CN105184193B - Safety defense monitoring system and method - Google Patents

Safety defense monitoring system and method Download PDF

Info

Publication number
CN105184193B
CN105184193B CN201510646177.3A CN201510646177A CN105184193B CN 105184193 B CN105184193 B CN 105184193B CN 201510646177 A CN201510646177 A CN 201510646177A CN 105184193 B CN105184193 B CN 105184193B
Authority
CN
China
Prior art keywords
data
control device
arm control
discrepancy
upper level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510646177.3A
Other languages
Chinese (zh)
Other versions
CN105184193A (en
Inventor
李晨枫
李喆
王栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weihai Beiyang Electric Group Co Ltd
Original Assignee
Weihai Beiyang Electric Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weihai Beiyang Electric Group Co Ltd filed Critical Weihai Beiyang Electric Group Co Ltd
Priority to CN201510646177.3A priority Critical patent/CN105184193B/en
Publication of CN105184193A publication Critical patent/CN105184193A/en
Application granted granted Critical
Publication of CN105184193B publication Critical patent/CN105184193B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/76Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Abstract

The present invention relates to a kind of safety defense monitoring system, the system comprises: data acquisition device enters and leaves data for acquiring;ARM control device for obtaining the discrepancy data, and judges whether the discrepancy data have corresponding permission;If the discrepancy data have corresponding permission, the ARM control device is also used to send instruction of letting pass to access apparatus, so that the access apparatus instructs to let pass according to the clearance;If the discrepancy data do not have corresponding permission, the ARM control device is also used to issue alarm signal.Cost can be effectively reduced using this system and improve reliability.Further, it would be desirable to provide a kind of security-protecting and monitoring methods.

Description

Safety defense monitoring system and method
Technical field
The present invention relates to security device technical fields, more particularly to a kind of safety defense monitoring system and method.
Background technique
As the development of computer technology and the security protection consciousness of people gradually increase, safety defense monitoring system has been obtained extensively General application.Traditional safety defense monitoring system is by microcomputer, interface circuit, RFID (Radio Frequency Identification, radio frequency identification) compositions such as radio-frequency unit and external common apparatus carry out data acquisition and security protection control. Due to micro computer hardware equipment cost with higher, lead to traditional safety defense monitoring system cost increase.Due to miniature The dust-proof of computer, shockproof properties are poor, lead to traditional safety defense monitoring system reliability decrease.How security protection prison is effectively reduced The cost of the control system and reliability for effectively improving safety defense monitoring system becomes a technical problem needing to solve at present.
Summary of the invention
Based on this, it is necessary to which in view of the above technical problems, providing one kind can be effectively reduced cost and improve reliability Safety defense monitoring system and method.
A kind of safety defense monitoring system, the system comprises:
Data acquisition device enters and leaves data for acquiring;
ARM control device for obtaining the discrepancy data, and judges whether the discrepancy data have corresponding power Limit;
If the discrepancy data have corresponding permission, the ARM control device is also used to send to access apparatus and let pass Instruction, so that the access apparatus instructs to let pass according to the clearance;
If the discrepancy data do not have corresponding permission, the ARM control device is also used to issue alarm signal.
In one of the embodiments, the system also includes: the ARM control device includes that bottom hardware and upper layer are answered With program, the bottom hardware is used to read the discrepancy number according to default communication protocol according to the data acquisition session received According to and cached, the upper level applications be used for obtained by automatic regular polling caching after discrepancy data.
In one of the embodiments, the ARM control device be also used to by treated enter and leave data write-in database, It is described treated enter and leave data in include let pass record and alarm logging.
In one of the embodiments, the system also includes server, permission number has been stored in advance on the server According to the ARM control device is also used to compare the discrepancy data and pre-stored permissions data on the server It is right, to judge whether the discrepancy data have corresponding permission.
The ARM control device includes package operation system, upper level applications and house dog in one of the embodiments, The multiple programs of program and bottom hardware, the house dog program are used to monitor the working condition of the ARM control device, work as institute When stating operating system or the upper level applications and breaking down, the house dog program is used for the operating system or described Upper level applications carry out reboot operation, and when the bottom hardware breaks down, the house dog program is for issuing failure Indication signal.
A kind of security-protecting and monitoring method, which comprises
It is acquired using data acquisition device and enters and leaves data;
The discrepancy data are obtained using ARM control device;
Judge whether the discrepancy data have corresponding permission using the ARM control device;
If so, instruction of letting pass is sent to access apparatus using the ARM control device, so that the access apparatus root It is instructed according to the clearance to let pass;
Otherwise, alarm signal is issued using the ARM control device.
The ARM control device includes bottom hardware and upper level applications, the utilization in one of the embodiments, ARM control device obtain the discrepancy data the step of include:
The discrepancy is read according to default communication protocol according to the data acquisition session received using the bottom hardware Data are simultaneously cached;
Discrepancy data after obtaining caching by automatic regular polling using the upper level applications.
In one of the embodiments, the method also includes: using the ARM control device will treated enter and leave number According to write-in database, it is described treated enter and leave data in include let pass record and alarm logging.
It is described in one of the embodiments, that using the ARM control device, by treated, data are written in discrepancy data The step of library includes:
Database file is obtained using the upper level applications, and judges whether the database file is writeable;
If so, inquiry whether there is entity category information corresponding with the discrepancy data;
If it does not exist, then parsing is carried out to entity class and reflection handles to obtain entity class corresponding with the discrepancy data Information;
Judge whether to obtain and writes lock;
If so, calling the data-interface of the ARM control device that the discrepancy data correspondent entity category information is written Database.
In one of the embodiments, it is described to entity class carry out parsing and reflection handle to obtain and the discrepancy data The step of corresponding entity category information includes:
Obtain all field attributes of entity class;
The method in entity class is traversed, the method in the entity class includes setter method;
Obtain the setter method;
The setter method for needing to reflect is obtained, and is reflected according to parameter type;
The object generated after reflection is packaged, corresponding entity category information is obtained.
Above-mentioned safety defense monitoring system and method are collected by using ARM control device to obtain data acquisition device Discrepancy data issue instruction of letting pass to access apparatus if ARM control device, such as if entering and leaving data has corresponding permission Fruit enters and leaves data and does not have corresponding permission, and ARM control device then issues alarm signal.Due to the cost ratio of ARM control device The cost of microcomputer is low, and thus, it is possible to the cost of safety defense monitoring system is effectively reduced.Due to ARM control device it is dust-proof, Shockproof properties are more dust-proof than microcomputer, shockproof properties are high, and ARM control device integrated level with higher, therefore energy Enough effectively improve the reliability of safety defense monitoring system.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of safety defense monitoring system in one embodiment;
Fig. 2 is the structural schematic diagram of safety defense monitoring system in another embodiment;
Fig. 3 is the structural schematic diagram of safety defense monitoring system in another embodiment;
Fig. 4 is the flow chart of security-protecting and monitoring method in one embodiment.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the present invention, not For limiting the present invention.
In one embodiment, as shown in Figure 1, providing a kind of safety defense monitoring system, which includes: data acquisition dress Set a kind of 102 and ARM (Advanced RISC Machines, microprocessor) control device 104, in which:
Data acquisition device 102 enters and leaves data for acquiring.
ARM control device 104 enters and leaves data for obtaining, and judges to enter and leave whether data have corresponding permission;If going out Enter data with corresponding permission, ARM control device 104 is also used to send instruction of letting pass to access apparatus, so that entering and leaving dress It sets according to instruction is let pass and lets pass;If entering and leaving data does not have corresponding permission, ARM control device 104 is also used to issue alarm Signal.
In the present embodiment, entering and leaving data includes the data that personnel and vehicle etc. are passed in and out by access apparatus.Access apparatus Including gate inhibition and gate etc..Data acquisition device includes the channel RFID, fingerprint machine and infrared receiver etc., wherein the channel RFID It can be used cooperatively with infrared receiver.It the channel RFID can be with the discrepancy information of collector or vehicle etc., according to infrared ray Personnel can be calculated in the data of receiver acquisition or vehicle passes through the direction of travel (such as enter or leave) of access apparatus, is No is vehicle etc..
ARM control device includes bottom hardware and upper level applications in one of the embodiments, and bottom hardware is used for It is read according to the data acquisition session received according to default communication protocol and enters and leaves data and cached, upper level applications are used Discrepancy data after obtaining caching by automatic regular polling.
Operating system, such as Android (Android) operating system and (SuSE) Linux OS have been run on ARM control device Deng.Further include data stack on ARM control device, stores data acquisition session in data stack.Data acquisition session can be with It is realized by thread.After data acquisition session is activated by operating system, bottom hardware is by driver first to default logical Letter agreement is initialized, subsequently into circulation wait state.Bottom hardware by serial ports or network and data acquisition device into Row communication.Bottom hardware initializes buffer area after receiving the data acquisition session activated by operating system, and It is read according to the data acquisition session received according to default communication protocol and enters and leaves data, and by the discrepancy data read slow It rushes in area and is cached.Default communication protocol refers to the transformat for entering and leaving data, including card number and time.
Upper level applications are timed poll by the data-interface of bottom hardware to obtain the discrepancy number in buffer area According to.It is (fixed using independent clock object AlarmManager in order to guarantee the accuracy of poll and the performance of ARM control device When device) Lai Zhihang automatic regular polling.
Further, ARM control device can also include storage card slot, after being inserted into storage card on storage card slot, The discrepancy data that ARM control device is got can be saved by storage card.Storage card can be TF card (Trans- Flash Card, abbreviation TF card) or SD card (Secure Digital Memory Card, safe digital card) etc..By that will go out Enter data to be stored in storage card, can effectively overcome the discrepancy as caused by abnormal power-down of the mechanical hard disk in microcomputer Corrupted data or loss, it is ensured that enter and leave the safety of data.
ARM control device carries out permission judgement to the discrepancy data got.Specifically, can be in ARM control device Permissions data is stored in advance, permissions data can also be stored in advance in the server.Data and pre-stored permission will be entered and left Data are compared, and pass through if compared, then it represents that the discrepancy data have corresponding permission, and ARM control device is filled to discrepancy Transmission clearance instruction is set, access apparatus is let pass according to instruction is let pass so that personnel or vehicle etc. can pass through the access apparatus.Such as Fruit, which compares, not to be passed through, then it represents that the discrepancy data do not have corresponding permission, and ARM control device issues alarm signal.
In the present embodiment, the collected discrepancy data of data acquisition device institute are obtained by using ARM control device, such as Fruit, which enters and leaves data, has corresponding permission, and ARM control device then issues instruction of letting pass to access apparatus, does not have if entering and leaving data There is corresponding permission, ARM control device then issues alarm signal.Due to ARM control device cost than microcomputer at This is low, and thus, it is possible to the cost of safety defense monitoring system is effectively reduced.Since the dust-proof of ARM control device, shockproof properties are than miniature The dust-proof of computer, shockproof properties are high, and ARM control device integrated level with higher, therefore can effectively improve security protection The reliability of monitoring system.And ARM control device is small in size, and easy to carry and installation can facilitate embedding data acquisition device In, the intelligence degree of data acquisition device can be effectively improved.
In one embodiment, ARM control device be also used to by treated enter and leave data write-in database, treated Enter and leave includes let pass record and alarm logging in data.
In the present embodiment, ARM control device can be handled data are entered and left, including permission judgement, controlling alarm etc.. After carrying out permission judgement, if entering and leaving data has corresponding permission, instruction of letting pass is sent to access apparatus, and remembered Record generates record of letting pass.If entering and leaving data does not have corresponding permission, alarm signal is issued, and recorded, generates report Alert record.ARM control device will enter and leave data, the persistences such as record and alarm logging of letting pass write-in database stores, So that the later period checks.
In one embodiment, as shown in Fig. 2, system further includes server 106, power has been stored in advance on server 106 Data are limited, ARM control device 104 is also used to enter and leave data and is compared with pre-stored permissions data on server 106, To judge to enter and leave whether data have corresponding permission.
In the present embodiment, server is communicated with ARM control device by network.ARM control device is being got out After entering data, pre-stored permissions data on server is transferred by network, data will be entered and left and be compared with permissions data. Permissions data can be stored compared with storing permissions data by storage card in ARM control device, on server more more Comprehensively, more acurrate thus, it is possible to compare permission.
In one embodiment, as shown in figure 3, system further includes photographic device 108, x-ray apparatus 108 is for acquiring view Picture and/or video;ARM control device 104 is also used to obtain picture and/or video, and data are written in picture and/or video Library.
In the present embodiment, photographic device includes security protection camera and security monitoring video camera etc..Photographic device passes through network and ARM Control device is communicated.The picture of photographic device acquisition can be the photo of photographic device candid photograph.It is filled for example, being controlled in ARM When setting transmission clearance instruction, triggering photographic device is captured, and obtains the personnel by access apparatus or the photo of vehicle.? When ARM control device issues alarm signal, triggering photographic device is captured, and obtains personnel when alarm or the photo of vehicle. Photographic device can also carry out real-time video monitoring shooting to access apparatus.Photographic device can be transmitted to ARM with multi-channel video Control device.For example, can have 9 tunnel real-time video transmissions to ARM control device.Picture that ARM control device will acquire and/ Or database is written in video persistence, to facilitate the later period to check.
In one embodiment, ARM control device includes that package operation system, upper level applications and house dog program are multiple Program and bottom hardware, house dog program is used to monitor the working condition of ARM control device, when operating system or upper layer application When program breaks down, house dog program is used to carry out reboot operation to operating system or upper level applications, fills when ARM is controlled When the bottom hardware set breaks down, house dog program is for issuing fault indication signal.
In the present embodiment, operating system is during long-play it is possible that operation slowly causes access apparatus to have Compared with the failure of long delay, such as operation ARM control is caused due to the certain self reasons of operating system or third equation The resource of device is largely occupied, is consumed, slow so as to cause operating system processing speed.In response to this, if it is determined that Continuously entering and leaving the data corresponding time difference twice is more than the first preset time (such as 2 seconds), then house dog program can open again Dynamic upper level applications.Further, lead to house dog in order to avoid a large amount of discrepancy data can be saved bit by bit in data acquisition device Program frequent starting upper level applications will not be touched in the second preset time (such as 30 minutes) after upper level applications starting Send out house dog program.
Operating system is it is possible that unexpected collapse failure.Just one is opened when os starting has super-ordinate right Finger daemon, it is fixed with bootstrap transmission heartbeat by the finger daemon.If being more than that third preset time (such as 3 seconds) do not connect Receive the heartbeat of bootstrap return, then it represents that unexpected collapse failure occurs in operating system.At this point, house dog program can be to behaviour The operation such as reset or restarted as system.
When upper level applications break down in operation, such as when there is accidentally quit, unexpected collapse, house dog journey Sequence can respond in the 4th preset time (such as 10 seconds), and re-launching applications.
The driver timing of bottom hardware is communicated with data acquisition device, and Content of Communication is fed back to upper layer and is answered Use program.If there is the case where feeding back without Content of Communication beyond continuous preset times (such as 5 times), then it represents that bottom hardware It breaks down.House dog program will record bottom hardware fault message at this time, and issue failure indication signal, for example, opening event Hinder indicator light.
In the present embodiment, the running gear of ARM control device is monitored by house dog program, to operating system or upper layer The failure that application program occurs can carry out corresponding processing and self modification in time, and the failure occurred for bottom hardware can Fault indication signal is issued in time, it is ensured that the operation of safety defense monitoring system.
In one embodiment, as shown in figure 4, providing a kind of security-protecting and monitoring method, this method is specifically included:
Step 402, it is acquired using data acquisition device and enters and leaves data.
Step 404, it is obtained using ARM control device and enters and leaves data.
Step 406, judge to enter and leave whether data have corresponding permission using ARM control device;If so, entering step 408, otherwise, then enter step 410.
Step 408, instruction of letting pass is sent to access apparatus using ARM control device, so that access apparatus is according to clearance Instruction is to let pass.
Step 410, alarm signal is issued using ARM control device.
In the present embodiment, data acquisition device includes the channel RFID, fingerprint machine and infrared receiver etc..Data acquisition dress The discrepancy data that collector or vehicle etc. are set by access apparatus to pass in and out.ARM control device in one of the embodiments, It include: to utilize bottom using the step of ARM control device acquisition discrepancy data including bottom hardware and upper level applications Hardware reads according to default communication protocol according to the data acquisition session received and enters and leaves data and cached;It is answered using upper layer Discrepancy data after obtaining caching by automatic regular polling with program.Default communication protocol refers to the transformat for entering and leaving data, Including card number and time.Upper level applications can execute automatic regular polling using independent clock object AlarmManager.
ARM control device carries out permission judgement to the discrepancy data got.Specifically, can be in ARM control device Permissions data is stored in advance, permissions data can also be stored in advance in the server.Data and pre-stored permission will be entered and left Data are compared, and pass through if compared, then it represents that the discrepancy data have corresponding permission, and ARM control device is filled to discrepancy Transmission clearance instruction is set, access apparatus is let pass according to instruction is let pass so that personnel or vehicle etc. can pass through the access apparatus.Such as Fruit, which compares, not to be passed through, then it represents that the discrepancy data do not have corresponding permission, and ARM control device issues alarm signal.
In the present embodiment, the collected discrepancy data of data acquisition device institute are obtained by using ARM control device, such as Fruit, which enters and leaves data, has corresponding permission, and ARM control device then issues instruction of letting pass to access apparatus, does not have if entering and leaving data There is corresponding permission, ARM control device then issues alarm signal.Due to ARM control device cost than microcomputer at This is low, and thus, it is possible to the cost of safety defense monitoring system is effectively reduced.Since the dust-proof of ARM control device, shockproof properties are than miniature The dust-proof of computer, shockproof properties are high, and ARM control device integrated level with higher, therefore can effectively improve security protection The reliability of monitoring system.And ARM control device is small in size, and easy to carry and installation can facilitate embedding data acquisition device In, the intelligence degree of data acquisition device can be effectively improved.
Further, the event and alarm supported in security-protecting and monitoring method provided in this embodiment include: that an overcrowding, people is more Card, without card personnel, have card lack of competence personnel, antisubmarine time, it is inactive time period, normal.Wherein, refer to for antisubmarine time personnel by entering and leaving dress Set entrance after and leave, can be it is into and out by the same access apparatus, be also possible to by some enter and leave dress After setting entrance, left by another access apparatus.Just referring to discrepancy data has corresponding permission, and access apparatus It lets pass.
It is illustrated so that personnel hold through gate as an example.Data acquisition device collects personnel and enters the discrepancy before gate Data, and ARM control device is reported to by data are entered and left.ARM control device judges the discrepancy number after receiving discrepancy data Whether the card number in is effective, if effective card number, then continues to judge whether the card number has corresponding permission, if changing card number With corresponding permission, then ARM control device sends instruction of letting pass to gate, and gate opens a sluice gate to let pass, which enters gate.Sentence It is disconnected whether to need to monitor the personnel whether antisubmarine time, it monitors if necessary antisubmarine time, then further judges the lock that the personnel enter Whether machine and other gates belong to same antisubmarine time group, if it is, ARM control device connects server, by server come The gate that the gate entered with the personnel belongs to same antisubmarine time group is obtained, it is corresponding according to other gates in same antisubmarine time group Data are entered and left to search whether the personnel have left.If the personnel have been left by other gates, then it represents that the personnel are anti- Sneak into personnel.
In one embodiment, judge that entering and leaving data whether to have the step of corresponding permission includes: to control to fill using ARM Data will be entered and left by setting is compared with permissions data pre-stored on server, to judge it is corresponding whether discrepancy data have Permission.
In the present embodiment, server is communicated with ARM control device by network.ARM control device is being got out After entering data, pre-stored permissions data on server is transferred by network, data will be entered and left and be compared with permissions data. Permissions data can be stored compared with storing permissions data by storage card in ARM control device, on server more more Comprehensively, more acurrate thus, it is possible to compare permission.
In one embodiment, method further include: data are written in discrepancy data by treated using ARM control device Library, it includes let pass record and alarm logging in data that treated, which enters and leaves,.
In the present embodiment, ARM control device is after carrying out permission judgement, if entering and leaving data has corresponding permission, Instruction of letting pass then is sent to access apparatus, and is recorded, record of letting pass is generated.If entering and leaving data does not have corresponding power Limit, then issue alarm signal, and recorded, and generates alarm logging.ARM control device will enter and leave data, let pass record and The persistences such as alarm logging write-in database is stored, so that the later period checks.
In one embodiment, inciting somebody to action the step of treated enters and leaves data write-in database using ARM control device includes: Database file is obtained using upper level applications, and judges whether database file is writeable;If so, inquiry with the presence or absence of with Enter and leave the corresponding entity category information of data;If it does not exist, then parsing is carried out to entity class and reflection handles to obtain and discrepancy number According to corresponding entity category information;Judge whether to obtain write-in lock;If so, calling the data-interface of ARM control device will enter and leave Database is written in data correspondent entity category information.
In the present embodiment, upper level applications can to enter and leave data handle, including data analysis, controlling alarm with And with the interaction of server etc..After handling processing data, upper level applications can receive data storage request, What the user that the data storage request can be safety defense monitoring system was issued by ARM control device, it is also possible to ARM control What device issued.According to data storage request, upper level applications can database be written in discrepancy data persistence by treated In.
Upper level applications judge whether database file is writeable.Specifically, can be according to the read-write of database file And can whether the link of database file be opened for test judgement.For according to the read-write of database file come into Row judgement, can be written byte into the database file, if byte can be written, then it represents that the database file is currently located In can write state.If byte cannot be written, then it represents that the database file is not presently within can write state.For according to data Can whether the link of library file be opened for test judgement, can open the link of database file offer, if link It can open, then it represents that the database file is currently at can write state.If link cannot open, then it represents that the data library text Part is not presently within can write state.
If database file be currently at can write state, upper level applications can in query caching whether there is and go out Enter the corresponding entity category information of data.If it does not exist, then need to enter and leave the corresponding entity class of data carry out parsing and Reflection processing obtains entity category information corresponding with data are entered and left.For the entity class obtained after parsing and reflection is handled Information can be deposited into caching, so that inquiry next time uses.
After obtaining entity category information, whether judgement can currently obtain write-in lock.If presently written thread is locked, It namely obtains and writes lock, then can stop other writing tasks and reading task, after the completion of the writing task again in wake-up waiting Writing task and reading task.If currently reading thread obtains institute, that is, obtains read lock, then it can stop writing task, but reading task It can carry out shared reading, the writing task after the completion of the reading task, in wake-up waiting.After lock is write in acquisition, ARM control is called By treated, database is written in discrepancy data correspondent entity category information to the data-interface of device.
In the present embodiment, due to entity category information have persistence, will treated enter and leave data correspondent entity class Information can persistence write-in database stored, thus, it is possible to facilitate subsequent use.
In one embodiment, parsing is carried out to entity class and reflection handles to obtain entity class corresponding with data are entered and left The step of information includes: all field attributes for obtaining entity class;The method in entity class is traversed, the method in entity class includes Setter method;Obtain setter method;The setter method for needing to reflect is obtained, and is reflected according to parameter type;It will The object generated after reflection is packaged, and obtains corresponding entity category information.
In the present embodiment, all field attributes of entity class are obtained, i.e.,
Field [] fields=c.getDeclaredFields ();
All methods in entity class are traversed, all method names in entity class are indicated using small letter.And it will be with small Write method object in the method name and entity class in the entity class of expression respectively in a manner of key, value temporal cache to map In (mapping).Domain is traversed, i.e. traversal fields, obtain the setter method name of field, setter method name uses small letter It indicates, and obtains the setter method from key of the caching into map, value set, i.e.,
Method method=Map.get (" set "+field.getName () .toLowerCase ());
The setter method that will acquire is written as key with the small of field, and Method is that value is put into caching.It is read in circulation When cursor data, the setter method for needing to reflect is obtained according to columns (column): i.e.
Int index=cursor.getColumnIndex (col);
Method method=methodMap.get (col.toLowerCase ()).
It according to the parameter type in method, is reflected: i.e.
Objectobj=c.newInstance ();
Class<?>argType=method.getParameterTypes () [0];
For example, parameter type is as follows for the reflection of the setter method of character string:
if(argType.equals(String.class));
method.invoke(obj,cursor.getString(index));
By the object encapsulation of generation to List (list), to obtain corresponding entity category information.
In one embodiment, this method further include: utilize photographic device acquisition picture and/or video;It is controlled using ARM Device obtains picture and/or video, and database is written in picture and/or video.
In the present embodiment, the picture of photographic device acquisition can be the photo of photographic device candid photograph.Photographic device can be with Real-time video monitoring shooting is carried out to access apparatus, acquires video.The picture and/or video that ARM control device will acquire Database is written in persistence, to facilitate the later period to check.
In one embodiment, ARM control device includes that package operation system, upper level applications and house dog program are multiple Program and bottom hardware, method further include: using the working condition of house dog program monitoring ARM control device, when operation is When system or upper level applications break down, operating system or upper level applications are carried out restarting behaviour using house dog program Make, when bottom hardware breaks down, issues fault indication signal using house dog program.
In the present embodiment, operating system is during long-play it is possible that operation slowly causes access apparatus to have Compared with the failure of long delay, then house dog program can restart upper level applications.Operating system is it is possible that unexpected collapse Failure.At this point, house dog program such as can be reset to operating system or be restarted at the operation.When upper level applications go out in operation When existing failure, house dog program can be responded, and re-launching applications.When bottom hardware breaks down, house dog program meeting Bottom hardware fault message is recorded, and issues failure indication signal, for example, opening malfunction indicator lamp.
The running gear that ARM control device is monitored by house dog program, goes out operating system or upper level applications Existing failure can carry out corresponding processing and self modification in time, and the failure occurred for bottom hardware can issue event in time Hinder indication signal, it is ensured that the operation of safety defense monitoring system.
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to protection of the invention Range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (9)

1. a kind of safety defense monitoring system, which is characterized in that the system comprises:
Data acquisition device, for acquiring the discrepancy data of monitored object;The data acquisition device includes the channel RFID and red Outer line receiver;The channel RFID and the infrared receiver are used to cooperate the discrepancy information for acquiring the monitored object, And identify that the monitored object is passing vehicle or current personnel according to information is entered and left;
Server, for storing permissions data;
ARM control device, for the discrepancy data to be compared with pre-stored permissions data on the server, with Judge whether the discrepancy data have corresponding permission;
If the discrepancy data have corresponding permission, the ARM control device is also used to send instruction of letting pass to access apparatus, So that the access apparatus instructs to let pass to the passing vehicle or the current personnel according to the clearance;
If the discrepancy data do not have corresponding permission, the ARM control device is also used to issue alarm signal;
Photographic device, for according to clearance instruction or alarm signal acquisition picture and/or video;
The ARM control device is also used to the picture and/or video write-in database.
2. system according to claim 1, which is characterized in that the system also includes: the ARM control device includes bottom Layer hardware and upper level applications, the bottom hardware are used for according to the data acquisition session received according to default communication protocol It reads the discrepancy data and is cached, the upper level applications are used to obtain the discrepancy after caching by automatic regular polling Data.
3. system according to claim 1, which is characterized in that the ARM control device be also used to by treated enter and leave Data be written database, it is described treated enter and leave data in include let pass record and alarm logging.
4. system according to claim 1, which is characterized in that the ARM control device includes that package operation system, upper layer are answered With program and the multiple programs of house dog program and bottom hardware, the house dog program is for monitoring the ARM control device Working condition, when the operating system or the upper level applications break down, the house dog program is used for institute It states operating system or the upper level applications carries out reboot operation, when the bottom hardware breaks down, the house dog Program is for issuing fault indication signal.
5. a kind of security-protecting and monitoring method, which comprises
Utilize the discrepancy data of data acquisition device acquisition monitored object;The data acquisition device includes the channel RFID and infrared Line receiver;The channel RFID and the infrared receiver are used to cooperate the discrepancy information for acquiring the monitored object, and Identify that the monitored object is passing vehicle or current personnel according to the discrepancy information;
The discrepancy data are obtained using ARM control device;
Pre-stored permissions data on server is obtained using ARM control device, by the discrepancy data and the permission number According to being compared, to judge whether the discrepancy data have corresponding permission;
If so, instruction of letting pass is sent to access apparatus using the ARM control device, so that the access apparatus is according to institute Clearance instruction is stated to let pass to the passing vehicle or the current personnel;
Otherwise, alarm signal is issued using the ARM control device;
It is instructed using photographic device according to the clearance or the alarm signal acquires picture and/or video;
Database is written into the picture and/or video using the ARM control device.
6. according to the method described in claim 5, it is characterized in that, the ARM control device includes that bottom hardware and upper layer are answered With program, described the step of obtaining the discrepancy data using ARM control device, includes:
The discrepancy data are read according to default communication protocol according to the data acquisition session received using the bottom hardware And it is cached;
Discrepancy data after obtaining caching by automatic regular polling using the upper level applications.
7. according to the method for claim 6, which is characterized in that the method also includes: utilize ARM control dress Set will treated enter and leave data write-in database, it is described treated enter and leave data in include let pass record and alarm note Record.
8. the method according to the description of claim 7 is characterized in that the utilization ARM control device is incited somebody to action, treated goes out Entering the step of database is written in data includes:
Database file is obtained using the upper level applications, and judges whether the database file is writeable;
If so, inquiry whether there is entity category information corresponding with the discrepancy data;
If it does not exist, then parsing is carried out to entity class and reflection handles to obtain entity class letter corresponding with the discrepancy data Breath;
Judge whether to obtain and writes lock;
If so, calling the data-interface of the ARM control device that data are written in the discrepancy data correspondent entity category information Library.
9. according to the method described in claim 8, it is characterized in that, it is described to entity class carry out parsing and reflection handle to obtain The step of entity category information corresponding with the discrepancy data includes:
Obtain all field attributes of entity class;
The method in entity class is traversed, the method in the entity class includes setter method;
Obtain the setter method;
The setter method for needing to reflect is obtained, and is reflected according to parameter type;
The object generated after reflection is packaged, corresponding entity category information is obtained.
CN201510646177.3A 2015-10-08 2015-10-08 Safety defense monitoring system and method Active CN105184193B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510646177.3A CN105184193B (en) 2015-10-08 2015-10-08 Safety defense monitoring system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510646177.3A CN105184193B (en) 2015-10-08 2015-10-08 Safety defense monitoring system and method

Publications (2)

Publication Number Publication Date
CN105184193A CN105184193A (en) 2015-12-23
CN105184193B true CN105184193B (en) 2019-06-11

Family

ID=54906266

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510646177.3A Active CN105184193B (en) 2015-10-08 2015-10-08 Safety defense monitoring system and method

Country Status (1)

Country Link
CN (1) CN105184193B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1831280A (en) * 2005-03-11 2006-09-13 北京富星创业科技发展有限公司 Safety entrance guard management system and its working method
CN202110591U (en) * 2011-04-19 2012-01-11 江苏信息职业技术学院 Intelligent banister system employing embedded vehicle license plate recognition
CN103921743A (en) * 2014-05-08 2014-07-16 长春工业大学 Automobile running working condition judgment system and judgment method thereof
CN103985259A (en) * 2014-05-19 2014-08-13 长治市丰雨机械有限公司 Community single-lane vehicle entrance and exit warning system
CN103985258A (en) * 2014-05-19 2014-08-13 长治市丰雨机械有限公司 Community vehicle entrance and exit warning system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100283849A1 (en) * 2008-01-11 2010-11-11 Cory James Stephanson System and method of environmental monitoring and event detection
CN202159398U (en) * 2011-06-10 2012-03-07 保定和易法电气科技有限公司 Fire pre-alarming system of electric apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1831280A (en) * 2005-03-11 2006-09-13 北京富星创业科技发展有限公司 Safety entrance guard management system and its working method
CN202110591U (en) * 2011-04-19 2012-01-11 江苏信息职业技术学院 Intelligent banister system employing embedded vehicle license plate recognition
CN103921743A (en) * 2014-05-08 2014-07-16 长春工业大学 Automobile running working condition judgment system and judgment method thereof
CN103985259A (en) * 2014-05-19 2014-08-13 长治市丰雨机械有限公司 Community single-lane vehicle entrance and exit warning system
CN103985258A (en) * 2014-05-19 2014-08-13 长治市丰雨机械有限公司 Community vehicle entrance and exit warning system

Also Published As

Publication number Publication date
CN105184193A (en) 2015-12-23

Similar Documents

Publication Publication Date Title
US6769077B2 (en) System and method for remotely creating a physical memory snapshot over a serial bus
CN101594261B (en) Forgery website monitoring method and system thereof
EP1777638A1 (en) Storage system for managing a log of access
US10853157B2 (en) Compact binary event log generation
CN109460343A (en) System exception monitoring method, device, equipment and storage medium based on log
US20140068350A1 (en) Self-checking system and method using same
CN108388496A (en) A kind of collection method of system log
CN112131002B (en) Data management method and device
Tsai et al. A fast linear shape from shading
US20140115112A1 (en) Server system and message processing method thereof
US11023335B2 (en) Computer and control method thereof for diagnosing abnormality
CN110147343A (en) A kind of Lockstep processor architecture compared entirely
CN105184193B (en) Safety defense monitoring system and method
CN108334392B (en) Start method, storage medium, equipment and the system of the page in Android system
US10754748B2 (en) System and method for constructing extensible event log with javascript object notation (JSON) encoded payload data
CN100568308C (en) Multi-functional onsite alarming controller
CN110764962A (en) Log processing method and device
US11586983B2 (en) Data processing system and method for acquiring data for training a machine learning model for use in monitoring the data processing system for anomalies
CN108920260A (en) A kind of exchange method and its device of heterogeneous system
US9749212B2 (en) Problem determination in a hybrid environment
US20190182070A1 (en) Event processing associated with a smart device
CN109086380B (en) Method and system for compressing and storing historical data
CN107133130A (en) Computer operational monitoring method and apparatus
CN109086200B (en) Effective test framework based on android virtual machine modification
CN109471772A (en) Monitoring method when concurrent program is run

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant