CN111862380A - Intelligent security inspection management method - Google Patents

Intelligent security inspection management method Download PDF

Info

Publication number
CN111862380A
CN111862380A CN202010687946.5A CN202010687946A CN111862380A CN 111862380 A CN111862380 A CN 111862380A CN 202010687946 A CN202010687946 A CN 202010687946A CN 111862380 A CN111862380 A CN 111862380A
Authority
CN
China
Prior art keywords
security
inspection
data
node
event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010687946.5A
Other languages
Chinese (zh)
Other versions
CN111862380B (en
Inventor
蒲雪芹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Wenqiang Technology Co ltd
Original Assignee
Guangyuan Liangzhihui Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangyuan Liangzhihui Technology Co ltd filed Critical Guangyuan Liangzhihui Technology Co ltd
Priority to CN202011510863.5A priority Critical patent/CN112669486B/en
Priority to CN202010687946.5A priority patent/CN111862380B/en
Publication of CN111862380A publication Critical patent/CN111862380A/en
Application granted granted Critical
Publication of CN111862380B publication Critical patent/CN111862380B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/20Checking timed patrols, e.g. of watchman
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/15Correlation function computation including computation of convolution operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/25Fusion techniques
    • G06F18/251Fusion techniques of input or preprocessed data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/25Fusion techniques
    • G06F18/253Fusion techniques of extracted features
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Abstract

The invention relates to the field of big data and intelligent security and protection, and discloses an intelligent security and protection inspection management method, which comprises the following steps: analyzing whether a first security event occurs to the patrol security node according to the first discrimination data of the patrol security node; when the first security event occurs, whether a second security event occurs to the adjacent security nodes is analyzed according to the second judgment data; when a second security event occurs, updating the first discrimination data according to the second discrimination data to obtain security inspection data, and obtaining a protection warning level according to the security inspection data; when the protection warning level is higher than the inspection warning level, the security inspection data are analyzed by combining environmental factors and behavior factors to obtain a target inspection area, and the inspection robot performs inspection operation in the target inspection area. The invention determines the target inspection area through the cooperative management of the security nodes, thereby improving the inspection precision and the inspection efficiency.

Description

Intelligent security inspection management method
Technical Field
The invention relates to the field of big data and intelligent security, in particular to an intelligent security inspection management method.
Background
The intelligent security is based on technologies such as Internet of things, big data and cloud computing, and people's air defense, physical defense and technical defense are closely combined to form a set of complete security system. The system can be divided into: sub-categories such as security inspection, video monitoring, anti-theft alarm, intelligent analysis, building talkback, access control and the like, thereby effectively ensuring the daily life of people such as work, study, entertainment, traffic and the like,
However, the traditional security inspection method is only used for randomly inspecting in a certain area, cannot cooperate with a security sensor, and has no pertinence, and the inspection method cannot accurately inspect the occurrence of security events, so that the inspection missing condition is caused. And this kind of mode of patrolling and examining needs to patrol and examine the robot and carry out round trip to patrol and examine in all weather and be unfavorable for practicing thrift manpower and materials cost.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a smart security inspection management method, which comprises the following steps:
receiving an inspection request sent by an inspection client, wherein the inspection request comprises an inspection security node, an inspection warning level and inspection precision;
acquiring a first security data field of an inspection security node, wherein the first security data field comprises first judging data and first protection area data;
analyzing whether a first security event occurs in the patrol security node according to the first discrimination data;
when a first security event occurs, acquiring a second security data domain of an adjacent security node according to first protection area data, wherein the second security data domain comprises second judgment data and second protection area data;
analyzing whether a second security event occurs to the adjacent security nodes according to the second judgment data;
When a second security event occurs, updating the first judgment data according to the second judgment data to obtain security inspection data, and analyzing the security inspection data to obtain a protection warning level;
when the protection warning level is higher than the inspection warning level, analyzing the security inspection data by combining environmental factors and behavior factors to obtain a target inspection area;
and generating a patrol inspection instruction according to the target patrol inspection area and sending the patrol inspection instruction to the patrol inspection robot, wherein the patrol inspection robot responds to the received patrol inspection instruction to execute patrol inspection operation in the target patrol inspection area.
According to a preferred embodiment, the first security data domain is a security data domain of an inspection security node, and the second security data domain is a security data domain of an adjacent security node of the inspection security node; the security data domain is used for carrying out security state detection and event analysis on a target monitoring area of the security node.
According to a preferred embodiment, the first protection zone data is used for identifying all security nodes in a protection zone where the routing inspection security node is located, and the first protection zone data comprises a node identifier of the routing inspection security node and a node identifier of an adjacent security node;
The routing inspection security node is a target security node; and the adjacent security nodes are security nodes except the routing inspection security node in a protection area where the routing inspection security node is located.
The protection zone is an area with a comprehensive precaution function and composed of one or more security nodes, and the security nodes can be of one or more types.
According to a preferred embodiment, the event discrimination module, according to the first discrimination data, analyzing whether the first security event occurs in the patrol security node includes:
the event distinguishing module obtains first state characteristic data according to the first distinguishing data;
the event distinguishing module acquires standard state characteristic data from a database;
the event judging module obtains a first state change degree according to the first state characteristic data and the standard state characteristic data, and compares the first state change degree with a first state threshold value to judge whether a first security event occurs; and the state change degree is used for measuring the change degree of the environment in the target monitoring area of the security node.
When the first state change degree is larger than a first state threshold value, indicating that a first security event occurs, and acquiring a second security data domain by the event distinguishing module according to the first protection area data;
And when the first state change degree is smaller than the first state threshold value, the first security event does not occur, and the event distinguishing module deletes the first security data domain.
According to a preferred embodiment, the event discrimination module obtaining the second security data domain according to the first guard zone data includes:
the event judgment module acquires node identifiers of adjacent security nodes according to the first protection area data;
the event judging module sends a state judging instruction to all adjacent security nodes according to the node identifier;
and the adjacent security nodes respond to the received state judgment instruction and send the second security data domain to the event judgment module.
According to a preferred embodiment, the event discrimination module obtains second state feature data according to the second discrimination data;
the event distinguishing module acquires standard state characteristic data from a database;
the event judging module obtains a second state change degree according to the second state characteristic data and the standard state characteristic data, and compares the second state change degree with a second state threshold value to judge whether a second security event occurs.
When the second state change degree is larger than a second state threshold value, a second security event is generated, the event judgment module sends second judgment data to the security inspection module, and the security inspection module updates the first judgment data according to the second judgment data to obtain security inspection data;
And when the second state change degree is smaller than the second state threshold value, indicating that the second security event does not occur.
According to a preferred embodiment, the updating the first discrimination data by the security inspection module according to the second discrimination data to obtain the security inspection data includes:
the security inspection module acquires node identifiers of all adjacent security nodes with a second security event, and sends an updating request instruction to the corresponding adjacent security nodes according to the node identifiers;
the adjacent security nodes respond to the received updating request instruction and send corresponding second security data domains to the security inspection module;
and the security inspection module performs data fusion processing on the second judgment data of the second security data domain and the first judgment data to obtain security inspection data.
According to a preferred embodiment, when the protection warning level is higher than the inspection warning level, the inspection area module analyzes the security inspection data to obtain a target inspection area, and the method comprises the following steps:
the inspection area module acquires inspection position information according to the security inspection data, wherein the inspection position information comprises position data of inspection security nodes and position data of all adjacent security nodes in which a second security event occurs;
The inspection area module acquires a reference point of a target inspection area according to the inspection position information and generates an initial inspection area which takes the reference point as a circle center and inspection precision as a radius;
the inspection area module analyzes according to the environmental factors and the behavior factors to obtain an environmental disturbance function;
and the inspection area module updates the initial inspection area according to the environment disturbance function to obtain a target inspection area.
According to a preferred embodiment, the environmental perturbation function is calculated by the formula:
dz=f(z,t)dt+dθ
wherein z is a reference point, f (z, t) is an environment disturbance function of an environment factor and a behavior factor, and d theta represents an expected value of 0.
According to a preferred embodiment, the security inspection module obtains a protection warning level according to the security inspection data; and when the protection warning level is lower than the inspection warning level, storing the security inspection data in a database for an inspection manager to inquire.
The invention has the following beneficial effects:
the intelligent security inspection platform determines the target inspection range by analyzing the security data field of the security node, so that the security inspection work of the inspection robot is pointed, and the condition of missing inspection in the traditional random inspection mode is avoided. In addition, the security inspection operation is executed only when the protection warning level is greater than the inspection warning level, the inspection efficiency is improved, and the condition that manpower and material resources are wasted due to the traditional all-weather inspection mode is avoided.
Drawings
Fig. 1 is a block diagram illustrating a smart security inspection management system according to an exemplary embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present invention. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
Referring to fig. 1, in one embodiment, a smart security inspection management system for performing a smart security inspection management method includes: the intelligent security inspection platform comprises an intelligent security inspection platform, security nodes and an inspection client. The intelligent security inspection platform is in communication connection with the inspection client and the security node respectively.
The security node is a device for checking the security state of a target monitoring area, and includes but is not limited to: the system comprises a microwave intrusion detector, an ultrasonic intrusion detector, an active infrared intrusion detector, a vibration sensor, a glass breakage detector, a space movement detector, a temperature sensing detector, an integrated camera, a high-speed dome camera and a network camera.
The intelligent security inspection platform comprises a data acquisition module, an event discrimination module, a security inspection module, an inspection area module and a database, and all the modules are in communication connection with one another. The data acquisition module is configured to acquire a first security data domain of the patrol security node and store the first security data domain in the database.
The event discrimination module is configured to analyze whether a first security event occurs in the routing inspection security node according to the first discrimination data, and analyze whether a second security event occurs according to the second discrimination data when the first security event occurs.
The security inspection module is configured to update the first discrimination data according to the second discrimination data to obtain security inspection data, and analyze the security inspection data to obtain a protection warning level.
The inspection area module is configured to obtain a target inspection area according to the analysis of the security inspection data when the protection warning level is higher than the inspection warning level, and generate an inspection instruction according to the target inspection area and send the inspection instruction to the inspection robot.
Specifically, in an embodiment, the intelligent security inspection management method of the present invention may include:
s1, the intelligent security inspection platform receives an inspection request sent by the inspection client, wherein the inspection request comprises inspection security nodes, inspection warning levels and inspection precision.
The inspection request is used for indicating the intelligent security inspection platform to process the inspection security node and data collected by adjacent security nodes of the inspection security node so as to judge whether security violation events can occur in the area near the inspection security node or not, and the inspection robot is assigned to the target inspection area for further inspection when the security violation events occur. The security violation event comprises: theft, intrusion and violent destruction.
Patrol and examine the minimum warning rank of warning rank for carrying out the operation of patrolling and examining, promptly, this application only protects warning rank and is greater than just appointing when patrolling and examining warning rank and patrols and examines the robot and patrol and examine the operation to avoid the waste of the manpower and materials resource that meaningless patrolled and examined and brought.
The inspection precision is the maximum radius of the target inspection area, the inspection precision is larger, the inspection range is larger, the inspection result is more accurate, and the inspection precision is set by a manager according to actual needs because the inspection range is larger and the consumed human and material resources are larger.
S2, a data acquisition module of the intelligent security inspection platform acquires a first security data domain of an inspection security node, wherein the first security data domain comprises first distinguishing data and first protection area data;
Specifically, the security data domain is used for carrying out security state detection and event analysis on the security nodes; the first discrimination data includes video stream data and sensing data. The first protection zone data is used for identifying all security nodes in a protection zone where the inspection security nodes are located, and the first protection zone data comprises node identifiers of the inspection security nodes and node identifiers of adjacent security nodes.
The patrol security node is a target security node, and the adjacent security nodes are other security nodes except the patrol security node in a protection area where the patrol security node is located.
The video stream data is obtained by compressing and coding original video image data collected in a target monitoring area by a security node through a video compression technology.
Optionally, the security node is a device for checking the security state of a target monitoring area in the protection area, and includes a microwave intrusion detector, an ultrasonic intrusion detector, an active infrared intrusion detector, a vibration sensor, a glass breakage detector, a spatial movement detector, a temperature-sensitive detector, an integrated camera, a high-speed dome camera, and a web camera.
Optionally, the protection area is an area with a comprehensive precaution function and composed of one or more security nodes, and the security nodes may include one or more types.
S3, the event distinguishing module analyzes whether the first security event occurs in the patrol security node according to the first distinguishing data.
Specifically, the process that whether the event discrimination module analyzes whether the first security event occurs in the patrol security node according to the first discrimination data comprises the following steps:
the event distinguishing module obtains first state characteristic data according to the first distinguishing data; the event distinguishing module acquires standard state characteristic data from a database;
the event distinguishing module obtains a first state change degree according to the first state characteristic data and the standard state characteristic data, and compares the first state change degree with a first state threshold value. The state change degree is used for measuring the change degree of the environment in the target monitoring area of the security node.
Specifically, the feature extraction unit of the event discrimination module obtains a first state feature vector according to the first state feature data,
A=[a1,a2…an]
the feature extraction unit obtains a standard state feature vector according to the standard state feature data,
B=[b1,b2…bn]
a state change degree calculation unit of the event discrimination module calculates a first state change degree according to the first state feature vector and the standard state feature vector,
Figure BDA0002588265610000071
where n is the number of state features, i is the state feature index, c is the first state change degree, a iFirst state of ith State featureValue of state, biIs the standard state value of the ith state feature.
When the first state change degree is larger than the first state threshold value, the first security event is generated, and the event distinguishing module obtains a second security data domain according to the first protection area data.
And when the first state change degree is smaller than the first state threshold value, the first security event does not occur, and the intelligent security inspection platform deletes the first security data domain.
Optionally, the first state threshold is a critical value preset by an administrator and used for determining that the first security event occurs, and the state change degree is used for measuring the environmental similarity. The standard state characteristic data is data which is pre-configured by an administrator according to the equipment parameters of the security node in the normal state in the target monitoring area.
Optionally, the first security event is a change of an environment occurring in a target monitoring area of the routing inspection security node; the second security event is a change in the environment within the target monitoring area of the adjacent security node.
S4, when a first security event occurs, the event distinguishing module obtains a second security data domain of the adjacent security node according to the first protection area data, and the second security data domain comprises second distinguishing data and second protection area data.
Specifically, the process that the event judgment module obtains the second security data domain of the adjacent security node according to the first protection area data comprises the following steps:
the event judgment module acquires node identifiers of adjacent security nodes according to the first protection area data;
the event judging module sends a state judging instruction to all adjacent security nodes according to the node identifier;
and the adjacent security nodes respond to the received state judgment instruction and send the second security data domain to the event judgment module.
S5, the event judging module analyzes whether a second security event occurs to the adjacent security nodes according to the second judging data.
When no adjacent security node has a second security event, executing the step S5.1: the event discrimination module acquires a node identifier of an adjacent security node according to the first protection area data, and sends safety warning information to the adjacent security node according to the node identifier so as to improve the warning degree of the security node.
Specifically, the process of the event discrimination module analyzing whether the second security event occurs according to the second discrimination data includes: the event judging module obtains second state characteristic data according to the second judging data; the event distinguishing module acquires standard state characteristic data from a database; and the event judging module obtains a second state change degree according to the second state characteristic data and the standard state characteristic data, and compares the second state change degree with a second state threshold value.
Specifically, the feature extraction unit of the event discrimination module obtains a second state feature vector according to the second state feature data,
D=[d1,d2…dn]
the feature extraction unit obtains a standard state feature vector according to the standard state feature data,
B=[b1,b2…bn]
a state change degree calculation unit of the event discrimination module calculates a second state change degree according to the second state feature vector and the standard state feature vector,
Figure BDA0002588265610000091
where n is the number of state features, i is the state feature index, t is the second state change degree, diSecond state value of i-th state feature, biIs the standard state value of the ith state feature.
When the second state change degree is larger than the second state threshold value, the second security event is represented to occur, the security inspection module updates the first judgment data according to the second judgment data to obtain security inspection data, and when the second state change degree is smaller than the second state threshold value, the second security event is represented to not occur.
And the event judging module analyzes and judges whether at least one adjacent security node generates a second security event according to second judging data in the second security data domain, and when no adjacent security node generates the second security event, the event judging module acquires node identifiers of all adjacent security nodes according to the first protection area data and sends safety warning information to the adjacent security nodes according to the node identifiers.
Optionally, the safety warning information is used for informing the adjacent security nodes in the protection area where the routing inspection security node is located to improve the safety warning degree, and the monitoring degree is enhanced.
When the security event occurs in the routing inspection security node, the intelligent security inspection management method can also judge whether the security event occurs in the adjacent security node in the protection area, realize the cooperative processing among all the security nodes in the protection area to judge whether the security violation event occurs, and ensure the accuracy of the judgment result.
S6, when a second security event occurs, the security inspection module updates the first judgment data according to the second judgment data to obtain security inspection data.
Specifically, the process that the security inspection module updates the first judgment data according to the second judgment data to obtain the security inspection data comprises the following steps:
the security inspection module acquires node identifiers of all adjacent security nodes with a second security event, and sends an updating request instruction to the corresponding adjacent security nodes according to the node identifiers;
the adjacent security nodes respond to the received updating request instruction and send corresponding second security data domains to the security inspection module;
And the security inspection module performs data fusion processing on the second judgment data of the second security data domain and the first judgment data to obtain security inspection data.
Optionally, the data fusion process includes: the security inspection module adds a node identifier of an inspection security node to video stream data and sensor data in the first discrimination data according to the first security data domain; and the security inspection module adds the node identifier of the adjacent security node with the second security event to the video stream data and the sensor data in the second judgment data according to the second security data domain.
The security inspection module performs fusion processing on the video stream data added with the node identifier of the inspection security node and the video stream data added with the node identifier of the adjacent security node to obtain first metadata; and the security inspection module performs fusion processing on the sensing data added with the node identifier of the inspection security node and the sensing data added with the node identifier of the adjacent security node to obtain second metadata. And the security inspection module integrates the first metadata and the second metadata to obtain security inspection data.
S7, the security inspection module analyzes the security inspection data to obtain a protection warning level.
Optionally, the protection alert level includes no alert, normal alert, and severe alert.
The process that the security protection patrol inspection module obtains the protection warning level according to the security protection patrol inspection data comprises the following steps: the security patrol module obtains a dimension characteristic vector X ═ X according to the security patrol data1,x2,…,xn](ii) a The security inspection data obtains warning standard data from the database, and obtains a first characteristic vector Y according to the warning standard data1=[y1,y2,…,yn]Second feature vector Y2=[y1,y2,…,yn]And a third feature vector Y3=[y1,y2,…,yn]。
Respectively calculating a first matching degree M of the dimension feature vector and the first feature vector1Second degree of matching M of the dimensional feature vector with the second feature vector2Third degree of matching M of the dimensional feature vector and the third feature vector3
Wherein the content of the first and second substances,
Figure BDA0002588265610000101
comparison M1,M2,M3The size of (2). If M is1At the minimum, the temperature of the mixture is controlled,at this time, the protection warning level is no warning, if M2At the minimum, the protection warning level is the ordinary warning at this moment, if M3At a minimum, the protection alert level is now a severe alert.
S8, when the protection warning level is higher than the inspection warning level, the inspection area module analyzes the security inspection data by combining the environmental factors and the behavior factors to obtain the target inspection area.
Optionally, when the protection warning level is higher than the inspection warning level, it is indicated that security violation events can occur in the target monitoring area of the security node, at this time, the target inspection area is determined, and the nearest inspection robot is assigned to perform inspection operation on the target inspection area.
Optionally, when the protection warning level is lower than the inspection warning level, the security inspection module stores the security inspection data in the database so that an inspection manager can check the security inspection data.
Specifically, the process that the inspection area module combines environmental factors and behavior factors to analyze security inspection data to obtain the target inspection area includes:
the inspection area module acquires inspection position information according to the security inspection data, wherein the inspection position information comprises position data of inspection security nodes and position data of all adjacent security nodes in which a second security event occurs;
the inspection area module acquires a reference point of a target inspection area according to the inspection position information and generates an initial inspection area which takes the reference point as a circle center and inspection precision as a radius;
the inspection area module analyzes according to the environmental factors and the behavior factors to obtain an environmental disturbance function;
and the inspection area module updates the initial inspection area according to the environment disturbance function to obtain a target inspection area.
Optionally, the calculation formula of the environmental disturbance function is:
dz=f(z,t)dt+dθ
wherein z is a reference point, f (z, t) is an environment disturbance function of an environment factor and a behavior factor, and d theta represents an expected value of 0.
And S9, the inspection area module generates an inspection instruction according to the target inspection area and sends the inspection instruction to the inspection robot, and the inspection robot responds to the received inspection instruction to perform inspection operation in the target inspection area.
The intelligent security inspection platform determines the target inspection range by analyzing the security data field of the security node, so that the security inspection work of the inspection robot is pointed, and the condition of missing inspection in the traditional random inspection mode is avoided. In addition, the security inspection operation is executed only when the protection warning level is greater than the inspection warning level, so that the condition of manpower and material resource waste caused by the traditional all-weather inspection mode is avoided.
In another embodiment, after the security patrol is completed, the intelligent security patrol platform updates the first state threshold and the second state threshold respectively according to the identification results of the first security event and the second security event to obtain a first updated threshold and a second updated threshold, and the first updated threshold and the second updated threshold are used as the first state threshold and the second state threshold of the next security patrol to improve the identification rate of the security event.
Specifically, the recognition rate of the first security event is maximized, and the threshold value at this time is used as a first updating threshold value, and the formula for maximizing the recognition rate of the first security event is as follows:
maxR=(Gθ-Q)s.tα∈[x1,y1]β∈[x2,y2]
Wherein R is the identification rate of the first security event, alpha is the lower limit of the first state threshold, beta is the upper limit of the first state threshold, G is the correct identification rate of the first security event, theta is the identification coefficient, Q is the false alarm rate of the first security event, and alpha belongs to [ x ]1,y1],β∈[x2,y2]Is a boundary constraint.
The method of updating the second state threshold to obtain the second updated threshold is the same as the method described above.
In the embodiment, after the security patrol is completed each time, the intelligent security patrol platform updates the first state threshold value and the second state threshold value, so that the identification rate of the security event is improved in the next security patrol, the more the security patrol times are, the higher the identification rate of the security event is, and the situations of false identification and missed identification of the security event are avoided.
In another embodiment, the process of the security patrol module obtaining the protection warning level according to the security patrol data comprises the following steps: the security inspection module obtains target characteristic data according to the security inspection data, and the security inspection module obtains the number of target types according to the target characteristic data and compares the number with a target type threshold value;
when the number of the target types is smaller than the target type threshold value, the security inspection module obtains the number of the target behaviors according to the target characteristic information, compares the number of the target behaviors with the target behavior threshold value, and if the number of the target behaviors is smaller than the target behavior threshold value, the protection warning level is no warning; and if the number of the target behaviors is larger than the target behavior threshold value, the protection warning level is a common warning.
When the number of the target types is larger than the target type threshold value, the security inspection module obtains the number of the target behaviors according to the target characteristic information, compares the number of the target behaviors with the target behavior threshold value, and if the number of the target behaviors is smaller than the target behavior threshold value, the protection warning level is ordinary warning; and if the number of the target behaviors is larger than the target behavior threshold value, the protection warning level is serious warning.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1. A smart security inspection management method is characterized by comprising the following steps:
receiving an inspection request sent by an inspection client, wherein the inspection request comprises an inspection security node, an inspection warning level and inspection precision;
acquiring a first security data field of an inspection security node, wherein the first security data field comprises first judging data and first protection area data;
analyzing whether a first security event occurs in the patrol security node according to the first discrimination data;
when a first security event occurs, acquiring a second security data domain of an adjacent security node according to first protection area data, wherein the second security data domain comprises second judgment data and second protection area data;
Analyzing whether a second security event occurs to the adjacent security nodes according to the second judgment data;
when a second security event occurs, updating the first judgment data according to the second judgment data to obtain security inspection data, and analyzing the security inspection data to obtain a protection warning level;
when the protection warning level is higher than the inspection warning level, analyzing the security inspection data by combining environmental factors and behavior factors to obtain a target inspection area;
and generating a patrol inspection instruction according to the target patrol inspection area and sending the patrol inspection instruction to the patrol inspection robot, wherein the patrol inspection robot responds to the received patrol inspection instruction to execute patrol inspection operation in the target patrol inspection area.
2. The method according to claim 1, wherein the first security data domain is a security data domain of an inspection security node, and the second security data domain is a security data domain of an adjacent security node of the inspection security node; the security data domain is used for carrying out security state detection and event analysis on a target monitoring area of the security node.
3. The method according to claim 2, wherein the first protection zone data is used for identifying all security nodes in the protection zone where the inspection security node is located, and comprises a node identifier of the inspection security node and node identifiers of adjacent security nodes;
The routing inspection security node is a target security node; and the adjacent security nodes are security nodes except the routing inspection security node in a protection area where the routing inspection security node is located.
4. The method of claim 3, wherein the event discrimination module analyzing whether the first security event occurs at the patrol security node according to the first discrimination data comprises:
the event distinguishing module obtains first state characteristic data according to the first distinguishing data;
the event distinguishing module acquires standard state characteristic data from a database;
the event judging module obtains a first state change degree according to the first state characteristic data and the standard state characteristic data, and compares the first state change degree with a first state threshold value to judge whether a first security event occurs; and the state change degree is used for measuring the change degree of the environment in the target monitoring area of the security node.
5. The method of claim 4, wherein the event discrimination module obtaining the second security data field from the first protected area data comprises:
the event judgment module acquires node identifiers of adjacent security nodes according to the first protection area data;
the event judging module sends a state judging instruction to all adjacent security nodes according to the node identifier;
And the adjacent security nodes respond to the received state judgment instruction and send the second security data domain to the event judgment module.
6. The method of claim 5, wherein the event discrimination module obtains second state feature data according to the second discrimination data;
the event distinguishing module acquires standard state characteristic data from a database;
the event judging module obtains a second state change degree according to the second state characteristic data and the standard state characteristic data, and compares the second state change degree with a second state threshold value to judge whether a second security event occurs.
7. The method according to claim 6, wherein the updating the first discrimination data by the security inspection module according to the second discrimination data to obtain the security inspection data comprises:
the security inspection module acquires node identifiers of all adjacent security nodes with a second security event, and sends an updating request instruction to the corresponding adjacent security nodes according to the node identifiers;
the adjacent security nodes respond to the received updating request instruction and send corresponding second security data domains to the security inspection module;
and the security inspection module performs data fusion processing on the second judgment data of the second security data domain and the first judgment data to obtain security inspection data.
8. The method of claim 7, wherein analyzing the security patrol data to obtain the target patrol area by the patrol area module when the protection alert level is higher than the patrol alert level comprises:
the inspection area module acquires inspection position information according to the security inspection data, wherein the inspection position information comprises position data of inspection security nodes and position data of all adjacent security nodes in which a second security event occurs;
the inspection area module acquires a reference point of a target inspection area according to the inspection position information and generates an initial inspection area which takes the reference point as a circle center and inspection precision as a radius;
the inspection area module analyzes according to the environmental factors and the behavior factors to obtain an environmental disturbance function;
and the inspection area module updates the initial inspection area according to the environment disturbance function to obtain a target inspection area.
9. The method of claim 8, wherein the environmental perturbation function is calculated by the formula:
dz=f(z,t)dt+dθ
wherein z is a reference point, f (z, t) is an environment disturbance function of an environment factor and a behavior factor, and d theta represents an expected value of 0.
10. The method according to claim 9, wherein the security inspection module obtains a protection alert level according to the security inspection data;
And when the protection warning level is lower than the inspection warning level, storing the security inspection data in a database for an inspection manager to inquire.
CN202010687946.5A 2020-07-16 2020-07-16 Intelligent security inspection management method Active CN111862380B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011510863.5A CN112669486B (en) 2020-07-16 2020-07-16 Intelligent security patrol management system
CN202010687946.5A CN111862380B (en) 2020-07-16 2020-07-16 Intelligent security inspection management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010687946.5A CN111862380B (en) 2020-07-16 2020-07-16 Intelligent security inspection management method

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202011510863.5A Division CN112669486B (en) 2020-07-16 2020-07-16 Intelligent security patrol management system

Publications (2)

Publication Number Publication Date
CN111862380A true CN111862380A (en) 2020-10-30
CN111862380B CN111862380B (en) 2021-07-06

Family

ID=72983288

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010687946.5A Active CN111862380B (en) 2020-07-16 2020-07-16 Intelligent security inspection management method
CN202011510863.5A Active CN112669486B (en) 2020-07-16 2020-07-16 Intelligent security patrol management system

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202011510863.5A Active CN112669486B (en) 2020-07-16 2020-07-16 Intelligent security patrol management system

Country Status (1)

Country Link
CN (2) CN111862380B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113192227B (en) * 2021-04-30 2022-09-30 重庆天智慧启科技有限公司 Community patrol service platform based on Internet of things
CN116050715B (en) * 2023-03-31 2024-01-05 山东联腾电子科技有限公司 Forest protection fireproof safety supervision system

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104299168A (en) * 2014-09-16 2015-01-21 华北电力大学 Optimal viewpoint selection method for overhead power transmission tower inspection flying robot
US20150110459A1 (en) * 2013-10-18 2015-04-23 Gomobile Security Solutions Pte Ltd Systems, methods and devices that allow security and security guard functions to be performed using an integrated system and mobile devices
CN105225288A (en) * 2015-10-29 2016-01-06 锦瀚智慧管网技术有限公司 A kind of pipe network cruising inspection system
CN105447612A (en) * 2014-12-19 2016-03-30 武汉鑫丰易科技发展有限公司 Wisdom community system based on modern security system
EP3138754A1 (en) * 2015-09-03 2017-03-08 Rail Vision Europe Ltd Rail track asset survey system
CN206115620U (en) * 2016-10-26 2017-04-19 国网山东省电力公司肥城市供电公司 Monitoring devices is prevented destroying by optical cable
CN106598052A (en) * 2016-12-14 2017-04-26 南京阿凡达机器人科技有限公司 Robot security inspection method based on environment map and robot thereof
CN107103337A (en) * 2017-05-17 2017-08-29 国网天津市电力公司 Status of electric power diagnostic device and method based on Internet of Things and information fusion
CN108124132A (en) * 2017-12-22 2018-06-05 国家电网公司 A kind of method for safety monitoring and device
CN110634197A (en) * 2018-06-05 2019-12-31 陕西钧冠电子科技有限公司 Inspection equipment and method for reminding inspection route based on voice data
CN111027422A (en) * 2019-11-27 2020-04-17 国网山东省电力公司电力科学研究院 Emergency unmanned aerial vehicle inspection method and system applied to power transmission line corridor

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5674406B2 (en) * 2010-09-30 2015-02-25 綜合警備保障株式会社 Surveillance system, monitoring device, autonomous mobile body, monitoring method, and monitoring program using autonomous mobile body
CN106131489B (en) * 2016-07-13 2018-12-28 江苏汇智达信息科技有限公司 Multi-source data power plant inspection management system
CN106382957B (en) * 2016-09-09 2019-11-05 重庆跃途科技有限公司 A kind of wisdom piping lane intelligent robot inspection comprehensive monitoring system
CN108847005A (en) * 2018-07-05 2018-11-20 北京宏大和创防务技术研究院有限公司 Integral network safety defense system and its control method are beaten in unattended examining
CN109489664A (en) * 2018-11-02 2019-03-19 浙江大华技术股份有限公司 A kind of method and apparatus of path planning
CN110009760A (en) * 2019-03-11 2019-07-12 常州大学 A kind of safety patrol inspection system and method
CN110163485A (en) * 2019-04-23 2019-08-23 北京海益同展信息科技有限公司 A kind of computer room cruising inspection system
CN110275896B (en) * 2019-05-28 2021-07-20 深圳供电局有限公司 Optical cable intrusion construction event identification method, device, equipment and readable storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150110459A1 (en) * 2013-10-18 2015-04-23 Gomobile Security Solutions Pte Ltd Systems, methods and devices that allow security and security guard functions to be performed using an integrated system and mobile devices
CN104299168A (en) * 2014-09-16 2015-01-21 华北电力大学 Optimal viewpoint selection method for overhead power transmission tower inspection flying robot
CN105447612A (en) * 2014-12-19 2016-03-30 武汉鑫丰易科技发展有限公司 Wisdom community system based on modern security system
EP3138754A1 (en) * 2015-09-03 2017-03-08 Rail Vision Europe Ltd Rail track asset survey system
CN105225288A (en) * 2015-10-29 2016-01-06 锦瀚智慧管网技术有限公司 A kind of pipe network cruising inspection system
CN206115620U (en) * 2016-10-26 2017-04-19 国网山东省电力公司肥城市供电公司 Monitoring devices is prevented destroying by optical cable
CN106598052A (en) * 2016-12-14 2017-04-26 南京阿凡达机器人科技有限公司 Robot security inspection method based on environment map and robot thereof
CN107103337A (en) * 2017-05-17 2017-08-29 国网天津市电力公司 Status of electric power diagnostic device and method based on Internet of Things and information fusion
CN108124132A (en) * 2017-12-22 2018-06-05 国家电网公司 A kind of method for safety monitoring and device
CN110634197A (en) * 2018-06-05 2019-12-31 陕西钧冠电子科技有限公司 Inspection equipment and method for reminding inspection route based on voice data
CN111027422A (en) * 2019-11-27 2020-04-17 国网山东省电力公司电力科学研究院 Emergency unmanned aerial vehicle inspection method and system applied to power transmission line corridor

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张良: "基于系统风险熵的化工园区风险态势预测预警研究", 《中国优秀硕士学位论文全文数据库工程科技Ⅰ辑》 *

Also Published As

Publication number Publication date
CN112669486A (en) 2021-04-16
CN111862380B (en) 2021-07-06
CN112669486B (en) 2022-06-10

Similar Documents

Publication Publication Date Title
CN111862380B (en) Intelligent security inspection management method
US10997422B2 (en) Information processing apparatus, information processing method, and program
CN201278180Y (en) Automatic tracking recognition system
CN102594620B (en) Linkable distributed network intrusion detection method based on behavior description
US20240054791A1 (en) Information processing apparatus, information processing method, and program
CN101465033A (en) Automatic tracking recognition system and method
CN108540310B (en) Behavior prediction method based on wireless network cooperative sensing
CN114973140A (en) Dangerous area personnel intrusion monitoring method and system based on machine vision
CN113011833A (en) Safety management method and device for construction site, computer equipment and storage medium
WO2018232846A1 (en) Large-scale peripheral security monitoring method and system
KR20180118979A (en) Method and apparatus for risk detection, prediction, and its correspondence for public safety based on multiple complex information
CN109410497A (en) A kind of monitoring of bridge opening space safety and alarm system based on deep learning
CN112381435A (en) Gridding directional pushing management method for dynamic risk in hydropower station operation process
CN107330884A (en) Ignition point detection method and device
CN111784986B (en) Intelligent security alarm method based on big data
CN111784987B (en) Intelligent security alarm system
CN112102543A (en) Security check system and method
CN116030404A (en) Artificial intelligence-based construction and safety monitoring method for electronic warning fence of operation area
CN111968324A (en) Big data-based intelligent community security alarm system
CN112885013A (en) Monitoring and early warning method and device and readable storage medium
Fu Construction site safety helmet wearing detection method based on improved YOLOv5
CN117376535B (en) Intelligent campus security control method and system
CN113657508A (en) Multi-dimensional information fusion security system decision method and device, computer equipment and storage medium
CN117973705A (en) Data processing and analyzing system and method for intelligent building site monitoring system
CN206557955U (en) Power transmission line corridor collecting unit module, external force damage prevention apparatus and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210114

Address after: 215123 room 1018-01, building 23, Times Square, Suzhou Industrial Park, Suzhou area, Suzhou pilot Free Trade Zone, Jiangsu Province

Applicant after: Suzhou Treasure Box Technology Co.,Ltd.

Address before: 628000 Xuefeng Qiao Road 338, Lizhou District, Guangyuan, Sichuan

Applicant before: GUANGYUAN LIANGZHIHUI TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210621

Address after: 210000 Room 601, building 1, No.4, Limin East Village, Jianye District, Nanjing City, Jiangsu Province

Applicant after: Lv Qiang

Address before: 215123 room 1018-01, building 23, Times Square, Suzhou Industrial Park, Suzhou area, Suzhou pilot Free Trade Zone, Jiangsu Province

Applicant before: Suzhou Treasure Box Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230331

Address after: No.329 Mochou Road, Qinhuai District, Nanjing, Jiangsu 210000

Patentee after: Jiangsu Wenqiang Technology Co.,Ltd.

Address before: 210000 Room 601, building 1, No.4, Limin East Village, Jianye District, Nanjing City, Jiangsu Province

Patentee before: Lv Qiang