CN112447033A - Security data processing method and system, computer equipment and storage medium - Google Patents

Security data processing method and system, computer equipment and storage medium Download PDF

Info

Publication number
CN112447033A
CN112447033A CN201910838205.XA CN201910838205A CN112447033A CN 112447033 A CN112447033 A CN 112447033A CN 201910838205 A CN201910838205 A CN 201910838205A CN 112447033 A CN112447033 A CN 112447033A
Authority
CN
China
Prior art keywords
security
unit
data
security data
alarm event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910838205.XA
Other languages
Chinese (zh)
Other versions
CN112447033B (en
Inventor
邓喜年
杨耕田
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BYD Co Ltd
Original Assignee
BYD Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BYD Co Ltd filed Critical BYD Co Ltd
Priority to CN201910838205.XA priority Critical patent/CN112447033B/en
Publication of CN112447033A publication Critical patent/CN112447033A/en
Application granted granted Critical
Publication of CN112447033B publication Critical patent/CN112447033B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/14Central alarm receiver or annunciator arrangements
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
    • H04L69/162Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Abstract

The invention discloses a security data processing method, a security data processing system, computer equipment and a storage medium. The method comprises the following steps: receiving security data reported by at least one security unit of a security module, wherein each security unit comprises at least one security device; determining an alarm event according to the received security data, and calling a preset linkage rule associated with the alarm event; and according to the preset linkage rule, enabling the security protection units needing linkage to control the corresponding security protection equipment to execute the linkage event corresponding to the security protection equipment. According to the invention, the security data of the security units with different purposes are processed uniformly, and the security equipment of each security unit of the whole station is transferred to execute and link the alarm event, so that the processing efficiency of the station on the alarm event is improved, the alarm event can be controlled and processed stably in time, and the safe and efficient operation of the station is ensured.

Description

Security data processing method and system, computer equipment and storage medium
Technical Field
The invention relates to the field of security data processing, in particular to a security data processing method, a security data processing system, computer equipment and a storage medium.
Background
Along with the development of scientific and technological, modern urban rail transit develops rapidly, and security protection system is as the indispensable partly of station among the modern urban rail transit, can provide and record the various security protection information at station for operation and managers to carry out safety control, supplementary maintenance station safety to the operation at station. In the prior art, a security system in a station mainly depends on a video monitoring system, an access control system and the like, because different systems operate independently, data between the systems cannot be checked simultaneously, and a security operation state of the station cannot be comprehensively evaluated, each system can only make different countermeasures for an alarm of an emergency in the system according to operation data of the system, and thus, the data of each system cannot be comprehensively processed for the alarm of the emergency, the final countermeasures for the alarm of the emergency by each system may be incomplete and stable, and the emergency of the security system cannot be timely controlled and solved.
Disclosure of Invention
The embodiment of the invention provides a security data processing method, a security data processing system, computer equipment and a storage medium, which can uniformly process security data sent by security units with different purposes, determine an alarm event by comprehensively processing the security data, and process the alarm event according to a preset linkage rule; the security protection running state of the whole station is clearer, the alarm event can be timely controlled and stably processed, the alarm event processing efficiency is improved, and safe and efficient running of the station is guaranteed.
A security data processing method comprises the following steps:
receiving security data reported by at least one security unit of a security module, wherein each security unit comprises at least one security device;
determining an alarm event according to the received security data, and calling a preset linkage rule associated with the alarm event; and according to the preset linkage rule, enabling the security protection units needing linkage to control the corresponding security protection equipment to execute the linkage event corresponding to the security protection equipment.
A security data processing system comprises a security module and an Internet of things control module which is in communication connection with the security module, wherein the security module comprises at least one security unit, and each security unit comprises at least one security device;
the thing networking control module includes:
the receiving unit is used for receiving security data reported by at least one security unit of the security module, wherein each security unit comprises at least one security device;
the calling unit is used for determining an alarm event according to the received security data and calling a preset linkage rule associated with the alarm event;
and the execution unit is used for controlling the security protection unit needing linkage to execute the corresponding linkage event according to the preset linkage rule.
A computer readable storage medium, which stores computer readable instructions, and when executed by a processor, implements the security data processing method.
The security data processing system comprises a security module and an Internet of things control module which are in communication connection, and security units with different purposes are integrated in the security module, so that the security data of the security units with different purposes can be processed in the Internet of things control module in a unified way, an alarm event is determined by comprehensively processing the security data, and the alarm event is processed according to a preset linkage rule; therefore, on one hand, the security data of the security units with different purposes are processed in a unified manner, so that the security running state of the whole station is clearer, the station operation personnel can know the security running state of the whole station more clearly, and further various alarms and emergencies can be analyzed, evaluated and processed in time, and the security work of the whole station is greatly facilitated and promoted; on the other hand, the alarm event is determined by comprehensively processing the security data and is processed according to the preset linkage rule, the security equipment of each security unit of the whole station can be moved to perform linkage execution on the corresponding linkage event, the processing efficiency of the station on the alarm event is greatly improved, the alarm event can be timely controlled and stably processed, and the safe and efficient operation of the station is ensured.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without inventive labor.
FIG. 1 is a flowchart of a security data processing method according to an embodiment of the present invention;
FIG. 2 is a functional block diagram of a security data processing system in an embodiment of the present invention;
FIG. 3 is a functional block diagram of a security module of the security data processing system in an embodiment of the present invention;
FIG. 4 is a functional block diagram of a security data processing system in another embodiment of the present invention;
FIG. 5 is a functional block diagram of a recall unit of the security data processing system in an embodiment of the present invention;
FIG. 6 is a functional block diagram of a security data processing system in accordance with yet another embodiment of the present invention;
FIG. 7 is a functional block diagram of a security data processing system in accordance with yet another embodiment of the present invention;
FIG. 8 is a functional block diagram of a recall unit of the security data processing system in another embodiment of the present invention;
FIG. 9 is a functional block diagram of an IOT control module of the security data processing system in an embodiment of the present invention;
FIG. 10 is a schematic block diagram of an IOT control module of a security data processing system according to another embodiment of the present invention;
FIG. 11 is a schematic block diagram of an IOT control module of the security data processing system according to another embodiment of the present invention;
FIG. 12 is a block diagram of an architecture of a security data processing system in an embodiment of the invention;
FIG. 13 is a block diagram of the architecture of a security data processing system in another embodiment of the present invention;
FIG. 14 is a functional block diagram of an event alert management module in the security data processing system in accordance with another embodiment of the present invention;
FIG. 15 is a schematic diagram of a computer device in an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, the present invention provides a security data processing method, which includes the following steps S10-S30:
s10, receiving security data reported by at least one security unit of a security module, wherein each security unit comprises at least one security device; understandably, the security data processing method is applied to an internet of things control module of a security data processing system, and the internet of things control module is in communication connection with the security module. The security module is integrated with at least one security unit, the security unit can be any one of a video monitoring unit, an intrusion monitoring unit, an entrance and exit monitoring unit, a security inspection unit, an electronic inspection unit and the like, but is not limited to the above. Moreover, each security unit comprises security equipment which can be directly controlled by the security unit, and the security equipment comprises but is not limited to the following equipment: the video monitoring unit includes a camera device, the intrusion monitoring unit includes an intrusion monitoring device (for example, a sensor that can detect whether a person or an article that is not allowed to pass invades a preset prohibited area, etc.), the entrance and exit monitoring unit includes an entrance and exit monitoring device (a device for controlling a switch of an entrance and an exit and monitoring a passing condition of the entrance and the exit), the security inspection unit includes a security inspection device (for acquiring and analyzing a security inspection image of a station or/and hazardous article detection information, etc.), and the electronic inspection unit includes an inspection device (for performing inspection according to an inspection route of each inspection point in an inspection plan), without being limited thereto.
S20, determining an alarm event according to the received security data, and calling a preset linkage rule associated with the alarm event; the preset linkage rules comprise attributes of all security units needing linkage and linkage events to be executed of all security equipment needing linkage in the security units needing linkage; that is, after receiving the security data sent by one or more security units, it may be determined comprehensively according to the received security data whether an alarm event occurs, if an alarm event occurs, first determine the attribute (such as the type, name, danger level, or critical level) of the alarm event, then retrieve the preset linkage rule matching the attribute of the alarm event from the database (all data required to be stored in the security data processing system is stored in the database), determine the security units required to be linked, and determine all the security devices required to be linked in each security unit and the linkage events to be executed in each security unit according to the preset linkage rule, and then proceed to step S30. The linkage event refers to an operation event that needs to be executed when the security device is in linkage, for example, the security device is an entrance monitoring device, and the linkage event may refer to switching of an opening and closing state of an entrance controlled by the entrance monitoring device. If the database does not have the preset linkage rule associated with the alarm event, the database can be updated to enable the database to have the preset linkage rule corresponding to the alarm event.
And S30, controlling the security protection units needing to be linked to execute the corresponding linkage events according to the preset linkage rules. Specifically, in step S30, the security unit that needs to be linked may be caused to instruct each security device that needs to be linked in the security unit to execute the linkage event corresponding to the security device according to the preset linkage rule. That is, after the security units needing to be linked, all the security devices needing to be linked in each security unit and the linkage events to be executed in each security unit are determined according to the preset linkage rule, all the security devices needing to be linked and the linkage events to be executed in each security unit can be directly and respectively sent to the corresponding security units, so that the security units can instruct the security devices needing to be linked to execute the respective linkage events to be executed according to the received information, thus, the process of automatically and timely and efficiently processing the alarm events by comprehensively analyzing the security data is completed, and the whole process can be completed without manual operation.
The security protection units with different purposes are integrated in the security protection module, so that the security protection data processing method provided by the invention can uniformly process the security protection data of the security protection units with different purposes, determines an alarm event by comprehensively processing the security protection data and processes the alarm event according to a preset linkage rule; therefore, on one hand, the security data of the security units with different purposes are processed in a unified manner, so that the security running state of the whole station is clearer, the station operation personnel can know the security running state of the whole station more clearly, and further various alarms and emergencies can be analyzed, evaluated and processed in time, and the security work of the whole station is greatly facilitated and promoted; on the other hand, the alarm event is determined by comprehensively processing the security data and is processed according to the preset linkage rule, the security equipment of each security unit of the whole station can be moved to perform linkage execution on the corresponding linkage event, the processing efficiency of the station on the alarm event is greatly improved, the alarm event can be timely controlled and stably processed, and the safe and efficient operation of the station is ensured. Meanwhile, the subsequent system maintenance and expansion can be facilitated through effective management of security data.
In one embodiment, the security unit comprises one or more of a video monitoring unit, an intrusion monitoring unit, an entrance and exit monitoring unit, a security inspection unit and an electronic inspection unit; that is, one the security protection unit can be for video monitor unit, invasion monitor unit, access & exit monitor unit, safety inspection unit and electron patrol and examine any one in the unit, and including a plurality of different security protection units in the security protection module, promptly, including video monitor unit, invasion monitor unit, access & exit monitor unit, safety inspection unit and electron in the security protection module patrol and examine a plurality of security protection units of unit wantonly, wherein, a plurality of are at least two.
Preferably, the security data includes video monitoring data obtained by analyzing video information shot by the camera device by the video monitoring unit according to preset defense information; at this time, in step S10, the receiving security data reported by at least one security unit of the security module includes:
receiving video monitoring data sent by the video monitoring unit, where the video monitoring data is analysis data obtained after the video monitoring unit analyzes video information shot by a camera device according to preset defense information (the analysis data may be data of a face in a preset area in a current video, that is, a person gathering condition, after face analysis is performed on an image in the video information, the analysis data may also be analysis of an article in the video information, and the like); in this embodiment, the video information may be captured by the camera device of the video monitoring unit, and the video monitoring unit may further perform functions such as video preview, video playback, pan-tilt control, and grab image, and may also perform intelligent analysis on the video information captured by the camera device according to preset defense deployment information, so as to indicate relevant analysis data of events such as people gathering, article leaving, loitering, and the like in the analysis data, so that after the subsequent video monitoring unit sends the analysis data (i.e., the video monitoring data) to the internet of things control module, the internet of things control module may determine whether the alarm event is formed according to the analysis data, perform the above-mentioned process of obtaining the analysis data in the video monitoring unit (in another embodiment, the analysis process may also be performed in the internet of things control module), so as to reduce the number of internet of things control modules (which need to process various security data at the same time, large data processing capacity) to increase its operating speed. Further, the video monitoring unit provides various interfaces, for example, a video information interface for acquiring video information shot by the camera device, a control interface for acquiring control signals such as video preview, video playback, pan-tilt control and the like (the control signals may be sent to the control interface by the internet of things control module, and may also be generated according to an operation instruction of the user on the video monitoring unit), a configuration defense deployment interface for intelligently analyzing the video information, and the like.
Further, the security data comprises intrusion monitoring equipment of the intrusion monitoring unit and intrusion monitoring data of a preset forbidden area of a station; at this time, in step S10, the receiving security data reported by at least one security unit of the security module includes: receiving intrusion monitoring data sent by the intrusion monitoring unit, wherein the intrusion monitoring data refer to monitoring data of a preset forbidden area of a station for intrusion monitoring equipment of the intrusion monitoring unit; in this embodiment, monitoring data (i.e., intrusion monitoring data, which may refer to information such as whether there are people or articles that are not allowed to enter the preset prohibited area, and the number of people or articles existing in the preset prohibited area, and the like, may be obtained by analyzing the video information of the monitored preset prohibited area, or may be directly reported by a worker in the preset prohibited area) for monitoring the preset prohibited area such as the edge of the station and the yellow line prohibited area according to the detection and defense plan, may be acquired by the intrusion monitoring device in the intrusion monitoring unit, so that after the subsequent intrusion monitoring unit sends the monitoring data to the internet of things control module, the internet of things control module may determine whether the monitoring data constitutes an alarm event according to the monitoring data. Furthermore, the intrusion monitoring unit comprises a management interface for controlling a preset forbidden area and acquiring intrusion monitoring data, and also comprises an alarm reporting interface which can report an alarm event of the intrusion monitoring equipment in the intrusion monitoring unit to the control module of the internet of things; that is, if the process of determining whether the intrusion monitoring data is an alarm event is directly performed in the intrusion detection unit according to the intrusion monitoring data, at this time, after the alarm event is determined, the alarm event may also be directly reported through the alarm reporting interface, and at this time, the alarm event may be regarded as a part of the reported intrusion monitoring data.
Further, the security data includes passage data of the entrance and exit monitoring equipment of the entrance and exit monitoring unit for monitoring the entrance and exit of the station; at this time, in step S10, the receiving security data reported by at least one security unit of the security module includes: receiving passage data sent by the entrance monitoring unit, wherein the passage data refer to entrance monitoring equipment of the entrance monitoring unit and monitoring data of an entrance of a station; in this embodiment, monitoring data (that is, traffic data, where the traffic data may refer to the number of currently-passed persons at the entrance and exit, the number of persons passing through the entrance and exit, the number of persons waiting before the entrance and exit, the number of persons passing through the entrance and exit, and the number of persons passing through the entrance and exit estimated according to the number of vehicle shifts at the station, and the like) for controlling the entrance and exit of the station may be obtained through entrance and exit monitoring devices (devices for controlling opening and closing of the entrance and exit and monitoring the traffic conditions of the entrance and exit) of the entrance and exit monitoring unit, so that the subsequent entrance and exit monitoring unit can determine whether the entrance and exit constitutes an alarm event according to the traffic data. Understandably, the control instruction of the switch of the entrance can be directly sent out by the internet of things control module, that is, the internet of things control module can indirectly control the on-off state of the entrance monitoring equipment of the entrance monitoring unit to the entrance of the station. Further, the entry monitoring unit be provided with thing networking control module communication connection's instruction control interface, the control command to the access & exit that thing networking control module assigned can be issued to entry monitoring unit through this instruction control interface, and the entry monitoring unit controls the on-off state of access & exit supervisory equipment adjustment access & exit according to the control command to the access & exit that thing networking control module assigned.
Further, the security data comprises security check equipment of the security check unit and security check data for performing security check on a station, and the security check data comprises security check images or/and dangerous goods detection information; at this time, in step S10, the receiving security data reported by at least one security unit of the security module includes: receiving security check data sent by the security check unit, wherein the security check data refer to security check equipment of the security check unit and are used for detecting security check images or/and dangerous goods detection information of a station; in this embodiment, the security check image or/and the hazardous article detection information (i.e., security check data including the number and types of hazardous articles currently checked, images of people currently performing security check, or articles currently checked, etc.) of the station may be acquired and analyzed by the security check device of the security check unit, so that the subsequent security check unit may send the security check data to the internet of things control module, and then the internet of things control module may determine whether the security check image or/and the hazardous article detection information constitute an alarm event according to the security check data. That is, thing networking control module can acquire the security installations of security installations and obtain security inspection image and other information in real time, also can carry out the hazardous articles management in the security inspection through hazardous articles detection information realization. Further, the security inspection unit provides a security inspection interface which can acquire real-time security inspection images or/and dangerous goods detection information.
Furthermore, the security data includes inspection data of the inspection equipment of the electronic inspection unit after inspection according to the inspection route of each inspection point in the inspection plan. At this time, in step S10, the receiving security data reported by at least one security unit of the security module includes: and receiving inspection data sent by the electronic inspection unit, wherein the inspection data refers to inspection result data of inspection equipment of the electronic inspection unit according to the inspection route of each inspection point in the inspection plan. In this embodiment, the inspection result data (that is, inspection data) after inspection is performed according to the inspection route of each inspection point in the inspection plan can be acquired through the inspection equipment of the electronic inspection unit, and whether an abnormal condition exists on the inspection route is determined when the inspection personnel inspects the inspection route, and if the abnormal condition exists, specific information of the abnormal condition, such as video or other data, needs to be attached to the inspection route, so that the subsequent electronic inspection unit can determine whether the inspection data constitutes an alarm event according to the inspection data. Understandably, the electronic inspection unit can realize the management of inspection points, inspection plans, inspection lines and the like, can check inspection results and inspection reports, and sends the inspection results and the inspection reports to the internet of things control module for real-time checking and analysis. Furthermore, the electronic inspection unit provides an inspection interface for acquiring information such as an inspection line, an inspection plan, an inspection result and the like.
Further, each Interface (such as a video information Interface, a control Interface, a configuration and defense Interface, a management Interface, an alarm reporting Interface, an instruction control Interface, a security inspection Interface, a routing inspection Interface, and the like) in the security unit of the security module is preferably an API Interface (Application Programming Interface). The application API is a predefined function that provides the developer with the ability to access a set of routines based on certain software or hardware without having to access source code or understand the details of the internal workings.
As can be seen from the above, each security unit can obtain security data of security equipment in the security unit, and report the security data to the internet of things control module, and the internet of things control module can perform comprehensive analysis according to all the received security data, determine whether the current security data corresponds to an alarm event, and prevent and respond to different situations such as the alarm event in time; meanwhile, the related data of the alarm event can be further evaluated, so that help is provided for better operation decision of the whole station.
In an embodiment, in step S10, the receiving the security data reported by the at least one security unit of the security module includes:
receiving security data reported by at least one security unit of a security module through an MQTT (Message queue Telemetry Transport) middleware, and after the reported security data is packaged and processed, inserting the security data into a Message queue to be processed according to a preset insertion rule. That is, the security module further comprises an MQTT middleware, and each security unit in the security module is connected with the receiving unit of the internet of things control module through the MQTT middleware; therefore, security data can be reported by the MQTT middleware in the security units of the security module (in addition to the security data mentioned in the above embodiment, the security data may also include alarm events corresponding to the security units, state information of security equipment, and the like). Understandably, in an embodiment, at least one security unit of the security module reports security data through the MQTT middleware, processes and encapsulates the security data, and then throws the security data into a Kafka message queue (a distributed, high-throughput, high-scalability message queue service, that is, a to-be-processed message queue) according to a preset insertion rule (for example, sorting according to a time sequence of a processing completion time point or sorting according to a data type), and then, the internet-of-things control module extracts the encapsulated security data from the Kafka message queue for analysis.
In an embodiment, in step S20, the determining an alarm event according to the received security data includes:
calling the security data from the message queue to be processed according to a preset analysis sequence; in this step, the packaged security data is extracted from the Kafka message queue (the extraction sequence is a preset analysis sequence, which may be set as required, or may be extracted according to the analysis sequence carried in the extraction instruction) and analyzed.
Analyzing the type and the data value of the security data, and acquiring an alarm threshold value associated with the type of the security data; in the step, the type and the data value of the extracted security data need to be analyzed, then an alarm threshold value associated with the type of the security data is obtained, the alarm threshold value associated with the type of the security data is compared with a data value of the security data analyzed before to determine whether the data value of the security data exceeds the alarm threshold value, and when the data value of the security data does not exceed the alarm threshold value, the data value of the security data is considered not to form an alarm event, and only the corresponding security data needs to be stored.
In an embodiment, after parsing the type and the data value of the security data, the method further includes: and acquiring a storage area associated with the type of the security data, storing the security data in the storage area associated with the security data, and receiving a feedback processing completion receipt after the storage is completed. In this embodiment, various security data can be classified and stored in the database, and a receipt message is fed back after storage is completed, so that the internet of things control module knows that the security message is processed (stored). And when the data value of the security data exceeds the alarm threshold value, confirming the alarm event corresponding to the security data according to the data value of the security data from all alarm events associated with the type of the security data. That is, when the data value of the security data exceeds the alarm threshold, it is determined that the security data has formed and triggered an alarm event, and at this time, the attribute of the alarm event, such as the type of the alarm event, needs to be confirmed, so as to further perform subsequent linkage processing according to the attribute of the alarm event.
In an embodiment, after the determining, according to the data value of the security data, the alarm event corresponding to the security data, the method further includes:
the security data corresponding to the alarm event is packaged and then inserted into an alarm queue; that is, after confirming that the security data constitutes and triggers an alarm event, the security data is packaged again and thrown into an alarm queue (the alarm queue is also a Kafka message queue).
The security data are called from the alarm queue, the device states of the security devices corresponding to the alarm events in the security data are extracted, the device states of the security devices are stored in a database, meanwhile, the device states are sent to a decision module through a WebSocket (a protocol for full duplex communication on a single TCP connection) to be displayed in real time, and meanwhile, the alarm events corresponding to the security data are warned in the decision module. That is, after the device state of the security device corresponding to the alarm event in the security data is acquired from the alarm queue, the device state is stored in the database, and meanwhile, information such as the device state is sent to the decision module through the WebSocket to be displayed in real time, so that the current running state of each security device can be monitored and checked in real time through the reported state information. Meanwhile, in this embodiment, an alarm prompt may be performed on the alarm event in the decision module (understandably, the alarm prompt may be performed separately or simultaneously on the alarm event in the internet of things control module). Understandably, the internet of things control module transmits messages with the decision module in a WebSocket mode, so that the decision module can master real-time changes of alarm time, equipment states, statistical data and the like of all security units of the security module, and the decision module can really monitor the whole security and protection landscape of a station in real time; moreover, the security data are put into the message queue to be processed, the security data corresponding to the alarm event are put into the alarm queue, the security data are taken according to a certain sequence and are correspondingly processed, a large amount of concurrent security data can be efficiently processed, the real-time state of the whole security system and the response speed of alarm are improved, all operations of the whole station are controlled, and accidents can be avoided.
In an embodiment, after the step S30, that is, after the security unit that needs to be linked controls the corresponding security device to execute the linkage event corresponding thereto according to the preset linkage rule, the method includes:
obtaining an execution result of each security device after executing the linkage event, sending the execution result to a decision module through WebSocket for real-time display, and adjusting the preset linkage rule associated with the alarm event according to the execution result. Namely, the internet of things control module performs message transmission with the decision module in a WebSocket mode, so that the decision module can master real-time change of execution conditions of linkage events corresponding to alarm events of all security units of the security module, and the decision module can really monitor the whole security of a station in real time. Meanwhile, the preset linkage rule is adjusted according to the execution result of the linkage event, so that the preset linkage rule is more suitable for the actual situation, and the processing of the alarm event is more perfect.
In an embodiment, before the step S20, before the invoking of the preset linkage rule associated with the alarm event, the method further includes:
distributing the corresponding security unit for the preset linkage rule, and associating the security unit with the preset linkage rule; specifically, the security units needing to be linked are distributed to the preset linkage rules, and the attributes of the security units needing to be linked are associated with the preset linkage rules; that is, in this embodiment, security units that need to be linked are configured for the preset linkage rules, and at least one or more security units that need to be linked need to be configured in each preset linkage rule. The attribute of the security unit refers to the attribute that the name, the type or the unique code of the security unit can represent the security unit.
Configuring a linkage event for the corresponding security equipment in the security unit according to the preset linkage rule; specifically, configuring a linkage event for each security device needing linkage in the security units needing linkage; the linkage event refers to an operation event that needs to be executed when the security device performs linkage, for example, the security device is an entrance monitoring device, and the linkage event may refer to switching of an opening and closing state of an entrance controlled by the entrance monitoring device.
And associating each preset linkage rule with at least one alarm event. That is, the preset linkage rule is configured and managed, and is also associated with the alarm event, so that when the trigger instruction of the alarm event is received, the preset linkage rule can be directly called according to the attribute of the alarm event, and the security equipment is controlled to execute the corresponding linkage event through the preset linkage rule. Understandably, when the security device executes the linkage event, the security device needs to send mail information (or notify in other ways) to inform a person in charge of the security device about the linkage event that the security device needs to execute.
In an embodiment, the security data processing method further includes:
receiving a login request sent by a login user, and calling login authority information from a database; the login authority information comprises login permission user information and a login permission area associated with each item of login permission user information; the login-permitting user information is preset for each registered user, and the login-permitting user information may be account information used by the registered user for logging in, such as an account number and a password of an account that a registered user is permitted to log in. Understandably, each of the login permission information is associated with at least one login permission area. If the login user information included in the login request is matched with the login permission user information, opening the access authority of the login permission area for the login user according to the login permission area associated with the login permission user information. The login user information refers to account information (such as an account number and a password) of a login user who logs in currently. The login user information included in the login request is matched with the login-allowed user information, and may refer to that an account and a password used for login by the login user currently are consistent with an account and a password in the login-allowed user information corresponding to the login user.
That is, in the above embodiment, a user may access all functional modules (such as a security module, an internet of things control module, a decision module, and the like) in the security data processing system through an access manner such as a World Wide Web (Web) page access, and at this time, the user needs to log in the security data processing system first, and determine access and management authority according to login user information of the login user; in this way, when any user accesses the security data processing system, the authority of the user is checked first, and the user can only see the page or menu (login-allowed area) allowed to be accessed in the function module allowed to be logged in. Wherein, the login authority information and the like are stored in the database.
In an embodiment, the security data processing method further includes:
receiving a station display instruction, and displaying a structural diagram of a station and all station security equipment in the station on a current display interface in at least one of a two-dimensional form and a three-dimensional form; that is, in this embodiment, the station security and protection overall appearance can be presented through two-dimensional or three-dimensional form integration, and the equipment and the station overall appearance of whole station are shown, so that the operator can master the dynamic situation in real time, the place of occurrence of the alarm event is clear at a glance, and the quick response and the processing of the alarm event are facilitated for the operator. The station display instruction can be automatically generated when the alarm event is triggered, or can be generated after a preset button is triggered by a user.
In an embodiment, the security data processing method further includes:
receiving an equipment configuration instruction comprising equipment parameters of security equipment, and configuring the security equipment to the security unit under the security module according to the equipment parameters. That is, in this embodiment, device parameters of the security devices of each security unit in the security module may be configured, where the device parameters include a device type, a command for controlling the device, a device state that can be realized by the security device, a security unit to which the security device belongs, a device placement area, and the like, and thus, it is convenient to perform subsequent processing and analysis after reporting security data corresponding to the security device, and it is also convenient to provide a reference value when adding or replacing the device.
In an embodiment, as shown in fig. 2, a security data processing system is provided, where the security data processing system corresponds to the security data processing methods in the foregoing embodiments one to one. The security data processing system comprises a security module 2 and an Internet of things control module 1 which is in communication connection with the security module 2, wherein the security module 2 comprises at least one security unit, and each security unit comprises at least one security device;
thing networking control module 1 includes:
the receiving unit 101 is configured to receive security data reported by at least one security unit of a security module, where each security unit includes at least one security device;
the calling unit 102 is configured to determine an alarm event according to the received security data, and call a preset linkage rule associated with the alarm event;
and the execution unit 103 is used for controlling the security protection units needing to be linked to execute the corresponding linkage events according to the preset linkage rules.
The security data processing system comprises a security module and an Internet of things control module which are in communication connection, and security units with different purposes are integrated in the security module, so that the security data of the security units with different purposes can be uniformly processed in the Internet of things control module, and an alarm event is determined by comprehensively processing the security data and is processed according to a preset linkage rule; therefore, on one hand, the security data of the security units with different purposes are processed in a unified manner, so that the security running state of the whole station is clearer, the station operation personnel can know the security running state of the whole station more clearly, and further various alarms and emergencies can be analyzed, evaluated and processed in time, and the security work of the whole station is greatly facilitated and promoted; on the other hand, the alarm event is determined by comprehensively processing the security data and is processed according to the preset linkage rule, the security equipment of each security unit of the whole station can be moved to perform linkage execution on the corresponding linkage event, the processing efficiency of the station on the alarm event is greatly improved, the alarm event can be timely controlled and stably processed, and the safe and efficient operation of the station is ensured.
In one embodiment, the security unit includes at least one of a video monitoring unit 21, an intrusion monitoring unit 22, an entrance and exit monitoring unit 23, a security inspection unit 24 and an electronic inspection unit 25; in an embodiment, as shown in fig. 3, the security unit in the security module 2 includes a frequency monitoring unit 21, an intrusion monitoring unit 22, an entrance and exit monitoring unit 23, a security inspection unit 24, and an electronic inspection unit 25.
The security data comprises at least one of the following data:
the video monitoring unit 21 analyzes video information shot by the camera equipment according to preset defense information to obtain video monitoring data;
the intrusion monitoring device of the intrusion monitoring unit 22 monitors intrusion monitoring data of a preset forbidden area of a station;
the entrance and exit monitoring equipment of the entrance and exit monitoring unit 23 is used for monitoring the traffic data of the entrance and exit of the station;
the safety inspection equipment of the safety inspection unit 24 is used for carrying out safety inspection data on a station, wherein the safety inspection data comprises a safety inspection image or/and dangerous goods inspection information;
the inspection equipment of the electronic inspection unit 25 performs inspection data after inspection according to the inspection route of each inspection point in the inspection plan.
In an embodiment, as shown in fig. 4, the security module 2 is connected to the receiving unit 101 of the internet of things control module 1 through MQTT middleware;
the receiving unit 101 includes:
the processing subunit 1011 is configured to receive security data reported by at least one security unit of the security module 2 through the MQTT middleware, encapsulate the reported security data, and insert the encapsulated security data into the to-be-processed message queue according to a preset insertion rule.
In one embodiment, as shown in fig. 5, the retrieving unit 102 includes:
the calling subunit 1021 is used for calling the security data from the message queue to be processed according to a preset analysis sequence;
the analysis subunit 1022 is configured to analyze the type and the data value of the security data, and obtain an alarm threshold associated with the type of the security data;
and the confirming subunit 1023 is configured to confirm the alarm event corresponding to the security data according to the data value of the security data when the data value of the security data exceeds the alarm threshold.
In an embodiment, as shown in fig. 6, the security data processing system further includes a decision module 3 communicatively connected to the internet of things control module 1;
the retrieving unit 102 further includes:
the sending subunit 1024 is configured to insert an alarm event corresponding to the security data into an alarm queue, record the device state of the security device corresponding to the alarm event, send the device state to a decision module through a WebSocket, and display the device state in real time, and meanwhile, warn the alarm event corresponding to the security data in the decision module.
In an embodiment, as shown in fig. 7, the internet of things control module 1 further includes:
and the adjusting unit 104 is configured to obtain an execution result of each security device after executing the linkage event, send the execution result to a decision module through WebSocket for real-time display, and adjust the preset linkage rule associated with the alarm event according to the execution result.
In an embodiment, as shown in fig. 8, the retrieving unit 102 further includes:
and the storage sub-unit 1025 is used for acquiring a storage area associated with the type of the security data, storing the security data in the storage area associated with the security data, and receiving a feedback processing completion receipt after the storage is completed.
In an embodiment, as shown in fig. 9, the internet of things control module 1 further includes:
the distribution unit 105 is used for distributing the corresponding security units to the preset linkage rules and associating the security units with the preset linkage rules;
a linkage event configuration unit 106, configured to configure a linkage event for the corresponding security device in the security unit according to the preset linkage rule;
an associating unit 107, configured to associate each preset linkage rule with at least one alarm event.
In an embodiment, as shown in fig. 10, the internet of things control module 1 further includes:
the login module 108 is used for receiving a login request sent by a login user and calling login permission information from a database; the login authority information comprises login permission user information and a login permission area associated with each item of login permission user information;
and the permission verification module 109 is configured to, if the login user information included in the login request matches the login-allowed user information, open the access permission of the login-allowed area for the login user according to the login-allowed area associated with the login-allowed user information.
In an embodiment, as shown in fig. 11, the internet of things control module 1 further includes:
the display module 110 is configured to receive a station display instruction, and display a structural diagram of a station and all station security devices in the station on a current display interface in at least one of a two-dimensional form and a three-dimensional form.
In an embodiment, as shown in fig. 11, the internet of things control module 1 further includes:
the device configuration module 111 is configured to receive a device configuration instruction including device parameters of security devices, and configure the security devices to the security units under the security module according to the device parameters.
For a specific description of the security data processing system, reference may be made to the above description of the security data processing method, which is not described herein again. All modules in the security data processing system can be completely or partially realized through software, hardware and a combination of the software and the hardware. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, the security data processing system is a security data processing system of a smart station, integrates all security units, can simultaneously perform unified processing and display on data of all different security units, and performs linkage processing on various alarm events and other information according to preset linkage rules, so that operators can clearly know security operation states of the whole station, and timely analyze, evaluate and process various alarm and emergency events, which greatly helps and promotes security work of the whole station. In this embodiment, as shown in fig. 12, the security data processing system of the smart station may be divided into three layers: a decision layer 4, a service module layer 5 and a support layer 6; the decision layer 4 at least includes the decision module 3 in the above embodiment, and the decision layer 4 is mainly used to perform alarm analysis (to evaluate whether an alarm event is formed) and emergency evaluation (to evaluate the emergency level of the alarm event and perform different hierarchical processing), and understandably, the decision layer 4 is also used to perform decision on other events (for example, to instruct a certain security unit to execute a certain security measure) or display (for example, to display an execution result after the linkage event is executed or a device state of the security device corresponding to the alarm event, and the like).
The service module layer 5 mainly instructs the support layer to execute the linkage event according to the final decision of the decision layer for alarm analysis of the alarm event or evaluation of the emergency event, or instructs the support layer to execute other events to be executed according to the decision of the decision layer. The service module layer 5 includes:
all security units in the security module 2: in the embodiment shown in fig. 12, the security unit includes a frequency monitoring unit 21, an intrusion monitoring unit 22, an entrance and exit monitoring unit 23, a security inspection unit 24, and an electronic inspection unit 25. The video monitoring unit 21 analyzes video information shot by the camera device according to preset defense information, and then obtains video monitoring data. The intrusion monitoring unit 22 acquires intrusion monitoring data of a preset prohibited area of the station through the intrusion monitoring device. The entrance-exit monitoring unit 23 acquires traffic data for monitoring the entrance and exit of the station through the entrance-exit monitoring device. The security check unit 24 acquires security check data for performing security check on the station through security check equipment, where the security check data includes security check images or/and hazardous article detection information. The electronic patrol unit 25 acquires patrol data after patrol is performed according to patrol routes of patrol points in the patrol plan through patrol equipment.
The receiving unit 101 is configured to receive security data reported by at least one security unit of the security module, where each security unit includes at least one security device.
The retrieving unit 102 is configured to determine an alarm event according to the received security data, and retrieve a preset linkage rule associated with the alarm event.
And the execution unit 103 is used for controlling the security protection units needing to be linked to execute the corresponding linkage events according to the preset linkage rules.
The display module 110 is configured to receive a station display instruction, and display a structural diagram of a station and all station security devices in the station on a current display interface in at least one of a two-dimensional form and a three-dimensional form.
The support layer 6 mainly includes:
security devices 61 of each security unit; the security device 61 includes the camera device of the video monitoring unit 21, the intrusion monitoring device of the intrusion monitoring unit 22, the entrance monitoring device of the entrance monitoring unit 23, the security inspection device of the security inspection unit 24, and the electronic inspection unit 25 inspection device.
And the distribution unit 105 is used for distributing the corresponding security protection unit for the preset linkage rule and associating the security protection unit with the preset linkage rule.
And the linkage event configuration unit 106 is configured to configure linkage events for the corresponding security equipment in the security unit according to the preset linkage rule.
An associating unit 107, configured to associate each preset linkage rule with at least one alarm event.
The login module 108 is used for receiving a login request sent by a login user and calling login permission information from a database; the login authority information comprises login permission user information and login permission areas associated with the login permission user information.
And the permission verification module 109 is configured to, if the login user information included in the login request matches the login-allowed user information, open the access permission of the login-allowed area for the login user according to the login-allowed area associated with the login-allowed user information.
The device configuration module 111 is configured to receive a device configuration instruction including device parameters of security devices, and configure the security devices to the security units under the security module according to the device parameters.
In an embodiment, as shown in fig. 13, the security data processing system of the present invention is a security data processing system of a smart station, and the system mainly includes four parts, i.e., a UI (User Interface) application layer 7, an internet of things platform 8, a security module 2, and a database 9. Wherein:
UI application layer 7: all the function modules in the UI application layer 7 can be accessed by a user through a Web page. As shown in fig. 13, the UI application layer 7 mainly includes the decision module 3 and part of the functional modules in the internet of things control module 1, and as shown in the embodiment shown in fig. 13, the UI application layer 7 specifically includes the following functional modules:
a decision module 3: the system is used for performing alarm analysis (whether an alarm event is formed or not) and emergency evaluation (whether the emergency level of the alarm event is evaluated and different grading processing is performed), understandably, the system is also used for making decisions on other events (for example, instructing a certain security unit to execute a certain security measure) or displaying an execution result reported by the platform 8 of the internet of things after the linkage event is executed or the equipment state of the security equipment corresponding to the alarm event, and the like, so as to monitor the station state at any time and in real time.
The display module 110 is configured to receive a station display instruction, and display a structural diagram of a station and all station security devices in the station on a current display interface in at least one of a two-dimensional form and a three-dimensional form.
The login module 108 is used for receiving a login request sent by a login user and calling login permission information from a database; the login authority information comprises login permission user information and login permission areas associated with the login permission user information.
And the permission verification module 109 is configured to, if the login user information included in the login request matches the login-allowed user information, open the access permission of the login-allowed area for the login user according to the login-allowed area associated with the login-allowed user information.
The Internet of things platform 8: the message transmission is carried out with the UI application layer 7 in a WebSocket mode, real-time changes of alarming, state, statistics and the like of the system are achieved, and real-time monitoring of the whole security and protection landscape of the station is really achieved. The internet of things platform 8 mainly includes some functional modules in the internet of things control module 1, and in the embodiment shown in fig. 13, the internet of things platform 8 specifically includes the following functional modules:
the device configuration module 111: the device configuration instruction is used for receiving device parameters including security devices, and the security devices are configured to the security units under the security modules according to the device parameters. That is, various functions such as types, parameters, commands and the like of each device (for example, security device) added to the internet of things platform 201 are managed and configured, so that subsequent devices can report data, process and analyze the data, and station security unit devices can be added or replaced later.
The receiving unit 101 is configured to receive security data reported by at least one security unit of the security module, where each security unit includes at least one security device.
The calling unit 102 is configured to determine an alarm event according to the received security data, and call a preset linkage rule associated with the alarm event;
and the execution unit 103 is used for controlling the security protection units needing to be linked to execute the corresponding linkage events according to the preset linkage rules.
And the adjusting unit 104 is configured to obtain an execution result of each security device after executing the linkage event, send the execution result to a decision module through WebSocket for real-time display, and adjust the preset linkage rule associated with the alarm event according to the execution result.
The distribution unit 105 is used for distributing the corresponding security units to the preset linkage rules and associating the security units with the preset linkage rules;
a linkage event configuration unit 106, configured to configure a linkage event for the corresponding security device in the security unit according to the preset linkage rule;
an associating unit 107, configured to associate each preset linkage rule with at least one alarm event.
As shown in fig. 14, in an embodiment, a specific process of processing security data by the internet of things platform 8 is as follows: event Source20232 obtains reported security data (including alarm Event or other events) through MQTT middleware (MQTT20231), processes and encapsulates the security data, and throws the security data into a message queue to be processed (Kafka message queue), Inbound Processing20233 receives the security data from the message queue to be processed for analysis, Event Management20234 classifies and stores various events in database 9, and after storage, acknowledgement message is given to Inbound Processing20233 through Kafka to tell it that it has been processed; meanwhile, if the alarm or remote measurement value (the data value of the security data) exceeds the alarm threshold value, the Linkage Engine20235 is triggered to perform Linkage processing. Meanwhile, the Inbound Processing20233 packages and throws the alarm event corresponding to the security data into an alarm queue (Kafka message queue), the Device State20236 obtains the alarm event corresponding to the security data through Kafka and stores the Device State in the database 9, and simultaneously, the information such as the Device State and the like is sent to the UI application layer 7 through the WebSocket20237 to be displayed in real time and to be prompted by an alarm. In the embodiment, a large amount of concurrent data can be efficiently processed, the real-time state of the system to the whole security system and the response speed of alarming are improved, all operations of the whole station are controlled, and accidents are prevented.
The security module 2: in the embodiment shown in fig. 13, all security units in the security module 2 include a frequency monitoring unit 21, an intrusion monitoring unit 22, an entrance and exit monitoring unit 23, a security inspection unit 24, and an electronic inspection unit 25. The video monitoring unit 21 analyzes video information shot by the camera device according to preset defense information, and then obtains video monitoring data. The intrusion monitoring unit 22 acquires intrusion monitoring data of a preset prohibited area of the station through the intrusion monitoring device. The entrance-exit monitoring unit 23 acquires traffic data for monitoring the entrance and exit of the station through the entrance-exit monitoring device. The security check unit 24 acquires security check data for performing security check on the station through security check equipment, where the security check data includes security check images or/and hazardous article detection information. The electronic patrol unit 25 acquires patrol data after patrol is performed according to patrol routes of patrol points in the patrol plan through patrol equipment. According to the security data processing method of the invention, besides data acquisition is performed by each security unit through an interface, the security equipment of each security unit reports events and alarms to the internet of things platform 8 through MQTT message middleware.
The database 9: and storing all data required to be stored by the security data processing system. As shown in fig. 14, the database 9 may be of the following type: MongoDB, MySQL, InfluxDB.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 15. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer readable instructions, and a database. The internal memory provides an environment for the operating system and execution of computer-readable instructions in the non-volatile storage medium. Which when executed by a processor, performs the method described above.
In one embodiment, a computer device is provided, comprising a memory, a processor, and computer readable instructions stored on the memory and executable on the processor, the processor when executing the computer readable instructions implementing the steps of:
receiving security data reported by at least one security unit of a security module; each security unit comprises at least one security device;
determining an alarm event according to the received security data, and calling a preset linkage rule associated with the alarm event; the preset linkage rules comprise attributes of all security units needing linkage and linkage events to be executed of all security equipment needing linkage in the security units needing linkage;
and enabling the security protection unit needing linkage to indicate each security protection device needing linkage in the security protection unit to execute the linkage event corresponding to the security protection device.
In one embodiment, a computer-readable storage medium is provided having computer-readable instructions stored thereon which, when executed by a processor, implement the method described above.
It will be understood by those of ordinary skill in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware associated with computer readable instructions, which can be stored in a non-volatile computer readable storage medium, and when executed, can include processes of the embodiments of the methods described above. Any reference to memory, storage, databases, or other media used in embodiments provided herein may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), Direct Rambus Dynamic RAM (DRDRAM), and Rambus Dynamic RAM (RDRAM).
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of each functional unit or module is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units or modules according to needs, that is, the internal structure of the system is divided into different functional units or modules to perform all or part of the above-mentioned functions.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (13)

1. A security data processing method is characterized by comprising the following steps:
receiving security data reported by at least one security unit of a security module, wherein each security unit comprises at least one security device;
determining an alarm event according to the received security data, and calling a preset linkage rule associated with the alarm event;
and according to the preset linkage rule, enabling the security protection units needing linkage to control the corresponding security protection equipment to execute the linkage event corresponding to the security protection equipment.
2. The security data processing method according to claim 1, wherein the security unit comprises at least one of a video monitoring unit, an intrusion monitoring unit, an entrance and exit monitoring unit, a security inspection unit and an electronic inspection unit;
the security data comprises at least one of the following data:
the video monitoring unit analyzes video information shot by the camera equipment according to preset defense information to obtain video monitoring data;
the intrusion monitoring equipment of the intrusion monitoring unit monitors intrusion monitoring data of a preset forbidden area of a station;
the access monitoring equipment of the access monitoring unit is used for monitoring the traffic data of the station access;
the safety inspection equipment of the safety inspection unit is used for carrying out safety inspection on the station, and the safety inspection data comprises a safety inspection image or/and dangerous goods inspection information;
and the inspection equipment of the electronic inspection unit is used for carrying out inspection data after inspection according to the inspection route of each inspection point in the inspection plan.
3. The security data processing method of claim 1, wherein the receiving the security data reported by at least one security unit of the security module comprises:
receiving security data reported by at least one security unit of a security module through MQTT middleware, and inserting the reported security data into a message queue to be processed according to a preset insertion rule after the reported security data is packaged.
4. The security data processing method of claim 3, wherein the determining an alarm event according to the received security data comprises:
calling the security data from the message queue to be processed according to a preset analysis sequence;
analyzing the type and the data value of the security data, and acquiring an alarm threshold value associated with the type of the security data;
and when the data value of the security data exceeds the alarm threshold value, confirming an alarm event corresponding to the security data according to the data value of the security data.
5. The security data processing method of claim 4, wherein after the alarm event corresponding to the security data is confirmed according to the data value of the security data, the method further comprises:
and inserting an alarm event corresponding to the security data into an alarm queue, recording the equipment state of the security equipment corresponding to the alarm event, sending the equipment state to a decision module through WebSocket for real-time display, and simultaneously warning the alarm event corresponding to the security data in the decision module.
6. The security data processing method according to claim 5, wherein after the security unit that needs to be linked controls the corresponding security device to execute the linkage event corresponding thereto according to the preset linkage rule, the method includes:
obtaining an execution result of each security device after executing the linkage event, sending the execution result to a decision module through WebSocket for real-time display, and adjusting the preset linkage rule associated with the alarm event according to the execution result.
7. The security data processing method of claim 4, wherein after parsing the type and the data value of the security data, the method further comprises:
and acquiring a storage area associated with the type of the security data, storing the security data in the storage area associated with the security data, and receiving a feedback processing completion receipt after the storage is completed.
8. The security data processing method of claim 1, wherein before the invoking of the preset linkage rule associated with the alarm event, further comprising:
distributing the corresponding security unit for the preset linkage rule, and associating the security unit with the preset linkage rule;
configuring a linkage event for the corresponding security equipment in the security unit according to the preset linkage rule;
and associating each preset linkage rule with at least one alarm event.
9. The security data processing method of claim 1, further comprising:
receiving a login request sent by a login user, and calling login authority information from a database; the login authority information comprises login permission user information and a login permission area associated with each item of login permission user information;
if the login user information included in the login request is matched with the login permission user information, opening the access authority of the login permission area for the login user according to the login permission area associated with the login permission user information.
10. The security data processing method of claim 1, further comprising:
receiving a station display instruction, and displaying a structural diagram of a station and all station security equipment in the station on a current display interface in at least one of a two-dimensional form and a three-dimensional form.
11. The security data processing method of claim 1, further comprising:
receiving an equipment configuration instruction comprising equipment parameters of security equipment, and configuring the security equipment to the security unit under the security module according to the equipment parameters.
12. A security data processing system is characterized by comprising a security module and an Internet of things control module which is in communication connection with the security module, wherein the security module comprises at least one security unit, and each security unit comprises at least one security device;
the thing networking control module includes:
the receiving unit is used for receiving security data reported by at least one security unit of the security module, wherein each security unit comprises at least one security device;
the calling unit is used for determining an alarm event according to the received security data and calling a preset linkage rule associated with the alarm event;
and the execution unit is used for controlling the security protection unit needing linkage to execute the corresponding linkage event according to the preset linkage rule.
13. A computer-readable storage medium storing computer-readable instructions, wherein the computer-readable instructions, when executed by a processor, implement the security data processing method according to any one of claims 1 to 11.
CN201910838205.XA 2019-09-05 2019-09-05 Security data processing method, system, computer equipment and storage medium Active CN112447033B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910838205.XA CN112447033B (en) 2019-09-05 2019-09-05 Security data processing method, system, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910838205.XA CN112447033B (en) 2019-09-05 2019-09-05 Security data processing method, system, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112447033A true CN112447033A (en) 2021-03-05
CN112447033B CN112447033B (en) 2024-03-19

Family

ID=74733596

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910838205.XA Active CN112447033B (en) 2019-09-05 2019-09-05 Security data processing method, system, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112447033B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113923239A (en) * 2021-09-18 2022-01-11 苏州城之瞳安防智能科技有限公司 System, method and medium applied to hospital security
CN114500644A (en) * 2022-03-28 2022-05-13 成都柔水科技有限公司 Internet of things data management method in municipal facility monitoring system
CN116127401A (en) * 2023-04-20 2023-05-16 西南石油大学 Data authority management and control method and system
CN117149897A (en) * 2023-10-31 2023-12-01 成都交大光芒科技股份有限公司 Big data alarm information hierarchical display system and method based on double-buffer technology
CN117250930A (en) * 2023-11-15 2023-12-19 深圳曼顿科技有限公司 Equipment linkage control method, system, device, terminal equipment and storage medium

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1412686A (en) * 2002-11-26 2003-04-23 深圳市海星信力德智能系统工程有限公司 Computer integrated control system for stadium and gym.
JP2010134724A (en) * 2008-12-05 2010-06-17 Canon It Solutions Inc Device and method for monitoring message queuing, program and recording medium
CN104125095A (en) * 2014-06-25 2014-10-29 世纪禾光科技发展(北京)有限公司 System and method for monitoring event failure in real time
CN105204471A (en) * 2015-09-30 2015-12-30 青岛海尔智能家电科技有限公司 Household appliance linkage method and device, server and household appliance
CN105491066A (en) * 2016-01-05 2016-04-13 李景泉 Social security protection video monitoring cloud platform and monitoring method
CN106656632A (en) * 2017-02-03 2017-05-10 上海中信信息发展股份有限公司 Machine room monitoring system fusing Ethernet protocol with Internet of Things protocol, and information processing and control method
CN107481472A (en) * 2017-09-22 2017-12-15 广州地铁设计研究院有限公司 A kind of security protection and fire protection linkage control method
CN107632285A (en) * 2017-09-19 2018-01-26 北京小米移动软件有限公司 Map building and amending method and device
CN107864174A (en) * 2017-07-03 2018-03-30 华南理工大学 A kind of rule-based internet of things equipment interlock method
CN108572606A (en) * 2018-07-12 2018-09-25 上海市城市建设设计研究总院(集团)有限公司 Rail traffic security protection integrated platform with linkage, disaster prevention emergency function
CN109215264A (en) * 2017-07-04 2019-01-15 北京航天长峰科技工业集团有限公司 A kind of alarm linkage method for security system
CN109255937A (en) * 2018-09-03 2019-01-22 平安科技(深圳)有限公司 Alarm processing method and terminal device
CN109544879A (en) * 2018-10-29 2019-03-29 视联动力信息技术股份有限公司 A kind of processing method and system of alert data
KR20190057818A (en) * 2017-11-20 2019-05-29 광운대학교 산학협력단 Priority-based MQTT System and method to provide Differentiated IoT Services
CN110191478A (en) * 2019-04-23 2019-08-30 深圳市荣盛智能装备有限公司 Take into account system, charging equipment and the terminal device of charging and data transfer management

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1412686A (en) * 2002-11-26 2003-04-23 深圳市海星信力德智能系统工程有限公司 Computer integrated control system for stadium and gym.
JP2010134724A (en) * 2008-12-05 2010-06-17 Canon It Solutions Inc Device and method for monitoring message queuing, program and recording medium
CN104125095A (en) * 2014-06-25 2014-10-29 世纪禾光科技发展(北京)有限公司 System and method for monitoring event failure in real time
CN105204471A (en) * 2015-09-30 2015-12-30 青岛海尔智能家电科技有限公司 Household appliance linkage method and device, server and household appliance
CN105491066A (en) * 2016-01-05 2016-04-13 李景泉 Social security protection video monitoring cloud platform and monitoring method
CN106656632A (en) * 2017-02-03 2017-05-10 上海中信信息发展股份有限公司 Machine room monitoring system fusing Ethernet protocol with Internet of Things protocol, and information processing and control method
CN107864174A (en) * 2017-07-03 2018-03-30 华南理工大学 A kind of rule-based internet of things equipment interlock method
CN109215264A (en) * 2017-07-04 2019-01-15 北京航天长峰科技工业集团有限公司 A kind of alarm linkage method for security system
CN107632285A (en) * 2017-09-19 2018-01-26 北京小米移动软件有限公司 Map building and amending method and device
CN107481472A (en) * 2017-09-22 2017-12-15 广州地铁设计研究院有限公司 A kind of security protection and fire protection linkage control method
KR20190057818A (en) * 2017-11-20 2019-05-29 광운대학교 산학협력단 Priority-based MQTT System and method to provide Differentiated IoT Services
CN108572606A (en) * 2018-07-12 2018-09-25 上海市城市建设设计研究总院(集团)有限公司 Rail traffic security protection integrated platform with linkage, disaster prevention emergency function
CN109255937A (en) * 2018-09-03 2019-01-22 平安科技(深圳)有限公司 Alarm processing method and terminal device
CN109544879A (en) * 2018-10-29 2019-03-29 视联动力信息技术股份有限公司 A kind of processing method and system of alert data
CN110191478A (en) * 2019-04-23 2019-08-30 深圳市荣盛智能装备有限公司 Take into account system, charging equipment and the terminal device of charging and data transfer management

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
肖立中;刘云翔;戴蒙;: "入侵检测系统中分层报警处理模型的研究", 计算机应用研究, no. 08, 15 August 2009 (2009-08-15), pages 2995 - 2999 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113923239A (en) * 2021-09-18 2022-01-11 苏州城之瞳安防智能科技有限公司 System, method and medium applied to hospital security
CN114500644A (en) * 2022-03-28 2022-05-13 成都柔水科技有限公司 Internet of things data management method in municipal facility monitoring system
CN116127401A (en) * 2023-04-20 2023-05-16 西南石油大学 Data authority management and control method and system
CN116127401B (en) * 2023-04-20 2023-06-16 西南石油大学 Data authority management and control method and system
CN117149897A (en) * 2023-10-31 2023-12-01 成都交大光芒科技股份有限公司 Big data alarm information hierarchical display system and method based on double-buffer technology
CN117149897B (en) * 2023-10-31 2024-01-26 成都交大光芒科技股份有限公司 Big data alarm information hierarchical display system and method based on double-buffer technology
CN117250930A (en) * 2023-11-15 2023-12-19 深圳曼顿科技有限公司 Equipment linkage control method, system, device, terminal equipment and storage medium
CN117250930B (en) * 2023-11-15 2024-02-20 深圳曼顿科技有限公司 Equipment linkage control method, system, device, terminal equipment and storage medium

Also Published As

Publication number Publication date
CN112447033B (en) 2024-03-19

Similar Documents

Publication Publication Date Title
CN112447033A (en) Security data processing method and system, computer equipment and storage medium
CN105023403B (en) A kind of inter-linked controlling method based on industry security emergency command integrated system
CN105035904A (en) Intelligent monitoring system for elevator safe operation based on IOT (Internet of Things) technology
CN109935042A (en) A kind of harbour dangerous material intelligent monitoring early warning system
CN108055261A (en) Industrial network security system deployment method and security system
US20220415148A1 (en) System and method enabling interactive services in alarm system environment
CN113971782B (en) Comprehensive monitoring information management method and system
CN112381435A (en) Gridding directional pushing management method for dynamic risk in hydropower station operation process
CN112558536A (en) Station monitoring system and method
JP2001331388A (en) System and method for managing remote maintenance of client server
CN113470302A (en) Intelligent security management method and system based on Internet of things and storage medium
CN110688418A (en) Intelligent prison patrol method and device, computer equipment and storage medium
EP2469479A1 (en) Intrusion detection
CN112381451A (en) Production potential safety hazard monitoring and closed-loop disposal method
KR101708338B1 (en) Monitoring system for train operation
CN111613034A (en) Fire-fighting monitoring control method and system
CN115100812A (en) Intelligent security monitoring method, system and device and electronic equipment
CN110633338A (en) Intelligent risk prompting system for industrial places
CN115880631A (en) Power distribution station fault identification system, method and medium
CN113763222A (en) Corridor operation control method, system and storage medium
CN103389361B (en) Gas monitor, early warning and analysis system and gas monitor, early warning and analysis method
CN109508906A (en) The control method and device of well lid operation
CN116506482B (en) Remote control method, system and storage medium for data machine room
CN113625663B (en) Comprehensive situation management and control system
KR101674719B1 (en) Apparatus and method for accumulating and transmitting data for preventing data's loss of radioisotope device between Device with a server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant