication device 409. The communication means 409 may allow the electronic device 400 to communicate wirelessly or by wire with other devices to exchange data. While fig. 4 illustrates an electronic device 400 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided. Each block shown in fig. 4 may represent one device or may represent multiple devices as desired.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In some such embodiments, the computer program may be downloaded and installed from a network through the communication device 409, or from the storage device 408, or from the ROM 402. Which when executed by the processing means 401, performs the above-described functions defined in the methods of some embodiments of the present disclosure.
It should be noted that the computer readable medium mentioned above in some embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the apparatus; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: collecting security monitoring internet of things data; the security monitoring internet of things data is transmitted back to the edge computing node; in response to the fact that the security monitoring internet of things data is successfully returned, controlling the edge computing node to perform data processing on the security monitoring internet of things data to obtain processed security monitoring internet of things data; and transmitting the processed security monitoring internet of things data to a target cloud, and managing the processed security monitoring internet of things data.
Computer program code for carrying out operations for embodiments of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present disclosure may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor comprises a collection unit, a return unit, a processing unit and a management unit. The names of the units do not form a limitation on the units themselves under certain conditions, and for example, the acquisition unit may also be described as a "unit for acquiring security monitoring internet of things data".
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
The foregoing description is only exemplary of the preferred embodiments of the present disclosure and is provided for the purpose of illustrating the general principles of the technology. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments disclosed in the present application is not limited to the embodiments with specific combinations of the above-mentioned features, but also covers other embodiments with any combination of the above-mentioned features or their equivalents without departing from the inventive concept. For example, the above features and (but not limited to) technical features with similar functions disclosed in the embodiments of the present disclosure are mutually replaced to form the technical solution.

Claims (10)

1. An edge computing data management method applied to security monitoring is characterized by comprising the following steps:
collecting security monitoring internet of things data;
the security monitoring internet of things data is transmitted back to the edge computing node;
in response to the fact that the security monitoring internet of things data is successfully returned, controlling the edge computing node to perform data processing on the security monitoring internet of things data to obtain processed security monitoring internet of things data;
and transmitting the processed security monitoring internet of things data to a target cloud, and managing the processed security monitoring internet of things data.
2. The method for managing the edge computing data applied to security monitoring according to claim 1, wherein the transmitting the security monitoring data of the internet of things back to the edge computing node comprises:
accessing the security monitoring internet of things data by using a preset transmission mode;
and responding to the fact that the access is successful, and transmitting the security monitoring internet of things data back to the edge computing node.
3. The method according to claim 1, wherein the controlling the edge computing node to perform data processing on the security monitoring internet of things data in response to determining that the security monitoring internet of things data is successfully returned back to obtain the processed security monitoring internet of things data comprises:
judging the security monitoring internet of things data to obtain abnormal data in the security monitoring internet of things data;
performing data cleaning on the abnormal data;
and in response to determining that the data cleaning is completed, determining the cleaned data as the processed security monitoring internet of things data.
4. The method according to claim 3, wherein in response to determining that the security monitoring internet of things data is successfully returned, the method further comprises, after controlling the edge computing node to perform data processing on the security monitoring internet of things data and obtaining the processed security monitoring internet of things data, the method further comprising:
and performing data caching on the processed security monitoring internet of things data.
5. The method according to claim 1, wherein the transmitting the processed security monitoring internet of things data to a target cloud and managing the processed security monitoring internet of things data comprises:
classifying the processed security monitoring internet of things data to obtain at least one classification;
storing the data in the at least one classification to a target database.
6. The method according to claim 5, wherein the step of transmitting the processed security monitoring internet of things data to a target cloud and managing the processed security monitoring internet of things data comprises:
performing image retrieval on the processed security monitoring internet of things data to obtain a retrieval result;
and transmitting the retrieval result to target equipment with a display function, and controlling the target equipment to display the retrieval result.
7. The utility model provides an edge calculation data management device for security protection monitoring which characterized in that includes:
the system comprises a collecting unit, a monitoring unit and a monitoring unit, wherein the collecting unit is configured to collect security monitoring internet of things data;
a passback unit configured to pass back the security monitoring IOT data to an edge computing node;
the processing unit is configured to control the edge computing node to perform data processing on the security monitoring internet of things data in response to the fact that the security monitoring internet of things data is successfully returned, and obtain the processed security monitoring internet of things data;
and the management unit is configured to transmit the processed security monitoring internet of things data to a target cloud and manage the processed security monitoring internet of things data.
8. The apparatus according to claim 7, wherein the backhaul unit comprises:
the access subunit is configured to access the security monitoring internet of things data by using a preset transmission mode;
a pass-back subunit configured to, in response to determining that the access is successful, pass back the security monitoring instrumented data to the edge computing node.
9. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon;
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-6.
10. A computer-readable medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the method of any one of claims 1-6.
CN202110047442.1A 2021-01-14 2021-01-14 Edge calculation data management method, device and equipment applied to security monitoring Pending CN112818139A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110047442.1A CN112818139A (en) 2021-01-14 2021-01-14 Edge calculation data management method, device and equipment applied to security monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110047442.1A CN112818139A (en) 2021-01-14 2021-01-14 Edge calculation data management method, device and equipment applied to security monitoring

Publications (1)

Publication Number Publication Date
CN112818139A true CN112818139A (en) 2021-05-18

Family

ID=75869494

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110047442.1A Pending CN112818139A (en) 2021-01-14 2021-01-14 Edge calculation data management method, device and equipment applied to security monitoring

Country Status (1)

Country Link
CN (1) CN112818139A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116489152A (en) * 2023-06-21 2023-07-25 北京德风新征程科技股份有限公司 Linkage control method and device for Internet of things equipment, electronic equipment and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639797A (en) * 2018-12-12 2019-04-16 深圳市中电数通智慧安全科技股份有限公司 A kind of wisdom safety monitoring system
CN111698470A (en) * 2020-06-03 2020-09-22 河南省民盛安防服务有限公司 Security video monitoring system based on cloud edge cooperative computing and implementation method thereof

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639797A (en) * 2018-12-12 2019-04-16 深圳市中电数通智慧安全科技股份有限公司 A kind of wisdom safety monitoring system
CN111698470A (en) * 2020-06-03 2020-09-22 河南省民盛安防服务有限公司 Security video monitoring system based on cloud edge cooperative computing and implementation method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116489152A (en) * 2023-06-21 2023-07-25 北京德风新征程科技股份有限公司 Linkage control method and device for Internet of things equipment, electronic equipment and medium
CN116489152B (en) * 2023-06-21 2023-09-19 北京德风新征程科技股份有限公司 Linkage control method and device for Internet of things equipment, electronic equipment and medium

Similar Documents

Publication Publication Date Title
CN110147398B (en) Data processing method, device, medium and electronic equipment
CN109819048B (en) Data synchronization method, device, terminal and storage medium
CN111367687A (en) Inter-process data communication method and device
CN110737726B (en) Method and device for determining test data of interface to be tested
CN111949850B (en) Multi-source data acquisition method, device, equipment and storage medium
CN112907942A (en) Vehicle scheduling method, device, equipment and medium based on edge calculation
WO2021139383A1 (en) Live broadcast room gift resource updating method and apparatus, and medium and electronic device
CN112256733A (en) Data caching method and device, electronic equipment and computer readable storage medium
CN111930709A (en) Data storage method and device, electronic equipment and computer readable medium
CN111163336B (en) Video resource pushing method and device, electronic equipment and computer readable medium
CN112015816A (en) Data synchronization method, device, medium and electronic equipment
CN112818139A (en) Edge calculation data management method, device and equipment applied to security monitoring
CN113722369A (en) Method, device, equipment and storage medium for predicting field monitoring data
CN110719233A (en) Method and device for sending information
WO2023273576A1 (en) Abnormal request processing method and apparatus, electronic device and storage medium
CN114035861A (en) Cluster configuration method and device, electronic equipment and computer readable medium
CN112015746B (en) Data real-time processing method, device, medium and electronic equipment
CN112732979B (en) Information writing method, information writing device, electronic equipment and computer readable medium
CN112507676B (en) Method and device for generating energy report, electronic equipment and computer readable medium
WO2021073413A1 (en) Method and apparatus for sending system performance parameters, management device, and storage medium
CN114020496A (en) Data checking method and device, electronic equipment and storage medium
CN112817874A (en) User interface test method, device, equipment and medium
CN112732457A (en) Image transmission method, image transmission device, electronic equipment and computer readable medium
CN112311842A (en) Method and device for information interaction
CN112311840A (en) Multi-terminal data synchronization method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination