Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a smart security inspection management method, which comprises the following steps:
receiving an inspection request sent by an inspection client, wherein the inspection request comprises an inspection security node, an inspection warning level and inspection precision;
acquiring a first security data field of an inspection security node, wherein the first security data field comprises first judging data and first protection area data;
analyzing whether a first security event occurs in the patrol security node according to the first discrimination data;
when a first security event occurs, acquiring a second security data domain of an adjacent security node according to first protection area data, wherein the second security data domain comprises second judgment data and second protection area data;
analyzing whether a second security event occurs to the adjacent security nodes according to the second judgment data;
When a second security event occurs, updating the first judgment data according to the second judgment data to obtain security inspection data, and analyzing the security inspection data to obtain a protection warning level;
when the protection warning level is higher than the inspection warning level, analyzing the security inspection data by combining environmental factors and behavior factors to obtain a target inspection area;
and generating a patrol inspection instruction according to the target patrol inspection area and sending the patrol inspection instruction to the patrol inspection robot, wherein the patrol inspection robot responds to the received patrol inspection instruction to execute patrol inspection operation in the target patrol inspection area.
According to a preferred embodiment, the first security data domain is a security data domain of an inspection security node, and the second security data domain is a security data domain of an adjacent security node of the inspection security node; the security data domain is used for carrying out security state detection and event analysis on a target monitoring area of the security node.
According to a preferred embodiment, the first protection zone data is used for identifying all security nodes in a protection zone where the routing inspection security node is located, and the first protection zone data comprises a node identifier of the routing inspection security node and a node identifier of an adjacent security node;
The routing inspection security node is a target security node; and the adjacent security nodes are security nodes except the routing inspection security node in a protection area where the routing inspection security node is located.
The protection zone is an area with a comprehensive precaution function and composed of one or more security nodes, and the security nodes can be of one or more types.
According to a preferred embodiment, the event discrimination module, according to the first discrimination data, analyzing whether the first security event occurs in the patrol security node includes:
the event distinguishing module obtains first state characteristic data according to the first distinguishing data;
the event distinguishing module acquires standard state characteristic data from a database;
the event judging module obtains a first state change degree according to the first state characteristic data and the standard state characteristic data, and compares the first state change degree with a first state threshold value to judge whether a first security event occurs; and the state change degree is used for measuring the change degree of the environment in the target monitoring area of the security node.
When the first state change degree is larger than a first state threshold value, indicating that a first security event occurs, and acquiring a second security data domain by the event distinguishing module according to the first protection area data;
And when the first state change degree is smaller than the first state threshold value, the first security event does not occur, and the event distinguishing module deletes the first security data domain.
According to a preferred embodiment, the event discrimination module obtaining the second security data domain according to the first guard zone data includes:
the event judgment module acquires node identifiers of adjacent security nodes according to the first protection area data;
the event judging module sends a state judging instruction to all adjacent security nodes according to the node identifier;
and the adjacent security nodes respond to the received state judgment instruction and send the second security data domain to the event judgment module.
According to a preferred embodiment, the event discrimination module obtains second state feature data according to the second discrimination data;
the event distinguishing module acquires standard state characteristic data from a database;
the event judging module obtains a second state change degree according to the second state characteristic data and the standard state characteristic data, and compares the second state change degree with a second state threshold value to judge whether a second security event occurs.
When the second state change degree is larger than a second state threshold value, a second security event is generated, the event judgment module sends second judgment data to the security inspection module, and the security inspection module updates the first judgment data according to the second judgment data to obtain security inspection data;
And when the second state change degree is smaller than the second state threshold value, indicating that the second security event does not occur.
According to a preferred embodiment, the updating the first discrimination data by the security inspection module according to the second discrimination data to obtain the security inspection data includes:
the security inspection module acquires node identifiers of all adjacent security nodes with a second security event, and sends an updating request instruction to the corresponding adjacent security nodes according to the node identifiers;
the adjacent security nodes respond to the received updating request instruction and send corresponding second security data domains to the security inspection module;
and the security inspection module performs data fusion processing on the second judgment data of the second security data domain and the first judgment data to obtain security inspection data.
According to a preferred embodiment, when the protection warning level is higher than the inspection warning level, the inspection area module analyzes the security inspection data to obtain a target inspection area, and the method comprises the following steps:
the inspection area module acquires inspection position information according to the security inspection data, wherein the inspection position information comprises position data of inspection security nodes and position data of all adjacent security nodes in which a second security event occurs;
The inspection area module acquires a reference point of a target inspection area according to the inspection position information and generates an initial inspection area which takes the reference point as a circle center and inspection precision as a radius;
the inspection area module analyzes according to the environmental factors and the behavior factors to obtain an environmental disturbance function;
and the inspection area module updates the initial inspection area according to the environment disturbance function to obtain a target inspection area.
According to a preferred embodiment, the environmental perturbation function is calculated by the formula:
dz=f(z,t)dt+dθ
wherein z is a reference point, f (z, t) is an environment disturbance function of an environment factor and a behavior factor, and d theta represents an expected value of 0.
According to a preferred embodiment, the security inspection module obtains a protection warning level according to the security inspection data; and when the protection warning level is lower than the inspection warning level, storing the security inspection data in a database for an inspection manager to inquire.
The invention has the following beneficial effects:
the intelligent security inspection platform determines the target inspection range by analyzing the security data field of the security node, so that the security inspection work of the inspection robot is pointed, and the condition of missing inspection in the traditional random inspection mode is avoided. In addition, the security inspection operation is executed only when the protection warning level is greater than the inspection warning level, the inspection efficiency is improved, and the condition that manpower and material resources are wasted due to the traditional all-weather inspection mode is avoided.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present invention. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
Referring to fig. 1, in one embodiment, a smart security inspection management system for performing a smart security inspection management method includes: the intelligent security inspection platform comprises an intelligent security inspection platform, security nodes and an inspection client. The intelligent security inspection platform is in communication connection with the inspection client and the security node respectively.
The security node is a device for checking the security state of a target monitoring area, and includes but is not limited to: the system comprises a microwave intrusion detector, an ultrasonic intrusion detector, an active infrared intrusion detector, a vibration sensor, a glass breakage detector, a space movement detector, a temperature sensing detector, an integrated camera, a high-speed dome camera and a network camera.
The intelligent security inspection platform comprises a data acquisition module, an event discrimination module, a security inspection module, an inspection area module and a database, and all the modules are in communication connection with one another. The data acquisition module is configured to acquire a first security data domain of the patrol security node and store the first security data domain in the database.
The event discrimination module is configured to analyze whether a first security event occurs in the routing inspection security node according to the first discrimination data, and analyze whether a second security event occurs according to the second discrimination data when the first security event occurs.
The security inspection module is configured to update the first discrimination data according to the second discrimination data to obtain security inspection data, and analyze the security inspection data to obtain a protection warning level.
The inspection area module is configured to obtain a target inspection area according to the analysis of the security inspection data when the protection warning level is higher than the inspection warning level, and generate an inspection instruction according to the target inspection area and send the inspection instruction to the inspection robot.
Specifically, in an embodiment, the intelligent security inspection management method of the present invention may include:
s1, the intelligent security inspection platform receives an inspection request sent by the inspection client, wherein the inspection request comprises inspection security nodes, inspection warning levels and inspection precision.
The inspection request is used for indicating the intelligent security inspection platform to process the inspection security node and data collected by adjacent security nodes of the inspection security node so as to judge whether security violation events can occur in the area near the inspection security node or not, and the inspection robot is assigned to the target inspection area for further inspection when the security violation events occur. The security violation event comprises: theft, intrusion and violent destruction.
Patrol and examine the minimum warning rank of warning rank for carrying out the operation of patrolling and examining, promptly, this application only protects warning rank and is greater than just appointing when patrolling and examining warning rank and patrols and examines the robot and patrol and examine the operation to avoid the waste of the manpower and materials resource that meaningless patrolled and examined and brought.
The inspection precision is the maximum radius of the target inspection area, the inspection precision is larger, the inspection range is larger, the inspection result is more accurate, and the inspection precision is set by a manager according to actual needs because the inspection range is larger and the consumed human and material resources are larger.
S2, a data acquisition module of the intelligent security inspection platform acquires a first security data domain of an inspection security node, wherein the first security data domain comprises first distinguishing data and first protection area data;
Specifically, the security data domain is used for carrying out security state detection and event analysis on the security nodes; the first discrimination data includes video stream data and sensing data. The first protection zone data is used for identifying all security nodes in a protection zone where the inspection security nodes are located, and the first protection zone data comprises node identifiers of the inspection security nodes and node identifiers of adjacent security nodes.
The patrol security node is a target security node, and the adjacent security nodes are other security nodes except the patrol security node in a protection area where the patrol security node is located.
The video stream data is obtained by compressing and coding original video image data collected in a target monitoring area by a security node through a video compression technology.
Optionally, the security node is a device for checking the security state of a target monitoring area in the protection area, and includes a microwave intrusion detector, an ultrasonic intrusion detector, an active infrared intrusion detector, a vibration sensor, a glass breakage detector, a spatial movement detector, a temperature-sensitive detector, an integrated camera, a high-speed dome camera, and a web camera.
Optionally, the protection area is an area with a comprehensive precaution function and composed of one or more security nodes, and the security nodes may include one or more types.
S3, the event distinguishing module analyzes whether the first security event occurs in the patrol security node according to the first distinguishing data.
Specifically, the process that whether the event discrimination module analyzes whether the first security event occurs in the patrol security node according to the first discrimination data comprises the following steps:
the event distinguishing module obtains first state characteristic data according to the first distinguishing data; the event distinguishing module acquires standard state characteristic data from a database;
the event distinguishing module obtains a first state change degree according to the first state characteristic data and the standard state characteristic data, and compares the first state change degree with a first state threshold value. The state change degree is used for measuring the change degree of the environment in the target monitoring area of the security node.
Specifically, the feature extraction unit of the event discrimination module obtains a first state feature vector according to the first state feature data,
A=[a1,a2…an]
the feature extraction unit obtains a standard state feature vector according to the standard state feature data,
B=[b1,b2…bn]
a state change degree calculation unit of the event discrimination module calculates a first state change degree according to the first state feature vector and the standard state feature vector,
where n is the number of state features, i is the state feature index, c is the first state change degree, a iFirst state of ith State featureValue of state, biIs the standard state value of the ith state feature.
When the first state change degree is larger than the first state threshold value, the first security event is generated, and the event distinguishing module obtains a second security data domain according to the first protection area data.
And when the first state change degree is smaller than the first state threshold value, the first security event does not occur, and the intelligent security inspection platform deletes the first security data domain.
Optionally, the first state threshold is a critical value preset by an administrator and used for determining that the first security event occurs, and the state change degree is used for measuring the environmental similarity. The standard state characteristic data is data which is pre-configured by an administrator according to the equipment parameters of the security node in the normal state in the target monitoring area.
Optionally, the first security event is a change of an environment occurring in a target monitoring area of the routing inspection security node; the second security event is a change in the environment within the target monitoring area of the adjacent security node.
S4, when a first security event occurs, the event distinguishing module obtains a second security data domain of the adjacent security node according to the first protection area data, and the second security data domain comprises second distinguishing data and second protection area data.
Specifically, the process that the event judgment module obtains the second security data domain of the adjacent security node according to the first protection area data comprises the following steps:
the event judgment module acquires node identifiers of adjacent security nodes according to the first protection area data;
the event judging module sends a state judging instruction to all adjacent security nodes according to the node identifier;
and the adjacent security nodes respond to the received state judgment instruction and send the second security data domain to the event judgment module.
S5, the event judging module analyzes whether a second security event occurs to the adjacent security nodes according to the second judging data.
When no adjacent security node has a second security event, executing the step S5.1: the event discrimination module acquires a node identifier of an adjacent security node according to the first protection area data, and sends safety warning information to the adjacent security node according to the node identifier so as to improve the warning degree of the security node.
Specifically, the process of the event discrimination module analyzing whether the second security event occurs according to the second discrimination data includes: the event judging module obtains second state characteristic data according to the second judging data; the event distinguishing module acquires standard state characteristic data from a database; and the event judging module obtains a second state change degree according to the second state characteristic data and the standard state characteristic data, and compares the second state change degree with a second state threshold value.
Specifically, the feature extraction unit of the event discrimination module obtains a second state feature vector according to the second state feature data,
D=[d1,d2…dn]
the feature extraction unit obtains a standard state feature vector according to the standard state feature data,
B=[b1,b2…bn]
a state change degree calculation unit of the event discrimination module calculates a second state change degree according to the second state feature vector and the standard state feature vector,
where n is the number of state features, i is the state feature index, t is the second state change degree, diSecond state value of i-th state feature, biIs the standard state value of the ith state feature.
When the second state change degree is larger than the second state threshold value, the second security event is represented to occur, the security inspection module updates the first judgment data according to the second judgment data to obtain security inspection data, and when the second state change degree is smaller than the second state threshold value, the second security event is represented to not occur.
And the event judging module analyzes and judges whether at least one adjacent security node generates a second security event according to second judging data in the second security data domain, and when no adjacent security node generates the second security event, the event judging module acquires node identifiers of all adjacent security nodes according to the first protection area data and sends safety warning information to the adjacent security nodes according to the node identifiers.
Optionally, the safety warning information is used for informing the adjacent security nodes in the protection area where the routing inspection security node is located to improve the safety warning degree, and the monitoring degree is enhanced.
When the security event occurs in the routing inspection security node, the intelligent security inspection management method can also judge whether the security event occurs in the adjacent security node in the protection area, realize the cooperative processing among all the security nodes in the protection area to judge whether the security violation event occurs, and ensure the accuracy of the judgment result.
S6, when a second security event occurs, the security inspection module updates the first judgment data according to the second judgment data to obtain security inspection data.
Specifically, the process that the security inspection module updates the first judgment data according to the second judgment data to obtain the security inspection data comprises the following steps:
the security inspection module acquires node identifiers of all adjacent security nodes with a second security event, and sends an updating request instruction to the corresponding adjacent security nodes according to the node identifiers;
the adjacent security nodes respond to the received updating request instruction and send corresponding second security data domains to the security inspection module;
And the security inspection module performs data fusion processing on the second judgment data of the second security data domain and the first judgment data to obtain security inspection data.
Optionally, the data fusion process includes: the security inspection module adds a node identifier of an inspection security node to video stream data and sensor data in the first discrimination data according to the first security data domain; and the security inspection module adds the node identifier of the adjacent security node with the second security event to the video stream data and the sensor data in the second judgment data according to the second security data domain.
The security inspection module performs fusion processing on the video stream data added with the node identifier of the inspection security node and the video stream data added with the node identifier of the adjacent security node to obtain first metadata; and the security inspection module performs fusion processing on the sensing data added with the node identifier of the inspection security node and the sensing data added with the node identifier of the adjacent security node to obtain second metadata. And the security inspection module integrates the first metadata and the second metadata to obtain security inspection data.
S7, the security inspection module analyzes the security inspection data to obtain a protection warning level.
Optionally, the protection alert level includes no alert, normal alert, and severe alert.
The process that the security protection patrol inspection module obtains the protection warning level according to the security protection patrol inspection data comprises the following steps: the security patrol module obtains a dimension characteristic vector X ═ X according to the security patrol data1,x2,…,xn](ii) a The security inspection data obtains warning standard data from the database, and obtains a first characteristic vector Y according to the warning standard data1=[y1,y2,…,yn]Second feature vector Y2=[y1,y2,…,yn]And a third feature vector Y3=[y1,y2,…,yn]。
Respectively calculating a first matching degree M of the dimension feature vector and the first feature vector1Second degree of matching M of the dimensional feature vector with the second feature vector2Third degree of matching M of the dimensional feature vector and the third feature vector3。
Wherein the content of the first and second substances,
comparison M1,M2,M3The size of (2). If M is1At the minimum, the temperature of the mixture is controlled,at this time, the protection warning level is no warning, if M2At the minimum, the protection warning level is the ordinary warning at this moment, if M3At a minimum, the protection alert level is now a severe alert.
S8, when the protection warning level is higher than the inspection warning level, the inspection area module analyzes the security inspection data by combining the environmental factors and the behavior factors to obtain the target inspection area.
Optionally, when the protection warning level is higher than the inspection warning level, it is indicated that security violation events can occur in the target monitoring area of the security node, at this time, the target inspection area is determined, and the nearest inspection robot is assigned to perform inspection operation on the target inspection area.
Optionally, when the protection warning level is lower than the inspection warning level, the security inspection module stores the security inspection data in the database so that an inspection manager can check the security inspection data.
Specifically, the process that the inspection area module combines environmental factors and behavior factors to analyze security inspection data to obtain the target inspection area includes:
the inspection area module acquires inspection position information according to the security inspection data, wherein the inspection position information comprises position data of inspection security nodes and position data of all adjacent security nodes in which a second security event occurs;
the inspection area module acquires a reference point of a target inspection area according to the inspection position information and generates an initial inspection area which takes the reference point as a circle center and inspection precision as a radius;
the inspection area module analyzes according to the environmental factors and the behavior factors to obtain an environmental disturbance function;
and the inspection area module updates the initial inspection area according to the environment disturbance function to obtain a target inspection area.
Optionally, the calculation formula of the environmental disturbance function is:
dz=f(z,t)dt+dθ
wherein z is a reference point, f (z, t) is an environment disturbance function of an environment factor and a behavior factor, and d theta represents an expected value of 0.
And S9, the inspection area module generates an inspection instruction according to the target inspection area and sends the inspection instruction to the inspection robot, and the inspection robot responds to the received inspection instruction to perform inspection operation in the target inspection area.
The intelligent security inspection platform determines the target inspection range by analyzing the security data field of the security node, so that the security inspection work of the inspection robot is pointed, and the condition of missing inspection in the traditional random inspection mode is avoided. In addition, the security inspection operation is executed only when the protection warning level is greater than the inspection warning level, so that the condition of manpower and material resource waste caused by the traditional all-weather inspection mode is avoided.
In another embodiment, after the security patrol is completed, the intelligent security patrol platform updates the first state threshold and the second state threshold respectively according to the identification results of the first security event and the second security event to obtain a first updated threshold and a second updated threshold, and the first updated threshold and the second updated threshold are used as the first state threshold and the second state threshold of the next security patrol to improve the identification rate of the security event.
Specifically, the recognition rate of the first security event is maximized, and the threshold value at this time is used as a first updating threshold value, and the formula for maximizing the recognition rate of the first security event is as follows:
maxR=(Gθ-Q)s.tα∈[x1,y1]β∈[x2,y2]
Wherein R is the identification rate of the first security event, alpha is the lower limit of the first state threshold, beta is the upper limit of the first state threshold, G is the correct identification rate of the first security event, theta is the identification coefficient, Q is the false alarm rate of the first security event, and alpha belongs to [ x ]1,y1],β∈[x2,y2]Is a boundary constraint.
The method of updating the second state threshold to obtain the second updated threshold is the same as the method described above.
In the embodiment, after the security patrol is completed each time, the intelligent security patrol platform updates the first state threshold value and the second state threshold value, so that the identification rate of the security event is improved in the next security patrol, the more the security patrol times are, the higher the identification rate of the security event is, and the situations of false identification and missed identification of the security event are avoided.
In another embodiment, the process of the security patrol module obtaining the protection warning level according to the security patrol data comprises the following steps: the security inspection module obtains target characteristic data according to the security inspection data, and the security inspection module obtains the number of target types according to the target characteristic data and compares the number with a target type threshold value;
when the number of the target types is smaller than the target type threshold value, the security inspection module obtains the number of the target behaviors according to the target characteristic information, compares the number of the target behaviors with the target behavior threshold value, and if the number of the target behaviors is smaller than the target behavior threshold value, the protection warning level is no warning; and if the number of the target behaviors is larger than the target behavior threshold value, the protection warning level is a common warning.
When the number of the target types is larger than the target type threshold value, the security inspection module obtains the number of the target behaviors according to the target characteristic information, compares the number of the target behaviors with the target behavior threshold value, and if the number of the target behaviors is smaller than the target behavior threshold value, the protection warning level is ordinary warning; and if the number of the target behaviors is larger than the target behavior threshold value, the protection warning level is serious warning.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.