CN102209073A - IOT (Internet of Things)-based Linux operation-level comprehensive security management platform - Google Patents

IOT (Internet of Things)-based Linux operation-level comprehensive security management platform Download PDF

Info

Publication number
CN102209073A
CN102209073A CN2011101326033A CN201110132603A CN102209073A CN 102209073 A CN102209073 A CN 102209073A CN 2011101326033 A CN2011101326033 A CN 2011101326033A CN 201110132603 A CN201110132603 A CN 201110132603A CN 102209073 A CN102209073 A CN 102209073A
Authority
CN
China
Prior art keywords
video
management module
module
internet
management platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011101326033A
Other languages
Chinese (zh)
Other versions
CN102209073B (en
Inventor
黄鑫
蒋智广
罗道渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN SUPERSIGHT TECHNOLOGY CO LTD
Original Assignee
SHENZHEN SUPERSIGHT TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN SUPERSIGHT TECHNOLOGY CO LTD filed Critical SHENZHEN SUPERSIGHT TECHNOLOGY CO LTD
Priority to CN201110132603.3A priority Critical patent/CN102209073B/en
Publication of CN102209073A publication Critical patent/CN102209073A/en
Application granted granted Critical
Publication of CN102209073B publication Critical patent/CN102209073B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Alarm Systems (AREA)

Abstract

The invention provides an IOT (Internet of Things)-based Linux operation-level comprehensive security management platform, relating to the technical field of security management systems. The IOT-based Linux operation-level comprehensive security management platform is provided for solving the problem that the traditional comprehensive security management platform with a single video function can be checked passively only, cannot perform active intelligent analysis, fails to realize equipment interconnection, has poor stability, can be damaged easily because of viruses, system bugs and holes, man-made misoperation and the like. The IOT-based Linux operation-level comprehensive security management platform comprises an operation service management module, a video management module, a client software module, an inductor management module and an alarm linkage plan management module, wherein the operation service management module is a main server of the comprehensive security management platform and is used for bridging other service modules, managing all equipment connected with the comprehensive security management platform and carrying out communication and synchronization with other management servers. The IOT-based Linux operation-level comprehensive security management platform has the advantages of good stability, high safety and reliability, good compatibility and powerful centralized management function.

Description

The comprehensive safeguard management platform of Linux operation level based on Internet of Things
Technical field
The present invention relates to the security-protection management system technical field.
Background technology
At present, the application apparatus manufacturing enterprise and the system integration number of the enterprise of China's Internet of Things industry are more, and a little less than software development, chip design manufacturing and the application relative thin, the industrial chain development is also unbalanced, still is in the eve by quantitative change to qualitative change.Compare with legacy network, information security, network security, data security and even national security problem that the Internet of Things development brings will be more outstanding, and existing protecting information safety system will face more stern challenge.Compare with traditional the Internet, Internet of Things has its distinct feature, its objective is to realize thing and thing, thing and people, and all article are connected with network, convenient identification, management and control.At first, it is the extensive use of various cognition technologies.The Internet of Things deploy polytype transducer of magnanimity, each transducer all is an information source, the information content that different classes of transducer is caught is different with information format.The data that transducer obtains have real-time, by the collection environmental information of certain frequency period, bring in constant renewal in data.Secondly, it is a kind of foundation Ubiquitous Network on the internet.The important foundation of technology of Internet of things and core still are the Internets, by various wired and wireless network and the Internet converged, the information of object are passed real-time and accurately.The informational needs of the transducer timing acquiring on Internet of Things because its quantity is extremely huge, has formed magnanimity information by Network Transmission.
Along with the construction of projects such as safe city, and the popularizing of notions such as intelligent transportation, city management, the paces that Internet of Things enters safety-security area also accelerate thereupon, and expedite the emergence of out more sector application.
Nowadays, the application of Internet of Things industry spreads all over a plurality of fields such as national security, city management, intelligent transportation, environmental protection, community's strick precaution, public safety, tele-medicine.The expert estimates, will develop into the complete industrial chain of trillion yuan scale at following Internet of Things, and be penetrated into the every aspect of people's productive life.The security protection industry is occupied very large space in Internet of Things is used, have the insider to point out, wherein the application of core is exactly a video monitoring the most.
Video monitoring is laid the basis of aspects such as certain technology and hardware as one of key areas of security protection industry for the topmost technological difficulties of " video-aware " this Internet of Things.Simultaneously, the field that traditional video surveillance is defended tenaciously has also been broken in the rise of technology of Internet of things and development, has introduced information system management more profound, higher degree on the one hand, sets up the management platform that can share, has solved the problem that interconnects between all departments; Internet of Things will make existing safety defense monitoring system rise to more intelligentized aspect on the other hand, no matter still use from collection, the management of video, all will handle by intellectual technology is more effective.The Internet of Things conception development will make video monitoring stride forward towards intellectuality, digitlization, informationalized direction.
A large-scale security protection integrated management operation platform, need to solve that monitoring range is wide, device category is various, number of devices is many, monitor terminal is many, user management is difficult, the multiple needs of problems such as expansion in the use, this just needs a kind of devices interconnect technology of maturation, and the appearance of Internet of Things has perfectly solved this problem, and Internet of Things is the important component part of generation information technology.And the stability of service software is just most important, present most of platform software all is based on the application of Windows operating system, though Windows operating system is to use the most general operating system, but a little less than but being highly brittle, be easy to because virus, system vulnerability, people to be misoperation etc. multiple former thereby destroyed, so allow the service system of monitor supervision platform software can be more stable, use the built-in Linux operating system of specialty just to become and be necessary very much as the service software operation platform.
Summary of the invention
In sum, of the present invention mainly is to have only single video capability in order to solve existing security protection integrated management operation platform, can only passive examining, intellectual analysis initiatively, can't realize devices interconnect, poor stability be multiple former thereby ruined technical problems such as misoperation because of virus, system vulnerability, people easily, and a kind of Linux based on Internet of Things that proposes is runed comprehensively safeguard management platform of level.
For solving technical problem proposed by the invention, the technical scheme that adopts is: based on the comprehensive safeguard management platform of Linux operation level of Internet of Things, it is characterized in that, include operation service management module, video management module, client software module, inductor management module and alarm linkage program management module; The operation service management module, master server for described comprehensive safeguard management platform, above-mentioned remaining each service module that has been used for bridge joint is used to manage all equipment of being connected with described comprehensive safeguard management platform and carries out communication and synchronously with other management server; The video management module, be used for forwarding stream media data between different segment, realization is forwarded the transparency of Streaming Media position, when a plurality of clients need be visited same long-range picture simultaneously, between service of transmitting and front end video channel, only take the Internet resources of a bandwidth chahnel, by forwarding server stream medium data is distributed to plural client again, and with the video file centralized stores in server; The client software module, be installed in the client, for finally being presented in face of the user, the module that supplies the user to manipulate, the client software module is by carrying out communication with each serviced component, the function that is used to realize includes: show real-time video and playback video recording, the action of control The Cloud Terrace camera lens, control warning input and output policer operation, and external equipment and user authority management function, and by the SmartClient technology of Microsoft, the user can operate and manage by IE mode access platform software in any place; Inductor management module is used for being connected with inductor, and networks with the independently warning subsystem that is dispersed in each place, and any one subsystem is carried out controlling alarm; Alarm linkage program management module is used for automatically performing the warning prediction scheme that sets in advance and carrying out combined operation when reporting to the police triggering.
Also include and run the support multistage multilayer multifile electronic chart that service management module is connected and the GPS map locating module of generalized information system; GPS map locating module is used for directly the dynamic object control point being upgraded in time and providing positional information, realizes the dynamic monitoring to the dynamic object control point, and retrieve for examination, setting, alarm linkage operation.
Also include and run the sensor management module that service management module is connected; The sensor management module is used for analog acquisition equipment is managed, and carries out self-defining warning by default high alarm setting and lower limit and handles.
Also include and run the entrance guard management module that service management module is connected; The entrance guard management module, the connected independently gate inhibition subsystem that is dispersed in each place is networked, realization shows on off state and the alarm condition of all in real time to the State Control of any of front end, and open the door and the interlock of abnormal alarm of default every fan door are moved.
Described default every fan door open the door and the interlock action of abnormal alarm includes: swiping the card opens the door ejects image, break in video wall switches image, the overtime self-defined auditory tone cues of not closing the door.
Also include and run the cell phone software module that service management module is connected;
The cell phone software module is used for setting up wireless telecommunications with mobile phone and is connected, and realizes video transmission between operation service management module and mobile phone, receives the operation control command that the mobile phone end sends, and alarm linkage.
Also include and run the intelligent analysis module that service management module is connected; Intelligent analysis module, be used for magnanimity vedio data object appearing according to the pre-conditioned analysis and judgement of carrying out, filter out garbage and interfere information in the image, automatically analyze, extract the crucial useful information in the video source, and directly trigger and report to the police, the alarm linkage prediction scheme that interlock is default.
The described inductor that is connected with inductor management module includes: Infrared Detectors, circumference detector, fence detector, cigarette sense, curtain wall.
Described warning prediction scheme include any one subsystem reported to the police deploy troops on garrison duty, withdraw a garrison, opening, closing of output reported to the police, reported to the police in bypass, removing, demonstrate place of alarm, title, type, Sub-System Number, the anti-area code of warning, and carry out combined operation according to the warning prediction scheme that sets in advance automatically.
Described combined operation includes: video eject to play, plays that specified voice, broadcasts of video group, the taking turn of video group, interlink warning output, warning cloth are withdrawn a garrison, video wall switches, the interlock cradle head preset positions, cruise, send SMS, the demonstration of LED screen and printer prints.
Beneficial effect of the present invention is: security protection integrated management operation platform of the present invention is based on linux system, and good stability is safe and reliable.Now domestic ripe professional video monitoring management platform software substantially all is based on the application of Windows operating system, though Windows operating system is to use the most general operating system, but a little less than but being highly brittle, very dangerous, compare with the fail safe of (SuSE) Linux OS, mainly contain following some difference:
One, Mo Ren security set
Be born with and be designed to a multi-user's operating system in the linux system sky.Therefore, even if certain user wants to carry out malicious sabotage, the first floor system file still can be protected.If, under very unfortunate situation, there is any long-range malicious code in system, to be performed, the harm that it brings also will be limited among the slight part.What form distinct contrast with it is the Windows XP system of Microsoft.Here, the user can give tacit consent to the login of system manager's identity, and any infringement that is taken place in system, all can rapid spread among whole system.Up-to-date Windows Vista system of Microsoft allows user's identity with limited users under default setting login, so it is a little safer more than the predecessor of oneself.
Two, modularized design
What linux system adopted is modularized design.This expression, if unwanted words, you can be deleted any one system component.A benefit of bringing therefrom is that if the user feels that certain part of linux system is not too safe, he just can remove this assembly.This is mysterious only not for the Windows system.Such as if I feel the linux system for oneself, the Firefox web browser is a weakest link, and I can delete it fully, substitute with other web browser, such as Opera.And in the middle of the Windows system, even if dissatisfied again, I also can't replace the Internet Explorer web browser of Microsoft.
Three, system mend management
In the Windows of Microsoft system, automatic refresh routine those assemblies that provided by official of Microsoft of only can upgrading.And third-party application program can not obtain repairing.Thereby third-party application program brings a large amount of potential safety hazards may for your system.Are you using Real player player? you need to upgrade separately it.Do you use Flash? you still need to upgrade separately.The rest may be inferred, and for application programs all on the computer, you need termly each software to be upgraded upgrading separately.Very loaded down with trivial details of this method, and make the people vexed, and most user forgets this work to having gone beyond the highest heavens soon.And in linux system, when you at automatic update system the time, its is all software in upgrade-system simultaneously.In the Ubuntu system, any software product that you downloaded all can appear in the middle of the program warehouse of system, upgrade it, and you only need click with mouse.And in other Linux release version, if downloaded software does not appear in the program warehouse of system, add it also is very easy.Such design has greatly improved the enthusiasm of user's real-time update system.
Four, attack defending on the zero
It is perfectly safe that this is not representing yet even if you can guarantee the system's real-time update of oneself! Attack on the zero referred to before the renewal patch of software production firm issue at leak, just tried to be the first and utilized this leak to start the attack pattern of network attack) becoming is becoming increasingly rampant.In addition, an investigation also shows: for the assailant, they only need 6 day time just can develop malicious attack code at leak, and software production firms need to spend the much longer time and can release corresponding renewal patch.Therefore, the wise and farsighted security strategy of a cover is defending attack on the zero most important.The Windows XP system of Microsoft does not provide such cover defense mechanism.And new Vista system under the protected mode state, though certain effect is arranged, also can only provide a bit limited protection to the attack at Internet Explorer web browser.No matter correspondingly with it be, be the Remote code intrusion of which kind of type, and AppArmor or SELinux can both provide careful and thorough protection for system.Increasing main flow Linux release version is arranged, in system, all give tacit consent to and integrated ppArmor (for example, SuSE, Ubuntu Gutsy) or SELinux (Fedora, Debian Etch, Yellow Dog).Even if for other release version, the user also can download and install this two covers software from network easily.
Five, development sources code framework
In linux system, when talking about security of system, the words describes, is again only suitable with " what you saw is exactly that you are resulting ".Open source code means that any possible software vulnerability all will be seen by " countless eyes eyeball ", and obtain fast as far as possible reparation.And the more important thing is that this also means simultaneously, here without any the reclamation activities that is hidden.As the user,, just can find out the existing safety problem of own system, and take the corresponding precautionary measures to tackle potential security threat, even if this leak is not also repaired at this moment as long as you have the inclination.And in the middle of the Windows world, have a lot of safety problems all to be covered up.The software vulnerability that Microsoft is found inside be to allow the external world know, and just in next one renewal AKU it being repaired dumbly that they thought is just passable.Do to allow the software vulnerability number that is disclosed still less although it is so, and allow some leak can not utilized on a large scale, but the eyes that this way has also been hoodwinked the user simultaneously.The result who is caused is thus, and the user can not upgrade to system probably energetically, does not exist which type of leak because he does not understand the system of oneself, and the harm size of these leaks, and the result can become the victim of malicious attack on the contrary.
Six, diversified system environments
The system environments of Windows can be described as stereotyped.This huge consistency allows assailants seem handy when writing the more suchlike things of malicious code, virus or other.Conversely, have a look at the linux system world.Here, application program can be .deb .rpm, or source code, and other is suchlike or the like.This otherness allows assailants be difficult in linux system and obtains extensive influence as the Windows system on one's body.
Fail safe by top some Windows system and linux system is compared, can very clear and definite reaching a conclusion, allow the service system of monitor supervision platform software can be more stable, use the built-in Linux operating system of specialty just to become and be necessary very much as the service software operation platform.
The present invention is mainly used in all kinds of large complicated networking monitoring projects, can carry out the management of simple and effective to all very complicated various systems of value volume and range of product, various kinds of equipment, various accidents, alert information are effectively grasped, to the scheduling integration intuitively rapidly of various resources, the function of required powerful comprehensive command and management is used in prediction scheme processing, emergency command etc. thereby the realization video-frequency networking is monitored in real time, reported to the police.
Beneficial effect of the present invention also includes:
(1) powerful compatibility
The safety precaution platform of operation level is certain to exist the vision hardware equipment of the multiple model of multiple brand, and because each hardware supplier does not have the unified interface of standard, compressed format is also different, this just require management software system can be to the greatest extent can the compatible how tame manufacturer in ground hardware, reduce overlapping investment thereby maximally utilise client's existing resource, the present invention is the almost compatible vision hardware equipment of all main brands in the market.As: Haikang, big China, uprightly, bright speed greatly, Chinese nation, the Yellow River, permanent hundred million, wave-particle, merchant's peace, field, Wei Lunte, peace news scholar, Bosch, Sony, Panasonic, advanced video signal, world great achievement, red apple, Infinova, scape sun, 30 triumphant skies, Arecont Vision, D-LINK, GE etc.
(2) powerful centralized management function
The present invention can carry out the remote parameter configuration to the digital hard disk recording server (DVS) in the network, embedded DVS, network video server (NVS), web camera products such as (IP Camera or Network Camera), long-distance video control, the distance host operating state detects, long-range cloth is withdrawn a garrison, multistage electronic chart and network virtual matrix, reports to the police centralized management such as to report.
(3) Streaming Media forwarding capability efficiently
Can be under limited bandwidth, by the P2P technology, it is stable and effectively transmit media data between different telecom operators network to guarantee that sound is looked data such as stream, realization is forwarded the transparency of medium position, the stream medium data repeater system is mainly realized the image channel data of the server in the same environment lower network and control command are carried out unified management, and the authority of center-side visit managed, played and in limited Internet resources, carried out Bandwidth Management, routing management.
(4) perfect authentification of user management system
Adopt perfect concentrated authentification of user management mode, adopt rational priority and collision detection mechanism to take precautions against monitoring, the regulatory requirement of multi-user in the platform to satisfy the operation level security; By of the conflict of streaming media video forwarding server, effectively utilize the network bandwidth in addition with solution bandwidth, cross operator network and multi-user access.
(5) centralized stores and retrieval
The centralized stores of video file data and dispersion storage each tool advantage for different monitoring is used.And also be a present problem facing of each supplier for carrying cost, storage medium, storage mode, memory capacity and reliability.And the problems such as safe and redundancy backup of video recording data information also are to consider.Systems soft ware is supported DAS, NAS and the SAN storage networking of multiple storage mediums such as IDE, SATA, SCSI, optical fiber, satisfies the storage demand in the different application.
(6) general monitoring mobile phone system
On the mobile phone of main flow (as Saipan, apple, Android, Microsoft) realizes feature operations such as video transmission, video switch, cradle head control, alarming short message reception by various wireless signals (GPRS, CDMA, 3G, WIFI).The user can be at any time by any one tunnel video that has authority to see in the mobile phone monitoring system, the operations such as platform control of racking of going forward side by side.Various accidents be can in the very first time, check, handle, telemanagement and commander, inspection, supervision, co-ordination realized.
(7) intellectual analysis function
In large-scale monitoring project, in the face of the magnanimity video, magnanimity information, check and transmit the burden that becomes digital security protection without any the insignificant video that filters, by the intellectual analysis functional module, can invade the security area, the invasion warning line, abandon, parking violation, article are moved, pace up and down, fall down to the ground, strenuous exercise, colony's incident, the sentry, actions such as smog detect, and after object appearing in the video carried out analysis and judgement, filter out garbage and interfere information in the image, automatically analyze, extract the crucial useful information in the video source, and directly trigger and report to the police, the interlock picture ejects, sound alarm, warning prediction schemes such as note transmission.
(8) expanded function of system
Expanded function is extremely important in the safety precaution platform of operation level, " ultraphotic " monitor supervision platform software passes through technology of Internet of things, can manage expanding systems such as gate control system, fire-fighting system, EMS, warning system, monitoring mobile phone system, intelligent analysis system, LED delivery system, GPS global positioning systems, and link with video system.
Description of drawings
Fig. 1 is an architectural schematic of the present invention;
Fig. 2 is applied to system architecture diagram in the Internet of Things for the present invention.
Embodiment
Below in conjunction with accompanying drawing and preferred specific embodiment the present invention is further described:
Said Internet of Things among the present invention (Internet of Things) refers to end-equipment (Devices) and the facility (Facilities) with ubiquitous (Ubiquitous), comprise the transducer that possesses " inherent intelligence ", portable terminal, industrial system, building control system, the home intelligent facility, video monitoring system etc., " external enabling " (Enabled), as stick the sundry assets (Assets) of RFID, carry the individual of wireless terminal and vehicle or the like " intelligent object or animal " or " SMART DUST " (Mote), realize interconnecting (M2M) by various wireless and/or wired long distance and/or short distance communication networks, use integrated greatly (Grand Integration), and based on the SaaS of cloud computing operation isotype, at Intranet (Intranet), private network (Extranet), and/or under the Internet (Internet) environment, adopt suitable security assurance information mechanism, provide safety controlled and even personalized real time on-line monitoring, the location is reviewed, alarm linkage, dispatch control, program management, Long-distance Control, safety precaution, long-range repair and maintenance, online upgrading, statistical report form, decision support, leader's desktop management and service functions such as (concentrating the Cockpit Dashboard that shows), realization is integrated to " pipe; control; battalion " of " efficient; energy-conservation; safety; environmental protection " of " all things on earth ".
Shown in seeing figures.1.and.2, the present invention is based on Internet of Things, by the cross-platform best Java platform of doing, use state-of-the-art technologies such as 3G, sensing net, global positioning system .Net, WebService, XML, SmartClient, realize in the modularization programming mode, collocation by disparate modules is used, but flexible Application is in the safety precaution project of various different application, and by the Java platform, can be implemented under the multisystems such as Windows, Linux, Unix and use, improve stability, portability and the retractility of system to greatest extent.
Software platform architecture of the present invention is divided into three levels, minimum one deck down is a hardware abstraction layer, purpose is the unified interface that the relevant device class is provided to different DVR and other equipment, manages, disposes, retrieves all equipment for entire system unified standard is provided; Top one deck is a platform, and terrace part comprises two parts, and a part is basic service, and another part is based on the design tool of these services.Topmost one deck is the application of framework on platform, these are used the basic service unanimity of usage platforms, finish function reliably, efficiently, neatly, and the instrument that platform provides can allow User Defined, create certainly, a lot of business function and flow processs relevant of combination certainly with user's specific transactions.
The division of level we can say any one complexity, through the most basic architectural model of software systems of good design, such as operating system and network layer model, the middleware and the application server of main flow are there's no one who doesn't or isn't like this in the market.These architectures adopt in some outstanding large-scale IT softwares at home to some extent, but the overwhelming majority at home monitors the software in field and does not do like this, the at first traditional monitoring software exploitation unit that traces it to its cause can not stand in one and treats product design in conjunction with professional overall angle, be the ability that general these units do not possess the abstract summary of large-scale IT software systems in addition, relate to the grasp and the fusion problem of aspect technology such as diverse network, video, cluster, analytical model, artificial intelligence and language parsing at last in addition.
Need to prove in addition, the all functions that platform and system provide all provide external interface by the international standard of WebService, this can carry out between xenogenesis operating system, xenogenesis language.
The service of system all is the service object that the intermediate layer by three-decker provides.Any behavior of system all needs the authentication through administrative center, and system provides the access control model based on the role to provide powerful and safety assurance flexibly.In case some access right has been revised by administrative center, these changes will be reflected in any once-through operation of Any user immediately.The behavioural norm of all constituents, strategy are also in administrative center's definition in the system, and this just means that you can be the local any behaviors that change whole system.
The present invention is based on the comprehensive safeguard management platform of Linux operation level of Internet of Things, and chief component includes: operation service management module, video management module, GPS map locating module, client software module, inductor management module, sensor management module, entrance guard management module, cell phone software module, intelligent analysis module and alarm linkage program management module.
1, operation service management module
The operation service management module is the core of system, it is the master server of whole system, bridge joint other each service module, can use any one database to come storing data information, as Oracle, SQLServer2000/2005, Mysql, PostgreSQL,, JavaDB, sybase, informix, db2, sqllite, access etc., be mainly used in all equipment of management system platform and carry out communication and synchronously with other management server.Can realize the management such as configuration, equipment routing inspection and real time access control of authority of mechanism, personnel, equipment, task, warning, daily record etc. to the digital remote video equipment.
2, video management module
When a plurality of clients need be checked the same frame of certain control point simultaneously, will certainly cause the data congestion on a communication network circuit, the serious waste Internet resources.The present invention can by Streaming Media forwarding efficiently and Streaming Media cascade function, guarantee the stabilizing effective transmission of audio/video flow, and transmit media data between different segment under limited bandwidth, realizes being forwarded the transparency of medium position.When a plurality of clients need be visited same long-range picture simultaneously, between service of transmitting and front end video channel, only take the Internet resources of a bandwidth chahnel, by forwarding server data are distributed to a plurality of clients again, and client can also be set the automatic selection function of many code streams, can select the code stream of suitable effect to play automatically according to current network conditions during broadcast, solve the conflict of bandwidth, intranet and extranet and multi-user access, effectively utilized the network bandwidth.By the centralized stores service, do not have memory function or be not suitable for carrying out the situation of video file storage particularly suitable at front end for front end.Be applicable to that also some important video files are not suitable for preserving at front end, can centralized stores on the centralized stores main frame of rear end.This function can be provided with the centralized stores plan, thereby realizes regularly file memory function on the centralized stores server.The video file centralized stores of a plurality of DVS, DVR can be arrived server, make each DVR as long as a spot of hard-disk capacity of configuration reduces whole use cost.The disk space of different disk groups can be set flexibly, and the video separate storage that significance level is different makes important video can preserve the longer time.Powerful and the plan of recording a video flexibly can be by the plan of deploying troops on garrison duty at the video arrangement video recording plan of every road, mobile detection plan, alarm of sky, week, the moon, year, cycle such as interim.
3, GPS map locating module
Support multistage multilayer multifile electronic chart and generalized information system, by electronic chart can be directly to the control point retrieve for examination, setting, alarm linkage operation, allow the user experience more visually and application, integrated by with gps system, for dynamic object upgrades in time and positional information is provided and dynamically monitors, provide that vehicle is anti-robs antitheft, warning, road navigation, medical aid and the various ecommerce value-added services of expansion on this system platform basis.
4, client software module
Client modules is finally to be presented in face of the user, the module that supplies the user to manipulate, client is by carrying out communication with each serviced component, be used to realize electronic chart, show policer operations such as real-time video and playback video recording, control The Cloud Terrace camera lens move, control warning input and output, and management functions such as configuration electronic chart, external equipment and user right.And SmartClient technology by Microsoft, the user can operate and manage by IE mode access platform software in any place, need not revise the security limitations of IE during use can normally use, be not subjected to the IE parameter that limitation is set, with normal use client software is the same, and more common realizes that with control the mode of WEB function is more advanced practical.
5, inductor management module
Can the alarm host machine of the market mainstream be managed, insert various inductors, as Infrared Detectors, circumference detector, fence detector, cigarette sense, curtain wall etc.Mode by serial ports or network communication, the independently warning subsystem that is dispersed in each place is networked, controlling alarm can be carried out to any one subsystem in the alarming and managing center, as: report to the police deploy troops on garrison duty, withdraw a garrison, output is reported to the police, is reported to the police in bypass, removing opens, closes etc.When any one warning subsystem has the generation of warning, the alarming and managing center can demonstrate the details of warning fast and accurately, as: place of alarm, title, type, Sub-System Number, anti-area code etc., and can automatically carry out combined operation according to the warning prediction scheme that sets in advance, as: video eject and play, play that specified voice, broadcasts of video group, the taking turn of video group, interlink warning output, warning cloth are withdrawn a garrison, video wall switches, the interlock cradle head preset positions, cruise, send SMS, LED shields demonstration, printer prints etc.
6, sensor management module
Can the analog acquisition equipment of the market mainstream be managed, insert various transducers, as temperature sensor, humidity sensor, gas concentration lwevel transducer, current sensor etc., realization shows the collection and the real time data value curve chart of analogue datas such as the temperature of front end, humidity, voltage, electric current, gas concentration, and can carry out self-defining warning by default high alarm setting and lower limit and handle.
7, entrance guard management module
Can gate inhibition's main process equipment of the market mainstream be managed.Mode by serial ports or network communication, the independently gate inhibition subsystem that is dispersed in each place is networked, can realize to front end arbitrarily the opening the door of door, often open, control such as normally closed, the on off state and the alarm condition that show all in real time, and the opening the door and the interlock action of abnormal alarm of can be self-defined every fan door, realizing for example swipes the card opens the door and ejects image, breaks in video wall and switch image, the overtime self-defined auditory tone cues etc. of not closing the door.
8, cell phone software module
(GPRS, CDMA, 3G, WIFI) realizes feature operations such as video transmission, video switch, cradle head control, SMS alarm on mobile phone by various wireless signals.The person in charge can be at any time by any one road video in the mobile phone monitoring system, the operation such as platform control of racking of going forward side by side.Various accidents be can in the very first time, check, handle, telemanagement and commander, inspection, supervision, co-ordination realized.
9, intelligent analysis module
In large-scale monitoring project, in the face of magnanimity video, magnanimity information, check and transmit the burden that becomes digital security protection without any the meaningless video that filters, by the intellectual analysis functional module, can carry out analysis and judgement to object appearing in the video, filter out garbage and interfere information in the image, analyze, extract the crucial useful information in the video source automatically, and directly trigger and report to the police, alarm modes such as the ejection of interlock picture, sound alarm, note transmission.In transmission course, correctness and promptness in order to ensure data adapt to various heterogeneous networks and agreement.Also have, the connection of transducer not only is provided, itself also has the ability of Intelligent treatment, can implement Based Intelligent Control to object.Transducer and Intelligent treatment are combined, utilize various intellectual technologies such as cloud computing, pattern recognition, expand its application.From the magnanimity information that transducer obtains, analyze, process and handle out significant data, to adapt to the different demands of different user.
10, alarm linkage program management module
The alarm linkage prediction scheme is supported twenties kinds of interlock actions, as: the warning message prompting, eject the warning map, eject video pictures, self-defined auditory tone cues, video group plays, the taking turn of video group, the output of reporting to the police is opened and is closed, warning is deployed troops on garrison duty and is withdrawn a garrison, the video wall broadcasting pictures, video wall displaying video group, video wall begins the taking turn of video group, call the camera pan-tilt presetting bit, the beginning camera pan-tilt cruises, beginning camera pan-tilt track, video camera begins video recording, the SMS notice, the LED on-screen-display message, the printer prints warning message, video image stack warning message, video capture etc.But every kind of interlock action can independently be used and the combination in any use, when any one reports to the police triggering, just can carry out combined operation according to the warning prediction scheme that sets in advance automatically.
Main application of the present invention
Can be used for the large, medium and small monitoring operation platform of all conglomeraties projects such as safety home, electric power safety, public safety, health monitoring, intelligent transportation, the anti-invasion of important area, environmental protection.
Major function of the present invention
Multiple cascading networks, the multisystem integrated management, real-time video monitoring, Collective qualification, user authority management, the Remote configuration device parameter, the character matrix function, the analog matrix management, sliceable large-size screen monitors wall controlled function, the gate control system management, the EMS management, the warning system management, monitoring mobile phone, intellectual analysis, the LED management, Long-distance Control, long-range cloth is withdrawn a garrison, centralized stores, playing back videos, cradle head control, alarm linkage, watch-dog control, electronic chart, equipment control, video wall output, the WEB function, usage track daily record etc.
The present invention and existing platform software function of the same trade, technology contrast
Figure BDA0000062768910000131
Figure BDA0000062768910000141
Figure BDA0000062768910000151
Figure BDA0000062768910000161
The present invention combines modern sound, video compression technology, network Internet of Things mechanics of communication, Computer Control Technology, streaming media transmission technique, adopts modular software design theory, and different clients' the demand mode with assembly module is realized; Be provided as the customized multiple assembly module combination of different user, satisfy client's demand to greatest extent.Powerful, flexible net centralized monitor comprehensive solution is provided.
Technology such as up-to-date 3G, sensing net, GPS, Java .Net, WebService, XML, SmartClient are adopted in this system planning, use (C/S) user terminal/server framework, distributed component to design, the software function that possesses specialization, personalization, hommization, it directly influences the application of centralized monitoring system from aspects such as operability, customizability, compatibility, stability.
The present invention compares with traditional safeguard management platform, possesses following advantage:
(1) operability
Taken into full account the user interface of hommization in the design, adopt friendly prompting, allow icon graphically, more directly perceived, simple on the mode of operation, diversified, energy is left-hand seat fast, multipage face, multiaspect plate, all can manually drag and put, set hiding, demonstration or hiding automatically, each user can use self-defining interface layout, and can the functional module at interface be moved to suitable position according to user's use habit, even never contacted user left-hand seat, comfortable use fast.And the design concept of propertyization is dissolved among each details of platform, allows the operator can be according to use habit left-hand seat, the operation very easily of oneself.
(2) stable, safe software architecture
Adopt service end/client framework (c/s), all information storage on server, the direct access server of client, when multi-client was visited simultaneously, bandwidth resources took few.Enabled SmartClient in addition, the client lands the intelligent page and gets final product access server in the place of any energy access network.Server data can use Microsoft's latest XML technology saved system information, and access speed is fast like this, and stability is high, need not to increase other softwares; Can use various databases again, as Oracle, SQLServer2000/2005, Mysql, PostgreSQL,, JavaDB, sybase, informix, db2, sqllite, access etc.
(3) WEB based on SmartClient uses
What our WEB function management module was used is the SmartClient technology of Microsoft, the user can operate and manage by IE mode access platform software in any place, need not revise the security limitations of IE during use can normally use, be not subjected to the IE parameter that limitation is set, with normal use client software is the same, and more common realizes that with control the mode of WEB function is more advanced practical.
(4) video wall service
The monitor supervision platform software of design not only can be managed the video wall of being made up of common monitor at present, can also manage DLP plasma rear-projection splicing large-size screen monitors wall and LCD splicing large-size screen monitors wall, realize that the large-screen of control any amount splices the switching of pattern arbitrarily.But also one or more groups monitor that can set on the video wall participates in alarm linkage queuing switching, the image of up-to-date interlock is presented at first all the time, the demonstration of lining up automatically of other alarm images early, alarm image the earliest will be kicked out of formation, and this function can perfectly solve to report to the police in conjunction with the prompting of self-defined alarm sound can't accurately see the problem of up-to-date alarm image when frequent on video wall
(5) matrix functions
Support on the analog matrix on wall, the embedded decoder wall and the soft decoding on-wall of computer bull video card on wall, the digital decoding card hard decoder, a plurality of video wall servers can be combined into the video wall of arbitrary placement's pattern, and can control at same interface, but manual switchover, regularly switching, grouping are switched, the grouping taking turn is switched and warning is switched, and can carry out The Cloud Terrace direction, velocity of rotation, video camera change to the video of last wall doubly, focal length, controls such as aperture, The Cloud Terrace switch, preset point, the route that cruises.
(6) control point query function
Possess control point query function quickly and easily, support accurately to search, fuzzy search, Chinese pinyin initial search, on the hundreds of road thousand the tunnel in addition the large-scale monitoring application scenario on roads up to ten thousand in, can find any one control point fast and accurately.
(7) alarm linkage prediction scheme
The alarm linkage prediction scheme is supported twenties kinds of interlock actions, as: the warning message prompting, eject the warning map, eject video pictures, self-defined auditory tone cues, video group plays, the taking turn of video group, the output of reporting to the police is opened and is closed, warning is deployed troops on garrison duty and is withdrawn a garrison, the video wall broadcasting pictures, video wall displaying video group, video wall begins the taking turn of video group, call the camera pan-tilt presetting bit, the beginning camera pan-tilt cruises, beginning camera pan-tilt track, video camera begins video recording, the SMS notice, the LED on-screen-display message, the printer prints warning message, video image stack warning message, video capture etc.But every kind of interlock action can independently be used and the combination in any use, when any one reports to the police triggering, just can carry out combined operation according to the warning prediction scheme that sets in advance automatically.
(8) electronic chart function
In the safety defense monitoring system in modern times, big-and-middle-sized monitoring is used in the majority, and widely used in the past free hand drawing sheet file electronic map technique can not satisfy the requirement of big-and-middle-sized electronic chart.Therefore, in the function design of electronic chart, having designed can be with the electronic chart configuration staged ATM layer relationsATM of any number, and can switch by on electronic chart, setting up hot-zone connection carrying out map redirect, and in the support of electronic map file, not only can use the picture electronic chart of monofiles such as wmf, jpg, bmp, png, gif, can also support the electronic chart and the GIS GIS-Geographic Information System map of multilayer multifile, under these two kinds of map modes, no matter it is much all applicable that map has, can not shine into influence with showing to the transfer of data of map.And the convergent-divergent of each ratio, the map content displayed can be different.Therefore fully applicable to the requirement of large-scale, ultra-large type and other map application of higher level, use very suitable large-range monitoring project as city, city, the whole nation and even the monitoring of global map.

Claims (10)

1. based on the comprehensive safeguard management platform of Linux operation level of Internet of Things, it is characterized in that, include operation service management module, video management module, client software module, inductor management module and alarm linkage program management module;
The operation service management module, master server for described comprehensive safeguard management platform, above-mentioned remaining each service module that has been used for bridge joint is used to manage all equipment of being connected with described comprehensive safeguard management platform and carries out communication and synchronously with other management server;
The video management module, be used for forwarding stream media data between different segment, realization is forwarded the transparency of Streaming Media position, when a plurality of clients need be visited same long-range picture simultaneously, between service of transmitting and front end video channel, only take the Internet resources of a bandwidth chahnel, by forwarding server stream medium data is distributed to plural client again, and with the video file centralized stores in server;
The client software module, be installed in the client, for finally being presented in face of the user, the module that supplies the user to manipulate, the client software module is by carrying out communication with each serviced component, the function that is used to realize includes: show real-time video and playback video recording, the action of control The Cloud Terrace camera lens, control warning input and output policer operation, and external equipment and user authority management function, and by the SmartClient technology of Microsoft, the user can operate and manage by IE mode access platform software in any place;
Inductor management module is used for being connected with inductor, and networks with the independently warning subsystem that is dispersed in each place, and any one subsystem is carried out controlling alarm;
Alarm linkage program management module is used for automatically performing the warning prediction scheme that sets in advance and carrying out combined operation when reporting to the police triggering.
2. the comprehensive safeguard management platform of Linux operation level based on Internet of Things according to claim 1 is characterized in that, includes and runs the support multistage multilayer multifile electronic chart that service management module is connected and the GPS map locating module of generalized information system;
GPS map locating module is used for directly the dynamic object control point being upgraded in time and providing positional information, realizes the dynamic monitoring to the dynamic object control point, and retrieve for examination, setting, alarm linkage operation.
3. the comprehensive safeguard management platform of Linux operation level based on Internet of Things according to claim 1 is characterized in that, includes and runs the sensor management module that service management module is connected;
The sensor management module is used for analog acquisition equipment is managed, and carries out self-defining warning by default high alarm setting and lower limit and handles.
4. the comprehensive safeguard management platform of Linux operation level based on Internet of Things according to claim 1 is characterized in that, includes and runs the entrance guard management module that service management module is connected;
The entrance guard management module, the connected independently gate inhibition subsystem that is dispersed in each place is networked, realization shows on off state and the alarm condition of all in real time to the State Control of any of front end, and open the door and the interlock of abnormal alarm of default every fan door are moved.
5. the comprehensive safeguard management platform of Linux operation level based on Internet of Things according to claim 4, it is characterized in that, described default every fan door open the door and the interlock action of abnormal alarm includes: swiping the card opens the door ejects image, break in video wall switches image, the overtime self-defined auditory tone cues of not closing the door.
6. the comprehensive safeguard management platform of Linux operation level based on Internet of Things according to claim 1 is characterized in that, includes and runs the cell phone software module that service management module is connected;
The cell phone software module is used for setting up wireless telecommunications with mobile phone and is connected, and realizes video transmission between operation service management module and mobile phone, receives the operation control command that the mobile phone end sends, and alarm linkage.
7. the comprehensive safeguard management platform of Linux operation level based on Internet of Things according to claim 1 is characterized in that, includes and runs the intelligent analysis module that service management module is connected;
Intelligent analysis module is used for the video object appearing filtering out garbage and interfere information in the image according to the pre-conditioned analysis and judgement of carrying out.
8. the comprehensive safeguard management platform of Linux operation level based on Internet of Things according to claim 1 is characterized in that the described inductor that is connected with inductor management module includes: Infrared Detectors, circumference detector, fence detector, cigarette sense, curtain wall.
9. the comprehensive safeguard management platform of Linux operation level based on Internet of Things according to claim 1, it is characterized in that, described warning prediction scheme include any one subsystem reported to the police deploy troops on garrison duty, withdraw a garrison, opening, closing of output reported to the police, reported to the police in bypass, removing, demonstrate place of alarm, title, type, Sub-System Number, the anti-area code of warning, and carry out combined operation according to the warning prediction scheme that sets in advance automatically.
10. according to claim 1 or the 9 described comprehensive safeguard management platforms of Linux operation level based on Internet of Things, it is characterized in that described combined operation includes: video eject to play, plays that specified voice, broadcasts of video group, the taking turn of video group, interlink warning output, warning cloth are withdrawn a garrison, video wall switches, the interlock cradle head preset positions, cruise, send SMS, the demonstration of LED screen and printer prints.
CN201110132603.3A 2011-05-20 2011-05-20 IOT (Internet of Things)-based Linux operation-level comprehensive security management platform Expired - Fee Related CN102209073B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110132603.3A CN102209073B (en) 2011-05-20 2011-05-20 IOT (Internet of Things)-based Linux operation-level comprehensive security management platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110132603.3A CN102209073B (en) 2011-05-20 2011-05-20 IOT (Internet of Things)-based Linux operation-level comprehensive security management platform

Publications (2)

Publication Number Publication Date
CN102209073A true CN102209073A (en) 2011-10-05
CN102209073B CN102209073B (en) 2014-12-24

Family

ID=44697737

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110132603.3A Expired - Fee Related CN102209073B (en) 2011-05-20 2011-05-20 IOT (Internet of Things)-based Linux operation-level comprehensive security management platform

Country Status (1)

Country Link
CN (1) CN102209073B (en)

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102541539A (en) * 2011-12-13 2012-07-04 东南大学 Method for designing intelligent panel of supply chain based on M2M (Machine to Machine)
CN102546787A (en) * 2011-12-29 2012-07-04 深圳市中庆微科技开发有限公司 Light-emitting diode (LED) display system controlled by cloud computing
CN102685254A (en) * 2012-05-31 2012-09-19 深圳英宝通科技有限公司 Control method and system for cross-platform mobile network terminal
CN102710663A (en) * 2012-06-21 2012-10-03 奇智软件(北京)有限公司 Method and device for obtaining cloud service
CN102752583A (en) * 2012-06-29 2012-10-24 浙江大学 Pump station video monitoring system based on smart phone
CN102809960A (en) * 2012-08-10 2012-12-05 武汉九升科技有限公司 Large-screen-application-based three-party linkage visible monitoring system and method for regulation centre
CN103578240A (en) * 2013-10-09 2014-02-12 无锡恺易物联网科技发展有限公司 Security and protection service network based on Internet of Things
CN103916625A (en) * 2013-01-04 2014-07-09 北京兆维电子(集团)有限责任公司 Video monitoring system and method based on cloud computing
CN104504478A (en) * 2014-12-30 2015-04-08 深圳市科漫达智能管理科技有限公司 Event handling method and device
CN104536426A (en) * 2015-01-15 2015-04-22 山东弘生源电子科技有限公司 Sensor signal linkage and simulation system using networks
CN105306900A (en) * 2015-10-28 2016-02-03 贵州省邮电规划设计院有限公司 Intelligent scheduling high definition integrated networking video monitoring system based on cloud computing
CN105376519A (en) * 2014-08-28 2016-03-02 苏州巴米特信息科技有限公司 Video monitoring alarm system
WO2016033987A1 (en) * 2014-09-04 2016-03-10 中兴通讯股份有限公司 Device application software management service method, device, and system for internet of things
CN105425701A (en) * 2015-11-23 2016-03-23 深圳市技强安防科技有限公司 Security and protection platform management system
CN105425700A (en) * 2015-11-23 2016-03-23 深圳市技强安防科技有限公司 Remote monitoring system for urban fire control
CN105745954A (en) * 2014-10-24 2016-07-06 华为技术有限公司 M2M terminal control method and related device
CN105894755A (en) * 2014-11-13 2016-08-24 支录奎 Research based on superposition of alarm signal and geographic information
CN106060474A (en) * 2016-06-27 2016-10-26 深圳辉锐天眼科技有限公司 Method for upgrading traditional video surveillance to video early-warning system
CN106060464A (en) * 2016-06-16 2016-10-26 深圳辉锐天眼科技有限公司 Video alarm
CN102546787B (en) * 2011-12-29 2016-12-14 深圳市中庆微科技开发有限公司 The LED display system that a kind of cloud computing controls
CN106303382A (en) * 2015-05-26 2017-01-04 湖北泰信科技信息发展有限责任公司 A kind of emergency command comprehensive management platform based on Internet of Things
CN106385431A (en) * 2016-08-30 2017-02-08 四川泰尔科技有限公司 Financial security integrated management and control platform
CN106679635A (en) * 2017-03-10 2017-05-17 江苏濠汉信息技术有限公司 Relaying plate switching state detection system
CN106803788A (en) * 2015-11-26 2017-06-06 财团法人资讯工业策进会 network packet management server and network packet management method thereof
CN107272535A (en) * 2017-07-11 2017-10-20 武汉虹信技术服务有限责任公司 The linkage and interlock method of a kind of intelligent building management system
CN108055502A (en) * 2017-11-30 2018-05-18 南京南邮信息产业技术研究院有限公司 Urban public security based on NB-IoT is quickly deployed to ensure effective monitoring and control of illegal activities system and method
CN108200190A (en) * 2018-01-26 2018-06-22 青岛国信发展(集团)有限责任公司 Internet of Things data service system and method based on cloud computing
CN108900608A (en) * 2018-06-29 2018-11-27 华南师范大学 Robot real-time feedback system based on cloud platform
CN109684872A (en) * 2018-12-27 2019-04-26 无锡京和信息技术有限公司 A kind of data integration management system based on Internet of Things
CN109818801A (en) * 2019-02-22 2019-05-28 苏州华必讯信息科技有限公司 A kind of cloud computing SAAS mode client relationship management system
CN110136408A (en) * 2019-06-21 2019-08-16 湖北广信汇科技有限公司 A kind of safety alarm system
WO2019192366A1 (en) * 2018-04-04 2019-10-10 电信科学技术研究院有限公司 Method and device for managing and controlling terminal ue
CN110839024A (en) * 2019-11-09 2020-02-25 湖北佳狮盾智能技术有限公司 Comprehensive safety management platform for cultural relic safety prevention and control
CN111614782A (en) * 2020-05-29 2020-09-01 上海挚达科技发展有限公司 New forms of energy heavy truck networking platform vehicle management system based on SAAS mode

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070290830A1 (en) * 2006-06-15 2007-12-20 Phase Iv Partners, Inc. Remotely monitored security system
CN101533546A (en) * 2009-04-09 2009-09-16 中国科学院嘉兴无线传感网工程中心 Antitheft and environment-monitoring system for magazine based on wireless sensor network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070290830A1 (en) * 2006-06-15 2007-12-20 Phase Iv Partners, Inc. Remotely monitored security system
CN101533546A (en) * 2009-04-09 2009-09-16 中国科学院嘉兴无线传感网工程中心 Antitheft and environment-monitoring system for magazine based on wireless sensor network

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102541539A (en) * 2011-12-13 2012-07-04 东南大学 Method for designing intelligent panel of supply chain based on M2M (Machine to Machine)
CN102541539B (en) * 2011-12-13 2014-04-16 东南大学 Method for designing intelligent panel of supply chain based on M2M (Machine to Machine)
CN102546787A (en) * 2011-12-29 2012-07-04 深圳市中庆微科技开发有限公司 Light-emitting diode (LED) display system controlled by cloud computing
CN102546787B (en) * 2011-12-29 2016-12-14 深圳市中庆微科技开发有限公司 The LED display system that a kind of cloud computing controls
CN102685254A (en) * 2012-05-31 2012-09-19 深圳英宝通科技有限公司 Control method and system for cross-platform mobile network terminal
CN102685254B (en) * 2012-05-31 2015-11-04 深圳英宝通科技有限公司 A kind of cross-platform mobile network's terminal control method and system thereof
CN102710663A (en) * 2012-06-21 2012-10-03 奇智软件(北京)有限公司 Method and device for obtaining cloud service
CN102752583A (en) * 2012-06-29 2012-10-24 浙江大学 Pump station video monitoring system based on smart phone
CN102809960A (en) * 2012-08-10 2012-12-05 武汉九升科技有限公司 Large-screen-application-based three-party linkage visible monitoring system and method for regulation centre
CN102809960B (en) * 2012-08-10 2015-02-25 武汉九升科技有限公司 Large-screen-application-based three-party linkage visible monitoring system and method for regulation centre
CN103916625A (en) * 2013-01-04 2014-07-09 北京兆维电子(集团)有限责任公司 Video monitoring system and method based on cloud computing
CN103578240B (en) * 2013-10-09 2015-10-21 无锡恺易物联网科技发展有限公司 A kind of security protection service network based on Internet of Things
CN103578240A (en) * 2013-10-09 2014-02-12 无锡恺易物联网科技发展有限公司 Security and protection service network based on Internet of Things
CN105376519A (en) * 2014-08-28 2016-03-02 苏州巴米特信息科技有限公司 Video monitoring alarm system
WO2016033987A1 (en) * 2014-09-04 2016-03-10 中兴通讯股份有限公司 Device application software management service method, device, and system for internet of things
CN105745954A (en) * 2014-10-24 2016-07-06 华为技术有限公司 M2M terminal control method and related device
CN105894755A (en) * 2014-11-13 2016-08-24 支录奎 Research based on superposition of alarm signal and geographic information
CN104504478A (en) * 2014-12-30 2015-04-08 深圳市科漫达智能管理科技有限公司 Event handling method and device
CN104536426A (en) * 2015-01-15 2015-04-22 山东弘生源电子科技有限公司 Sensor signal linkage and simulation system using networks
CN106303382A (en) * 2015-05-26 2017-01-04 湖北泰信科技信息发展有限责任公司 A kind of emergency command comprehensive management platform based on Internet of Things
CN105306900A (en) * 2015-10-28 2016-02-03 贵州省邮电规划设计院有限公司 Intelligent scheduling high definition integrated networking video monitoring system based on cloud computing
CN105425700A (en) * 2015-11-23 2016-03-23 深圳市技强安防科技有限公司 Remote monitoring system for urban fire control
CN105425701A (en) * 2015-11-23 2016-03-23 深圳市技强安防科技有限公司 Security and protection platform management system
CN106803788A (en) * 2015-11-26 2017-06-06 财团法人资讯工业策进会 network packet management server and network packet management method thereof
CN106060464A (en) * 2016-06-16 2016-10-26 深圳辉锐天眼科技有限公司 Video alarm
CN106060474A (en) * 2016-06-27 2016-10-26 深圳辉锐天眼科技有限公司 Method for upgrading traditional video surveillance to video early-warning system
CN106385431A (en) * 2016-08-30 2017-02-08 四川泰尔科技有限公司 Financial security integrated management and control platform
CN106679635A (en) * 2017-03-10 2017-05-17 江苏濠汉信息技术有限公司 Relaying plate switching state detection system
CN107272535A (en) * 2017-07-11 2017-10-20 武汉虹信技术服务有限责任公司 The linkage and interlock method of a kind of intelligent building management system
CN108055502A (en) * 2017-11-30 2018-05-18 南京南邮信息产业技术研究院有限公司 Urban public security based on NB-IoT is quickly deployed to ensure effective monitoring and control of illegal activities system and method
CN108200190A (en) * 2018-01-26 2018-06-22 青岛国信发展(集团)有限责任公司 Internet of Things data service system and method based on cloud computing
CN108200190B (en) * 2018-01-26 2019-11-22 青岛国信发展(集团)有限责任公司 Internet of things data service system and method based on cloud computing
WO2019192366A1 (en) * 2018-04-04 2019-10-10 电信科学技术研究院有限公司 Method and device for managing and controlling terminal ue
US11206541B2 (en) 2018-04-04 2021-12-21 Datang Mobile Communications Equipment Co., Ltd. Method and device for managing and controlling terminal UE
CN108900608A (en) * 2018-06-29 2018-11-27 华南师范大学 Robot real-time feedback system based on cloud platform
CN109684872A (en) * 2018-12-27 2019-04-26 无锡京和信息技术有限公司 A kind of data integration management system based on Internet of Things
CN109818801A (en) * 2019-02-22 2019-05-28 苏州华必讯信息科技有限公司 A kind of cloud computing SAAS mode client relationship management system
CN110136408A (en) * 2019-06-21 2019-08-16 湖北广信汇科技有限公司 A kind of safety alarm system
CN110839024A (en) * 2019-11-09 2020-02-25 湖北佳狮盾智能技术有限公司 Comprehensive safety management platform for cultural relic safety prevention and control
CN111614782A (en) * 2020-05-29 2020-09-01 上海挚达科技发展有限公司 New forms of energy heavy truck networking platform vehicle management system based on SAAS mode
CN111614782B (en) * 2020-05-29 2021-01-29 上海挚达科技发展有限公司 New forms of energy heavy truck networking platform vehicle management system based on SAAS mode

Also Published As

Publication number Publication date
CN102209073B (en) 2014-12-24

Similar Documents

Publication Publication Date Title
CN102209073B (en) IOT (Internet of Things)-based Linux operation-level comprehensive security management platform
US20220297619A1 (en) Vehicle Activity Information System
CN104243569B (en) A kind of city operating system
US20070291118A1 (en) Intelligent surveillance system and method for integrated event based surveillance
CN105187771A (en) Plant-level comprehensive supervision platform
Shu et al. IBM smart surveillance system (S3): a open and extensible framework for event based surveillance
CN102110220B (en) Application program monitoring method and device
CN104918005A (en) Device, system and method for intercepting and sending monitoring record in real-time
CN112765245A (en) Electronic government affair big data processing platform
US20090089108A1 (en) Method and apparatus for automatically identifying potentially unsafe work conditions to predict and prevent the occurrence of workplace accidents
US20080297599A1 (en) Video data storage, search, and retrieval using meta-data and attribute data in a video surveillance system
US20130262640A1 (en) Method and Apparatus for Interconnectivity between Legacy Security Systems and Networked Multimedia Security Surveillance System
CA3049058C (en) Centralized monitoring of confined spaces
CN101937610A (en) Method for triggering linkage action between security equipment and monitoring equipment
CN102120070A (en) Self-extinguishing rescuing intelligent system based on fire-fighting early warning
CN103186733A (en) Database user behavior management system and database user behavior management method
CN115966313B (en) Integrated management platform based on face recognition
CN106303382A (en) A kind of emergency command comprehensive management platform based on Internet of Things
CN102651090A (en) Safety guarding and emergency operation system for prison
CN108028873A (en) Vehicles camera chain
CN113538825A (en) Campus wall-turning event alarm method and system
CN205507061U (en) Radar is synthesized and is taken notes appearance
JP3619958B2 (en) Crisis management system and computer
US11785186B2 (en) Centralized monitoring of confined spaces
JP2023103210A (en) Device, method, and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20141224

Termination date: 20190520