CN104635611A - Video monitoring-based networking safe-guard intelligent processing system for quickly fighting terrorist activities - Google Patents

Video monitoring-based networking safe-guard intelligent processing system for quickly fighting terrorist activities Download PDF

Info

Publication number
CN104635611A
CN104635611A CN201510074719.4A CN201510074719A CN104635611A CN 104635611 A CN104635611 A CN 104635611A CN 201510074719 A CN201510074719 A CN 201510074719A CN 104635611 A CN104635611 A CN 104635611A
Authority
CN
China
Prior art keywords
data
video monitoring
intelligent
positioning
backup
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510074719.4A
Other languages
Chinese (zh)
Other versions
CN104635611B (en
Inventor
覃心成
刘惠燕
苏展都
苏展鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUZHOU JIAAN SECURITY Co Ltd
Original Assignee
WUZHOU JIAAN SECURITY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUZHOU JIAAN SECURITY Co Ltd filed Critical WUZHOU JIAAN SECURITY Co Ltd
Priority to CN201510074719.4A priority Critical patent/CN104635611B/en
Publication of CN104635611A publication Critical patent/CN104635611A/en
Application granted granted Critical
Publication of CN104635611B publication Critical patent/CN104635611B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/05Programmable logic controllers, e.g. simulating logic interconnections of signals according to ladder diagrams or function charts
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a video monitoring-based networking safe-guard intelligent processing system for quickly fighting terrorist activities. The system comprises a dual-positioning mobile phone and watch intelligent terminal, a barrier-free quick alarming system, a skynet video monitoring camera linkage system, a site quick fighting system, an intelligent system center platform, a database server and a distributing and storing platform. The system effectively integrates police data assistant equipment and combines the current skynet video monitoring system, so that the functions of timely alarming, quick positioning, accurate check and site fighting are realized; the system assists a police service platform to reasonably arrange police services, effectively communicates and wises, and quickly treats on site. The system also has the advantages of stable and reliable equipment, safe data storage and communication, simple system operation and intuitive and quick display; the system can be expanded to be connected to other platform application system; the efficiency of preventing and fighting the terrorist activities is improved; the cost for maintaining social safety stability is reduced; the system for safely preventing irregularity and crime is modernized, digitalized and scientific.

Description

A kind of based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system
Technical field
The present invention relates to a kind of based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system.
Background technology
At present, along with deepening continuously of China's reform and opening-up, the politics of China more democracy and international status constantly promotes, together with change contradiction and the overseas anti-China forces of domestic Social Transformation Period contain that the force of Chinese development is interweaved.Anti-China forces bring the terrified backbone of tissue training secret help from publicizing, giving secret support to, and the three vices are united, and China's terrorist activity is occurred again and again, and such as Kunming, Yunnan railway station terrorist incident in 2014 is mark.The greatest problem existed in anti-terrorism work is at present: fail Timeliness coverage terrorist activity and dispose terrorist activity fast.
The command centre that deals with emergencies and dangerous situations is met for public security bureau 110, current command centre connects the mode of dealing with emergencies and dangerous situations and is tradition and receives a crime report mode, namely alarm people is dialled by landline telephone or mobile phone and dials 110 to call the police, first to verify the identity of warning personnel after the person of receiving a crime report receives calls, go to understand the description of warning personnel to field conditions, personage is known in inquiry, thing, time, after the four factor of place, just call day net video monitoring to warning on-site verification, due to through sky net system Construction in recent years, it net camera quantity is various, the person of receiving a crime report can not can navigate to the sky net video near alarm people at once, cause the real-time understanding that the person of receiving a crime report fails fast to alarm people's surrounding enviroment situation, make the most effective decision-making, simultaneously, the scheduling of police strength also needs the regular hour, lead to miss the best opportunity disposed, cause the injures and deaths of personnel, the loss of property.
Summary of the invention
The object of the invention is to for the deficiencies in the prior art, for the terrified detonation to public place, attack of terrorism activity realize finding fast, examine fast, the long-range disposal of rapid strike, stable for maintaining public order, control in time, stablize surrounding enviroment situation, control the overall situation, go deep into disposal further for the police and condition precedent is provided, get the time, get triumph and provide a kind of based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system.
To achieve these goals, the present invention is by the following technical solutions:
A kind of based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system, setting comprises: two locating cellphone wrist-watch intelligent terminal, accessible rapid alarm system, it net video monitoring camera linked system, on-the-spot prompt-strike system, intelligent system central platform, database service, distribution and storage platform; Described two locating cellphone wrist-watch intelligent terminals, accessible rapid alarm system, sky net video monitoring camera linked system, on-the-spot prompt-strike system, database service, distribution and storage platform, intelligent system central platform is interconnected respectively by public network or dedicated network.
Above-described pair of locating cellphone wrist-watch intelligent terminal, presses three seconds Rapid Alarm, intelligent positioning, effectively waterproof and dampproof.
Above-described accessible rapid alarm system and 110 alarm platforms are interconnected by dedicated network.
Above-described accessible rapid alarm system, comprises four subsystems: voice signaling data acquisition service subsystem, positioning service subsystem, positioning authentication service subsystem, positioning strategy and timed task service subsystem;
Above-described voice signaling data acquisition service subsystem comprises: data acquisition nucleus module, system data Configuration Manager, signaling data acquisition gateway Configuration Manager, statistical analysis module; Wherein data acquisition nucleus module uses multi-thread mechanism to gather the data of multiple collector, being transmitted to authentication service subsystem, guaranteeing response speed when conversing in a large number by gathering the data processing of coming; System data Configuration Manager configuration management user right system information; The parameters such as signaling data acquisition gateway Configuration Manager configuration signal collector IP, port, classification and region and emergency telephone number management; Statistical analysis module provides placement of emergency calls number to add up, voice signaling gathers load analysis and communication interface data analysis, and data backup restoration service is provided, important business datum, Operation Log, critical data, database and operating system are backed up and date restoring, what data backup adopted is utilize program backstage automated back-up, manually arranges backup cycle;
Above-described positioning service subsystem passes through the latitude and longitude coordinates positional information of the two locating cellphone table mobile terminal terminal user of Network Capture intelligence of operator, under the support of electronic map platform, for user provides relevant position information service; By the two locating cellphone meter terminal mandate location of intelligence, use time of arrival (TOA) technically, strengthen Measuring Time difference (E-OTD) two kinds of modes, position success rate, location average waiting duration statistical study are provided;
Above-described positioning authentication service subsystem carries out authentication to the positioning strategy that the preposition service system of positioning strategy sends over, and to the request response positioning result that authentication is passed through, the request such as instant location, consecutive tracking that 110 platforms are initiated to positioning strategy and timed task service system, after positioning strategy and the process of timing services system, request forward is carried out authentication to authentication service system, and query history dials information, report speech data information simultaneously; The data of authentication service communications protocol use XML format, comprise three parts: logical protocol, physical layer protocol, content protocol, authentication rate is provided unsuccessfully, successful authentication rate, tracking frequencies, number of authentications, alert event prone areas, multiple time period, system load statistical study, guarantees that data security is reliable;
Above-described positioning strategy and timed task service subsystem provide locates immediately, timing location, consecutive tracking strategy, store authentication information, on a time period, calling number, called number inquiry query composition inquiry incoming information.
Above-described intelligent system central platform and Jingwutong's equipment are interconnected, intelligent centre system platform supports the GPS agreement of Jingwutong, and positioning compensation is done to the region that GPS cannot cover, point scope tube of Jingwutong is carried out to the management map of gridding, realize the two locating cellphone meter terminal, 110 of intelligence to receive a crime report platform, Jingwutong's Three-Way Calling, intelligence arranges police's responding, record responding situation, working position, online situation; The also Vehicle tracing linked system of other Partial flats application systems of accessible public security bureau, described employing B/S, C/S are in conjunction with framework, Intelligent alarming terminal, at county level 110, city-level 110, provincial 110, ministerial level 110 client exempt to install, and are convenient to that unit at different levels uses, maintenance and management.
Above-described sky net video monitoring camera linked system connects the existing urban road video monitoring system of public security bureau, the alerting signal that the two locating cellphone meter terminals of intelligence or other alarm terminals send is after 110 ranking machines are arrested, sending the sky net camera that signaling recalls terminal position and periphery is reflected on map, ejects 1 to 4 camera picture of periphery definition on warning seat.
Above-described on-the-spot prompt-strike system comprises central server, PLC industrial control module, on-site terminal three part, central server is by TCP/IP private line access PLC industrial control module, control on-the-spot sprayer terminal to spray water to knock region, or police dacryagogue is sprayed to terrorist, realize on-the-spot rapid strike.
Above-described on-the-spot sprayer terminal arranges and comprises medicine tank, intelligent apparatus, solenoid valve and fog-spray nozzle; Described medicine tank is square or circular, is provided with fixing feet and dosing mouth; Described fixing feet, intelligent apparatus and dosing mouth are located at napex or the side of medicine tank respectively; Described fog-spray nozzle is circle, cylindrical shape and taper, and fog-spray nozzle is connected by the bottom of solenoid valve with medicine tank; Described intelligent apparatus is connected with solenoid valve by connecting line.
Above-described database service, distribution and storage platform provide alert data, speech data, locator data, system configuration data, Dynamic System record, the Data dissemination such as picture or video recording and storage are captured in interlock, and there is high-level disaster tolerance, primary data center adopts the design of high reliability Cluster Solution, Backup Data center is connected by DDN/VPN with primary data center, primary data center system configuration main frame comprises two or multiple servers and other associated servers, and data are stored in primary data center storage server; Simultaneously, at the mutually isostructural storage server of remote backup data center configuration and one or more backup server, automatically can realize primary data center by special disaster recovery software to store the real-time of data and Backup Data centre data and back up completely, at primary data center according to user's requirement, tape backup server can also be configured, be used for backup software and tape library are installed; Backup server is directly connected to storage server, control system day regular data backup.
Advantage of the present invention and good effect:
1. the present invention selects J2EE system, Sun gives complete based on Java language exploitation To enterprises distribution applications specification, wherein, on distributed Interoperability Protocol, J2EE supports RMI and IIOP simultaneously, and in the structural form of server end Distributed Application, then include the various ways such as Java Servlet, JSP (Java Server Page), EJB, the characteristic that to support different business demands, and java application has " Write once, run anywhere ".Provide a standard middleware architecture, be responsible for processing all system level issues involved in enterprise development by this architecture, thus the ideal platform of the multilayer distributed cross-platform enterprise application telescopic, there is load balance ability, improve the efficiency of work.
2. the present invention selects two locating cellphone wrist-watch intelligent terminal, can coordinate networking security protection by maneuverability, to the accurate location of terrorist activity, and on-the-spot follow-up, site disposal.
3. the present invention can realize the quick discovery of combatting terrorist activities about 3 seconds, about 3 seconds examine fast, to terrified detonation, the attack of terrorism activity Timeliness coverage terrorist activity in public place with dispose fast in 10 seconds of the rapid strike of about 3 seconds, go deep into disposal further for the police and condition precedent is provided, get the time, get triumph.
4. one of the present invention is based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system, can long-distance intelligent alarm terminal, at county level 110, city-level 110, provincial 110, ministerial level 110 multiple cascading networks, the terrified detonation in public place, attack of terrorism activity are realized fast remote and disposed, stable for what maintain public order, timely control, stablize surrounding enviroment situation, control the overall situation.
Accompanying drawing explanation
Fig. 1: be the structural representation based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system.
Fig. 2: be J2EE functional module divide schematic diagram refer to Fig. 2.
Fig. 3: the architectural schematic being Sun ONE.
Fig. 4: be rapid alarm system schematic flow sheet.
Fig. 5: be on-the-spot prompt-strike system schematic diagram.
Fig. 6: be query history track schematic flow sheet.
Fig. 7: be immediately locate schematic diagram.
Fig. 8: be consecutive tracking schematic diagram.
Fig. 9: be that schematic diagram is located in timing.
Figure 10: be the on-the-spot schematic diagram that day net checks across camera movement.
Figure 11: be the structural representation that day net checks across the camera scene of moving.
Figure 12: the structural representation being four cascade networks.
Figure 13: the on-the-spot schematic diagram being four cascade networks.
Embodiment
With embodiment, the specific embodiment of the present invention is further described in detail with reference to the accompanying drawings.Embodiment is one of more preferably concrete mode of the present invention, and the usual change that those skilled in the art carry out within the scope of technical solution of the present invention and replacement all should be included in protection scope of the present invention.
Embodiment 1
A kind of based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system, setting comprises: two locating cellphone wrist-watch intelligent terminal, accessible rapid alarm system, it net video monitoring camera linked system, on-the-spot prompt-strike system, intelligent system central platform, database service, distribution and storage platform; Described two locating cellphone wrist-watch intelligent terminals, accessible rapid alarm system, sky net video monitoring camera linked system, on-the-spot prompt-strike system, database service, distribution and storage platform, intelligent system central platform is interconnected respectively by public network or dedicated network.Fig. 1 is seen based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system structural representation.
Above-described pair of locating cellphone wrist-watch intelligent terminal, presses three seconds Rapid Alarm, intelligent positioning, effectively waterproof and dampproof.Two locating cellphone wrist-watch is provided with waterproof cover, LCD display, USB interface and function button, and circuit line end corresponding on function mainboard is respectively connected, and described function mainboard forms primarily of the functional circuit chip be arranged on pcb board, miaow head and loudspeaker.Functional circuit chip on pcb board comprises master chip, communicating circuit, positioning circuit etc.; These circuit can adopt the conventional design of current this area, also can adopt the circuit design that inventor researches and develops voluntarily.
Above-described accessible rapid alarm system and 110 alarm platforms are interconnected by dedicated network.
Above-described accessible rapid alarm system, comprises four subsystems: voice signaling data acquisition service subsystem, positioning service subsystem, positioning authentication service subsystem, positioning strategy and timed task service subsystem;
Above-described voice signaling data acquisition service subsystem comprises: data acquisition nucleus module, system data Configuration Manager, signaling data acquisition gateway Configuration Manager, statistical analysis module; Wherein data acquisition nucleus module uses multi-thread mechanism to gather the data of multiple collector, being transmitted to authentication service subsystem, guaranteeing response speed when conversing in a large number by gathering the data processing of coming; System data Configuration Manager configuration management user right system information; The parameters such as signaling data acquisition gateway Configuration Manager configuration signal collector IP, port, classification and region and emergency telephone number management; Statistical analysis module provides placement of emergency calls number to add up, voice signaling gathers load analysis and communication interface data analysis, and data backup restoration service is provided, important business datum, Operation Log, critical data, database and operating system are backed up and date restoring, what data backup adopted is utilize program backstage automated back-up, manually arranges backup cycle;
Above-described positioning service subsystem passes through the latitude and longitude coordinates positional information of the two locating cellphone table mobile terminal terminal user of Network Capture intelligence of operator, under the support of electronic map platform, for user provides relevant position information service; By the two locating cellphone meter terminal mandate location of intelligence, use time of arrival (TOA) technically, strengthen Measuring Time difference (E-OTD) two kinds of modes, position success rate, location average waiting duration statistical study are provided;
Above-described positioning authentication service subsystem carries out authentication to the positioning strategy that the preposition service system of positioning strategy sends over, and to the request response positioning result that authentication is passed through, the request such as instant location, consecutive tracking that 110 platforms are initiated to positioning strategy and timed task service system, after positioning strategy and the process of timing services system, request forward is carried out authentication to authentication service system, and query history dials information, report speech data information simultaneously; The data of authentication service communications protocol use XML format, comprise three parts: logical protocol, physical layer protocol, content protocol, authentication rate is provided unsuccessfully, successful authentication rate, tracking frequencies, number of authentications, alert event prone areas, multiple time period, system load statistical study, guarantees that data security is reliable;
Above-described positioning strategy and timed task service subsystem provide locates immediately, timing location, consecutive tracking strategy, store authentication information, on a time period, calling number, called number inquiry query composition inquiry incoming information.
Above-described intelligent system central platform and Jingwutong's equipment are interconnected, intelligent centre system platform supports the GPS agreement of Jingwutong, and positioning compensation is done to the region that GPS cannot cover, point scope tube of Jingwutong is carried out to the management map of gridding, realize the two locating cellphone meter terminal, 110 of intelligence to receive a crime report platform, Jingwutong's Three-Way Calling, intelligence arranges police's responding, record responding situation, working position, online situation; The also Vehicle tracing linked system of other Partial flats application systems of accessible public security bureau, described employing B/S, C/S are in conjunction with framework, Intelligent alarming terminal, at county level 110, city-level 110, provincial 110, ministerial level 110 client exempt to install, and are convenient to that unit at different levels uses, maintenance and management.
Above-described sky net video monitoring camera linked system connects the existing urban road video monitoring system of public security bureau, the alerting signal that the two locating cellphone meter terminals of intelligence or other alarm terminals send is after 110 ranking machines are arrested, sending the sky net camera that signaling recalls terminal position and periphery is reflected on map, ejects 1 to 4 camera picture of periphery definition on warning seat.
Above-described on-the-spot prompt-strike system comprises central server, PLC industrial control module, on-site terminal three part, central server is by TCP/IP private line access PLC industrial control module, control on-the-spot sprayer terminal to spray water to knock region, or police dacryagogue is sprayed to terrorist, realize on-the-spot rapid strike.
Above-described on-the-spot sprayer terminal arranges and comprises medicine tank, intelligent apparatus, solenoid valve and fog-spray nozzle; Described medicine tank is square or circular, is provided with fixing feet and dosing mouth; Described fixing feet, intelligent apparatus and dosing mouth are located at napex or the side of medicine tank respectively; Described fog-spray nozzle is circle, cylindrical shape and taper, and fog-spray nozzle is connected by the bottom of solenoid valve with medicine tank; Described intelligent apparatus is connected with solenoid valve by connecting line.
Above-described database service, distribution and storage platform provide alert data, speech data, locator data, system configuration data, Dynamic System record, the Data dissemination such as picture or video recording and storage are captured in interlock, and there is high-level disaster tolerance, primary data center adopts the design of high reliability Cluster Solution, Backup Data center is connected by DDN/VPN with primary data center, primary data center system configuration main frame comprises two or multiple servers and other associated servers, and data are stored in primary data center storage server; Simultaneously, at the mutually isostructural storage server of remote backup data center configuration and one or more backup server, automatically can realize primary data center by special disaster recovery software to store the real-time of data and Backup Data centre data and back up completely, at primary data center according to user's requirement, tape backup server can also be configured, be used for backup software and tape library are installed; Backup server is directly connected to storage server, control system day regular data backup.
Rapid alarm system is based on J2EE structure.J2EE is an opening, measured platform, in order to exploitation, dispose and management N Rotating fields, web oriented, enterprise-level application centered by server is the application architecture utilizing Java 2 platform to simplify the many challenge relevant to the exploitation of multi-level enterprise solution, deployment and management.
In the multilayer distributed computation model of J2EE, applied logic is divided into assembly according to function.The functional module of J2EE divides schematic diagram and refers to Fig. 2
The architecture of above-described J2EE structure application program is with Sun ONE for J2EE answers program architecture, and its core technology is structure intelligent web Service system.The key of effective open Intelligent Web Service infrastructure is a series of Service Part.For the ease of finding and access, these Service Parts must be registered in a central directory.In order to ensure degree of integration and the operability of Web service further, these Service Parts must use measured structure, show the information of linguistic context aspect, and use a measured programming interface collection to visit and utilize these language ambience informations, they must be open simultaneously.The gordian technique that Sun ONE uses comprises: XML standard and technology, Java technology, Infrastructure standard such as HTTP, SSL and LDAP.The architectural schematic of Sun ONE refers to Fig. 3.
The database of above-described J2EE structure adopts oracle, and oracle database has following functions and performance requirement:
(1) open
Opening refers to that Database Systems are the Open database connectivity based on client/server architecture, the application of user can operate on different hardware platforms from database server, as IBM, HP and SUN etc., the speciality of dissimilar hardware sufficiently and reasonably can be played.Meanwhile, under distributed environment, there is the interoperability with heterogeneous database.System R supports numerous open system standards: ANSI SQL-89 LEVEL1, ANSI SQL-89 LEVEL2 and ANSI SQL-92, by American National Standard and Technical Board (NIST) Federal Information Processing Standards (FIPS) for normal data storage capacity, referential integrity, and the 127-1 test pack of FIPS mark.Support the communication connection of all kinds of client/server, comprise IPX/SPX, TCP/IP and SHARE MEMORY.NIST is the government organs that the U.S. specifies industrial standard, has the testing software bag of uniquely available inspection SQL standard compatibility.
Open on DataBase combining, show as ODBC standard, and developing instrument can be used to pass through ODBC can realize the interconnection with multitype database, as ORACLE, INFORMIX, SYBASE etc.
Meet open middleware (MIDDLEWARE) product of enterprise's one-level interoperability needs, it allows client to access various relevant database pellucidly and comprise ORACLE, INFORMIX and SYBASE.Simultaneously by remote procedure call (RPC), user can go to revise the data in other data sources.The function directly revised by SQL statement is provided simultaneously.Database and higher level lanquage have good interconnection capability, support ODBC, support by ODBC the developing instrument that a large amount of third party one business provides, as: Ern, Powerbuilder, VB, VC++, EXCEL etc.
(2) safety and reliability
For guaranteeing that database security provides the access right of two ranks.For private data, database can provide:
Detect suspicious user action, and perform the identity of specific user of those actions;
Detect nonowners's access attempts;
Assessing potential secure context infringement may;
If necessary, the evident information analyzed for safety research can be provided;
For user provides passive protection, the action allowing user understand them can be subject to security screening.
Database server provides two-stage access rights to ensure the security of database.Data base authority control is to the access of database and the power creating table and index on the database.The operation that table authority designated user can carry out in particular table.
Storing process by set up them, the mechanism that is different from data permission and additional security is provided.The owner of storing process authorizes the authority performing this storing process to user, allow user to perform SQL operations all in this process, but limited other database access.Carry out limited subscriber by using storing process and perform some database manipulation, the security of system is brought up to procedure level by DBA.
Security audit function each database object to user operation provides tracking and operation note.This function meets C2 level security requirement model.Selective monitoring can be carried out to the activity of user in system.The interface of security audit is driven by order line, or by parameter regulable control, and it allows you to specify to monitor the specific activities of a certain specific user.
Reliability index has on-line backup according to storehouse system, and the Restoration Mechanism such as Database Automatic Backup, journal file management, make Database Systems in various abnormal conditions, automatically can recover data, to ensure the system on-line execute of 24 hours.The on-line backup that Database Systems provide automatically can be carried out time unmanned on the scene.The on-line backup of Database Systems can arrange BACKUP TIME easily, and is automatically carried out within the specified time by system, and does not need any managerial personnel on the scene.All available when data in order to ensure user no matter when and where need, Database Systems provide multiple Restoration Mechanism, to ensure that database recovered from hardware or the system failure with the shortest time, comprise quick restoring mechanism, disk mirroring, two-node cluster hot backup.There is provided a set of online management tool, to strengthen availability.Multiple remote data base can be managed from a central control board by management tool system manager, greatly reduce the burden of data base administration work in distributed environment.
(3) flexible and efficient architecture
Flexible and efficient architecture refers to that architecture is multi-process multi thread, dynamically adjustable and highly concurrent structure.Database server is programmable services device, provides stronger trigger and storing process mechanism, uses these two kinds of mechanism all can to database server programming, and deposit in a database as database object, come for all effective application programs.There is provided multiple blockade granularity with satisfied different lock-out facility, comprise database level lock, table level lock, page level lock and row level are locked and automatically can be realized blocking upgrading according to the actual conditions of database manipulation.Make full use of the ability of uniprocessor, symmetric multiprocessor (SMP), SMP group's machine (Cluster), massively parallel processing (MPP) structure simultaneously, adapt to different system hardware configuration requirements.
(4) distributed treatment ability
Distributed treatment Capability index supports distributed environment, to ensure distributed management and the integrality of data according to storehouse kernel.Distributed query and renewal are provided, provide remote procedure call (RPC) to reduce network overhead, transparent Two-phase commitment and automatic Two-phase commitment Restoration Mechanism are provided in distributed renewal rewards theory.The management tool of a whole set of Database Systems is provided, can be optimized database, daily management mission is completed rapidly.
(5) perfect management tool interface
Perfect management interface, support Simple Network Management Protocol (SNMP) with based on such as HP OpenView in the technical compatibility of SNMP, IBM SystemView, database is provided support with dedicated management information bank MIB (Management Information Bases) for public by sub agent (subagent).The public MIBs of database meets IETF (Internet Engineering Task Force) the public mib standard of relational database, general data library information is provided, such as database manufacturer, version number, complete transactions, disk service condition, etc.The special MIBs of database provides Copyright Law About Databases specific information, comprises the information such as data base buffer, blockade, daily record, submission and the transactions of rollback, last checkpoint time, internal memory use, date, time and last backup level.These information make network manager can effective all databases on monitoring network.
Application and development for many years and enterprise level service is provided accumulation under, my company defines a whole set of oneself ripe and complete Technical Architecture, development platform and establishment storehouse.As INF development platform, GenericForm development platform, J2EE FrameWork, WorkFlow, CommonLib set up storehouse (as SQLStore data management component, PoolMng connection pool management assembly, Cache Memory management component etc.) in basis.
Especially, in J2EE, the INF development platform that applicable B/S applies and the J2EE FrameWork being applicable to exploitation Web application is successively proposed.
Above-mentioned technical foundation develops rapid alarm system, and the main flow business of rapid alarm system, rapid alarm system schematic flow sheet is shown in Fig. 4.
Be attached to police network, realize on-the-spot prompt-strike system, Fig. 5 is shown in by concrete on-the-spot prompt-strike system schematic diagram, and its principle of work is:
The request such as instant location, consecutive tracking that 110 platforms are initiated to positioning strategy and timing services system, after positioning strategy and the process of timing services system, request forward is carried out authentication to authentication service system, if the location number of request is in current sessions, then initiate a Location Request to positioning service system.If not in current sessions, just go to search in database history and dial information and judge to change number whether within the specific time period, as a week or one month, this parameter can configure in authentication service parameter; If just locating, if just do not returning the result that can not locate, if query history track does not provide time period scope, the position record of default query within 1 month.
(1) provisional authentication
System is while session is set up in this call when receiving the number that voice signaling service system interface sends over, and checks numbers locate first according to dialing needs.
(2) positioning strategy authentication
The Location Request that positioning strategy service system sends over, such as: locate immediately, timing location, consecutive tracking; Authentication is carried out by this approach, all first judge whether in current sessions (session), if at response positioning result, if not in current sessions, by system configuration settings just inquiry maximum can positioning time scope, with or without this number in the directory of location.
If there is just corresponding positioning result, as nothing just returns the result of unauthorized query failure.Query history track schematic flow sheet as shown in Figure 6.
(3) communications protocol
Positioning authentication service system, as the important system of whole mobile alarm positioning system, is coordinated subsystems and is normally run.And the communications protocol between each subsystem seems importance.
The ease for use of communications protocol, security are the basic principles that whole agreement is write, and in the middle of each link of system is run, need to ensure that agreement also can not be simulated thus cause mobile alarm locating system to destroy while correct transmission data.
The data exchange ways of communications protocol is XML (Extensible Markup Language) file; Xml format specification is controlled by DTD (DocumentTypeDefinition).
(4) logical protocol
Logical protocol is responsible for setting up the data link communicated between client, server.And long-time this data link of maintenance.
Set up 3 requirements that logical protocol should be noted that:
What 1. communication link adopted is that the mode of TCP/IP communicates.And set up link and adopt configurable mode, the xml document in figure is exactly be responsible for depositing the server domain name used when setting up link, the effect reached is that IP changes and sets up relative transparent to link.
2. the communications status of this link of long term maintenance is needed, until calling communication link-down module just closes whole communication process.
3. the error processing procedure (exception catching process) of necessity when communication link is set up, also need when setting up link and keep link communication to catch the exceptions such as UnknownHostException when link establishment except needing the basic IOException of seizure, make to adopt settling mode targetedly for different problems in the process setting up communication link.
The result of the direct restoring to normal position of authentication success, blocked before returning results always.
Command centre, when connecting subscribers participating dials request, thinks that native system sends the request of locating immediately as required, and system is restoring to normal position result after being sent to positioning authentication service system after process and carrying out authentication.Native system is transmitted to 110 platforms locating information again, realizes immediately locating, and instant location schematic diagram is as Fig. 7.
Command centre is when connecting subscribers participating dials request, the request of consecutive tracking is sent as required to native system, request is converted into some positioning time of response according to the time interval of request continuously and time period by system, is joined in timed task positioning sequence by these time points.Be responsible for the location of this warning message by positioning sequence and result is returned to this command centre.Realize following consecutive tracking, refer to Fig. 8 consecutive tracking schematic diagram.
Command centre is when connecting subscribers participating dials request, and send the request of timing location as required to native system, this current time point adds in timed task positioning sequence by system automatically.Be responsible for locating by positioning sequence and return results to command centre.Realize timing location, timing location schematic diagram is as Fig. 9.
This Rapid Alarm subsystem also possesses the function such as position history inquiry, System Operation Log record, diary record system running node simultaneously.
Native system is required for fixed-site and mobile place, to the original large data message of sky net system and interchange data pattern requirements very high, particularly camera position data acquisition, the installation site of sky net camera, accurately geography information describe and latitude and longitude coordinates.Native system scientifically solves the required positional information gathering sky net camera, and provides positional information typing interface and information introducting interface.Its approach is: one is that after signal 110 ranking machine that Intelligent alarming terminal sends is arrested, information is shaken hands.Two is send signaling to recall a day net camera and be reflected on map.Three is that the camera picture of ejection definition is on warning seat.Its framework is as follows:
(1) camera position data acquisition
Camera position data are derived by the PGIS Police Geographic Information System built with current prefectures and cities.
(2) camera position data management
The additions and deletions of the position data of camera change operation, and provide the positional information map of camera to describe management.
(3) camera device inquiry and management
Camera is combined with map by system, provides the map location mark of camera, and can click mark and open camera, so that can the field condition of real time inspection definition each camera lower.
(4) with sky net camera intelligent linkage
Command centre receive a crime report platform answer front end report to the police receive a crime report after, system is located in real time to intelligence two locating cellphone meter terminal places field position, and send alarm sound and light prompting operator on duty, automatically calculate scene of reporting a case to the security authorities simultaneously and whether have camera, if had, realize automatically opening the camera with customer location place in the very first time, automatically on alerting computer, eject 1-4 video camera real-time pictures of alarm set point periphery definition, realize alert locations and sky net camera links, and the sky net camera of on-the-spot periphery of may reporting a case to the security authorities is listed and is convenient to check the field condition across camera movement, it net checks that the on-the-spot schematic diagram across camera movement is shown in that Figure 10 and sky net check that moving on-the-spot structural representation across camera sees Figure 11.
Above-described on-the-spot rapid strike disposal system to be the most important part of the terrified Intelligent Large Scale System of whole rapid strike be native system, by PLC industrial control module principle, realizes national Iarge-scale system and solves the police service cloud data practical application solution of hitting terrified detonation, the attack of terrorism.
PLC works basic model:
The action that native system controls field apparatus is realized by PLC industrial module.
System installs the original-pack PLC of brand, supports text link, touch-screen link, computer on-line monitoring, current failure memory function.
PLC is by anti-interference CE-EMC certification.
Import ARM technical grade 32 bit CPU.
Anti-interference EFT test, is greater than technical grade highest standard 4KV
Fan-out capability, uses high-quality relay output current 5A, transistor modular output current 2A, band TVS protection
Modbus communication, supports 485ModbusRTU/ASCII master and slave communication, can networking, Long-distance Control, supervision more convenient
Principle of work:
Whole control system is made up of following key equipment:
(1) field apparatus; (2) C control module; (3) TCP/IP turns 232 modules; (4) central server; (5) command centre's user control terminal.
System architecture:
(1) field apparatus is divided into different group, often organizes maximum 16 of support equipment number.
(2) each group equipment is controlled by a PLC module.
(3) each PLC module is connected to TCP/IP converter.
(4) TCP/IP is connected to 110 by private line network and deals with emergencies and dangerous situations center.
(5) central server realizes controlling field apparatus by internet and tcp/ip communication.
Above-described backup system and system platform networking data sharing application subsystem, reserved standard development interface, achievement unit, province, city, county four cascade network, seamless access is realized with public security bureau other platform application, for large data system provides basic data information, the structural representation of four cascade networks is shown in that Figure 13 is shown in by the on-the-spot schematic diagram of Figure 12 and four cascade networks.
The structure function of four cascade networks:
(1) expanded function
With the wireless image transmission intelligent linkage system such as unmanned plane (intelligence two locating cellphone meter terminal)
The same with public security bureau's sky net supervisory system interlock principle, the wireless image transmission intelligent linkages such as unmanned plane (the two locating cellphone meter terminal of intelligence) are one of system spare interfaces.By wireless reverse transfer mode, the image that front-end camera is captured is ejected control system, then send signaling control wireless front end and carry out the evidence obtaining work of love scene location.
(2) according to the principle of hierarchical design, logic stripping, abstract service, integration access, realize the security administration of social face, internal institution security administration, " gridding " is carried out in emphasis place (position) security administration, serve and respond the rigid demand of people's sense of security, and provide the on-the-spot prompt-strike system warning in the whole nation of the large data seamless such as accessible rapid alarm system, sky net video monitoring system, on-the-spot prompt-strike system docking immediately to hit intelligent system.
Implementation: adopt B/S, C/S in conjunction with framework, intelligent alarm front end, command centre at county level, city-level command centre, provincial command centre, Sector Command Centre client are exempted to install.Carry out system manager's client secure to arrange and management.
Realize on-the-spot prompt-strike system warning global design requirement:
(1) client has become the trend of industry main flow at present based on the office automation of browser.County, city, province, portion's level Four in systems in which, whole employing is synchronized explorer mode (WEB mode) simultaneously, at county level is that there is the highest operating rights of disposal system in unit under battle conditions, many benefits can be brought like this: without the need to installing any software, the time is implemented in the installation greatly reducing system, can greatly reduce the workload of system maintenance simultaneously.System manager use band safety certification and private line network, CPU certification client, greatly improve the security of system, provide instrument flexibly conveniently to realize various flow process.
(2) design of memory systems disaster tolerance comprises data disaster tolerance and application disaster tolerance two class.Data disaster tolerance refers to the data system setting up a strange land, and this system is that of local crucial application data copies in real time.When disaster appears in local data and whole application system, system at least preserves the data of a available key business in strange land.Application disaster tolerance is on the basis of data disaster tolerance, sets up the back-up application system (can be backup each other) suitable with local production system of complete set in strange land.It is relatively complicated for setting up such system, not only needs a available data Replica, also will have and comprise the resource such as network, main frame, application, even IP, and the good coordination between each resource.No matter be data disaster tolerance or application disaster tolerance, the intervention of automatic flow, still be unable to do without the follow-up reparation of system manager and management work, this system has a SMS notification service, this service and system are logic isolation, service itself can detect the activity of link level system, once find mistake, and will SMS notification system manager.
(3) primary data center adopts the design of high reliability Cluster Solution, and Backup Data center is connected by DDN/VPN with primary data center, and primary data center system configuration main frame comprises two or multiple servers and other associated servers.Data are stored in primary data center storage server.Meanwhile, at the mutually isostructural storage server of remote backup data center configuration and one or more backup server.Automatically can realize primary data center by special disaster recovery software to store the real-time of data and Backup Data centre data and back up completely.At primary data center, according to user's requirement, tape backup server can also be configured, be used for backup software and tape library are installed.Backup server is directly connected to storage server, control system day regular data backup.
(4) system management function; on-the-spot prompt-strike system reports to the police instant strike intelligent system with social security management for core; emphasize to put prevention first; strike be auxiliary, improve people security precautions, emergency response process etc. and be applied to one, realize a set of powerful social safety net's total management system.The general frame structure of its system is as follows:
Access Layer: the data access providing multiple client, realizes the dynamic management of link layer and the dynamic adaptation of protocol layer.
Core layer: core layer is responsible for data, the interface security of guarantee system, provides map to access and arithmetic capability, ensures that the service logic of application layer is correctly responded.Core layer also provides self-checking system, ensures the correct running of whole system, once the node failure of the system of discovery, can and alarm, and proactive notification system manager.In addition, core layer also provides BOSS ability, so that system smoothly can access with all-purpose card, realizes Urban Campus net.
Application layer: application layer is responsible for service logic, user interactions, and WEB access capability is provided.The benefit done like this is when changing the service logic of user class, can not reciprocal effect to other business, also without the need to restarting the program of core layer and Access Layer.
(5) data management
Report query function; The track record of system, operation note, image and text message etc., can by various definitions condition query, like this can effective query society face, internal institution, emphasis place (position) violence a situation arises statistics; Gang video recording is inquired about; If default alarm set point interlock video, picture or video recording are captured in interlock, directly can recall the picture captured at that time and play video file etc. at that time when inquiring about alarm logging.
(6) security of system overall design
Computer system disaster be many-sided, from the angle of computer data management, the little maloperation to operating personnel causes the destruction of system, the loss of database; In to the damage of hard disc of computer, the damage of storage medium; The large non-computer systems factor that arrives is as fire, earthquake, floods etc.The continuation of maintenance business is the importance that current user carries out that data store needs consideration.Take long-range data disaster recovery ways, the high reliability of system can be improved, really protect operational sustainability.
Independent construction site prompt-strike system is reported to the police and is immediately hit the whole Iarge-scale system of intelligent system, it not exclusively depends on the department informationizations such as current public security organ and builds degree, system platform is in charge of all operations authority, grading authorized by user's PKI authentication, adopt network anti-intrusion system, secure border to access with external network, data network, can directly implement, short implementation cycle, input cost is very low, and is got up by the large data technique Seamless integration-such as video monitoring, prominent function.

Claims (9)

1. one kind based on the terrorist activity of video monitoring rapid strike networking security protection intelligence disposal system, it is characterized in that: arrange and comprise: two locating cellphone wrist-watch intelligent terminal, accessible rapid alarm system, it net video monitoring camera linked system, on-the-spot prompt-strike system, intelligent system central platform, database service, distribution and storage platform; Described two locating cellphone wrist-watch intelligent terminals, accessible rapid alarm system, sky net video monitoring camera linked system, on-the-spot prompt-strike system, database service, distribution and storage platform, intelligent system central platform is interconnected respectively by public network or dedicated network.
2. one according to claim 1 is based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system, it is characterized in that: described two locating cellphone wrist-watch intelligent terminals, press three seconds Rapid Alarm, intelligent positioning, effectively waterproof and dampproof.
3. one according to claim 1 is based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system, it is characterized in that: described accessible rapid alarm system and 110 alarm platforms are interconnected by dedicated network.
4. one according to claim 1 is based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system, it is characterized in that: described accessible rapid alarm system, comprise four subsystems: voice signaling data acquisition service subsystem, positioning service subsystem, positioning authentication service subsystem, positioning strategy and timed task service subsystem;
Described voice signaling data acquisition service subsystem comprises: data acquisition nucleus module, system data Configuration Manager, signaling data acquisition gateway Configuration Manager, statistical analysis module; Wherein data acquisition nucleus module uses multi-thread mechanism to gather the data of multiple collector, being transmitted to authentication service subsystem, guaranteeing response speed when conversing in a large number by gathering the data processing of coming; System data Configuration Manager configuration management user right system information; The parameters such as signaling data acquisition gateway Configuration Manager configuration signal collector IP, port, classification and region and emergency telephone number management; Statistical analysis module provides placement of emergency calls number to add up, voice signaling gathers load analysis and communication interface data analysis, and data backup restoration service is provided, important business datum, Operation Log, critical data, database and operating system are backed up and date restoring, what data backup adopted is utilize program backstage automated back-up, manually arranges backup cycle;
Described positioning service subsystem passes through the latitude and longitude coordinates positional information of the two locating cellphone table mobile terminal terminal user of Network Capture intelligence of operator, under the support of electronic map platform, for user provides relevant position information service; By the two locating cellphone meter terminal mandate location of intelligence, use time of arrival (TOA) technically, strengthen Measuring Time difference (E-OTD) two kinds of modes, position success rate, location average waiting duration statistical study are provided;
Described positioning authentication service subsystem carries out authentication to the positioning strategy that the preposition service system of positioning strategy sends over, and to the request response positioning result that authentication is passed through, the request such as instant location, consecutive tracking that 110 platforms are initiated to positioning strategy and timed task service system, after positioning strategy and the process of timing services system, request forward is carried out authentication to authentication service system, and query history dials information, report speech data information simultaneously; The data of authentication service communications protocol use XML format, comprise three parts: logical protocol, physical layer protocol, content protocol, authentication rate is provided unsuccessfully, successful authentication rate, tracking frequencies, number of authentications, alert event prone areas, multiple time period, system load statistical study, guarantees that data security is reliable;
Described positioning strategy and timed task service subsystem provide locates immediately, timing location, consecutive tracking strategy, store authentication information, on a time period, calling number, called number inquiry query composition inquiry incoming information.
5. one according to claim 1 is based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system, it is characterized in that: described intelligent system central platform and Jingwutong's equipment are interconnected, intelligent centre system platform supports the GPS agreement of Jingwutong, and positioning compensation is done to the region that GPS cannot cover, point scope tube of Jingwutong is carried out to the management map of gridding, realize the two locating cellphone meter terminal of intelligence, 110 receive a crime report platform, Jingwutong's Three-Way Calling, intelligence arranges police's responding, record responding situation, working position, online situation, the also Vehicle tracing linked system of other Partial flats application systems of accessible public security bureau, described employing B/S, C/S are in conjunction with framework, Intelligent alarming terminal, at county level 110, city-level 110, provincial 110, ministerial level 110 client exempt to install, and are convenient to that unit at different levels uses, maintenance and management.
6. one according to claim 1 is based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system, it is characterized in that: described sky net video monitoring camera linked system connects the existing urban road video monitoring system of public security bureau, the alerting signal that the two locating cellphone meter terminals of intelligence or other alarm terminals send is after 110 ranking machines are arrested, sending the sky net camera that signaling recalls terminal position and periphery is reflected on map, ejects 1 to 4 camera picture of periphery definition on warning seat.
7. one according to claim 1 is based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system, it is characterized in that: described on-the-spot prompt-strike system comprises central server, PLC industrial control module, on-site terminal three part, central server is by TCP/IP private line access PLC industrial control module, control on-the-spot sprayer terminal to spray water to knock region, or police dacryagogue is sprayed to terrorist, realize on-the-spot rapid strike.
8. a kind of rapid strike terrorist activity networking security protection intelligent remote disposal system according to claim 7, is characterized in that: described on-the-spot sprayer terminal arranges and comprises medicine tank, intelligent apparatus, solenoid valve and fog-spray nozzle; Described medicine tank is square or circular, is provided with fixing feet and dosing mouth; Described fixing feet, intelligent apparatus and dosing mouth are located at napex or the side of medicine tank respectively; Described fog-spray nozzle is circle, cylindrical shape and taper, and fog-spray nozzle is connected by the bottom of solenoid valve with medicine tank; Described intelligent apparatus is connected with solenoid valve by connecting line.
9. one according to claim 1 is based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system, it is characterized in that: described database service, distribution and storage platform provide alert data, speech data, locator data, system configuration data, Dynamic System record, the Data dissemination such as picture or video recording and storage are captured in interlock, and there is high-level disaster tolerance, primary data center adopts the design of high reliability Cluster Solution, Backup Data center is connected by DDN/VPN with primary data center, primary data center system configuration main frame comprises two or multiple servers and other associated servers, data are stored in primary data center storage server, simultaneously, at the mutually isostructural storage server of remote backup data center configuration and one or more backup server, automatically can realize primary data center by special disaster recovery software to store the real-time of data and Backup Data centre data and back up completely, at primary data center according to user's requirement, tape backup server can also be configured, be used for backup software and tape library are installed, backup server is directly connected to storage server, control system day regular data backup.
CN201510074719.4A 2015-02-12 2015-02-12 One kind is based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system Expired - Fee Related CN104635611B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510074719.4A CN104635611B (en) 2015-02-12 2015-02-12 One kind is based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510074719.4A CN104635611B (en) 2015-02-12 2015-02-12 One kind is based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system

Publications (2)

Publication Number Publication Date
CN104635611A true CN104635611A (en) 2015-05-20
CN104635611B CN104635611B (en) 2017-07-07

Family

ID=53214487

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510074719.4A Expired - Fee Related CN104635611B (en) 2015-02-12 2015-02-12 One kind is based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system

Country Status (1)

Country Link
CN (1) CN104635611B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105573343A (en) * 2016-02-22 2016-05-11 铱格斯曼航空科技集团有限公司 Capture system based on unmanned aerial vehicle
CN105719052A (en) * 2016-01-13 2016-06-29 天津中科智能识别产业技术研究院有限公司 GIS-based disaster emergency linkage command system
CN107240057A (en) * 2017-05-24 2017-10-10 南京金盾公共安全技术研究院有限公司 Video monitoring residence management system and management method based on Quick Response Code
CN107657813A (en) * 2017-09-21 2018-02-02 中交第二公路勘察设计研究院有限公司 Freeway traffic law enforcement method of discrimination based on wheelpath
CN108288365A (en) * 2017-06-01 2018-07-17 北京石油化工学院 A kind of intelligent alarm method, intelligent terminal and intelligent alarm processing system
CN109302485A (en) * 2018-10-19 2019-02-01 河南汇纳科技有限公司 A kind of city alert monitoring system based on Internet of Things
CN110333699A (en) * 2019-05-05 2019-10-15 深圳市万睿智能科技有限公司 A kind of equipment centralized management system
CN110533867A (en) * 2018-05-25 2019-12-03 昆达电脑科技(昆山)有限公司 Fire monitoring alarm system
CN111372197A (en) * 2020-03-12 2020-07-03 深圳市天彦通信股份有限公司 Early warning method and related device
CN112749126A (en) * 2020-12-28 2021-05-04 贵州东冠科技有限公司 Law enforcement record data archive management method and system
CN114999099A (en) * 2022-07-18 2022-09-02 中国地质大学(武汉) Big data based collaborative early warning method, device, equipment and storage medium
CN116599994A (en) * 2023-05-25 2023-08-15 北京格林威尔科技发展有限公司 Intelligent access control monitoring video computing gateway system based on Internet of things and cloud computing

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070112574A1 (en) * 2003-08-05 2007-05-17 Greene William S System and method for use of mobile policy agents and local services, within a geographically distributed service grid, to provide greater security via local intelligence and life-cycle management for RFlD tagged items
CN203425434U (en) * 2013-07-12 2014-02-12 上海赛复安防科技有限公司 Intelligent real-time monitoring and fire extinguishing system for large-space fire
CN103745579A (en) * 2014-01-15 2014-04-23 武汉科技大学 Security and protection monitoring system
CN203825790U (en) * 2014-05-07 2014-09-10 兰州石化职业技术学院 Distributed type oil depot fire control alarming system
CN204515463U (en) * 2015-02-12 2015-07-29 梧州市家安安防有限责任公司 A kind of based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070112574A1 (en) * 2003-08-05 2007-05-17 Greene William S System and method for use of mobile policy agents and local services, within a geographically distributed service grid, to provide greater security via local intelligence and life-cycle management for RFlD tagged items
CN203425434U (en) * 2013-07-12 2014-02-12 上海赛复安防科技有限公司 Intelligent real-time monitoring and fire extinguishing system for large-space fire
CN103745579A (en) * 2014-01-15 2014-04-23 武汉科技大学 Security and protection monitoring system
CN203825790U (en) * 2014-05-07 2014-09-10 兰州石化职业技术学院 Distributed type oil depot fire control alarming system
CN204515463U (en) * 2015-02-12 2015-07-29 梧州市家安安防有限责任公司 A kind of based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105719052A (en) * 2016-01-13 2016-06-29 天津中科智能识别产业技术研究院有限公司 GIS-based disaster emergency linkage command system
CN105573343A (en) * 2016-02-22 2016-05-11 铱格斯曼航空科技集团有限公司 Capture system based on unmanned aerial vehicle
CN107240057A (en) * 2017-05-24 2017-10-10 南京金盾公共安全技术研究院有限公司 Video monitoring residence management system and management method based on Quick Response Code
CN108288365A (en) * 2017-06-01 2018-07-17 北京石油化工学院 A kind of intelligent alarm method, intelligent terminal and intelligent alarm processing system
CN107657813B (en) * 2017-09-21 2020-09-04 中交第二公路勘察设计研究院有限公司 Highway traffic law enforcement discrimination method based on driving track
CN107657813A (en) * 2017-09-21 2018-02-02 中交第二公路勘察设计研究院有限公司 Freeway traffic law enforcement method of discrimination based on wheelpath
CN110533867A (en) * 2018-05-25 2019-12-03 昆达电脑科技(昆山)有限公司 Fire monitoring alarm system
CN109302485A (en) * 2018-10-19 2019-02-01 河南汇纳科技有限公司 A kind of city alert monitoring system based on Internet of Things
CN110333699A (en) * 2019-05-05 2019-10-15 深圳市万睿智能科技有限公司 A kind of equipment centralized management system
CN111372197A (en) * 2020-03-12 2020-07-03 深圳市天彦通信股份有限公司 Early warning method and related device
CN112749126A (en) * 2020-12-28 2021-05-04 贵州东冠科技有限公司 Law enforcement record data archive management method and system
CN114999099A (en) * 2022-07-18 2022-09-02 中国地质大学(武汉) Big data based collaborative early warning method, device, equipment and storage medium
CN114999099B (en) * 2022-07-18 2022-12-30 中国地质大学(武汉) Big data based collaborative early warning method, device, equipment and storage medium
CN116599994A (en) * 2023-05-25 2023-08-15 北京格林威尔科技发展有限公司 Intelligent access control monitoring video computing gateway system based on Internet of things and cloud computing
CN116599994B (en) * 2023-05-25 2023-11-17 北京格林威尔科技发展有限公司 Intelligent access control monitoring video computing gateway system based on Internet of things and cloud computing

Also Published As

Publication number Publication date
CN104635611B (en) 2017-07-07

Similar Documents

Publication Publication Date Title
CN104635611B (en) One kind is based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system
US7080144B2 (en) System enabling access to obtain real-time information from a cell site when an emergency event occurs at the site
US6792269B2 (en) System, method and apparatus for tracking deployment of cellular telephone network sites
CN110210696A (en) A kind of emergency communication Command Management System
CN106230636A (en) Radio monitoring net whole network equipment monitoring system
US6807265B2 (en) System, method and apparatus for court-ordered surveillance of call records
US6788933B2 (en) System, method and apparatus for capturing and processing call processing failures occurring at a digital wireless switch
CN110212968A (en) A kind of emergency communication ICBM SHF satellite terminal management system
CN105190721A (en) Personnel crisis communications management system
CN104052964A (en) Security worker duty management method and system adopted by method
CN104484474A (en) Database security auditing method
RU113394U1 (en) SYSTEM OF ELECTRONIC MONITORING OF CONTROLLED PERSONS
CN102056202A (en) Mobile terminal error processing method and system
CN106131006A (en) House based on GIS Life cycle safety management system
CN112598368A (en) Sewage treatment online supervision platform
CN109478056A (en) Intelligent node for distributed grid network
CN104599049A (en) Method and device for gridding managing polices
CN204515463U (en) A kind of based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system
CN103679612A (en) Intelligent government affair and innovative social management system
CN110517165A (en) A kind of water utilities micro services support platform
US20020119786A1 (en) System, apparatus and method for managing telephone call records
CN108416721A (en) A kind of emergency management system
CN113034857A (en) Urban natural disaster monitoring emergency management scheduling platform based on block chain
CN105023085A (en) City state mobile supervision system and method
CN108876363A (en) A kind of cross-border supervision reporting system based on double-strand framework block chain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170707

Termination date: 20210212

CF01 Termination of patent right due to non-payment of annual fee