CN111368272B - Space monitoring management system, method, storage medium and computer equipment - Google Patents
Space monitoring management system, method, storage medium and computer equipment Download PDFInfo
- Publication number
- CN111368272B CN111368272B CN202010181826.8A CN202010181826A CN111368272B CN 111368272 B CN111368272 B CN 111368272B CN 202010181826 A CN202010181826 A CN 202010181826A CN 111368272 B CN111368272 B CN 111368272B
- Authority
- CN
- China
- Prior art keywords
- monitoring
- space
- target space
- operator
- management system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 186
- 238000000034 method Methods 0.000 title claims abstract description 18
- 238000007726 management method Methods 0.000 claims description 116
- 238000012806 monitoring device Methods 0.000 claims description 34
- 238000012795 verification Methods 0.000 claims description 14
- 238000004891 communication Methods 0.000 claims description 10
- 238000004590 computer program Methods 0.000 claims description 9
- 238000012986 modification Methods 0.000 claims description 6
- 230000004048 modification Effects 0.000 claims description 6
- 230000001105 regulatory effect Effects 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000002159 abnormal effect Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1066—Hiding content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Automation & Control Theory (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a space monitoring management system, a method, a storage medium and computer equipment, wherein the space monitoring management system comprises: the identity authentication module 101 is used for performing identity authentication on an operator of the monitoring management system; the authority management module 102 is configured to grant an authority for monitoring the management target space to an operator after the operator of the monitoring and management system passes identity authentication, and provide an originally hidden interface for accessing the functional module for monitoring the management target space to the operator, so that the operator can monitor and manage the target space. Thereby can provide the operation entry of disguise for the operator to the higher target space of secret nature such as compartment, secret room, realize that the operator carries out secret control and management to the target space to the realization is regulated and control convenient effectual monitoring and security protection to the target space.
Description
Technical Field
The present invention relates to the field of space management and control, and in particular, to a space monitoring and management system, method, storage medium, and computer device.
Background
In the prior art, the control of the smart home by using the application software APP can be realized, so that the operation is more convenient. However, for private spaces such as private rooms or secret rooms in a home, safe, private, convenient and effective monitoring and security measures are lacked in the prior art. In addition, in the prior art, security measures for a secret room space are usually a pre-designed fixed scheme, are not easy to modify and lack flexibility.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: how to monitor and manage the concealment of the target space, thereby carrying out flexible, safe and secret monitoring, convenient and effective monitoring and safe prevention and control on the target space.
To solve the above technical problems, the present invention provides a space monitoring management system, method, storage medium and computer device,
in a first aspect of the present application, there is provided a space monitoring management system, including:
the identity authentication module is used for authenticating the identity of an operator of the monitoring management system;
and the authority granting module is used for granting the authority of the monitoring management target space to the operator after the operator of the monitoring management system passes identity authentication, and providing an originally hidden interface for accessing the functional module of the monitoring management target space to the operator so that the operator can realize monitoring management of the target space.
Preferably, the identity verification module includes: at least one of a face recognition unit, a fingerprint recognition unit, a voice recognition unit and a password verification unit.
Preferably, the space monitoring and managing system further includes a function module for monitoring and managing the target space, and the function module includes:
the device management module is used for managing monitoring devices and security protection devices of a target space and network devices in communication connection with the monitoring devices and the security protection devices;
the state display module is used for displaying the state of a target space, wherein the state of the target space comprises whether a target object appears in the target space;
and the linkage configuration module is used for finishing the setting of the linkage configuration relation between the monitoring equipment and the security equipment in the target space according to the received configuration instruction, so that when the monitoring equipment monitors that the target object appears in the target space, the security equipment can automatically take corresponding counter measures.
Preferably, the device management module includes: a device adding unit and a device deleting unit.
Preferably, the linkage configuration module comprises a display unit and a modification unit, and the display unit is used for displaying the known linkage configuration relationship between the monitoring equipment and the security equipment; and the modification module is used for modifying the known linkage configuration relationship between the monitoring equipment and the security equipment according to the received configuration instruction.
Preferably, the linkage configuration module includes a custom unit, and is configured to create a new linkage configuration relationship between the monitoring device and the security device according to the received configuration instruction.
Preferably, the linkage configuration relationship comprises a corresponding linkage relationship and parameter configuration between the monitoring device and the security device.
Preferably, the function module for monitoring and managing the target space further includes: and the early warning reminding module is used for sending early warning reminding information to a preset receiving end when the target object appears in the target space.
In a second aspect of the present application, there is provided a monitoring and controlling method, comprising:
carrying out identity authentication on an operator of the monitoring management system;
after the operator of the monitoring management system passes identity authentication, the operator is granted the authority of monitoring and managing the target space, and an originally hidden interface for accessing the functional module of the monitoring and managing target space is provided for the operator, so that the operator can realize monitoring and managing of the target space.
Preferably, after granting the operator the right to monitor the management target space and providing the operator with an originally hidden interface for accessing the functional module for monitoring the management target space, the method further includes:
managing monitoring equipment, security equipment and network equipment which are in communication connection with the monitoring equipment and the security equipment in the target space;
displaying the state of the target space, wherein the state of the target space comprises whether a target object appears in the target space;
and setting a linkage configuration relation between the monitoring equipment and the security equipment in the target space according to the received configuration instruction, so that when the monitoring equipment monitors that the target object appears in the target space, the security equipment can automatically take corresponding counter measures.
In a third aspect of the present application, a storage medium is further provided, where a computer program is stored, and the computer program, when executed by a processor, can implement the space monitoring management method as described in any one of the above.
In a fourth aspect of the present application, there is also provided a computer device, including: a processor and a storage medium having stored therein a computer program that, when executed by the processor, is capable of implementing the space monitoring management method as set forth in any one of the above.
Compared with the prior art, one or more embodiments in the above scheme can have the following advantages or beneficial effects:
the invention relates to a space monitoring management system, a method, a storage medium and a computer device, wherein the space monitoring management system comprises: the identity authentication module is used for authenticating the identity of an operator of the monitoring management system; and the authority management module is used for granting the authority of the monitoring management target space to the operator after the operator of the monitoring management system passes the identity authentication, and providing an originally hidden interface for accessing the functional module of the monitoring management target space for the operator so as to enable the operator to realize the monitoring management of the target space. Thereby can provide the operation entry of disguise for the operator to the higher target space of secret nature such as compartment, secret room, realize that the operator carries out secret control and management to the target space to the realization is regulated and control convenient effectual monitoring and security protection to the target space.
Drawings
The scope of the present disclosure may be better understood by reading the following detailed description of exemplary embodiments in conjunction with the accompanying drawings. Wherein the included drawings are:
fig. 1 is a schematic structural diagram illustrating a space monitoring and management system according to an embodiment of the present application;
fig. 2 is a schematic structural diagram illustrating another space monitoring and management system provided in an embodiment of the present application;
fig. 3 is a schematic flow chart of a monitoring and regulation method provided in an embodiment of the present application;
fig. 4 is a schematic flow chart of another monitoring and control method provided in the embodiment of the present application;
fig. 5A and 5B are schematic diagrams illustrating a specific example of monitoring and managing a covert space by using an APP to which the space monitoring and management system is applied according to the embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the following will describe in detail an implementation method of the present invention with reference to the accompanying drawings and embodiments, so that how to apply technical means to solve the technical problems and achieve the technical effects can be fully understood and implemented.
In the prior art, the control of the smart home by using the application software APP can be realized, so that the operation is more convenient. However, for private spaces such as private rooms or secret rooms in a home, safe, private, convenient and effective monitoring and security measures are lacked in the prior art. In addition, in the prior art, security measures for a secret room space are usually a pre-designed fixed scheme, are not easy to modify and lack flexibility.
In view of this, the present application provides a space monitoring management system, a method, a storage medium and a computer device, where the space monitoring management system includes: the identity authentication module is used for authenticating the identity of an operator of the monitoring management system; and the authority management module is used for granting the authority of the monitoring management target space to the operator after the operator of the monitoring management system passes the identity authentication, and providing an originally hidden interface for accessing the functional module of the monitoring management target space for the operator so as to enable the operator to realize the monitoring management of the target space. Thereby can provide the operation entry of disguise for the operator to the higher target space of secret nature such as compartment, secret room, realize that the operator carries out secret control and management to the target space to the realization is regulated and control convenient effectual monitoring and security protection to the target space.
Example one
Referring to fig. 1, fig. 1 is a schematic structural diagram illustrating a space monitoring management system according to an embodiment of the present application, where the space monitoring management system includes:
the identity authentication module 101 is used for performing identity authentication on an operator of the monitoring management system;
the authority granting module 102 is configured to grant an authority for monitoring the management target space to an operator after the operator of the monitoring and management system passes identity authentication, and provide an originally hidden interface for accessing the functional module for monitoring the management target space to the operator, so that an accessor can monitor and manage the target space.
The identity verification module 101 may include: at least one of a face recognition unit, a fingerprint recognition unit, a voice recognition unit and a password verification unit. The user can set various verification modes according to requirements, and on one hand, flexible and various verification modes can be provided; on the other hand, the accuracy of identity authentication can be improved by combining multiple authentication modes, so that the safety of the space monitoring and management system is greatly improved.
The identity verification module 101 can verify the identity of the operator, and when the identity verification passes, the interface which cannot be seen originally, namely, the hidden interface for accessing the functional module for monitoring and managing the target space can be further provided for the operator, and the operator can also realize monitoring and management of the target space after the identity verification passes. The space monitoring and management system can be used for managing a secret room, a secret space and the like, and can effectively improve the safety and the concealment of the management of target spaces such as the secret room, the secret space and the like.
The foregoing is a space monitoring and management system provided in an embodiment of the present application, where the space monitoring and management system includes: the identity authentication module 101 is used for performing identity authentication on an operator of the monitoring management system; the authority management module 102 is configured to grant an authority for monitoring the management target space to an operator after the operator of the monitoring and management system passes identity authentication, and provide an originally hidden interface for accessing the functional module for monitoring the management target space to the operator, so that the operator can monitor and manage the target space. Thereby can provide the operation entry of disguise for the operator to the higher target space of secret nature such as compartment, secret room, realize that the operator carries out secret control and management to the target space to the realization is regulated and control convenient effectual monitoring and security protection to the target space.
Example two
Referring to fig. 2, fig. 2 shows another space monitoring and management system provided in the embodiment of the present application, which may further include, in addition to the identity authentication module 101 and the permission granting module 102, a functional module for monitoring and managing a target space, and includes:
the device management module 103 is used for managing monitoring devices, security and protection devices and network devices in communication connection with the monitoring devices and the security and protection devices in the target space;
a state display module 104, configured to display a state of the target space, where the state of the target space includes whether a target object appears in the target space;
and the linkage configuration module 105 is used for completing the setting of the linkage configuration relationship between the monitoring equipment and the security equipment in the target space according to the received control instruction, so that when the monitoring equipment monitors that the target object appears in the target space, the security equipment can automatically take corresponding measures.
In this embodiment of the application, the states of the monitoring device, the security device, and the network device communicatively connected to the monitoring device and the security device may include a start state and a stop state, and the device management module 103 may manage the states of the monitoring device, the security device, and the network device by receiving an instruction of an operator. When the network equipment is in an open state, the monitoring equipment and the security equipment can receive a control instruction through the network equipment.
In addition, referring to fig. 2, the device management module 103 may include: a device adding unit and a device deleting unit. The equipment adding unit can add monitoring equipment, network equipment or security equipment according to the requirements of an operator, and the operator can manage the state of the added equipment by sending an instruction; the equipment deleting module can delete monitoring equipment, network equipment or security equipment according to the requirements of an operator, so that each piece of equipment can be flexibly managed according to the requirements of the operator.
As an example, the linkage configuration module 105 may include a display unit and a modification unit, where the display unit is used to display a known linkage configuration relationship between the monitoring device and the security device. The known linkage configuration relationship between the monitoring device and the security equipment can be a linkage configuration relationship which is set in an initial state of the system and is displayed to an operator, and the known linkage configuration relationship between the monitoring device and the security equipment can also be a historical linkage configuration relationship which is set in the previous use. The modification unit can modify the displayed known linkage configuration relationship, so that the requirements of users are met. The linkage configuration relationship can comprise corresponding linkage relationship and parameter configuration between the monitoring equipment and the security equipment.
Specifically, the monitoring device may include: at least one of a human body sensor, an image collector and a sound collector. In the embodiment of the application, a plurality of monitoring devices can be arranged, the image collector can be a camera with a storage function, and the sound collector can be an interphone and the like; the security device may include: the monitoring equipment is used for monitoring whether an object with a target appears in the target space or not; the network device may be a gateway. The linkage relationship may be a first camera and a second camera, a first gateway, and a gate lock, and the corresponding configuration parameter may be a time length between a time when the first camera and the second camera both monitor that the target object appears in the target space and a time when the linkage control gate lock is automatically closed, for example, the time length may be 10 seconds.
As another example, the linkage configuration module 105 may also be a custom configuration unit configured to create a linkage configuration relationship between a new monitoring device and a security device according to the received configuration instruction. An operator can create a new linkage relation between the configuration monitoring equipment and the security equipment in a self-defined mode according to requirements, so that the regulation and control mode is more convenient and free.
In addition, in this embodiment of the application, referring to fig. 2, the space monitoring and management system may further include: and the early warning reminding module 106 is configured to send early warning reminding information to a preset receiving end when a target object is monitored to appear in the target space.
Wherein, predetermine the receiving end and can include: user terminal equipment or client, user terminal equipment includes: the handheld mobile communication terminal of user, the panel computer that possesses wired or wireless communication function of user, user's on-vehicle display communication equipment, or user's intelligent wearable electronic equipment, the customer end includes: an application running on a user terminal device.
In the above another space monitoring and management system provided in this embodiment of the present application, in addition to the identity verification module 101 and the permission granting module 102, the system may further include: the device management module 103 is used for managing monitoring devices, security and protection devices and network devices in communication connection with the monitoring devices and the security and protection devices in the target space; a state display module 104, configured to display a state of the target space, where the state of the target space includes whether a target object appears in the target space; the linkage configuration module 105 is configured to complete setting of a linkage configuration relationship between the monitoring device and the security device in the target space according to the received configuration instruction, so that when the monitoring device monitors that a target object appears in the target space, the security device can automatically take corresponding measures. In addition, the early warning reminding module 106 may be further configured to send an early warning reminding message to a preset receiving end when it is monitored that a target object appears in the target space. Therefore, the security and privacy can be monitored and controlled aiming at target spaces such as a privacy compartment or a secret room and the like; the linkage relation of configuration monitoring facilities and security protection equipment that can be nimble is favorable to carrying out convenient effectual remote monitoring and security protection regulation and control to secret compartment or secret room space.
On the other hand, the present application further provides a space monitoring management method, which refers to embodiment three and embodiment four specifically.
EXAMPLE III
Referring to fig. 3, fig. 3 is a schematic flowchart illustrating a space monitoring management method according to an embodiment of the present application, where the method includes steps S301 to S302.
In step S301, an operator of the monitoring management system is authenticated.
The step may specifically be to perform identity verification on the operator of the monitoring management system by collecting at least one of a face feature, a fingerprint feature, a voice of the operator, or a password received from an input.
In step S302, after the operator of the monitoring and management system passes the authentication, the operator is granted the right to monitor and manage the target space, and an originally hidden interface for accessing the functional module of the monitoring and management target space is provided to the operator, so that the operator can monitor and manage the target space.
The state of the target space can be whether a target object appears in the target space or not, and the state can be divided into a normal state when no target object appears in the target space according to whether the target object appears in the monitored target space or not; and when the target space is monitored to have the target object, the state is an abnormal state.
In the embodiment of the application, the monitoring management authority of the target space can be granted to the operator and an originally hidden interface for accessing the functional module of the monitoring management target space can be provided for the operator only when the identity authentication information of the operator passes the authentication. Therefore, the system can be applied to monitoring and managing target spaces such as a privacy room or a private space at home and the like which are inconvenient for other users to see, so that the requirement of the users on carrying out secret operation on the private space is met, and meanwhile, the operation safety is improved.
Example four
Referring to fig. 4, fig. 4 is a schematic flowchart illustrating another space monitoring management method provided in the embodiment of the present application, and the method includes steps S401 to S406.
In step S401, the operator of the monitoring management system is authenticated.
The step may specifically be to perform identity verification on the operator of the monitoring management system by collecting at least one of a face feature, a fingerprint feature, a voice of the operator, or a password received from an input.
In step S402, after the operator of the monitoring and management system passes the authentication, the operator is granted the right to monitor and manage the target space, and an originally hidden interface for accessing the functional module of the monitoring and management target space is provided to the operator, so that the operator can monitor and manage the target space.
The state of the target space can be whether a target object appears in the target space or not, and the state can be divided into a normal state when no target object appears in the target space according to whether the target object appears in the monitored target space or not; and when the target space is monitored to have the target object, the state is an abnormal state.
In the embodiment of the application, the monitoring management authority of the target space can be granted to the operator and an originally hidden interface for accessing the functional module of the monitoring management target space can be provided for the operator only when the identity authentication information of the operator passes the authentication. Therefore, the system can be applied to monitoring and managing other target spaces which are inconvenient to see, such as a private room or a private space at home, so that the requirement of a user for carrying out secret operation on the private space is met, and meanwhile, the operation safety is improved.
In step S403, a monitoring device, a security device, and a network device communicatively connected to the monitoring device and the security device of the target space are managed.
Specifically, according to the requirement of an operator, the monitoring device, the security device, and the network device in communication connection with the monitoring device and the security device may be selected in an adding or deleting manner, and the state of each device may be controlled according to the requirement, for example, the devices may be turned on or off.
In step S404, the state of the target space is displayed, including whether a target object appears in the target space.
Specifically, the step may be to display the state of the target space according to whether a target object appears in the target space after receiving the data of the monitoring device in the on state and processing the received data according to the management of the monitoring device in step S403.
In step S405, according to the received configuration instruction, a linkage configuration relationship between the monitoring device and the security device in the target space is set, so that when the monitoring device monitors that a target object appears in the target space, the security device can automatically take corresponding measures.
In the embodiment of the application, the linkage configuration relationship may include a corresponding linkage relationship and parameter configuration between the monitoring device and the security device. Specifically, the monitoring device may include: at least one of a human body sensor, an image collector and a sound collector. In the embodiment of the application, a plurality of monitoring devices can be arranged, the image collector can be a camera with a storage function, and the sound collector can be an interphone and the like; the security device may include: the monitoring equipment is used for monitoring whether an object with a target appears in the target space or not; the network device may be a gateway. The linkage relationship may be a first camera and a second camera, a first gateway, and a gate lock, and the corresponding configuration parameter may be a time length between a time when the first camera and the second camera both monitor that the target object appears in the target space and a time when the linkage control gate lock is automatically closed, for example, the time length may be 10 seconds.
The configuration instruction can be a configuration instruction sent by a received operator according to the displayed linkage configuration relationship between the known monitoring equipment and the security equipment, a configuration instruction for modifying the known configuration relationship, or a new configuration instruction created by the operator through direct customization.
In step S406, when it is monitored that a target object appears in the target space, an early warning prompt message is sent to a preset receiving end.
In order to improve the convenience of monitoring the private space, a user can preset an early warning reminding scheme so as to send early warning reminding information to a preset receiving end when a target object appears in the target space, and therefore the target space is monitored conveniently and effectively.
According to the monitoring regulation and control method provided by the embodiment of the application, the identity of the operator of the monitoring management system is verified, after the identity of the operator of the monitoring management system is verified, the operator is granted the authority of monitoring and managing the target space, and an originally hidden interface for accessing the functional module of the monitoring and managing target space is provided for the operator, so that the monitoring equipment, the security equipment and the network equipment which are in communication connection with the monitoring equipment and the security equipment of the target space can be further managed, the state of the target space is displayed, the linkage configuration relation between the monitoring equipment and the security equipment of the target space is set according to the received configuration instruction, and when the monitoring equipment monitors that a target object appears in the target space, the security equipment can automatically take corresponding measures. The method can meet the requirement of an operator on the secret operation of the target space, and can improve the safety of the operation. In addition, according to the linkage relation of the monitoring equipment and the security equipment, remote monitoring and security regulation and control can be conveniently and effectively carried out on the target space. By sending the prompt message to the preset receiving end, the state of the target space can be timely obtained under the condition that application software is not opened.
Specific examples
Referring to fig. 5A and 5B, fig. 5A and 5B are specific examples of monitoring and managing a covert space by using an APP using the space monitoring and management system provided in the present application.
As shown in fig. 5A, an entry for monitoring and managing the hidden space may be set on the APP, and this entry may be displayed to the operator in the form of an icon, where the box at the lower right corner of the icon may display the state of the target space by color. As a specific example, yellow indicates that the covert space has no target object present, i.e., represents security; red indicates that the target object appears in the crypt space, i.e., represents an anomaly.
After clicking the icon, the operator can only show the authentication interface shown in the right half of fig. 5A to the operator, wherein the authentication interface may be at least one of face authentication, fingerprint authentication, voice authentication, or password authentication.
The operator can grant the right to monitor and manage the secret room to the operator by performing the authentication in the corresponding manner and when the authentication passes, and provides the originally hidden graphical interface for accessing the functional module of the monitoring and managing secret room to the operator, as shown in fig. 5B. So set up, can satisfy the operator and carry out the demand of disguised control management to secret space.
After an originally hidden graphical interface for accessing a function module for monitoring and managing a secret room is provided for an operator, the operator can manage monitoring equipment, network equipment and security equipment in an adding or deleting mode, and can further manage the state of each equipment, for example, the states of two added human body sensors, a gateway and other security equipment are set to be started.
According to the monitoring equipment in the open state, when the situation that a target object appears in the hidden space is monitored, the state of the hidden space can be displayed on a graphical interface of a functional module for accessing, monitoring and managing the hidden space through the color of a circular icon, for example, the hidden space has no target object and represents that the hidden space is in a normal state through displaying green; when the target object appears in the secret space, the abnormal condition of the secret space is represented by displaying red.
In addition, on a graphical interface of a functional module for accessing, monitoring and managing a secret space, a known linkage configuration relationship between monitoring equipment and security equipment can be displayed, for example, according to a historical usage record, the linkage relationship in the linkage configuration relationship set last time is 'human body sensor 1 and human body sensor 2-gateway door lock', and the configuration parameters can be, when the human body sensor 1 and the human body sensor 2 both monitor a time period between occurrence of a target object in the secret space and automatic closing of the gateway door lock, for example, the time period can be 10 seconds, and when the graphical interface of the functional module in the secret space is displayed to an operator, the historical linkage configuration relationship can be directly displayed, so that the operator can directly recommend the historical linkage configuration relationship, and the operation flow is simplified. In addition, the operator can further modify the displayed known linkage configuration relationship according to the requirement, for example, the time between the human body sensor 1 and the human body sensor 2 monitoring that the target object appears in the secret space and the automatic closing of the door lock of the office is modified to 5 seconds.
In addition, on a graphical interface of a functional module for accessing the monitoring and management secret space, an operator can also create a new linkage configuration relationship between the monitoring equipment and the security equipment in a self-defined mode. Specifically, a linkage management of 'human body sensor 1-camera 1-gateway-smart door lock' can be created, and parameters are configured, for example, a time difference between a moment when the human body sensor 1 monitors the appearance of a target object and a moment when the camera uploads data shot by the target object to a server; the time between the moment when the camera uploads the data to the server and the automatic closing of the door lock of the office can be, for example, when the human body sensor 1 monitors that the target object appears in the secret space, the camera 1 is controlled to upload the data after 1 second of monitoring that the target object appears, and the door lock of the office is automatically closed after 10 seconds. Therefore, remote monitoring and security control of the secret space are achieved. In addition, the operator can also set an early warning reminding scheme to carry out safety protection on the secret space quickly and effectively.
In another aspect of the present application, there is also provided a storage medium having a computer program stored therein, where the computer program is capable of implementing the space monitoring management method described above when executed by a processor, and the storage medium includes:
carrying out identity authentication on an operator of the monitoring management system;
after the operator of the monitoring and management system passes the identity authentication, the operator is granted the authority of monitoring and managing the target space, and an originally hidden interface for accessing the functional module of the monitoring and management target space is provided for the operator, so that the operator can realize the monitoring and management of the target space.
In another aspect of the present application, there is also provided a computer device, which includes a processor and a storage medium, where the storage medium stores a computer program, and the computer program, when executed by the processor, can implement the space monitoring management method as described above, including:
carrying out identity authentication on an operator of the monitoring management system;
after the operator of the monitoring and management system passes the identity authentication, the operator is granted the authority of monitoring and managing the target space, and an originally hidden interface for accessing the functional module of the monitoring and management target space is provided for the operator, so that the operator can realize the monitoring and management of the target space.
Although the embodiments of the present invention have been described above, the above description is only for the convenience of understanding the present invention, and is not intended to limit the present invention. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (10)
1. A space monitoring and management system, comprising:
the identity authentication module is used for authenticating the identity of an operator of the monitoring management system;
the authority granting module is used for granting the authority of the monitoring management target space to an operator after the operator of the monitoring management system passes identity authentication, and providing an originally hidden interface for accessing the functional module of the monitoring management target space to the operator so that the operator can realize monitoring management of the target space;
a functional module for monitoring and managing a target space, the functional module comprising:
the device management module is used for managing monitoring devices and security protection devices of a target space and network devices in communication connection with the monitoring devices and the security protection devices;
the state display module is used for displaying the state of a target space, wherein the state of the target space comprises whether a target object appears in the target space;
and the linkage configuration module is used for finishing the setting of the linkage configuration relation between the monitoring equipment and the security equipment in the target space according to the received configuration instruction, so that when the monitoring equipment monitors that the target object appears in the target space, the security equipment can automatically take corresponding counter measures.
2. The space monitoring and management system according to claim 1, wherein the identity verification module comprises: at least one of a face recognition unit, a fingerprint recognition unit, a voice recognition unit and a password verification unit.
3. The space monitoring and management system according to claim 1, wherein the equipment management module comprises: a device adding unit and a device deleting unit.
4. The space monitoring and management system according to claim 1, wherein the linkage configuration module comprises a display unit and a modification unit, and the display unit is used for displaying the linkage configuration relationship between known monitoring equipment and security equipment; the modification unit is used for modifying the known linkage configuration relation between the monitoring equipment and the security equipment according to the received configuration instruction.
5. The space monitoring and management system according to claim 1, wherein the linkage configuration module comprises a custom unit configured to create a linkage configuration relationship between the new monitoring device and the security device according to the received configuration instruction.
6. The space monitoring and management system according to any one of claims 1 to 5, wherein the linkage configuration relationship comprises a corresponding linkage relationship and parameter configuration between the monitoring device and the security device.
7. The space monitoring and management system according to claim 1, wherein the function module for monitoring and managing the target space further comprises: and the early warning reminding module is used for sending early warning reminding information to a preset receiving end when the target object appears in the target space.
8. A space monitoring management method, characterized in that it applies the space monitoring management system according to any one of the preceding claims 1 to 7, comprising:
carrying out identity authentication on an operator of the monitoring management system;
after an operator of the monitoring management system passes identity authentication, granting the operator with the authority of monitoring and managing a target space, and providing an originally hidden interface for accessing a functional module of the monitoring and managing target space for the operator, so that the operator can realize monitoring and managing of the target space; after granting the operator the authority to monitor the management target space and providing the operator with an originally hidden interface for accessing the functional module monitoring the management target space, the method further includes:
managing monitoring equipment, security equipment and network equipment which are in communication connection with the monitoring equipment and the security equipment in the target space;
displaying the state of the target space, wherein the state of the target space comprises whether a target object appears in the target space;
and setting a linkage configuration relation between the monitoring equipment and the security equipment in the target space according to the received configuration instruction, so that when the monitoring equipment monitors that the target object appears in the target space, the security equipment can automatically take corresponding counter measures.
9. A storage medium, characterized in that the storage medium has stored therein a computer program which, when executed by a processor, is capable of implementing a method for space monitoring management according to claim 8.
10. A computer device, comprising: a processor and a storage medium having stored therein a computer program which, when executed by the processor, is capable of implementing the space monitoring management method according to claim 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010181826.8A CN111368272B (en) | 2020-03-16 | 2020-03-16 | Space monitoring management system, method, storage medium and computer equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010181826.8A CN111368272B (en) | 2020-03-16 | 2020-03-16 | Space monitoring management system, method, storage medium and computer equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111368272A CN111368272A (en) | 2020-07-03 |
CN111368272B true CN111368272B (en) | 2021-07-20 |
Family
ID=71208790
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010181826.8A Active CN111368272B (en) | 2020-03-16 | 2020-03-16 | Space monitoring management system, method, storage medium and computer equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111368272B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113786601A (en) * | 2021-09-06 | 2021-12-14 | 广州博冠信息科技有限公司 | Control method and device for secret room, computer equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN204302763U (en) * | 2014-09-30 | 2015-04-29 | 深圳市九洲电器有限公司 | A kind of watch-dog |
CN105188058A (en) * | 2015-09-25 | 2015-12-23 | 上海矽昌通信技术有限公司 | Authentication method for performing identity recognition at WIFI (Wireless Fidelity) scanning stage |
CN106572465A (en) * | 2016-10-18 | 2017-04-19 | 上海众人网络安全技术有限公司 | Wireless connection method and system thereof |
CN107182053A (en) * | 2017-06-08 | 2017-09-19 | 上海掌门科技有限公司 | A kind of method and apparatus for being used to connect hiding WAP |
CN107862502A (en) * | 2017-11-23 | 2018-03-30 | 武汉湖滨电器有限公司 | Warehouse safety management system based on B/S Yu C/S frameworks |
CN108305367A (en) * | 2018-02-22 | 2018-07-20 | 陕西卓居未来智能科技有限公司 | A kind of application method of intelligent peephole and intelligent peephole and high in the clouds management system |
CN110611913A (en) * | 2019-09-24 | 2019-12-24 | 中广核工程有限公司 | Wireless network access method, system management platform and access system for nuclear power plant |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060004737A1 (en) * | 2004-07-02 | 2006-01-05 | Grzonka Michael T | Computer virus protection for automated pharmaceutical processes |
CN101819618A (en) * | 2010-03-19 | 2010-09-01 | 杨筑平 | File encryption method |
-
2020
- 2020-03-16 CN CN202010181826.8A patent/CN111368272B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN204302763U (en) * | 2014-09-30 | 2015-04-29 | 深圳市九洲电器有限公司 | A kind of watch-dog |
CN105188058A (en) * | 2015-09-25 | 2015-12-23 | 上海矽昌通信技术有限公司 | Authentication method for performing identity recognition at WIFI (Wireless Fidelity) scanning stage |
CN106572465A (en) * | 2016-10-18 | 2017-04-19 | 上海众人网络安全技术有限公司 | Wireless connection method and system thereof |
CN107182053A (en) * | 2017-06-08 | 2017-09-19 | 上海掌门科技有限公司 | A kind of method and apparatus for being used to connect hiding WAP |
CN107862502A (en) * | 2017-11-23 | 2018-03-30 | 武汉湖滨电器有限公司 | Warehouse safety management system based on B/S Yu C/S frameworks |
CN108305367A (en) * | 2018-02-22 | 2018-07-20 | 陕西卓居未来智能科技有限公司 | A kind of application method of intelligent peephole and intelligent peephole and high in the clouds management system |
CN110611913A (en) * | 2019-09-24 | 2019-12-24 | 中广核工程有限公司 | Wireless network access method, system management platform and access system for nuclear power plant |
Non-Patent Citations (1)
Title |
---|
如何建立和完善视频监控应用工作机制;潘欢等;《电脑知识与技术》;20121226;第8卷(第24期);第5882-5884页 * |
Also Published As
Publication number | Publication date |
---|---|
CN111368272A (en) | 2020-07-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11282314B2 (en) | Systems and methods for controlling access to physical space | |
CN108091011A (en) | Method and system of the verification technique to equipment progress permission control is unified by the testimony of a witness | |
CN105096420A (en) | Access control system and data processing method for same | |
CN110211267A (en) | Indoor openings control method, the configuration method of permission, device and storage medium | |
CN107093243A (en) | A kind of door lock alarm verification method and system, terminal | |
CN102903167A (en) | Management system for renting and selling houses | |
CN116011005A (en) | Method and system for preventing phishing or luxury software attacks | |
CN106230937A (en) | Long-range control method, remote control and terminal | |
AU2014370501A1 (en) | An integrated access control and identity management system | |
CN114360114B (en) | User authority management method and system | |
KR20180058140A (en) | Method and system for controlling doorlock | |
WO2021017567A1 (en) | Door lock control system and method, display control terminal and door lock control device | |
CN110491008A (en) | A kind of community-based managing caller side and system, storage medium | |
CN105187640A (en) | Anti-theft method and system of mobile terminal | |
CN111784889A (en) | Access control management system | |
KR101765080B1 (en) | smart door lock system based on iot and the method thereof | |
CN205140028U (en) | Gate inhibition system | |
CN111368272B (en) | Space monitoring management system, method, storage medium and computer equipment | |
CN108364376A (en) | A kind of gate inhibition and integrated Work attendance method of checking card | |
KR20160010009A (en) | System and method for managing remote entrance of person | |
CN108537924B (en) | Method for realizing network intelligent lock | |
CN113421362B (en) | CTID-based intelligent door lock real-name authentication method, device and system | |
CN112652101A (en) | Multi-feature finger vein biological data identification method and device | |
TWM449312U (en) | Cloud door-security management system | |
CN107437284B (en) | Lock control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |