CN105184193B - Safety defense monitoring system and method - Google Patents
Safety defense monitoring system and method Download PDFInfo
- Publication number
- CN105184193B CN105184193B CN201510646177.3A CN201510646177A CN105184193B CN 105184193 B CN105184193 B CN 105184193B CN 201510646177 A CN201510646177 A CN 201510646177A CN 105184193 B CN105184193 B CN 105184193B
- Authority
- CN
- China
- Prior art keywords
- data
- control device
- arm control
- discrepancy
- upper level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/76—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
Abstract
The present invention relates to a kind of safety defense monitoring system, the system comprises: data acquisition device enters and leaves data for acquiring;ARM control device for obtaining the discrepancy data, and judges whether the discrepancy data have corresponding permission;If the discrepancy data have corresponding permission, the ARM control device is also used to send instruction of letting pass to access apparatus, so that the access apparatus instructs to let pass according to the clearance;If the discrepancy data do not have corresponding permission, the ARM control device is also used to issue alarm signal.Cost can be effectively reduced using this system and improve reliability.Further, it would be desirable to provide a kind of security-protecting and monitoring methods.
Description
Technical field
The present invention relates to security device technical fields, more particularly to a kind of safety defense monitoring system and method.
Background technique
As the development of computer technology and the security protection consciousness of people gradually increase, safety defense monitoring system has been obtained extensively
General application.Traditional safety defense monitoring system is by microcomputer, interface circuit, RFID (Radio Frequency
Identification, radio frequency identification) compositions such as radio-frequency unit and external common apparatus carry out data acquisition and security protection control.
Due to micro computer hardware equipment cost with higher, lead to traditional safety defense monitoring system cost increase.Due to miniature
The dust-proof of computer, shockproof properties are poor, lead to traditional safety defense monitoring system reliability decrease.How security protection prison is effectively reduced
The cost of the control system and reliability for effectively improving safety defense monitoring system becomes a technical problem needing to solve at present.
Summary of the invention
Based on this, it is necessary to which in view of the above technical problems, providing one kind can be effectively reduced cost and improve reliability
Safety defense monitoring system and method.
A kind of safety defense monitoring system, the system comprises:
Data acquisition device enters and leaves data for acquiring;
ARM control device for obtaining the discrepancy data, and judges whether the discrepancy data have corresponding power
Limit;
If the discrepancy data have corresponding permission, the ARM control device is also used to send to access apparatus and let pass
Instruction, so that the access apparatus instructs to let pass according to the clearance;
If the discrepancy data do not have corresponding permission, the ARM control device is also used to issue alarm signal.
In one of the embodiments, the system also includes: the ARM control device includes that bottom hardware and upper layer are answered
With program, the bottom hardware is used to read the discrepancy number according to default communication protocol according to the data acquisition session received
According to and cached, the upper level applications be used for obtained by automatic regular polling caching after discrepancy data.
In one of the embodiments, the ARM control device be also used to by treated enter and leave data write-in database,
It is described treated enter and leave data in include let pass record and alarm logging.
In one of the embodiments, the system also includes server, permission number has been stored in advance on the server
According to the ARM control device is also used to compare the discrepancy data and pre-stored permissions data on the server
It is right, to judge whether the discrepancy data have corresponding permission.
The ARM control device includes package operation system, upper level applications and house dog in one of the embodiments,
The multiple programs of program and bottom hardware, the house dog program are used to monitor the working condition of the ARM control device, work as institute
When stating operating system or the upper level applications and breaking down, the house dog program is used for the operating system or described
Upper level applications carry out reboot operation, and when the bottom hardware breaks down, the house dog program is for issuing failure
Indication signal.
A kind of security-protecting and monitoring method, which comprises
It is acquired using data acquisition device and enters and leaves data;
The discrepancy data are obtained using ARM control device;
Judge whether the discrepancy data have corresponding permission using the ARM control device;
If so, instruction of letting pass is sent to access apparatus using the ARM control device, so that the access apparatus root
It is instructed according to the clearance to let pass;
Otherwise, alarm signal is issued using the ARM control device.
The ARM control device includes bottom hardware and upper level applications, the utilization in one of the embodiments,
ARM control device obtain the discrepancy data the step of include:
The discrepancy is read according to default communication protocol according to the data acquisition session received using the bottom hardware
Data are simultaneously cached;
Discrepancy data after obtaining caching by automatic regular polling using the upper level applications.
In one of the embodiments, the method also includes: using the ARM control device will treated enter and leave number
According to write-in database, it is described treated enter and leave data in include let pass record and alarm logging.
It is described in one of the embodiments, that using the ARM control device, by treated, data are written in discrepancy data
The step of library includes:
Database file is obtained using the upper level applications, and judges whether the database file is writeable;
If so, inquiry whether there is entity category information corresponding with the discrepancy data;
If it does not exist, then parsing is carried out to entity class and reflection handles to obtain entity class corresponding with the discrepancy data
Information;
Judge whether to obtain and writes lock;
If so, calling the data-interface of the ARM control device that the discrepancy data correspondent entity category information is written
Database.
In one of the embodiments, it is described to entity class carry out parsing and reflection handle to obtain and the discrepancy data
The step of corresponding entity category information includes:
Obtain all field attributes of entity class;
The method in entity class is traversed, the method in the entity class includes setter method;
Obtain the setter method;
The setter method for needing to reflect is obtained, and is reflected according to parameter type;
The object generated after reflection is packaged, corresponding entity category information is obtained.
Above-mentioned safety defense monitoring system and method are collected by using ARM control device to obtain data acquisition device
Discrepancy data issue instruction of letting pass to access apparatus if ARM control device, such as if entering and leaving data has corresponding permission
Fruit enters and leaves data and does not have corresponding permission, and ARM control device then issues alarm signal.Due to the cost ratio of ARM control device
The cost of microcomputer is low, and thus, it is possible to the cost of safety defense monitoring system is effectively reduced.Due to ARM control device it is dust-proof,
Shockproof properties are more dust-proof than microcomputer, shockproof properties are high, and ARM control device integrated level with higher, therefore energy
Enough effectively improve the reliability of safety defense monitoring system.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of safety defense monitoring system in one embodiment;
Fig. 2 is the structural schematic diagram of safety defense monitoring system in another embodiment;
Fig. 3 is the structural schematic diagram of safety defense monitoring system in another embodiment;
Fig. 4 is the flow chart of security-protecting and monitoring method in one embodiment.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the present invention, not
For limiting the present invention.
In one embodiment, as shown in Figure 1, providing a kind of safety defense monitoring system, which includes: data acquisition dress
Set a kind of 102 and ARM (Advanced RISC Machines, microprocessor) control device 104, in which:
Data acquisition device 102 enters and leaves data for acquiring.
ARM control device 104 enters and leaves data for obtaining, and judges to enter and leave whether data have corresponding permission;If going out
Enter data with corresponding permission, ARM control device 104 is also used to send instruction of letting pass to access apparatus, so that entering and leaving dress
It sets according to instruction is let pass and lets pass;If entering and leaving data does not have corresponding permission, ARM control device 104 is also used to issue alarm
Signal.
In the present embodiment, entering and leaving data includes the data that personnel and vehicle etc. are passed in and out by access apparatus.Access apparatus
Including gate inhibition and gate etc..Data acquisition device includes the channel RFID, fingerprint machine and infrared receiver etc., wherein the channel RFID
It can be used cooperatively with infrared receiver.It the channel RFID can be with the discrepancy information of collector or vehicle etc., according to infrared ray
Personnel can be calculated in the data of receiver acquisition or vehicle passes through the direction of travel (such as enter or leave) of access apparatus, is
No is vehicle etc..
ARM control device includes bottom hardware and upper level applications in one of the embodiments, and bottom hardware is used for
It is read according to the data acquisition session received according to default communication protocol and enters and leaves data and cached, upper level applications are used
Discrepancy data after obtaining caching by automatic regular polling.
Operating system, such as Android (Android) operating system and (SuSE) Linux OS have been run on ARM control device
Deng.Further include data stack on ARM control device, stores data acquisition session in data stack.Data acquisition session can be with
It is realized by thread.After data acquisition session is activated by operating system, bottom hardware is by driver first to default logical
Letter agreement is initialized, subsequently into circulation wait state.Bottom hardware by serial ports or network and data acquisition device into
Row communication.Bottom hardware initializes buffer area after receiving the data acquisition session activated by operating system, and
It is read according to the data acquisition session received according to default communication protocol and enters and leaves data, and by the discrepancy data read slow
It rushes in area and is cached.Default communication protocol refers to the transformat for entering and leaving data, including card number and time.
Upper level applications are timed poll by the data-interface of bottom hardware to obtain the discrepancy number in buffer area
According to.It is (fixed using independent clock object AlarmManager in order to guarantee the accuracy of poll and the performance of ARM control device
When device) Lai Zhihang automatic regular polling.
Further, ARM control device can also include storage card slot, after being inserted into storage card on storage card slot,
The discrepancy data that ARM control device is got can be saved by storage card.Storage card can be TF card (Trans-
Flash Card, abbreviation TF card) or SD card (Secure Digital Memory Card, safe digital card) etc..By that will go out
Enter data to be stored in storage card, can effectively overcome the discrepancy as caused by abnormal power-down of the mechanical hard disk in microcomputer
Corrupted data or loss, it is ensured that enter and leave the safety of data.
ARM control device carries out permission judgement to the discrepancy data got.Specifically, can be in ARM control device
Permissions data is stored in advance, permissions data can also be stored in advance in the server.Data and pre-stored permission will be entered and left
Data are compared, and pass through if compared, then it represents that the discrepancy data have corresponding permission, and ARM control device is filled to discrepancy
Transmission clearance instruction is set, access apparatus is let pass according to instruction is let pass so that personnel or vehicle etc. can pass through the access apparatus.Such as
Fruit, which compares, not to be passed through, then it represents that the discrepancy data do not have corresponding permission, and ARM control device issues alarm signal.
In the present embodiment, the collected discrepancy data of data acquisition device institute are obtained by using ARM control device, such as
Fruit, which enters and leaves data, has corresponding permission, and ARM control device then issues instruction of letting pass to access apparatus, does not have if entering and leaving data
There is corresponding permission, ARM control device then issues alarm signal.Due to ARM control device cost than microcomputer at
This is low, and thus, it is possible to the cost of safety defense monitoring system is effectively reduced.Since the dust-proof of ARM control device, shockproof properties are than miniature
The dust-proof of computer, shockproof properties are high, and ARM control device integrated level with higher, therefore can effectively improve security protection
The reliability of monitoring system.And ARM control device is small in size, and easy to carry and installation can facilitate embedding data acquisition device
In, the intelligence degree of data acquisition device can be effectively improved.
In one embodiment, ARM control device be also used to by treated enter and leave data write-in database, treated
Enter and leave includes let pass record and alarm logging in data.
In the present embodiment, ARM control device can be handled data are entered and left, including permission judgement, controlling alarm etc..
After carrying out permission judgement, if entering and leaving data has corresponding permission, instruction of letting pass is sent to access apparatus, and remembered
Record generates record of letting pass.If entering and leaving data does not have corresponding permission, alarm signal is issued, and recorded, generates report
Alert record.ARM control device will enter and leave data, the persistences such as record and alarm logging of letting pass write-in database stores,
So that the later period checks.
In one embodiment, as shown in Fig. 2, system further includes server 106, power has been stored in advance on server 106
Data are limited, ARM control device 104 is also used to enter and leave data and is compared with pre-stored permissions data on server 106,
To judge to enter and leave whether data have corresponding permission.
In the present embodiment, server is communicated with ARM control device by network.ARM control device is being got out
After entering data, pre-stored permissions data on server is transferred by network, data will be entered and left and be compared with permissions data.
Permissions data can be stored compared with storing permissions data by storage card in ARM control device, on server more more
Comprehensively, more acurrate thus, it is possible to compare permission.
In one embodiment, as shown in figure 3, system further includes photographic device 108, x-ray apparatus 108 is for acquiring view
Picture and/or video;ARM control device 104 is also used to obtain picture and/or video, and data are written in picture and/or video
Library.
In the present embodiment, photographic device includes security protection camera and security monitoring video camera etc..Photographic device passes through network and ARM
Control device is communicated.The picture of photographic device acquisition can be the photo of photographic device candid photograph.It is filled for example, being controlled in ARM
When setting transmission clearance instruction, triggering photographic device is captured, and obtains the personnel by access apparatus or the photo of vehicle.?
When ARM control device issues alarm signal, triggering photographic device is captured, and obtains personnel when alarm or the photo of vehicle.
Photographic device can also carry out real-time video monitoring shooting to access apparatus.Photographic device can be transmitted to ARM with multi-channel video
Control device.For example, can have 9 tunnel real-time video transmissions to ARM control device.Picture that ARM control device will acquire and/
Or database is written in video persistence, to facilitate the later period to check.
In one embodiment, ARM control device includes that package operation system, upper level applications and house dog program are multiple
Program and bottom hardware, house dog program is used to monitor the working condition of ARM control device, when operating system or upper layer application
When program breaks down, house dog program is used to carry out reboot operation to operating system or upper level applications, fills when ARM is controlled
When the bottom hardware set breaks down, house dog program is for issuing fault indication signal.
In the present embodiment, operating system is during long-play it is possible that operation slowly causes access apparatus to have
Compared with the failure of long delay, such as operation ARM control is caused due to the certain self reasons of operating system or third equation
The resource of device is largely occupied, is consumed, slow so as to cause operating system processing speed.In response to this, if it is determined that
Continuously entering and leaving the data corresponding time difference twice is more than the first preset time (such as 2 seconds), then house dog program can open again
Dynamic upper level applications.Further, lead to house dog in order to avoid a large amount of discrepancy data can be saved bit by bit in data acquisition device
Program frequent starting upper level applications will not be touched in the second preset time (such as 30 minutes) after upper level applications starting
Send out house dog program.
Operating system is it is possible that unexpected collapse failure.Just one is opened when os starting has super-ordinate right
Finger daemon, it is fixed with bootstrap transmission heartbeat by the finger daemon.If being more than that third preset time (such as 3 seconds) do not connect
Receive the heartbeat of bootstrap return, then it represents that unexpected collapse failure occurs in operating system.At this point, house dog program can be to behaviour
The operation such as reset or restarted as system.
When upper level applications break down in operation, such as when there is accidentally quit, unexpected collapse, house dog journey
Sequence can respond in the 4th preset time (such as 10 seconds), and re-launching applications.
The driver timing of bottom hardware is communicated with data acquisition device, and Content of Communication is fed back to upper layer and is answered
Use program.If there is the case where feeding back without Content of Communication beyond continuous preset times (such as 5 times), then it represents that bottom hardware
It breaks down.House dog program will record bottom hardware fault message at this time, and issue failure indication signal, for example, opening event
Hinder indicator light.
In the present embodiment, the running gear of ARM control device is monitored by house dog program, to operating system or upper layer
The failure that application program occurs can carry out corresponding processing and self modification in time, and the failure occurred for bottom hardware can
Fault indication signal is issued in time, it is ensured that the operation of safety defense monitoring system.
In one embodiment, as shown in figure 4, providing a kind of security-protecting and monitoring method, this method is specifically included:
Step 402, it is acquired using data acquisition device and enters and leaves data.
Step 404, it is obtained using ARM control device and enters and leaves data.
Step 406, judge to enter and leave whether data have corresponding permission using ARM control device;If so, entering step
408, otherwise, then enter step 410.
Step 408, instruction of letting pass is sent to access apparatus using ARM control device, so that access apparatus is according to clearance
Instruction is to let pass.
Step 410, alarm signal is issued using ARM control device.
In the present embodiment, data acquisition device includes the channel RFID, fingerprint machine and infrared receiver etc..Data acquisition dress
The discrepancy data that collector or vehicle etc. are set by access apparatus to pass in and out.ARM control device in one of the embodiments,
It include: to utilize bottom using the step of ARM control device acquisition discrepancy data including bottom hardware and upper level applications
Hardware reads according to default communication protocol according to the data acquisition session received and enters and leaves data and cached;It is answered using upper layer
Discrepancy data after obtaining caching by automatic regular polling with program.Default communication protocol refers to the transformat for entering and leaving data,
Including card number and time.Upper level applications can execute automatic regular polling using independent clock object AlarmManager.
ARM control device carries out permission judgement to the discrepancy data got.Specifically, can be in ARM control device
Permissions data is stored in advance, permissions data can also be stored in advance in the server.Data and pre-stored permission will be entered and left
Data are compared, and pass through if compared, then it represents that the discrepancy data have corresponding permission, and ARM control device is filled to discrepancy
Transmission clearance instruction is set, access apparatus is let pass according to instruction is let pass so that personnel or vehicle etc. can pass through the access apparatus.Such as
Fruit, which compares, not to be passed through, then it represents that the discrepancy data do not have corresponding permission, and ARM control device issues alarm signal.
In the present embodiment, the collected discrepancy data of data acquisition device institute are obtained by using ARM control device, such as
Fruit, which enters and leaves data, has corresponding permission, and ARM control device then issues instruction of letting pass to access apparatus, does not have if entering and leaving data
There is corresponding permission, ARM control device then issues alarm signal.Due to ARM control device cost than microcomputer at
This is low, and thus, it is possible to the cost of safety defense monitoring system is effectively reduced.Since the dust-proof of ARM control device, shockproof properties are than miniature
The dust-proof of computer, shockproof properties are high, and ARM control device integrated level with higher, therefore can effectively improve security protection
The reliability of monitoring system.And ARM control device is small in size, and easy to carry and installation can facilitate embedding data acquisition device
In, the intelligence degree of data acquisition device can be effectively improved.
Further, the event and alarm supported in security-protecting and monitoring method provided in this embodiment include: that an overcrowding, people is more
Card, without card personnel, have card lack of competence personnel, antisubmarine time, it is inactive time period, normal.Wherein, refer to for antisubmarine time personnel by entering and leaving dress
Set entrance after and leave, can be it is into and out by the same access apparatus, be also possible to by some enter and leave dress
After setting entrance, left by another access apparatus.Just referring to discrepancy data has corresponding permission, and access apparatus
It lets pass.
It is illustrated so that personnel hold through gate as an example.Data acquisition device collects personnel and enters the discrepancy before gate
Data, and ARM control device is reported to by data are entered and left.ARM control device judges the discrepancy number after receiving discrepancy data
Whether the card number in is effective, if effective card number, then continues to judge whether the card number has corresponding permission, if changing card number
With corresponding permission, then ARM control device sends instruction of letting pass to gate, and gate opens a sluice gate to let pass, which enters gate.Sentence
It is disconnected whether to need to monitor the personnel whether antisubmarine time, it monitors if necessary antisubmarine time, then further judges the lock that the personnel enter
Whether machine and other gates belong to same antisubmarine time group, if it is, ARM control device connects server, by server come
The gate that the gate entered with the personnel belongs to same antisubmarine time group is obtained, it is corresponding according to other gates in same antisubmarine time group
Data are entered and left to search whether the personnel have left.If the personnel have been left by other gates, then it represents that the personnel are anti-
Sneak into personnel.
In one embodiment, judge that entering and leaving data whether to have the step of corresponding permission includes: to control to fill using ARM
Data will be entered and left by setting is compared with permissions data pre-stored on server, to judge it is corresponding whether discrepancy data have
Permission.
In the present embodiment, server is communicated with ARM control device by network.ARM control device is being got out
After entering data, pre-stored permissions data on server is transferred by network, data will be entered and left and be compared with permissions data.
Permissions data can be stored compared with storing permissions data by storage card in ARM control device, on server more more
Comprehensively, more acurrate thus, it is possible to compare permission.
In one embodiment, method further include: data are written in discrepancy data by treated using ARM control device
Library, it includes let pass record and alarm logging in data that treated, which enters and leaves,.
In the present embodiment, ARM control device is after carrying out permission judgement, if entering and leaving data has corresponding permission,
Instruction of letting pass then is sent to access apparatus, and is recorded, record of letting pass is generated.If entering and leaving data does not have corresponding power
Limit, then issue alarm signal, and recorded, and generates alarm logging.ARM control device will enter and leave data, let pass record and
The persistences such as alarm logging write-in database is stored, so that the later period checks.
In one embodiment, inciting somebody to action the step of treated enters and leaves data write-in database using ARM control device includes:
Database file is obtained using upper level applications, and judges whether database file is writeable;If so, inquiry with the presence or absence of with
Enter and leave the corresponding entity category information of data;If it does not exist, then parsing is carried out to entity class and reflection handles to obtain and discrepancy number
According to corresponding entity category information;Judge whether to obtain write-in lock;If so, calling the data-interface of ARM control device will enter and leave
Database is written in data correspondent entity category information.
In the present embodiment, upper level applications can to enter and leave data handle, including data analysis, controlling alarm with
And with the interaction of server etc..After handling processing data, upper level applications can receive data storage request,
What the user that the data storage request can be safety defense monitoring system was issued by ARM control device, it is also possible to ARM control
What device issued.According to data storage request, upper level applications can database be written in discrepancy data persistence by treated
In.
Upper level applications judge whether database file is writeable.Specifically, can be according to the read-write of database file
And can whether the link of database file be opened for test judgement.For according to the read-write of database file come into
Row judgement, can be written byte into the database file, if byte can be written, then it represents that the database file is currently located
In can write state.If byte cannot be written, then it represents that the database file is not presently within can write state.For according to data
Can whether the link of library file be opened for test judgement, can open the link of database file offer, if link
It can open, then it represents that the database file is currently at can write state.If link cannot open, then it represents that the data library text
Part is not presently within can write state.
If database file be currently at can write state, upper level applications can in query caching whether there is and go out
Enter the corresponding entity category information of data.If it does not exist, then need to enter and leave the corresponding entity class of data carry out parsing and
Reflection processing obtains entity category information corresponding with data are entered and left.For the entity class obtained after parsing and reflection is handled
Information can be deposited into caching, so that inquiry next time uses.
After obtaining entity category information, whether judgement can currently obtain write-in lock.If presently written thread is locked,
It namely obtains and writes lock, then can stop other writing tasks and reading task, after the completion of the writing task again in wake-up waiting
Writing task and reading task.If currently reading thread obtains institute, that is, obtains read lock, then it can stop writing task, but reading task
It can carry out shared reading, the writing task after the completion of the reading task, in wake-up waiting.After lock is write in acquisition, ARM control is called
By treated, database is written in discrepancy data correspondent entity category information to the data-interface of device.
In the present embodiment, due to entity category information have persistence, will treated enter and leave data correspondent entity class
Information can persistence write-in database stored, thus, it is possible to facilitate subsequent use.
In one embodiment, parsing is carried out to entity class and reflection handles to obtain entity class corresponding with data are entered and left
The step of information includes: all field attributes for obtaining entity class;The method in entity class is traversed, the method in entity class includes
Setter method;Obtain setter method;The setter method for needing to reflect is obtained, and is reflected according to parameter type;It will
The object generated after reflection is packaged, and obtains corresponding entity category information.
In the present embodiment, all field attributes of entity class are obtained, i.e.,
Field [] fields=c.getDeclaredFields ();
All methods in entity class are traversed, all method names in entity class are indicated using small letter.And it will be with small
Write method object in the method name and entity class in the entity class of expression respectively in a manner of key, value temporal cache to map
In (mapping).Domain is traversed, i.e. traversal fields, obtain the setter method name of field, setter method name uses small letter
It indicates, and obtains the setter method from key of the caching into map, value set, i.e.,
Method method=Map.get (" set "+field.getName () .toLowerCase ());
The setter method that will acquire is written as key with the small of field, and Method is that value is put into caching.It is read in circulation
When cursor data, the setter method for needing to reflect is obtained according to columns (column): i.e.
Int index=cursor.getColumnIndex (col);
Method method=methodMap.get (col.toLowerCase ()).
It according to the parameter type in method, is reflected: i.e.
Objectobj=c.newInstance ();
Class<?>argType=method.getParameterTypes () [0];
For example, parameter type is as follows for the reflection of the setter method of character string:
if(argType.equals(String.class));
method.invoke(obj,cursor.getString(index));
By the object encapsulation of generation to List (list), to obtain corresponding entity category information.
In one embodiment, this method further include: utilize photographic device acquisition picture and/or video;It is controlled using ARM
Device obtains picture and/or video, and database is written in picture and/or video.
In the present embodiment, the picture of photographic device acquisition can be the photo of photographic device candid photograph.Photographic device can be with
Real-time video monitoring shooting is carried out to access apparatus, acquires video.The picture and/or video that ARM control device will acquire
Database is written in persistence, to facilitate the later period to check.
In one embodiment, ARM control device includes that package operation system, upper level applications and house dog program are multiple
Program and bottom hardware, method further include: using the working condition of house dog program monitoring ARM control device, when operation is
When system or upper level applications break down, operating system or upper level applications are carried out restarting behaviour using house dog program
Make, when bottom hardware breaks down, issues fault indication signal using house dog program.
In the present embodiment, operating system is during long-play it is possible that operation slowly causes access apparatus to have
Compared with the failure of long delay, then house dog program can restart upper level applications.Operating system is it is possible that unexpected collapse
Failure.At this point, house dog program such as can be reset to operating system or be restarted at the operation.When upper level applications go out in operation
When existing failure, house dog program can be responded, and re-launching applications.When bottom hardware breaks down, house dog program meeting
Bottom hardware fault message is recorded, and issues failure indication signal, for example, opening malfunction indicator lamp.
The running gear that ARM control device is monitored by house dog program, goes out operating system or upper level applications
Existing failure can carry out corresponding processing and self modification in time, and the failure occurred for bottom hardware can issue event in time
Hinder indication signal, it is ensured that the operation of safety defense monitoring system.
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to protection of the invention
Range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.
Claims (9)
1. a kind of safety defense monitoring system, which is characterized in that the system comprises:
Data acquisition device, for acquiring the discrepancy data of monitored object;The data acquisition device includes the channel RFID and red
Outer line receiver;The channel RFID and the infrared receiver are used to cooperate the discrepancy information for acquiring the monitored object,
And identify that the monitored object is passing vehicle or current personnel according to information is entered and left;
Server, for storing permissions data;
ARM control device, for the discrepancy data to be compared with pre-stored permissions data on the server, with
Judge whether the discrepancy data have corresponding permission;
If the discrepancy data have corresponding permission, the ARM control device is also used to send instruction of letting pass to access apparatus,
So that the access apparatus instructs to let pass to the passing vehicle or the current personnel according to the clearance;
If the discrepancy data do not have corresponding permission, the ARM control device is also used to issue alarm signal;
Photographic device, for according to clearance instruction or alarm signal acquisition picture and/or video;
The ARM control device is also used to the picture and/or video write-in database.
2. system according to claim 1, which is characterized in that the system also includes: the ARM control device includes bottom
Layer hardware and upper level applications, the bottom hardware are used for according to the data acquisition session received according to default communication protocol
It reads the discrepancy data and is cached, the upper level applications are used to obtain the discrepancy after caching by automatic regular polling
Data.
3. system according to claim 1, which is characterized in that the ARM control device be also used to by treated enter and leave
Data be written database, it is described treated enter and leave data in include let pass record and alarm logging.
4. system according to claim 1, which is characterized in that the ARM control device includes that package operation system, upper layer are answered
With program and the multiple programs of house dog program and bottom hardware, the house dog program is for monitoring the ARM control device
Working condition, when the operating system or the upper level applications break down, the house dog program is used for institute
It states operating system or the upper level applications carries out reboot operation, when the bottom hardware breaks down, the house dog
Program is for issuing fault indication signal.
5. a kind of security-protecting and monitoring method, which comprises
Utilize the discrepancy data of data acquisition device acquisition monitored object;The data acquisition device includes the channel RFID and infrared
Line receiver;The channel RFID and the infrared receiver are used to cooperate the discrepancy information for acquiring the monitored object, and
Identify that the monitored object is passing vehicle or current personnel according to the discrepancy information;
The discrepancy data are obtained using ARM control device;
Pre-stored permissions data on server is obtained using ARM control device, by the discrepancy data and the permission number
According to being compared, to judge whether the discrepancy data have corresponding permission;
If so, instruction of letting pass is sent to access apparatus using the ARM control device, so that the access apparatus is according to institute
Clearance instruction is stated to let pass to the passing vehicle or the current personnel;
Otherwise, alarm signal is issued using the ARM control device;
It is instructed using photographic device according to the clearance or the alarm signal acquires picture and/or video;
Database is written into the picture and/or video using the ARM control device.
6. according to the method described in claim 5, it is characterized in that, the ARM control device includes that bottom hardware and upper layer are answered
With program, described the step of obtaining the discrepancy data using ARM control device, includes:
The discrepancy data are read according to default communication protocol according to the data acquisition session received using the bottom hardware
And it is cached;
Discrepancy data after obtaining caching by automatic regular polling using the upper level applications.
7. according to the method for claim 6, which is characterized in that the method also includes: utilize ARM control dress
Set will treated enter and leave data write-in database, it is described treated enter and leave data in include let pass record and alarm note
Record.
8. the method according to the description of claim 7 is characterized in that the utilization ARM control device is incited somebody to action, treated goes out
Entering the step of database is written in data includes:
Database file is obtained using the upper level applications, and judges whether the database file is writeable;
If so, inquiry whether there is entity category information corresponding with the discrepancy data;
If it does not exist, then parsing is carried out to entity class and reflection handles to obtain entity class letter corresponding with the discrepancy data
Breath;
Judge whether to obtain and writes lock;
If so, calling the data-interface of the ARM control device that data are written in the discrepancy data correspondent entity category information
Library.
9. according to the method described in claim 8, it is characterized in that, it is described to entity class carry out parsing and reflection handle to obtain
The step of entity category information corresponding with the discrepancy data includes:
Obtain all field attributes of entity class;
The method in entity class is traversed, the method in the entity class includes setter method;
Obtain the setter method;
The setter method for needing to reflect is obtained, and is reflected according to parameter type;
The object generated after reflection is packaged, corresponding entity category information is obtained.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510646177.3A CN105184193B (en) | 2015-10-08 | 2015-10-08 | Safety defense monitoring system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510646177.3A CN105184193B (en) | 2015-10-08 | 2015-10-08 | Safety defense monitoring system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105184193A CN105184193A (en) | 2015-12-23 |
CN105184193B true CN105184193B (en) | 2019-06-11 |
Family
ID=54906266
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510646177.3A Active CN105184193B (en) | 2015-10-08 | 2015-10-08 | Safety defense monitoring system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105184193B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1831280A (en) * | 2005-03-11 | 2006-09-13 | 北京富星创业科技发展有限公司 | Safety entrance guard management system and its working method |
CN202110591U (en) * | 2011-04-19 | 2012-01-11 | 江苏信息职业技术学院 | Intelligent banister system employing embedded vehicle license plate recognition |
CN103921743A (en) * | 2014-05-08 | 2014-07-16 | 长春工业大学 | Automobile running working condition judgment system and judgment method thereof |
CN103985259A (en) * | 2014-05-19 | 2014-08-13 | 长治市丰雨机械有限公司 | Community single-lane vehicle entrance and exit warning system |
CN103985258A (en) * | 2014-05-19 | 2014-08-13 | 长治市丰雨机械有限公司 | Community vehicle entrance and exit warning system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100283849A1 (en) * | 2008-01-11 | 2010-11-11 | Cory James Stephanson | System and method of environmental monitoring and event detection |
CN202159398U (en) * | 2011-06-10 | 2012-03-07 | 保定和易法电气科技有限公司 | Fire pre-alarming system of electric apparatus |
-
2015
- 2015-10-08 CN CN201510646177.3A patent/CN105184193B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1831280A (en) * | 2005-03-11 | 2006-09-13 | 北京富星创业科技发展有限公司 | Safety entrance guard management system and its working method |
CN202110591U (en) * | 2011-04-19 | 2012-01-11 | 江苏信息职业技术学院 | Intelligent banister system employing embedded vehicle license plate recognition |
CN103921743A (en) * | 2014-05-08 | 2014-07-16 | 长春工业大学 | Automobile running working condition judgment system and judgment method thereof |
CN103985259A (en) * | 2014-05-19 | 2014-08-13 | 长治市丰雨机械有限公司 | Community single-lane vehicle entrance and exit warning system |
CN103985258A (en) * | 2014-05-19 | 2014-08-13 | 长治市丰雨机械有限公司 | Community vehicle entrance and exit warning system |
Also Published As
Publication number | Publication date |
---|---|
CN105184193A (en) | 2015-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6769077B2 (en) | System and method for remotely creating a physical memory snapshot over a serial bus | |
CN101594261B (en) | Forgery website monitoring method and system thereof | |
EP1777638A1 (en) | Storage system for managing a log of access | |
US10853157B2 (en) | Compact binary event log generation | |
CN109460343A (en) | System exception monitoring method, device, equipment and storage medium based on log | |
US20140068350A1 (en) | Self-checking system and method using same | |
CN108388496A (en) | A kind of collection method of system log | |
CN112131002B (en) | Data management method and device | |
Tsai et al. | A fast linear shape from shading | |
US20140115112A1 (en) | Server system and message processing method thereof | |
US11023335B2 (en) | Computer and control method thereof for diagnosing abnormality | |
CN110147343A (en) | A kind of Lockstep processor architecture compared entirely | |
CN105184193B (en) | Safety defense monitoring system and method | |
CN108334392B (en) | Start method, storage medium, equipment and the system of the page in Android system | |
US10754748B2 (en) | System and method for constructing extensible event log with javascript object notation (JSON) encoded payload data | |
CN100568308C (en) | Multi-functional onsite alarming controller | |
CN110764962A (en) | Log processing method and device | |
US11586983B2 (en) | Data processing system and method for acquiring data for training a machine learning model for use in monitoring the data processing system for anomalies | |
CN108920260A (en) | A kind of exchange method and its device of heterogeneous system | |
US9749212B2 (en) | Problem determination in a hybrid environment | |
US20190182070A1 (en) | Event processing associated with a smart device | |
CN109086380B (en) | Method and system for compressing and storing historical data | |
CN107133130A (en) | Computer operational monitoring method and apparatus | |
CN109086200B (en) | Effective test framework based on android virtual machine modification | |
CN109471772A (en) | Monitoring method when concurrent program is run |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |