CN113470302A - Intelligent security management method and system based on Internet of things and storage medium - Google Patents

Intelligent security management method and system based on Internet of things and storage medium Download PDF

Info

Publication number
CN113470302A
CN113470302A CN202110753906.0A CN202110753906A CN113470302A CN 113470302 A CN113470302 A CN 113470302A CN 202110753906 A CN202110753906 A CN 202110753906A CN 113470302 A CN113470302 A CN 113470302A
Authority
CN
China
Prior art keywords
abnormal
monitoring
component
intelligent security
map
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110753906.0A
Other languages
Chinese (zh)
Inventor
李永波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Shangyuan Art Design Co ltd
Original Assignee
Shenzhen Shangyuan Art Design Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Shangyuan Art Design Co ltd filed Critical Shenzhen Shangyuan Art Design Co ltd
Priority to CN202110753906.0A priority Critical patent/CN113470302A/en
Publication of CN113470302A publication Critical patent/CN113470302A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B19/00Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
    • G08B19/005Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow combined burglary and fire alarm systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/20Administration of product repair or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/80Homes; Buildings
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y20/00Information sensed or collected by the things
    • G16Y20/10Information sensed or collected by the things relating to the environment, e.g. temperature; relating to location
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y20/00Information sensed or collected by the things
    • G16Y20/40Information sensed or collected by the things relating to personal data, e.g. biometric data, records or preferences
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/10Detection; Monitoring
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/30Control
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/40Maintenance of things
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems

Abstract

The invention relates to an intelligent security management method, an intelligent security management system and a storage medium based on the Internet of things, which belong to the field of intelligent security, wherein the method comprises the steps of identifying the signal type of an abnormal alarm signal and a carried monitoring component identifier after receiving the abnormal alarm signal; according to the monitoring component identification, identifying an abnormal occurrence region and generating an abnormal occurrence region graph; controlling a target monitoring component associated with the abnormal occurrence area to generate and feed back real-time condition information; generating an abnormal alarm request according to the abnormal occurrence area map and the real-time condition information; and sending the abnormal alarm request to a preset abnormal state processing center. The method and the device have the advantages that the targeted solution is convenient to make, and therefore the effect of improving the processing efficiency of the abnormal condition is improved.

Description

Intelligent security management method and system based on Internet of things and storage medium
Technical Field
The application relates to the field of intelligent security, in particular to an intelligent security management method, system and storage medium based on the Internet of things.
Background
The Internet of things is used as an important component of a new-generation information technology, and is applied to the infrastructure fields of industry, agriculture, environment, traffic, logistics, security and the like, so that the intelligent development of the fields is effectively promoted.
With the improvement of living standard and safety consciousness of people, intelligent security systems applying the internet of things technology are arranged in a plurality of buildings and used for monitoring and managing the interior of the buildings. When abnormal conditions such as fire, illegal intrusion and the like occur, the intelligent security system can automatically make a response and send an alarm to the abnormal state processing center in time.
The above-described related art has the following drawbacks: after the intelligent security system gives an alarm, although the abnormal state processing center receives the alarm, a targeted solution is difficult to formulate, so that the processing efficiency of the abnormal condition is influenced.
Disclosure of Invention
In order to facilitate formulation of a targeted solution, and therefore improve the processing efficiency of abnormal conditions, the application provides an intelligent security management method and system based on the Internet of things and a storage medium.
In a first aspect, the application provides an intelligent security management method based on the internet of things, which adopts the following technical scheme:
an intelligent security management method based on the Internet of things is based on a control center in an intelligent security system, the intelligent security system further comprises monitoring components of different types, and the method comprises the following steps:
after receiving an abnormal alarm signal, identifying the signal type of the abnormal alarm signal and the carried monitoring component identifier;
marking an abnormal occurrence region according to the identification result and generating an abnormal occurrence region map;
controlling a target monitoring component associated with the abnormal occurrence area to acquire and feed back real-time condition information;
generating an abnormal alarm request according to the abnormal occurrence area map and the real-time condition information;
and sending the abnormal alarm request to a preset abnormal state processing center.
By adopting the technical scheme, after the monitoring component identifies that the abnormal condition occurs, the abnormal alarm signal is sent to the control center, and the control center identifies and processes the acquired abnormal alarm signal, so that the abnormal occurring region is identified and an abnormal occurring region map is generated, and meanwhile, the corresponding target monitoring component is controlled to acquire and feed back real-time condition information according to the identified signal type. And then, the control center sends an abnormal alarm request carrying the abnormal occurrence area map and the real-time condition information to the abnormal state processing center, so that workers of the abnormal state processing center can timely know the specific situation in the abnormal occurrence area, the workers can make a solution in a targeted manner, and the abnormal state processing efficiency is improved.
Optionally, the marking an abnormal occurrence region and generating an abnormal occurrence region map according to the identification result specifically includes:
extracting a pre-stored building overall map, wherein monitoring areas corresponding to the monitoring components are recorded in the building overall map;
identifying a monitoring component corresponding to the monitoring component identification, and marking a monitoring area corresponding to the monitoring component as an abnormal area in the building overall map;
and generating an abnormal area map marked with the abnormal area.
By adopting the technical scheme, the control center can identify the abnormal occurrence area according to the preset building overall map and the identified monitoring component identification, and process and generate the abnormal occurrence area map.
Optionally, when it is identified that the abnormal alarm signal is a fire alarm signal, the generating an abnormal occurrence region map marked with the abnormal occurrence region specifically includes:
identifying the number of abnormal alarm signals with different monitoring component identifications in a preset historical time;
when the number of the recognized areas is not greater than a preset safety threshold value, canceling the generation of the abnormal area map;
when the number of the monitoring components is larger than a preset safety threshold value, identifying the monitoring components corresponding to the monitoring component identifiers, and marking the monitoring areas corresponding to the monitoring components in the building overall map as abnormal areas;
and generating an abnormal area map marked with all the abnormal areas.
By adopting the technical scheme, when the number of the identified monitoring components is not more than the preset safety threshold, the control center cancels the generation of the abnormal area occurrence graph, so that an abnormal alarm request cannot be sent out; when the number of the identified monitoring components is larger than a preset safety threshold value, the fire disaster is represented to have a spreading trend, and an abnormal occurrence area graph is generated at the moment to ensure the generation of an abnormal alarm request, so that the possibility of false alarm of the fire disaster is reduced.
Optionally, when it is identified that the abnormal alarm signal is a fire alarm signal, the controlling the target monitoring component associated with the abnormal occurrence area to generate and feed back the real-time status information specifically includes:
identifying at least one disaster-stricken floor corresponding to the abnormal occurrence area;
and sending a signal for acquiring the number of the remaining people to a target monitoring assembly preset on each disaster-stricken floor, so that the target monitoring assembly feeds back the number of the remaining people on each disaster-stricken floor.
By adopting the technical scheme, when a fire disaster is identified, the control center acquires the number of the detained people corresponding to the disaster-stricken floor through the target monitoring assembly preset on the disaster-stricken floor, so that the scientific formulation of a solution scheme is facilitated.
Optionally, when it is identified that the abnormal alarm signal is an anti-theft alarm signal, the controlling the target monitoring component associated with the abnormal occurrence region to generate and feed back the real-time status information specifically includes:
and sending an image acquisition signal to the target monitoring assembly in the abnormal occurrence area, so that the target monitoring assembly in the abnormal occurrence area acquires and feeds back a real-time monitoring image.
By adopting the technical scheme, when a theft occurs, the control center controls the target monitoring component to acquire the real-time monitoring image according to the received anti-theft alarm signal, thereby being beneficial to acquiring the appearance information of surrounding personnel when the accident occurs and further being beneficial to formulating the solution.
Optionally, the method further includes:
sending a state detection signal to the monitoring component according to a preset detection period;
acquiring a state feedback signal carrying a component code and fed back by the monitoring component;
when the condition feedback signal carrying the target component code is identified to be abnormal or the condition feedback signal carrying the target component code is not received within a preset response time, generating a maintenance request carrying the target component code;
and sending the maintenance request to a preset maintenance center.
Through adopting above-mentioned technical scheme, control center detects monitoring subassembly running state according to predetermined detection cycle to help the monitoring subassembly that in time finds out the trouble, the maintenance center of being convenient for arranges the maintenance, and then has ensured monitoring subassembly normal operating.
Optionally, the intelligent security system further includes different types of execution components; after the identifying an abnormal occurrence region and generating an abnormal occurrence region map according to the monitoring component identifier, the method further comprises the following steps:
calling a preset safety plan table, wherein a plurality of safety plans and corresponding trigger conditions are stored in the safety plan table: at least one execution component type and to-be-executed processing corresponding to each execution component type are recorded in each safety plan;
judging the triggering conditions met by the abnormal alarm signals and extracting corresponding safety plans;
identifying an execution component type of a target execution component associated with the exception-occurring region;
and sending a control instruction carrying the to-be-executed processing to a target execution component of a corresponding type according to the identified type of the execution component.
By adopting the technical scheme, on one hand, the execution assembly can timely cope with the abnormal condition, which is beneficial to reducing loss; on the other hand, the provision of the safety protocol contributes to an improvement in response speed.
In a second aspect, the present application provides an intelligent security system, which adopts the following technical scheme: an intelligent security system comprises a control center and monitoring components of different categories, wherein the control center is used for monitoring the monitoring components;
after receiving an abnormal alarm signal, identifying the signal type of the abnormal alarm signal and the carried monitoring component identifier;
marking an abnormal occurrence region according to the identification result and generating an abnormal occurrence region map;
controlling a target monitoring component associated with the abnormal occurrence area to acquire and feed back real-time condition information;
generating an abnormal alarm request according to the abnormal occurrence area map and the real-time condition information;
and sending the abnormal alarm request to a preset abnormal state processing center.
By adopting the technical scheme, the method is beneficial to realizing the convenience of formulating a targeted solution, thereby improving the effect of processing the abnormal condition.
In a third aspect, the present application provides a network device, which adopts the following technical solution:
a network device comprising a memory and a processor, said memory having stored thereon a computer program that can be loaded by the processor and that executes a process performed by a control center as in the method of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium, which adopts the following technical solutions:
a computer readable storage medium comprising a computer program stored thereon which is loadable by a processor and adapted to carry out the method of the first aspect.
By adopting the technical scheme, after the computer storage medium is loaded into any computer, the computer can execute the intelligent security management method based on the internet of things according to the first aspect.
In summary, the invention includes at least one of the following beneficial technical effects:
1. after receiving the abnormal alarm request, the control center sends the abnormal alarm request carrying the abnormal occurrence area map and the real-time condition information to the abnormal state processing center, so that a worker of the abnormal state processing center can know the specific situation in the abnormal occurrence area in time, the worker can make a solution in a targeted manner, and the abnormal state processing efficiency is improved;
2. the control center detects the running states of the monitoring assembly and the executing assembly according to a preset detection period, so that the monitoring assembly or the executing assembly which breaks down can be found in time, the maintenance center can arrange maintenance conveniently, and the normal running of the monitoring assembly and the executing assembly is guaranteed.
Drawings
Fig. 1 is a schematic flow chart of a main flow for embodying an intelligent security management method based on the internet of things in the embodiment of the present application.
Fig. 2 is a flowchart illustrating the false alarm prevention process in S102 when a fire alarm signal is received according to an embodiment of the present application.
Fig. 3 is a schematic flowchart of generating a control instruction through a safety protocol table according to an embodiment of the present application.
Fig. 4 is a structural block diagram of an intelligent security system provided in an embodiment of the present application.
Detailed Description
The present application is described in further detail below with reference to figures 1-4.
The embodiment of the application discloses an intelligent security management method based on the Internet of things, which can be applied to intelligent security systems of buildings such as shopping malls, museums and office buildings. The execution main body can be a control center in the intelligent security system and is realized by the aid of different types of monitoring components in the intelligent security system. The intelligent security system is a system for monitoring abnormal conditions in a building, and the monitoring components can be monitoring equipment which is arranged on different floors and different positions in the building and is used for implementing daily monitoring.
The process flow shown in fig. 1 will be described in detail below with reference to specific embodiments, and the contents may be as follows:
s101: and after receiving the abnormal alarm signal, identifying the signal type of the abnormal alarm signal and the carried monitoring component identifier.
In implementation, the abnormal alarm signal may be generated and sent by the monitoring component that recognizes the abnormal condition, each monitoring component carries a unique monitoring component identifier, and the type information and the address information of the corresponding monitoring component are recorded in the monitoring component identifier. After receiving the abnormal alarm signal, the control center can identify the signal type of the abnormal alarm signal and the carried monitoring component identifier.
In the present embodiment, the abnormal alert signal may include both the fire alert signal and the burglar alarm signal types.
The monitoring assembly may include smoke alarms distributed throughout the building, and quantity monitoring devices located at entrances to various floors of the building. The quantity monitoring device can be an intelligent passenger flow counter and is used for counting the number of the detained people on each floor in real time. In the monitoring process, after the smoke alarm is triggered by smoke, a fire alarm signal is sent to the control center.
The monitoring assembly may further include an anti-theft alarm lock and an image capture device disposed at each storage facility, wherein the image capture device may be a camera. When the anti-theft alarm lock is violently unlocked or forcibly opened, an anti-theft alarm signal is sent to the control center.
S102: and marking the abnormal region according to the identification result and generating an abnormal region map.
In particular, the monitoring component identification reflects the specific location of the corresponding monitoring component and its monitoring area in the building. After identifying the monitoring component identification carried by the abnormal alarm signal, the control center can further confirm the specific position of the monitoring area corresponding to the identified monitoring component identification, thereby marking the abnormal area and generating an abnormal area map.
In the implementation, a building overall map is prestored in the control center, and monitoring areas corresponding to the monitoring components are recorded in the building overall map, which may be specifically as shown in table 1:
Figure DEST_PATH_IMAGE001
it should be noted that the corresponding relationships in table 1 are shown in the form of a map in the whole building map, and for convenience of description, the corresponding relationships are illustrated in a table.
After identifying the monitoring component identifier in the abnormal alarm signal, the control center identifies the monitoring component corresponding to the monitoring component identifier. And then, the control center extracts a pre-stored building overall map, and marks the monitoring area corresponding to the monitoring component as an abnormal area in the building overall map. Then, the control center generates an abnormality occurrence area map in which the abnormality occurrence area is marked.
S103: and controlling a target monitoring component associated with the abnormal area to acquire and feed back the real-time condition information.
Specifically, after the control center identifies the abnormal occurrence region and the signal type of the abnormal alarm signal, the control center confirms which monitoring components are specifically included in the target monitoring component associated with the abnormal occurrence region according to the identified signal type, and sends a real-time status acquisition signal to the target monitoring component, and after receiving the real-time status acquisition signal, the target monitoring component acquires the real-time status information at the current moment and feeds the real-time status information back to the control center.
In implementation, when the abnormal alarm signal is a fire alarm signal, the target monitoring component is a number monitoring device, the real-time condition acquisition signal is a number of people staying, and the real-time condition information is the number of people staying. And the control center identifies at least one floor corresponding to the monitoring area marked as the abnormal occurrence area and marks the floor as a disaster-stricken floor. Thereafter, the control center identifies all of the quantity monitoring devices corresponding to the disaster-stricken floors, wherein the quantity of the quantity monitoring devices per floor is determined according to the quantity of the entrances and exits of the floor. The specific correspondence may be as shown in table 2:
Figure 397808DEST_PATH_IMAGE002
and then, the control center sends a remaining number of people to all the number monitoring devices corresponding to the disaster-stricken floors, and the number monitoring devices feed back the number of the remaining people at the current time node to the control center after receiving the remaining number of people to obtain signals. The control center adds the feedback results of all the quantity monitoring devices belonging to the same floor, so that the total number of remaining people of each disaster-stricken floor at the current moment is obtained.
In implementation, when the abnormal alarm signal is an anti-theft alarm signal, the target monitoring component is an image acquisition device, the real-time condition acquisition signal is an image acquisition signal, and the real-time condition information is a real-time monitoring image. The control center identifies the image acquisition device corresponding to the monitoring area marked as the abnormal occurrence area, then sends an image acquisition signal to the corresponding image acquisition device, and the image acquisition device receiving the image acquisition signal acquires and feeds back a real-time monitoring image of the monitoring area at the current moment.
S104: and generating an abnormal alarm request according to the abnormal occurrence area map and the real-time condition information.
Specifically, when the abnormal alarm signal is a fire alarm signal, the control center generates an abnormal alarm request based on the abnormal occurrence area map generated in S102 and the total number of remaining persons calculated from the number of remaining persons in S103. The abnormal alarm request carries an abnormal occurrence area map and the total number of remaining people corresponding to each disaster-stricken floor.
And when the abnormal alarm signal is the anti-theft alarm signal, the control center generates an abnormal alarm request according to the abnormal occurrence area map generated in the S102 and the real-time monitoring image acquired in the S103. At this time, the abnormality alarm request carries the abnormality occurrence area map and the real-time monitoring image.
S105: and sending an abnormal alarm request to a preset abnormal state processing center.
The abnormal state processing center is a unit for processing an abnormal state. In this embodiment, the abnormal situation processing center includes a fire department, a security department, and the like.
When the abnormal alarm signal is a fire alarm signal, the control center sends the abnormal alarm request to the fire department, and fire fighters in the fire department can know the occurrence position of a fire through an abnormal occurrence area map and can know the total number of detained people on a disaster floor by checking the abnormal alarm request, so that the fire fighters can make a targeted solution.
When the abnormal alarm signal is the anti-theft alarm signal. The control center can send the abnormal alarm request to the security department, and staff of the security department can know the position of the accident of the theft event by checking the abnormal alarm request and can also know the image of nearby staff at the time of the accident by checking the real-time monitoring image, thereby being beneficial to formulating a targeted solution.
Further, since a fire with a small size may be extinguished on site in time, and there is no need for alarming, in another embodiment, in order to reduce the possibility of false alarm and save social resources, referring to fig. 2, in S102, a false alarm prevention process is further included, and at this time, the generation of the abnormal occurrence area map marked with the abnormal occurrence area specifically includes the following contents:
s201: and when the received abnormal alarm signals are identified to be fire alarm signals, identifying the number of the abnormal alarm signals with different monitoring component identifiers in a preset historical time.
The historical duration refers to a period of time before the abnormal alarm signal is received, the specific duration can be adjusted according to factors such as the environment humidity where the building is located, the distance between adjacent humidity alarms and the like, and the historical duration can be 5 minutes, 10 minutes and the like.
In implementation, after the control center marks the abnormal occurrence region according to the abnormal alarm signals received at the current moment, the control center identifies the number of the abnormal alarm signals with different monitoring component identifiers received in the historical duration.
When the number of the recognized numbers is not greater than a preset safety threshold, entering S202; when the number of identifications is greater than the preset safety threshold, S203 is entered. The preset safety threshold value is at least 2, the preset safety threshold value can be specifically set according to the distance between adjacent humidity alarms, when the distance between the adjacent humidity alarms is small, the value of the safety threshold value can be larger, and otherwise, the value of the safety threshold value can be smaller.
S202: and canceling the generation of the abnormal area map.
Specifically, when the number of the identified abnormal alarm signals with different monitoring component identifiers is not greater than the preset safety threshold, the possibility of false alarm of the smoke alarm at the moment or the possibility of fire being smaller and field extinguishing exists, in this case, the control center cancels generation of the abnormal occurrence area map, so that an abnormal alarm request cannot be generated in subsequent S104, and an abnormal alarm request cannot be sent to the abnormal state processing center.
S203: and identifying the monitoring components corresponding to all the monitoring component identifications, and marking the monitoring areas corresponding to all the monitoring components in the building overall map as abnormal areas.
In this case, all the abnormality occurrence areas are marked in the abnormality occurrence area map that is finally generated.
Further, in order to improve the prompt effect of the abnormal occurrence area map, in another embodiment, the abnormal alarm signal further carries a time identifier for indicating the generation time. At this time, the method further comprises the following steps:
when the control center identifies the abnormal alarm signal, the control center also identifies the time identifier carried by the abnormal alarm signal, so that the generation time sequence of all the abnormal alarm signals can be known, and the starting point and the spreading trend of the fire can be identified. The starting point of the fire refers to a monitoring area corresponding to the monitoring component corresponding to the abnormal alarm signal with the earliest generation time.
When the control center generates the abnormal occurrence region map, each corresponding abnormal occurrence region can be marked with different colors according to the sequence of the generation time of the corresponding abnormal alarm signal, for example, the darker the color is, the earlier the generation time is, so that the control center is helpful for fire fighters to make targeted solutions.
Optionally, in another embodiment, in order to ensure normal operation of the monitoring component, the control center may perform daily detection on the monitoring component, and the specific flow is as follows:
and the control center sends a state detection signal to each monitoring component at each detection time node according to a preset detection period, wherein each monitoring component corresponds to a unique component code. The detection period may be 1 time/day, 1 time/12 hours, etc.
On one hand, after receiving the state monitoring signal, the monitoring component can feed back a state feedback signal carrying the self component code, and the control center can judge the working state of the monitoring component by identifying whether the state feedback signal is abnormal or not. On the other hand, after the control center sends out the state monitoring signal, if the state feedback signal carrying a certain component code is not received within the preset response time, the control center can also judge that the monitoring component corresponding to the component code is abnormal.
After judging that the abnormal monitoring assembly exists, the control center can generate a maintenance request carrying the assembly code of the abnormal monitoring assembly, and the maintenance request is sent to a preset maintenance center, so that maintenance personnel can maintain the abnormal monitoring assembly in time.
Optionally, in another embodiment, in order to quickly cope with the abnormal condition, the intelligent security system may further include an execution component, which is set corresponding to the monitoring area and is used for implementing a processing measure. The execution assembly comprises different types such as a fire door, an audible and visual alarm, a fire nozzle, an access door and the like. Each monitoring area may be provided with a different category and number of executive components, and table 3 shows one possible executive component placement scheme:
Figure DEST_PATH_IMAGE003
correspondingly, referring to fig. 3, after the abnormality occurrence area is marked, the following contents are also included:
s301: and calling a preset safety plan table.
Wherein, a plurality of safety plans and corresponding trigger conditions are stored in the safety plan table: at least one execution component type and a to-be-executed process corresponding to each execution component type are recorded in each security plan. The specific correspondence may be as shown in table 4:
Figure 3364DEST_PATH_IMAGE004
s302: and judging the triggering conditions met by the abnormal alarm signals and extracting the corresponding safety plans.
In implementation, the control center judges the triggering condition met by the abnormal alarm signal according to the type of the identified abnormal alarm signal, so as to extract the corresponding safety plan.
S303: an execution component type of a target execution component associated with the exception-occurring region is identified.
Specifically, the target execution component is an execution component corresponding to the monitoring area marked as the abnormal occurrence area, and after the target execution component is identified, the control center identifies the respective execution component type of each target execution component.
S304: and sending a control instruction carrying processing to be executed to the target execution component of the corresponding type according to the identified type of the execution component.
In implementation, the control center confirms to-be-executed processing required to be executed by each target execution component according to the execution component type of each target execution component based on the safety plan table. The control center generates a control instruction which corresponds to the target execution component and carries the processing to be executed, and sends the control instruction to the corresponding target execution component, so that the execution component executes the operation recorded by the processing to be executed.
In the embodiment of the application, the monitoring component is used for monitoring the abnormal conditions in the building, the abnormal alarm signal is fed back to the control center when the abnormality occurs, the control center further generates the abnormal alarm request by identifying and processing the abnormal alarm signal, and the abnormal alarm request is sent to the abnormal processing center, so that the targeted processing measures can be made, and the efficiency of abnormal processing is improved.
Based on the method, the embodiment of the application further discloses an intelligent security system, and referring to fig. 4, the intelligent security system comprises a control center and a plurality of monitoring components for monitoring.
Wherein, the control center is used for: after receiving the abnormal alarm signal, identifying the signal type of the abnormal alarm signal and the carried monitoring component identifier;
marking an abnormal occurrence region according to the identification result and generating an abnormal occurrence region map;
controlling a target monitoring component associated with the abnormal occurrence area to acquire and feed back real-time condition information;
generating an abnormal alarm request according to the abnormal occurrence area map and the real-time condition information;
and sending an abnormal alarm request to a preset abnormal state processing center.
Optionally, the control center is specifically configured to: extracting a pre-stored building integral map;
identifying a monitoring component corresponding to the monitoring component identification, and marking a monitoring area corresponding to the monitoring component as an abnormal area in the building overall map;
an abnormality occurrence area map in which abnormality occurrence areas are marked is generated.
Optionally, when the control center identifies that the abnormal alarm signal is a fire alarm signal, the control center is specifically configured to: identifying the number of abnormal alarm signals with different monitoring component identifications in a preset historical time;
when the number of the recognized areas is not greater than a preset safety threshold value, canceling the generation of an abnormal area map;
when the number of the monitoring assemblies is larger than a preset safety threshold value, identifying the monitoring assemblies corresponding to all the monitoring assembly identifiers, and marking the monitoring areas corresponding to all the monitoring assemblies in the building overall map as abnormal areas;
and generating an abnormal area map marked with the abnormal area.
Optionally, when the control center identifies that the abnormal alarm signal is a fire alarm signal, the control center is specifically configured to: identifying at least one disaster-stricken floor corresponding to the abnormal occurrence area;
and sending a signal for acquiring the number of the remaining people to a target monitoring assembly preset on each disaster-stricken floor, so that the target monitoring assembly feeds back the number of the remaining people on each disaster-stricken floor.
Optionally, when the control center identifies that the abnormal alarm signal is the anti-theft alarm signal, the control center is specifically configured to: and sending an image acquisition signal to the target monitoring assembly in the abnormal occurrence area, so that the target monitoring assembly in the abnormal occurrence area acquires and feeds back the real-time monitoring image.
Optionally, the control center is further configured to: sending a state detection signal to a monitoring component according to a preset detection period;
acquiring a state feedback signal carrying a component code and fed back by a monitoring component;
when the condition feedback signal carrying the target component code is identified to be abnormal or the condition feedback signal carrying the target component code is not received within the preset response time, generating a maintenance request carrying the target component code;
and sending a maintenance request to a preset maintenance center.
Optionally, referring to fig. 4, the intelligent security system further includes different types of execution components, and the execution components are configured to implement different processing measures according to control of the control center. At this time, the control center is also configured to:
calling a preset safety plan table;
judging the triggering condition met by the abnormal alarm signal and extracting a corresponding safety plan;
identifying an execution component type of a target execution component associated with the exception-occurring region;
and sending a control instruction carrying processing to be executed to the target execution component of the corresponding type according to the identified type of the execution component.
Based on the method, the embodiment of the application further discloses a network device, wherein the network device comprises a memory and a processor, and the memory stores a computer program which can be loaded by the processor and executes the processing of the control center in the intelligent security management method based on the internet of things.
An embodiment of the present application further discloses a computer-readable storage medium, which stores a computer program that can be loaded by a processor and execute the foregoing intelligent security management method based on the internet of things, where the computer-readable storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above examples are only used to illustrate the technical solutions of the present application, and do not limit the scope of protection of the application. It is to be understood that the embodiments described are only some of the embodiments of the present application and not all of them. All other embodiments, which can be derived by a person skilled in the art from these embodiments without making any inventive step, are within the scope of the present application.

Claims (10)

1. An intelligent security management method based on the Internet of things is characterized in that the method is based on a control center in an intelligent security system, the intelligent security system further comprises monitoring components of different types, and the method comprises the following steps:
after receiving an abnormal alarm signal, identifying the signal type of the abnormal alarm signal and the carried monitoring component identifier;
marking an abnormal occurrence region according to the identification result and generating an abnormal occurrence region map;
controlling a target monitoring component associated with the abnormal occurrence area to acquire and feed back real-time condition information;
generating an abnormal alarm request according to the abnormal occurrence area map and the real-time condition information;
and sending the abnormal alarm request to a preset abnormal state processing center.
2. The intelligent security management method based on the internet of things according to claim 1, wherein according to the identification result, the abnormal occurrence region is marked and an abnormal occurrence region map is generated, and the method specifically comprises the following steps:
extracting a pre-stored building overall map, wherein monitoring areas corresponding to the monitoring components are recorded in the building overall map;
identifying a monitoring component corresponding to the monitoring component identification, and marking a monitoring area corresponding to the monitoring component as an abnormal area in the building overall map;
and generating an abnormal area map marked with the abnormal area.
3. The intelligent security management method based on the internet of things of claim 2, wherein when it is identified that the abnormal alarm signal is a fire alarm signal, the generating of the abnormal occurrence area map marked with the abnormal occurrence area specifically comprises:
identifying the number of abnormal alarm signals with different monitoring component identifications in a preset historical time;
when the number of the recognized areas is not greater than a preset safety threshold value, canceling the generation of the abnormal area map;
when the number of the monitoring components is larger than a preset safety threshold value, identifying the monitoring components corresponding to the monitoring component identifiers, and marking the monitoring areas corresponding to the monitoring components in the building overall map as abnormal areas;
and generating an abnormal area map marked with all the abnormal areas.
4. The intelligent security management method based on the internet of things of claim 1, wherein when it is recognized that the abnormal alarm signal is a fire alarm signal, the controlling the target monitoring component associated with the abnormal occurrence area to generate and feed back real-time status information specifically comprises:
identifying at least one disaster-stricken floor corresponding to the abnormal occurrence area;
and sending a signal for acquiring the number of the remaining people to a target monitoring assembly preset on each disaster-stricken floor, so that the target monitoring assembly feeds back the number of the remaining people on each disaster-stricken floor.
5. The intelligent security management method based on the internet of things of claim 1, wherein when the abnormal alarm signal is identified as an anti-theft alarm signal, the controlling the target monitoring component associated with the abnormal occurrence area to generate and feed back real-time status information specifically comprises:
and sending an image acquisition signal to the target monitoring assembly in the abnormal occurrence area, so that the target monitoring assembly in the abnormal occurrence area acquires and feeds back a real-time monitoring image.
6. The intelligent security management method based on the internet of things of claim 1, wherein the method further comprises the following steps:
sending a state detection signal to the monitoring component according to a preset detection period;
acquiring a state feedback signal carrying a component code and fed back by the monitoring component;
when the condition feedback signal carrying the target component code is identified to be abnormal or the condition feedback signal carrying the target component code is not received within a preset response time, generating a maintenance request carrying the target component code;
and sending the maintenance request to a preset maintenance center.
7. The Internet of things-based intelligent security management method according to claim 1, wherein the intelligent security system further comprises different types of execution components; after the identifying an abnormal occurrence region and generating an abnormal occurrence region map according to the monitoring component identifier, the method further comprises the following steps:
calling a preset safety plan table, wherein a plurality of safety plans and corresponding trigger conditions are stored in the safety plan table: at least one execution component type and to-be-executed processing corresponding to each execution component type are recorded in each safety plan;
judging the triggering conditions met by the abnormal alarm signals and extracting corresponding safety plans;
identifying an execution component type of a target execution component associated with the exception-occurring region;
and sending a control instruction carrying the to-be-executed processing to a target execution component of a corresponding type according to the identified type of the execution component.
8. An intelligent security system is characterized by comprising a control center and monitoring components of different categories, wherein the control center is used for monitoring the monitoring components;
after receiving an abnormal alarm signal, identifying the signal type of the abnormal alarm signal and the carried monitoring component identifier;
marking an abnormal occurrence region according to the identification result and generating an abnormal occurrence region map;
controlling a target monitoring component associated with the abnormal occurrence area to acquire and feed back real-time condition information;
generating an abnormal alarm request according to the abnormal occurrence area map and the real-time condition information;
and sending the abnormal alarm request to a preset abnormal state processing center.
9. A network device comprising a memory and a processor, the memory having stored thereon a computer program that can be loaded by the processor and that executes a process by a control center according to any one of the methods of claims 1 to 7.
10. A computer-readable storage medium, in which a computer program is stored which can be loaded by a processor and which executes the method of any one of claims 1 to 7.
CN202110753906.0A 2021-07-03 2021-07-03 Intelligent security management method and system based on Internet of things and storage medium Pending CN113470302A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110753906.0A CN113470302A (en) 2021-07-03 2021-07-03 Intelligent security management method and system based on Internet of things and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110753906.0A CN113470302A (en) 2021-07-03 2021-07-03 Intelligent security management method and system based on Internet of things and storage medium

Publications (1)

Publication Number Publication Date
CN113470302A true CN113470302A (en) 2021-10-01

Family

ID=77877702

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110753906.0A Pending CN113470302A (en) 2021-07-03 2021-07-03 Intelligent security management method and system based on Internet of things and storage medium

Country Status (1)

Country Link
CN (1) CN113470302A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115933427A (en) * 2023-02-28 2023-04-07 协同安全科技(深圳)有限公司 Home security linkage handling method, device, equipment and storage medium
CN117408680A (en) * 2023-12-14 2024-01-16 安徽常力达电气有限公司 Intelligent power distribution room management method and system based on Internet of things

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070273497A1 (en) * 2006-05-24 2007-11-29 Tekuya Kuroda Security monitoring device, security monitoring system and security monitoring method
CN205788615U (en) * 2016-05-25 2016-12-07 北京易方通达科技有限公司 A kind of temperature monitoring caution device and fire-fighting caution system
CN109493555A (en) * 2018-12-05 2019-03-19 郑州升达经贸管理学院 A kind of campus dormitory building safety defense monitoring system based on intelligent monitoring technology
CN112044006A (en) * 2020-08-28 2020-12-08 深圳市富思源智慧消防股份有限公司 Monitoring fire-fighting system for building
CN112712669A (en) * 2020-12-24 2021-04-27 广东名盾保安集团有限公司 Anti-theft and fire-proof management method and system
CN112767624A (en) * 2020-12-18 2021-05-07 山东盛帆蓝海电气有限公司 Intelligent building safety joint defense system and method based on communication network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070273497A1 (en) * 2006-05-24 2007-11-29 Tekuya Kuroda Security monitoring device, security monitoring system and security monitoring method
CN205788615U (en) * 2016-05-25 2016-12-07 北京易方通达科技有限公司 A kind of temperature monitoring caution device and fire-fighting caution system
CN109493555A (en) * 2018-12-05 2019-03-19 郑州升达经贸管理学院 A kind of campus dormitory building safety defense monitoring system based on intelligent monitoring technology
CN112044006A (en) * 2020-08-28 2020-12-08 深圳市富思源智慧消防股份有限公司 Monitoring fire-fighting system for building
CN112767624A (en) * 2020-12-18 2021-05-07 山东盛帆蓝海电气有限公司 Intelligent building safety joint defense system and method based on communication network
CN112712669A (en) * 2020-12-24 2021-04-27 广东名盾保安集团有限公司 Anti-theft and fire-proof management method and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115933427A (en) * 2023-02-28 2023-04-07 协同安全科技(深圳)有限公司 Home security linkage handling method, device, equipment and storage medium
CN117408680A (en) * 2023-12-14 2024-01-16 安徽常力达电气有限公司 Intelligent power distribution room management method and system based on Internet of things
CN117408680B (en) * 2023-12-14 2024-03-19 安徽常力达电气有限公司 Intelligent power distribution room management method and system based on Internet of things

Similar Documents

Publication Publication Date Title
CN113470302A (en) Intelligent security management method and system based on Internet of things and storage medium
CN107680220A (en) A kind of operation unlawful practice intelligent identification Method based on machine vision technique
CN111539861B (en) Fire emergency treatment method, fire emergency treatment device, computer equipment and storage medium
CN112349015B (en) Shelter management and control system and method based on Internet of things
CN113066247A (en) Intelligent monitoring system for operation of power distribution room based on cloud edge cooperation
CN112447033A (en) Security data processing method and system, computer equipment and storage medium
CN111539862B (en) Emergency processing method and device based on individual dispatch and computer equipment
US20210200808A1 (en) Prison monitoring intelligent control method with comparative analysis function
CN112381435A (en) Gridding directional pushing management method for dynamic risk in hydropower station operation process
CN107895453A (en) Building safety warning system and method
EP2656322B1 (en) Intrusion detection
CN114326468A (en) Wisdom fire control remote monitering system based on thing networking
CN111613034A (en) Fire-fighting monitoring control method and system
CN110533867A (en) Fire monitoring alarm system
CN107644506A (en) A kind of intelligent security protection system
WO2020229498A1 (en) Method and system for monitoring course of work
KR20190075296A (en) Building control system through detection of dangerous behavior pattern
CN209357110U (en) A kind of radioactive source managing and control system
CN114281656A (en) Intelligent central control system
JPH0836685A (en) Security device and security system
CN112800896A (en) Security emergency measure self-response method and system based on knowledge graph
CN110895686A (en) On-duty identification method for special person of fire-fighting person
WO2019224116A2 (en) Fire alarm system integration
WO2018152723A1 (en) Home security and protection robot and control method therefor
CN110503795B (en) Fire rescue response system based on aircraft

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination