CN112447033B - Security data processing method, system, computer equipment and storage medium - Google Patents

Security data processing method, system, computer equipment and storage medium Download PDF

Info

Publication number
CN112447033B
CN112447033B CN201910838205.XA CN201910838205A CN112447033B CN 112447033 B CN112447033 B CN 112447033B CN 201910838205 A CN201910838205 A CN 201910838205A CN 112447033 B CN112447033 B CN 112447033B
Authority
CN
China
Prior art keywords
security
data
unit
inspection
security data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910838205.XA
Other languages
Chinese (zh)
Other versions
CN112447033A (en
Inventor
邓喜年
杨耕田
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BYD Co Ltd
Original Assignee
BYD Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BYD Co Ltd filed Critical BYD Co Ltd
Priority to CN201910838205.XA priority Critical patent/CN112447033B/en
Publication of CN112447033A publication Critical patent/CN112447033A/en
Application granted granted Critical
Publication of CN112447033B publication Critical patent/CN112447033B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/14Central alarm receiver or annunciator arrangements
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
    • H04L69/162Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Abstract

The invention discloses a security data processing method, a security data processing system, computer equipment and a storage medium. The method comprises the following steps: receiving security data reported by at least one security unit of a security module, wherein each security unit comprises at least one security device; determining an alarm event according to the received security data, and calling a preset linkage rule associated with the alarm event; and according to the preset linkage rule, enabling the security units to be linked to control the corresponding security equipment to execute the corresponding linkage event. According to the invention, the security data of the security units with different purposes are uniformly processed, and the security equipment of each security unit of the whole station is mobilized to execute and link the alarm event, so that the processing efficiency of the station on the alarm event is improved, the alarm event can be controlled in time and processed stably, and the safe and efficient operation of the station is ensured.

Description

Security data processing method, system, computer equipment and storage medium
Technical Field
The invention relates to the field of security data processing, in particular to a security data processing method, a security data processing system, computer equipment and a storage medium.
Background
Along with the development of scientific technology, modern urban rail transit develops rapidly, and the security protection system is used as an indispensable part of a station in modern urban rail transit, can provide and record various security protection information of the station for operation and management personnel so as to carry out security management on the operation of the station and assist in maintaining the security of the station. In the prior art, security systems in stations mainly depend on video monitoring systems, entrance and exit control systems and the like, and because different systems run independently, data among the systems cannot be checked at the same time, and the security running state of the stations cannot be comprehensively evaluated, so that the systems can only formulate different countermeasures for alarming of an emergency in the systems according to the running data of the systems, and thus, the data of the systems cannot be comprehensively processed for alarming of the emergency, the final countermeasures for alarming of the emergency of the systems are possibly not comprehensive and stable, and further, the emergency of the security systems cannot be timely controlled and solved.
Disclosure of Invention
The embodiment of the invention provides a security data processing method, a security data processing system, computer equipment and a storage medium, which can uniformly process security data sent by security units with different purposes, and process an alarm event according to a preset linkage rule after the alarm event is determined by comprehensively processing the security data; the security operation state of the whole station is clearer, the alarm event can be controlled in time and processed safely, the alarm event processing efficiency is improved, and the safe and efficient operation of the station is ensured.
A security data processing method comprises the following steps:
receiving security data reported by at least one security unit of a security module, wherein each security unit comprises at least one security device;
determining an alarm event according to the received security data, and calling a preset linkage rule associated with the alarm event;
and according to the preset linkage rule, enabling the security units to be linked to control the corresponding security equipment to execute the corresponding linkage event.
The security data processing system comprises a security module and an Internet of things control module which is in communication connection with the security module, wherein the security module comprises at least one security unit, and each security unit comprises at least one security device;
the control module of the Internet of things comprises:
the receiving unit is used for receiving security data reported by at least one security unit of the security module, wherein each security unit comprises at least one security device;
the calling unit is used for determining an alarm event according to the received security data and calling a preset linkage rule associated with the alarm event;
and the execution unit is used for enabling the security and protection units needing to be linked to control the corresponding security and protection equipment to execute the corresponding linkage event according to the preset linkage rule.
A computer readable storage medium storing computer readable instructions which when executed by a processor implement the security data processing method described above.
The security data processing system comprises a security module and an Internet of things control module which are in communication connection, and security units with different purposes are integrated in the security module, so that security data of the security units with different purposes can be uniformly processed in the Internet of things control module, an alarm event is determined by comprehensively processing the security data, and the alarm event is processed according to a preset linkage rule; on one hand, the security data of the security units with different purposes are uniformly processed, so that the security running state of the whole station is clearer, station operators can know the security running state of the whole station more clearly, various alarms and emergency events can be analyzed and evaluated in time, and the security work of the whole station is greatly helped and promoted; on the other hand, the alarm event is determined by comprehensively processing the security data and is processed according to the preset linkage rule, the security equipment of each security unit of the whole station can be mobilized to carry out linkage of the corresponding linkage event, the processing efficiency of the station on the alarm event is greatly improved, the alarm event can be controlled and processed stably in time, and the safe and efficient operation of the station is ensured.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the description of the embodiments of the present invention will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a security data processing method according to an embodiment of the invention;
FIG. 2 is a functional block diagram of a security data processing system in accordance with one embodiment of the present invention;
FIG. 3 is a functional block diagram of a security module of a security data processing system in accordance with one embodiment of the present invention;
FIG. 4 is a functional block diagram of a security data processing system in another embodiment of the present invention;
FIG. 5 is a schematic block diagram of a fetch unit of a security data processing system in accordance with an embodiment of the present invention;
FIG. 6 is a functional block diagram of a security data processing system in yet another embodiment of the present invention;
FIG. 7 is a functional block diagram of a security data processing system in accordance with yet another embodiment of the present invention;
FIG. 8 is a functional block diagram of a fetch unit of a security data processing system in accordance with another embodiment of the present invention;
FIG. 9 is a schematic block diagram of an Internet of things control module of a security data processing system in an embodiment of the present invention;
FIG. 10 is a schematic block diagram of an Internet of things control module of a security data processing system in accordance with another embodiment of the present invention;
FIG. 11 is a functional block diagram of an Internet of things control module of a security data processing system in accordance with yet another embodiment of the present invention;
FIG. 12 is a schematic block diagram of a security data processing system in accordance with an embodiment of the present invention;
FIG. 13 is a schematic block diagram of a security data processing system in accordance with another embodiment of the invention;
FIG. 14 is a functional block diagram of an event alert management module in a security data processing system in accordance with another embodiment of the present invention;
FIG. 15 is a schematic diagram of a computer device in accordance with an embodiment of the invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, the present invention provides a security data processing method, which includes the following steps S10 to S30:
S10, receiving security data reported by at least one security unit of a security module, wherein each security unit comprises at least one security device; understandably, the security data processing method is applied to an internet of things control module of a security data processing system, and the internet of things control module is in communication connection with the security module. The security module is integrated with at least one security unit, and the security unit can be any security unit such as a video monitoring unit, an intrusion monitoring unit, an entrance monitoring unit, a security inspection unit, an electronic inspection unit and the like, but is not limited to the video monitoring unit, the intrusion monitoring unit, the entrance monitoring unit, the security inspection unit, the electronic inspection unit and the like, and as an example, the security module is integrated with a plurality of security units, and as the security module comprises a plurality of different security units, the security module comprises at least two security units such as the video monitoring unit, the intrusion monitoring unit, the entrance monitoring unit, the security inspection unit and the electronic inspection unit. And, each security unit includes security equipment that security unit can directly control, and security equipment includes but is not limited to following equipment: the video monitoring unit includes a camera device, the intrusion monitoring unit includes an intrusion monitoring device (such as a sensor or the like that can detect whether a person or an article not allowed to pass intrudes into a preset prohibited area), the entrance monitoring unit includes an entrance monitoring device (a device for controlling opening and closing of an entrance and monitoring traffic conditions of the entrance), the security inspection unit includes a security inspection device (a security inspection image or/and dangerous article detection information or the like for acquiring and analyzing a station), and the electronic inspection unit includes an inspection device (for inspecting according to inspection routes of inspection points in an inspection plan), but is not limited thereto.
S20, determining an alarm event according to the received security data, and calling a preset linkage rule associated with the alarm event; the preset linkage rules comprise attributes of all security units needing to be linked and linkage events to be executed of all security devices needing to be linked in the security units needing to be linked; that is, after the security data sent by one or more security units are received, whether an alarm event occurs or not may be comprehensively determined according to the received security data, if an alarm event occurs, the attribute (such as the type, the name, the danger level or the critical level) of the alarm event is first determined, then a preset linkage rule matched with the attribute of the alarm event is retrieved from a database (all data to be saved in the security data processing system is stored in the database), the security units to be linked and all security devices to be linked in each security unit and the linkage event to be executed thereof are determined according to the preset linkage rule, and step S30 is performed. The linkage event refers to an operation event that needs to be executed when the security device performs linkage, for example, the security device is an entrance monitoring device, and the linkage event may refer to switching of an on-off state of the entrance controlled by the entrance monitoring device. If the database does not have the preset linkage rule associated with the alarm event, the database can be updated to enable the database to have the preset linkage rule corresponding to the alarm event.
S30, according to the preset linkage rule, enabling the security units to be linked, and controlling the corresponding security equipment to execute the linkage event corresponding to the security units. Specifically, in step S30, the security unit to be linked may instruct each security device to be linked in the security unit to execute the corresponding linking event according to the preset linking rule. That is, after the security units needing to be linked and all the security devices needing to be linked in each security unit and the linkage events to be executed thereof are determined according to the preset linkage rule, all the security devices needing to be linked in each security unit and the linkage events to be executed thereof can be directly sent to the corresponding security units respectively, so that the security units instruct the security devices needing to be linked to execute the respective linkage events to be executed according to the received information, and therefore, the process of automatically and efficiently processing the alarm events in time through comprehensive analysis of security data is completed, and the whole process can be completed without manual operation.
The security units with different purposes are integrated in the security module, so that the security data processing method provided by the invention can uniformly process the security data of the security units with different purposes, determine an alarm event by comprehensively processing the security data and process the alarm event according to a preset linkage rule; on one hand, the security data of the security units with different purposes are uniformly processed, so that the security running state of the whole station is clearer, station operators can know the security running state of the whole station more clearly, various alarms and emergency events can be analyzed and evaluated in time, and the security work of the whole station is greatly helped and promoted; on the other hand, the alarm event is determined by comprehensively processing the security data and is processed according to the preset linkage rule, the security equipment of each security unit of the whole station can be mobilized to carry out linkage of the corresponding linkage event, the processing efficiency of the station on the alarm event is greatly improved, the alarm event can be controlled and processed stably in time, and the safe and efficient operation of the station is ensured. Meanwhile, through effective management of security data, subsequent system maintenance and expansion can be facilitated.
In an embodiment, the security unit includes one or more of a video monitoring unit, an intrusion monitoring unit, an entrance monitoring unit, a security inspection unit, and an electronic inspection unit; that is, one security unit may be any one of a video monitoring unit, an intrusion monitoring unit, an entrance monitoring unit, a security inspection unit and an electronic inspection unit, and the security module includes a plurality of different security units, that is, includes any plurality of security units of the video monitoring unit, the intrusion monitoring unit, the entrance monitoring unit, the security inspection unit and the electronic inspection unit, where a plurality is at least two.
Preferably, the security data comprises video monitoring data obtained after the video monitoring unit analyzes video information shot by the camera equipment according to preset security information; at this time, in step S10, the receiving security data reported by at least one security unit of the security module includes:
receiving video monitoring data sent by the video monitoring unit, wherein the video monitoring data refers to analysis data obtained after the video monitoring unit analyzes video information shot by the shooting equipment according to preset defense setting information (the analysis data can refer to data of faces in a preset area in the current video, namely personnel gathering condition, after face analysis is carried out on images in the video information, meanwhile, the analysis data can also refer to analysis of objects in the video information and the like); in this embodiment, video information may be shot by the camera device of the video monitoring unit, and the video monitoring unit may also perform functions such as video preview, video playback, pan-tilt control and capture, and may also perform intelligent analysis on video information shot by the camera device according to preset defense setting information, so as to indicate relevant analysis data of events such as personnel gathering, article leaving, loitering detection, etc. in analysis data, so that after the subsequent video monitoring unit sends the analysis data (i.e. video monitoring data) to the internet of things control module, the internet of things control module may confirm whether the analysis data constitutes an alarm event according to the analysis data, and perform the process of obtaining the analysis data in the video monitoring unit (in another embodiment, the analysis process may also be performed in the internet of things control module) so as to reduce the load of the internet of things control module (which needs to process multiple security data simultaneously, and has a large data processing capacity), so as to increase the running rate thereof. Further, the video monitoring unit provides various interfaces, such as a video information interface for acquiring video information shot by the image capturing device, a control interface for acquiring control signals (the control signals can be sent to the control interface by the control module of the internet of things and can also be generated according to an operation instruction of a user on the video monitoring unit) such as video preview, video playback and pan-tilt control, a configuration defense arrangement interface for performing intelligent analysis on the video information, and the like.
Further, the security data comprise intrusion monitoring equipment of the intrusion monitoring unit, and intrusion monitoring data of a preset forbidden area of the station; at this time, in step S10, the receiving security data reported by at least one security unit of the security module includes: receiving intrusion monitoring data sent by the intrusion monitoring unit, wherein the intrusion monitoring data refers to monitoring data of intrusion monitoring equipment of the intrusion monitoring unit on a preset forbidden area of a station; in this embodiment, monitoring data (that is, intrusion monitoring data may refer to whether personnel or articles which are not allowed to enter, the number of the personnel or articles existing in the preset forbidden area, and the like exist in the preset forbidden area) for monitoring the preset forbidden area such as the edge of the station, the yellow line forbidden area, and the like according to the detection defense arrangement plan can be obtained through intrusion monitoring equipment in the intrusion monitoring unit, the intrusion monitoring data can be obtained by analyzing video information of the monitored preset forbidden area, and can also be directly reported by staff in the preset forbidden area, so that after the follow-up intrusion monitoring unit sends the monitoring data to the internet of things control module, the internet of things control module can confirm whether the monitoring data form an alarm event according to the monitoring data. Further, the intrusion monitoring unit comprises a management interface for controlling a preset forbidden area and acquiring intrusion monitoring data, and an alarm reporting interface for reporting an alarm event of intrusion monitoring equipment in the intrusion monitoring unit to the control module of the internet of things; that is, if the process of confirming whether the intrusion monitoring data is an alarm event is directly performed in the intrusion detection unit, after the alarm event is confirmed, the alarm event can also be directly reported through the alarm reporting interface, and at this time, the alarm event can be regarded as a part of the reported intrusion monitoring data.
Further, the security data comprise access monitoring equipment of the access monitoring unit and traffic data for monitoring the access of the station; at this time, in step S10, the receiving security data reported by at least one security unit of the security module includes: receiving traffic data sent by the entrance monitoring unit, wherein the traffic data is monitoring data indicating entrance monitoring equipment of the entrance monitoring unit and indicating an entrance of a station; in this embodiment, the entrance monitoring device (the device for controlling the opening and closing of the entrance and monitoring the traffic situation of the entrance) of the entrance monitoring unit may obtain monitoring data (i.e., traffic data, where the traffic data may be the number of traffic personnel indicating that the entrance has currently passed, the number of traffic personnel waiting before the entrance, the number of traffic personnel to be passed estimated according to the train of the station, etc.) for controlling the entrance of the station, so as to facilitate the following entrance monitoring unit to send the traffic data to the internet of things control module, and the internet of things control module may confirm whether the traffic data forms an alarm event according to the traffic data. Understandably, the control instruction of the opening and closing of the entrance may be directly sent by the control module of the internet of things, that is, the control module of the internet of things may indirectly control the opening and closing state of the entrance monitoring device of the entrance monitoring unit to the station entrance. Further, the entrance monitoring unit is provided with an instruction control interface in communication connection with the internet of things control module, a control instruction for the entrance and exit issued by the internet of things control module can be issued to the entrance monitoring unit through the instruction control interface, and the entrance monitoring unit controls the entrance and exit monitoring equipment to adjust the opening and closing states of the entrance and exit according to the control instruction for the entrance and exit issued by the internet of things control module.
Further, the security data comprise security equipment of the security unit, security data for performing security inspection on the station, and the security data comprise security inspection images or/and dangerous goods detection information; at this time, in step S10, the receiving security data reported by at least one security unit of the security module includes: receiving security inspection data sent by the security inspection unit, wherein the security inspection data refers to security inspection equipment of the security inspection unit, and security inspection images of stations or/and dangerous goods detection information are detected; in this embodiment, the security inspection image or/and dangerous goods detection information (that is, security inspection data, including the number and the type of dangerous goods currently inspected, the image of personnel or goods currently subjected to security inspection, etc.) of the station may be obtained and analyzed by the security inspection device of the security inspection unit, so that after the subsequent security inspection unit sends the security inspection data to the control module of the internet of things, the control module of the internet of things may confirm whether the security inspection data forms an alarm event according to the security inspection data. The control module of the Internet of things can acquire security inspection images and other information acquired by security inspection equipment of the security inspection unit in real time, and dangerous goods management in security inspection can be realized through dangerous goods detection information. Further, the security inspection unit provides a security inspection interface capable of acquiring real-time security inspection images or/and dangerous goods detection information.
Further, the security data comprise inspection equipment of the electronic inspection unit, and inspection data after inspection are carried out according to inspection routes of all inspection points in an inspection plan. At this time, in step S10, the receiving security data reported by at least one security unit of the security module includes: and receiving inspection data sent by the electronic inspection unit, wherein the inspection data refers to inspection result data after inspection by inspection equipment of the electronic inspection unit according to inspection routes of all inspection points in an inspection plan. In this embodiment, the inspection device of the electronic inspection unit may obtain inspection result data (i.e., inspection data, where the inspection data is whether an abnormal condition exists on the inspection route when an inspector inspects according to the inspection route, and if the abnormal condition exists, specific information of the abnormal condition, such as video or other data, needs to be attached to the abnormal condition, so as to be beneficial for the internet of things control module to confirm whether the abnormal condition constitutes an alarm event according to the inspection data after the subsequent electronic inspection unit sends the inspection data to the internet of things control module. Understandably, the electronic inspection unit can manage inspection points, inspection plans, inspection lines and the like, can also check inspection results and inspection reports, and sends the inspection results and inspection reports to the control module of the internet of things for real-time inspection and analysis. Further, the electronic inspection unit provides an inspection interface for acquiring information such as inspection lines, inspection plans, inspection results and the like.
Further, each interface (such as a video information interface, a control interface, a configuration and defense arrangement interface, a management interface, an alarm reporting interface, an instruction control interface, a security check interface, a patrol interface, etc.) in the security unit of the security module is preferably an API interface (Application Programming Interface ). An application API is a number of predefined functions that provide a developer with the ability to access a set of routines based on certain software or hardware without having to access source code or understand the details of the internal operating mechanisms.
According to the above, each security unit can respectively acquire security data of security equipment in the security unit and report the security data to the control module of the internet of things, and the control module of the internet of things can comprehensively analyze according to all the received security data, multiply confirm whether the current security data corresponds to the occurrence of an alarm event or not, and prevent and timely cope with different conditions such as the alarm event; meanwhile, the warning event related data can be further evaluated, so that help is provided for better operation decision of the whole station.
In an embodiment, in step S10, the receiving security data reported by at least one security unit of the security module includes:
and receiving security data reported by at least one security unit of the security module through an MQTT (Message Queuing Telemetry Transport) message queue telemetry transmission middleware, and inserting the reported security data into a message queue to be processed according to a preset insertion rule after packaging the security data. That is, the security module further comprises an MQTT middleware, and each security unit in the security module is connected with the receiving unit of the control module of the Internet of things through the MQTT middleware; in this way, the security data (besides the security data mentioned in the above embodiment, the security data may also include alarm events corresponding to the security units, status information of the security device, etc.) in the security units of the security module may be reported through the MQTT middleware. Understandably, in an embodiment, at least one security unit of the security module reports security data through the MQTT middleware, processes and encapsulates the security data, and then throws the security data into the Kafka message queue (a distributed, high-throughput, high-scalability message queue service, i.e. a message queue to be processed) according to a preset insertion rule (for example, sorting according to a time sequence of a time point when processing is completed or sorting according to a data type), and then the internet of things control module extracts the security data after encapsulation from the Kafka message queue to parse.
In an embodiment, in the step S20, the determining an alarm event according to the received security data includes:
the security data are called from the message queue to be processed according to a preset analysis sequence; in this step, security data after encapsulation is extracted from the Kafka message queue (the extraction order is a preset analysis order, which may be set according to the requirement, or may be extracted according to the analysis order carried in the extraction instruction).
Analyzing the type and the data value of the security data, and acquiring an alarm threshold associated with the type of the security data; in the step, the type and the data value of the extracted security data are required to be analyzed, then an alarm threshold value associated with the type of the security data is acquired, the alarm threshold value associated with the type of the security data is compared with the data value of the security data analyzed before, whether the data value of the security data exceeds the alarm threshold value is determined, and when the data value of the security data does not exceed the alarm threshold value, the data value of the security data is considered to not form an alarm event yet, and only the corresponding security data is required to be stored.
In an embodiment, after the parsing the type and the data value of the security data, the method further includes: and acquiring a storage area associated with the type of the security data, storing the security data in the storage area associated with the security data, and receiving a feedback processing receipt after the storage is completed. In this embodiment, various security data may be stored in a database in a classified manner, and after the security data is stored, a receipt message is fed back, so that the control module of the internet of things can learn that the security message has been processed (stored) completely. And when the data value of the security data exceeds the alarm threshold value, confirming the alarm event corresponding to the security data according to the data value of the security data from all alarm events associated with the type of the security data. That is, when the data value of the security data exceeds the alarm threshold, the security data is considered to be already configured and trigger the alarm event, and at this time, the attribute of the alarm event, such as the type of the alarm event, needs to be confirmed, so that the subsequent linkage processing is further performed according to the attribute of the alarm event.
In an embodiment, after the alarm event corresponding to the security data is confirmed according to the data value of the security data, the method further includes:
the security data corresponding to the alarm event is inserted into an alarm queue after being packaged; that is, after confirming that the security data has been constructed and triggering an alarm event, the security data is packaged again and then thrown into an alarm queue (the alarm queue is also a Kafka message queue).
And retrieving the security data from the alarm queue, extracting the equipment state of the security equipment corresponding to the alarm event in the security data, storing the equipment state of the security equipment in a database, simultaneously sending the equipment state to a decision module for real-time display through a WebSocket (a protocol for carrying out full duplex communication on a single TCP connection), and simultaneously warning the alarm event corresponding to the security data in the decision module. That is, after the device state of the security device corresponding to the alarm event in the security data is obtained from the alarm queue, the device state is stored in a database, and meanwhile, information such as the device state is sent to a decision module for real-time display through WebSocket, so that the current running state of each security device can be monitored and checked in real time through the reported state information. Meanwhile, in the embodiment, the alarm event can be sent to the decision module (understandably, the alarm event can be sent to the control module of the internet of things separately or synchronously). Understandably, the control module of the internet of things carries out message transmission with the decision module in a WebSocket mode, so that the decision module can control the alarm time, equipment state, statistical data and other real-time changes of each security unit of the security module, and the decision module can truly realize real-time monitoring of the whole security appearance of the station; and by placing the security data into the message queue to be processed and placing the security data corresponding to the alarm event into the alarm queue, the security data is called according to a certain sequence and is correspondingly processed, so that a large amount of concurrent security data can be efficiently processed, the real-time state of the whole security system and the response speed of the alarm are improved, all operations of the whole station are controlled, and accidents can be avoided.
In an embodiment, after the step S30, that is, after the security unit to be linked is controlled to execute the linking event corresponding to the security unit according to the preset linking rule, the method includes:
and acquiring an execution result of each security device after executing the linkage event, sending the execution result to a decision module for real-time display through a WebSocket, and adjusting the preset linkage rule associated with the alarm event according to the execution result. That is, the control module of the internet of things carries out message transmission with the decision module in a WebSocket mode, so that the decision module can control the execution condition of the linkage event corresponding to the alarm event of each security unit of the security module in real time, and the decision module can truly monitor the whole security appearance of the station in real time. Meanwhile, the preset linkage rule is adjusted according to the execution result of the linkage event, so that the preset linkage rule is more suitable for the actual situation, and the alarm event is processed more perfectly.
In an embodiment, before the step S20 of retrieving the preset linkage rule associated with the alarm event, the method further includes:
Distributing the corresponding security unit for the preset linkage rule, and associating the security unit with the preset linkage rule; specifically, the security units needing to be linked are distributed for the preset linkage rules, and the attribute of the security units needing to be linked is associated with the preset linkage rules; that is, in this embodiment, security units that need to be linked are configured for preset linkage rules, and at least one or more security units that need to be linked need to be configured in each preset linkage rule. The attribute of the security unit refers to the attribute that the name, type or unique code of the security unit can represent the security unit.
Configuring a linkage event for the corresponding security equipment in the security unit according to the preset linkage rule; specifically, a linkage event is configured for the security equipment to be linked in each security unit to be linked; the linkage event refers to an operation event that needs to be executed when the security device performs linkage, for example, the security device is an entrance monitoring device, and the linkage event may refer to switching of an on-off state of the entrance controlled by the entrance monitoring device.
And associating each preset linkage rule with at least one alarm event. That is, the configuration management is performed on the preset linkage rule, and the configuration management further comprises associating the preset linkage rule with the alarm event, so that when a trigger instruction of the alarm event is received, the preset linkage rule can be directly called according to the attribute of the alarm event, and further the corresponding linkage event is executed by the security equipment under the control of the preset linkage rule. Understandably, when the security device performs a linkage event, a mail message (or otherwise notify) needs to be sent to a responsible person of the security device, and the security device needs to perform related information of the linkage event.
In an embodiment, the security data processing method further includes:
receiving a login request sent by a login user, and calling login permission information from a database; the login permission information comprises login permission user information and login permission areas associated with each item of login permission user information; the login-allowed user information is preset for each registered user, and the login-allowed user information can be account information used for login of the registered user, such as an account number and a password of an account which is allowed to be logged in by one registered user. Understandably, each of the login permission information allows login user information to be associated with at least one login-allowed area. And if the login user information included in the login request is matched with the login allowing user information, opening the access right of the login allowing area for the login user according to the login allowing area associated with the login allowing user information. The login user information refers to account information (such as an account number and a password) of a login user who is currently logged in. The matching of the login user information included in the login request with the login permission user information may mean that the account number and the password currently used for login by the login user are consistent with the account number and the password in the login permission user information corresponding to the login user.
That is, in the above embodiment, the user may access all the functional modules (such as the security module, the control module of the internet of things, the decision module, etc.) in the security data processing system through access modes such as Web (World Wide Web) page access, etc., at this time, the user is required to log in the security data processing system first, and determine the access and management authority according to the login user information of the logged-in user; thus, when any user accesses the security data processing system, the authority of the user is checked first, and the user can only see the pages or menus (login permission areas) which are permitted to be accessed in the login permission function module. Wherein login right information and the like are stored in a database.
In an embodiment, the security data processing method further includes:
receiving a station display instruction, and displaying a construction diagram of a station and all station security equipment in the station on a current display interface in at least one of two-dimensional and three-dimensional forms; that is, in this embodiment, the station security feature may be integrally presented in a two-dimensional or three-dimensional form, so that the whole station equipment and the station feature are presented, so that operators can grasp the dynamic situation in real time, the occurrence place of the alarm event is clear at a glance, and they can respond and process quickly. The station presentation instruction may be automatically generated when an alarm event is triggered, or may be generated after a preset button is triggered by a user.
In an embodiment, the security data processing method further includes:
and receiving an equipment configuration instruction comprising equipment parameters of security equipment, and configuring the security equipment to the security unit under the security module according to the equipment parameters. That is, the embodiment can configure the device parameters of the security device of each security unit in the security module, where the device parameters include the device type, the command of the control device, the device state that the security device can implement, the security unit to which the security device belongs, the region where the device is placed, and the like, so that the processing analysis can be conveniently performed after the security data corresponding to the security device is reported, and the subsequent providing of reference value when the device is newly added or replaced is also convenient.
In one embodiment, as shown in fig. 2, a security data processing system is provided, where the security data processing system corresponds to the security data processing method in the above embodiment one by one. The security data processing system comprises a security module 2 and an internet of things control module 1 which is in communication connection with the security module 2, wherein the security module 2 comprises at least one security unit, and each security unit comprises at least one security device;
The control module 1 of the internet of things comprises:
a receiving unit 101, configured to receive security data reported by at least one security unit of a security module, where each security unit includes at least one security device;
the invoking unit 102 is configured to determine an alarm event according to the received security data, and invoke a preset linkage rule associated with the alarm event;
and the execution unit 103 is used for enabling the security unit to be linked according to the preset linkage rule, and controlling the corresponding security equipment to execute the linkage event corresponding to the security equipment.
The security data processing system comprises a security module and an Internet of things control module which are in communication connection, and security units with different purposes are integrated in the security module, so that security data of the security units with different purposes can be uniformly processed in the Internet of things control module, an alarm event is determined by comprehensively processing the security data, and the alarm event is processed according to a preset linkage rule; on one hand, the security data of the security units with different purposes are uniformly processed, so that the security running state of the whole station is clearer, station operators can know the security running state of the whole station more clearly, various alarms and emergency events can be analyzed and evaluated in time, and the security work of the whole station is greatly helped and promoted; on the other hand, the alarm event is determined by comprehensively processing the security data and is processed according to the preset linkage rule, the security equipment of each security unit of the whole station can be mobilized to carry out linkage of the corresponding linkage event, the processing efficiency of the station on the alarm event is greatly improved, the alarm event can be controlled and processed stably in time, and the safe and efficient operation of the station is ensured.
In an embodiment, the security unit includes at least one of a video monitoring unit 21, an intrusion monitoring unit 22, an entrance monitoring unit 23, a security inspection unit 24 and an electronic inspection unit 25; in an embodiment, as shown in fig. 3, the security units in the security module 2 include a frequency monitoring unit 21, an intrusion monitoring unit 22, an entrance monitoring unit 23, a security inspection unit 24, and an electronic inspection unit 25.
The security data comprises at least one of the following data:
the video monitoring unit 21 analyzes video information shot by the shooting equipment according to preset defense setting information and obtains video monitoring data;
the intrusion monitoring device of the intrusion monitoring unit 22 monitors intrusion data of a preset forbidden area of the station;
the entrance monitoring device of the entrance monitoring unit 23 monitors traffic data of the station entrance;
the security inspection device of the security inspection unit 24 performs security inspection on security inspection data of the station, wherein the security inspection data comprises security inspection images or/and dangerous goods detection information;
the inspection device of the electronic inspection unit 25 performs inspection data after inspection according to the inspection route of each inspection point in the inspection plan.
In an embodiment, as shown in fig. 4, the security module 2 is connected to the receiving unit 101 of the control module 1 of the internet of things through MQTT middleware;
the receiving unit 101 includes:
the processing subunit 1011 is configured to receive security data reported by at least one security unit of the security module 2 through the MQTT middleware, and insert the reported security data into a message queue to be processed according to a preset insertion rule after the security data is subjected to encapsulation processing.
In one embodiment, as shown in fig. 5, the calling unit 102 includes:
a retrieving subunit 1021, configured to retrieve the security data from the message queue to be processed according to a preset parsing order;
the parsing subunit 1022 is configured to parse the type and the data value of the security data, and obtain an alarm threshold associated with the type of the security data;
and the confirming subunit 1023 is configured to confirm an alarm event corresponding to the security data according to the data value of the security data when the data value of the security data exceeds the alarm threshold.
In an embodiment, as shown in fig. 6, the security data processing system further includes a decision module 3 communicatively connected to the control module 1 of the internet of things;
The call unit 102 further includes:
and a sending subunit 1024, configured to insert an alarm event corresponding to the security data into an alarm queue, record a device state of the security device corresponding to the alarm event, send the device state to a decision module through WebSocket for real-time display, and alert the alarm event corresponding to the security data in the decision module.
In an embodiment, as shown in fig. 7, the control module 1 of the internet of things further includes:
the adjusting unit 104 is configured to obtain an execution result of each security device after executing the linkage event, send the execution result to a decision module for real-time display through WebSocket, and adjust the preset linkage rule associated with the alarm event according to the execution result.
In one embodiment, as shown in fig. 8, the calling unit 102 further includes:
the storage subunit 1025 is configured to obtain a storage area associated with the type of the security data, store the security data to the storage area associated therewith, and receive a feedback processed receipt after the storage is completed.
In an embodiment, as shown in fig. 9, the control module 1 of the internet of things further includes:
The distribution unit 105 is configured to distribute the corresponding security unit for the preset linkage rule, and associate the security unit with the preset linkage rule;
a linkage event configuration unit 106, configured to configure a linkage event for the security device corresponding to the security unit according to the preset linkage rule;
an associating unit 107, configured to associate each preset linkage rule with at least one alarm event.
In an embodiment, as shown in fig. 10, the control module 1 of the internet of things further includes:
the login module 108 is configured to receive a login request sent by a login user, and retrieve login permission information from a database; the login permission information comprises login permission user information and login permission areas associated with each item of login permission user information;
and the permission verification module 109 is configured to, if the login user information included in the login request matches the login permission user information, open an access permission of the login permission area to the login user according to the login permission area associated with the login permission user information.
In an embodiment, as shown in fig. 11, the control module 1 of the internet of things further includes:
The display module 110 is configured to receive a station display instruction, and display a construction diagram of a station and all station security devices in the station on a current display interface in at least one of two-dimensional and three-dimensional forms.
In an embodiment, as shown in fig. 11, the control module 1 of the internet of things further includes:
the device configuration module 111 is configured to receive a device configuration instruction including a device parameter of a security device, and configure the security device to the security unit under the security module according to the device parameter.
The specific description of the security data processing system can be referred to the description of the security data processing method hereinabove, and will not be repeated here. The modules in the security data processing system may be implemented in whole or in part by software, hardware, or a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, the security data processing system is a security data processing system of an intelligent station, integrates each security unit, can uniformly process and display the data of each different security unit, and carries out linkage processing on various alarm events and other information according to preset linkage rules, so that operators can clearly know the security running state of the whole station, analyze and evaluate various alarms and emergency events in time, and the security operation of the whole station is greatly facilitated and improved. In this embodiment, as shown in fig. 12, the security data processing system of the smart station may be divided into three layers: a decision layer 4, a service module layer 5 and a support layer 6; the decision layer 4 at least includes the decision module 3 in the above embodiment, where the decision layer 4 is mainly used for performing alarm analysis (to evaluate whether an alarm event is formed) and evaluation of an emergency event (to evaluate an emergency level of the alarm event and perform different grading processes), and understandably, the decision layer 4 is also used for making a decision on other events (such as instructing a certain security unit to perform a certain security measure) or displaying (such as displaying an execution result after the linkage event is performed or displaying a device state of the security device corresponding to the alarm event).
The service module layer 5 instructs the support layer to execute the linkage event mainly according to the final decision of the decision layer for alarm analysis of the alarm event or evaluation of the emergency event, or instructs the support layer to execute other events to be executed according to the decision of the decision layer. The service module layer 5 includes:
all security units in security module 2: in the embodiment shown in fig. 12, the security units include a frequency monitoring unit 21, an intrusion monitoring unit 22, an entrance monitoring unit 23, a security inspection unit 24, and an electronic inspection unit 25. Wherein, the video monitoring unit 21 obtains video monitoring data after analyzing the video information shot by the shooting equipment according to the preset defense setting information. The intrusion monitoring unit 22 acquires intrusion monitoring data for a preset forbidden area of the station through an intrusion monitoring device. The entrance and exit monitoring unit 23 acquires traffic data for monitoring the entrance and exit of the station through the entrance and exit monitoring device. The security inspection unit 24 acquires security inspection data for performing security inspection on the station through security inspection equipment, wherein the security inspection data comprises security inspection images or/and dangerous goods detection information. The electronic inspection unit 25 acquires inspection data after inspection according to the inspection route of each inspection point in the inspection plan by the inspection apparatus.
The receiving unit 101 is configured to receive security data reported by at least one security unit of the security module, where each security unit includes at least one security device.
And the invoking unit 102 is configured to determine an alarm event according to the received security data, and invoke a preset linkage rule associated with the alarm event.
And the execution unit 103 is used for enabling the security unit to be linked according to the preset linkage rule, and controlling the corresponding security equipment to execute the linkage event corresponding to the security equipment.
The display module 110 is configured to receive a station display instruction, and display a construction diagram of a station and all station security devices in the station on a current display interface in at least one of two-dimensional and three-dimensional forms.
The support layer 6 mainly includes:
security devices 61 of the respective security units; the security device 61 includes the image capturing device of the video monitoring unit 21, the intrusion monitoring device of the intrusion monitoring unit 22, the entrance monitoring device of the entrance monitoring unit 23, the security device of the security unit 24, and the inspection device of the electronic inspection unit 25.
And the distribution unit 105 is configured to distribute the corresponding security unit for the preset linkage rule, and associate the security unit with the preset linkage rule.
And the linkage event configuration unit 106 is configured to configure a linkage event for the corresponding security device in the security unit according to the preset linkage rule.
An associating unit 107, configured to associate each preset linkage rule with at least one alarm event.
The login module 108 is configured to receive a login request sent by a login user, and retrieve login permission information from a database; the login permission information comprises login permission user information and login permission areas associated with each item of login permission user information.
And the permission verification module 109 is configured to, if the login user information included in the login request matches the login permission user information, open an access permission of the login permission area to the login user according to the login permission area associated with the login permission user information.
The device configuration module 111 is configured to receive a device configuration instruction including a device parameter of a security device, and configure the security device to the security unit under the security module according to the device parameter.
In one embodiment, as shown in fig. 13, the security data processing system of the present invention is a security data processing system of a smart station, and the system mainly includes four parts, namely a UI (User Interface) application layer 7, an internet of things platform 8, a security module 2 and a database 9. Wherein:
UI application layer 7: the user can access all the functional modules in the UI application layer 7 through a Web page. The UI application layer 7 shown in fig. 13 mainly includes the decision module 3 and part of functional modules in the control module 1 of the internet of things, and in the embodiment shown in fig. 13, the UI application layer 7 specifically includes the following functional modules:
decision module 3: the system is used for carrying out alarm analysis (evaluating whether an alarm event is formed) and emergency evaluation (evaluating the emergency level of the alarm event and carrying out different grading processes), and can be used for making decisions on other events (such as instructing a certain security unit to execute a certain security measure) or displaying an execution result after the linkage event is executed or the equipment state of the security equipment corresponding to the alarm event and the like reported by the internet of things platform 8 so as to monitor the station state at any time in real time.
The display module 110 is configured to receive a station display instruction, and display a construction diagram of a station and all station security devices in the station on a current display interface in at least one of two-dimensional and three-dimensional forms.
The login module 108 is configured to receive a login request sent by a login user, and retrieve login permission information from a database; the login permission information comprises login permission user information and login permission areas associated with each item of login permission user information.
And the permission verification module 109 is configured to, if the login user information included in the login request matches the login permission user information, open an access permission of the login permission area to the login user according to the login permission area associated with the login permission user information.
Internet of things platform 8: and the information is transmitted with the UI application layer 7 in a WebSocket mode, so that real-time changes of alarming, state, statistics and the like of the system are realized, and real-time monitoring of the whole security and protection aspect of the station is truly realized. The internet of things platform 8 mainly comprises part of functional modules in the internet of things control module 1, and in the embodiment shown in fig. 13, the functional modules specifically included in the internet of things platform 8 are as follows:
device configuration module 111: and the device configuration instruction is used for receiving device parameters including security devices, and configuring the security devices to the security units under the security modules according to the device parameters. That is, various functions such as types, parameters, commands and the like of the devices (such as security devices) added to the internet of things platform 201 are managed and configured, so that subsequent device reporting data processing analysis and later station security unit device new addition or replacement are facilitated.
The receiving unit 101 is configured to receive security data reported by at least one security unit of the security module, where each security unit includes at least one security device.
The invoking unit 102 is configured to determine an alarm event according to the received security data, and invoke a preset linkage rule associated with the alarm event;
and the execution unit 103 is used for enabling the security unit to be linked according to the preset linkage rule, and controlling the corresponding security equipment to execute the linkage event corresponding to the security equipment.
The adjusting unit 104 is configured to obtain an execution result of each security device after executing the linkage event, send the execution result to a decision module for real-time display through WebSocket, and adjust the preset linkage rule associated with the alarm event according to the execution result.
The distribution unit 105 is configured to distribute the corresponding security unit for the preset linkage rule, and associate the security unit with the preset linkage rule;
a linkage event configuration unit 106, configured to configure a linkage event for the security device corresponding to the security unit according to the preset linkage rule;
an associating unit 107, configured to associate each preset linkage rule with at least one alarm event.
As shown in fig. 14, in an embodiment, a specific process of processing security data by the internet of things platform 8 is as follows: event Source20232 obtains reported security data (including alarm events or other events and the like) through an MQTT middleware (MQTT 20231), processes and packages the security data, throws the security data into a to-be-processed message queue (Kafka message queue), receives the security data from the to-be-processed message queue, analyzes the security data, sorts and stores various events in a database 9 through Event Management20234, and returns a receipt message to Inbound Processing20233 through Kafka after the storage is finished to tell that the security data is processed; and meanwhile, if the alarm or telemetry value (the data value of the security data) exceeds the alarm threshold value, triggering the link Engine20235 to carry out Linkage processing. Meanwhile, inbound Processing20233 packages the alarm event corresponding to the security data again and throws the alarm event into an alarm queue (Kafka message queue), the Device State20236 stores the Device State in the database 9 after obtaining the alarm event corresponding to the security data through Kafka, and sends information such as the Device State to the UI application layer 7 through WebSocket20237 for real-time display and alarm prompt. In the embodiment, a large amount of concurrent data can be processed efficiently, so that the real-time state of the system to the whole security system and the response speed of the alarm are improved, all operations of the whole station are controlled, and accidents are prevented.
Security module 2: in the embodiment shown in fig. 13, all security units in the security module 2 include a frequency monitoring unit 21, an intrusion monitoring unit 22, an entrance monitoring unit 23, a security inspection unit 24, and an electronic patrol unit 25. Wherein, the video monitoring unit 21 obtains video monitoring data after analyzing the video information shot by the shooting equipment according to the preset defense setting information. The intrusion monitoring unit 22 acquires intrusion monitoring data for a preset forbidden area of the station through an intrusion monitoring device. The entrance and exit monitoring unit 23 acquires traffic data for monitoring the entrance and exit of the station through the entrance and exit monitoring device. The security inspection unit 24 acquires security inspection data for performing security inspection on the station through security inspection equipment, wherein the security inspection data comprises security inspection images or/and dangerous goods detection information. The electronic inspection unit 25 acquires inspection data after inspection according to the inspection route of each inspection point in the inspection plan by the inspection apparatus. Referring to the security data processing method in the invention, except that each security unit performs data acquisition through an interface, security equipment of each security unit reports events and alarms to the internet of things platform 8 through the MQTT message middleware.
Database 9: all data to be saved by the security data processing system are saved. As shown in fig. 14, the database 9 may be the following type of database: mongoDB, mySQL, influxDB.
In one embodiment, a computer device is provided, which may be a server, and the internal structure of which may be as shown in fig. 15. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer readable instructions, and a database. The internal memory provides an environment for the execution of an operating system and computer-readable instructions in a non-volatile storage medium. Which when executed by a processor, perform the methods described above.
In one embodiment, a computer device is provided that includes a memory, a processor, and computer readable instructions stored on the memory and executable on the processor, when executing the computer readable instructions, performing the steps of:
Receiving security data reported by at least one security unit of the security module; each security unit comprises at least one security device;
determining an alarm event according to the received security data, and calling a preset linkage rule associated with the alarm event; the preset linkage rules comprise the attribute of all the security units needing to be linked and the linkage event to be executed of all the security devices needing to be linked in the security units needing to be linked;
and enabling the security unit to be linked to instruct each security device to be linked in the security unit to execute the corresponding linkage event.
In one embodiment, a computer readable storage medium having computer readable instructions stored thereon which when executed by a processor perform the method described above is provided.
Those skilled in the art will appreciate that implementing all or part of the processes of the methods of the embodiments described above may be accomplished by instructing the associated hardware by computer readable instructions stored on a non-transitory computer readable storage medium, which when executed may comprise processes of embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
It will be apparent to those skilled in the art that the above-described functional units or modules are merely illustrated in terms of division for convenience and brevity, and that in practical applications, the above-described functional units or modules may be allocated to different functional units or modules according to needs, i.e., the internal structure of the system may be divided into different functional units or modules to perform all or part of the above-described functions.
The above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention, and are intended to be included in the scope of the present invention.

Claims (11)

1. The security data processing method is characterized by comprising the following steps of:
receiving security data reported by at least one security unit of a security module, wherein each security unit comprises at least one security device;
The receiving of security data reported by at least one security unit of the security module comprises:
receiving security data reported by at least one security unit of the security module through an MQTT middleware, and inserting the reported security data into a message queue to be processed according to a preset insertion rule after packaging the security data; the preset insertion rule is ordered according to the time sequence of the time points of the processing completion or according to the data types;
determining an alarm event according to the received security data, and calling a preset linkage rule associated with the alarm event; the preset linkage rules comprise attributes of all security units needing to be linked and linkage events to be executed of all security devices needing to be linked in the security units needing to be linked;
according to the preset linkage rule, the security unit needing linkage is controlled to control the corresponding security equipment to execute the linkage event corresponding to the security unit;
after the alarm event is determined according to the received security data, the method further comprises:
inserting an alarm event corresponding to the security data after being encapsulated again into an alarm queue, recording the current running state of the security equipment corresponding to the alarm event, sending the current running state to a decision module through a WebSocket for real-time display, and simultaneously warning the alarm event corresponding to the security data in the decision module.
2. The security data processing method according to claim 1, wherein the security unit comprises at least one of a video monitoring unit, an intrusion monitoring unit, an entrance monitoring unit, a security inspection unit and an electronic inspection unit;
the security data comprises at least one of the following data:
the video monitoring unit analyzes video information shot by the shooting equipment according to preset defense setting information and obtains video monitoring data;
the intrusion monitoring device of the intrusion monitoring unit monitors intrusion data of a preset forbidden area of the station;
the entrance monitoring device of the entrance monitoring unit monitors traffic data of the station entrance;
the security inspection equipment of the security inspection unit performs security inspection on security inspection data of the station, wherein the security inspection data comprises security inspection images or/and dangerous goods detection information;
and the inspection equipment of the electronic inspection unit performs inspection data after inspection according to the inspection route of each inspection point in the inspection plan.
3. The security data processing method according to claim 1, wherein the determining an alarm event according to the received security data comprises:
The security data are called from the message queue to be processed according to a preset analysis sequence;
analyzing the type and the data value of the security data, and acquiring an alarm threshold associated with the type of the security data;
and when the data value of the security data exceeds the alarm threshold value, confirming an alarm event corresponding to the security data according to the data value of the security data.
4. The security data processing method according to claim 1, wherein after the security unit to be linked is controlled to execute the linking event corresponding to the security unit according to the preset linking rule, the method comprises:
and acquiring an execution result of each security device after executing the linkage event, sending the execution result to a decision module for real-time display through a WebSocket, and adjusting the preset linkage rule associated with the alarm event according to the execution result.
5. The security data processing method according to claim 3, wherein after the analyzing the type and the data value of the security data, further comprises:
and acquiring a storage area associated with the type of the security data, storing the security data in the storage area associated with the security data, and receiving a feedback processing receipt after the storage is completed.
6. The security data processing method according to claim 1, wherein before the invoking of the preset linkage rule associated with the alarm event, further comprising:
distributing the corresponding security unit for the preset linkage rule, and associating the security unit with the preset linkage rule;
configuring a linkage event for the corresponding security equipment in the security unit according to the preset linkage rule;
and associating each preset linkage rule with at least one alarm event.
7. The security data processing method of claim 1, further comprising:
receiving a login request sent by a login user, and calling login permission information from a database; the login permission information comprises login permission user information and login permission areas associated with each item of login permission user information;
and if the login user information included in the login request is matched with the login allowing user information, opening the access right of the login allowing area for the login user according to the login allowing area associated with the login allowing user information.
8. The security data processing method of claim 1, further comprising:
And receiving a station display instruction, and displaying a construction diagram of a station and all station security equipment in the station on a current display interface in at least one of two-dimensional and three-dimensional forms.
9. The security data processing method of claim 1, further comprising:
and receiving an equipment configuration instruction comprising equipment parameters of security equipment, and configuring the security equipment to the security unit under the security module according to the equipment parameters.
10. The security data processing system is characterized by comprising a security module and an Internet of things control module which is in communication connection with the security module, wherein the security module comprises at least one security unit, and each security unit comprises at least one security device;
the control module of the Internet of things comprises:
the receiving unit is used for receiving security data reported by at least one security unit of the security module, wherein each security unit comprises at least one security device;
the receiving unit further includes: receiving security data reported by at least one security unit of the security module through an MQTT middleware, and inserting the reported security data into a message queue to be processed according to a preset insertion rule after packaging the security data; the preset insertion rule is ordered according to the time sequence of the time points of the processing completion or according to the data types;
The calling unit is used for determining an alarm event according to the received security data and calling a preset linkage rule associated with the alarm event; the preset linkage rules comprise attributes of all security units needing to be linked and linkage events to be executed of all security devices needing to be linked in the security units needing to be linked;
the execution unit is used for enabling the security unit to be linked according to the preset linkage rule and controlling the corresponding security equipment to execute the linkage event corresponding to the security equipment;
the calling unit further comprises:
inserting an alarm event corresponding to the security data after being encapsulated again into an alarm queue, recording the current running state of the security equipment corresponding to the alarm event, sending the current running state to a decision module through a WebSocket for real-time display, and simultaneously warning the alarm event corresponding to the security data in the decision module.
11. A computer readable storage medium storing computer readable instructions which, when executed by a processor, implement the security data processing method of any of claims 1 to 9.
CN201910838205.XA 2019-09-05 2019-09-05 Security data processing method, system, computer equipment and storage medium Active CN112447033B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910838205.XA CN112447033B (en) 2019-09-05 2019-09-05 Security data processing method, system, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910838205.XA CN112447033B (en) 2019-09-05 2019-09-05 Security data processing method, system, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112447033A CN112447033A (en) 2021-03-05
CN112447033B true CN112447033B (en) 2024-03-19

Family

ID=74733596

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910838205.XA Active CN112447033B (en) 2019-09-05 2019-09-05 Security data processing method, system, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112447033B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113923239A (en) * 2021-09-18 2022-01-11 苏州城之瞳安防智能科技有限公司 System, method and medium applied to hospital security
CN114500644A (en) * 2022-03-28 2022-05-13 成都柔水科技有限公司 Internet of things data management method in municipal facility monitoring system
CN116127401B (en) * 2023-04-20 2023-06-16 西南石油大学 Data authority management and control method and system
CN117149897B (en) * 2023-10-31 2024-01-26 成都交大光芒科技股份有限公司 Big data alarm information hierarchical display system and method based on double-buffer technology
CN117250930B (en) * 2023-11-15 2024-02-20 深圳曼顿科技有限公司 Equipment linkage control method, system, device, terminal equipment and storage medium

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1412686A (en) * 2002-11-26 2003-04-23 深圳市海星信力德智能系统工程有限公司 Computer integrated control system for stadium and gym.
JP2010134724A (en) * 2008-12-05 2010-06-17 Canon It Solutions Inc Device and method for monitoring message queuing, program and recording medium
CN104125095A (en) * 2014-06-25 2014-10-29 世纪禾光科技发展(北京)有限公司 System and method for monitoring event failure in real time
CN105204471A (en) * 2015-09-30 2015-12-30 青岛海尔智能家电科技有限公司 Household appliance linkage method and device, server and household appliance
CN105491066A (en) * 2016-01-05 2016-04-13 李景泉 Social security protection video monitoring cloud platform and monitoring method
CN106656632A (en) * 2017-02-03 2017-05-10 上海中信信息发展股份有限公司 Machine room monitoring system fusing Ethernet protocol with Internet of Things protocol, and information processing and control method
CN107481472A (en) * 2017-09-22 2017-12-15 广州地铁设计研究院有限公司 A kind of security protection and fire protection linkage control method
CN107632285A (en) * 2017-09-19 2018-01-26 北京小米移动软件有限公司 Map building and amending method and device
CN107864174A (en) * 2017-07-03 2018-03-30 华南理工大学 A kind of rule-based internet of things equipment interlock method
CN108572606A (en) * 2018-07-12 2018-09-25 上海市城市建设设计研究总院(集团)有限公司 Rail traffic security protection integrated platform with linkage, disaster prevention emergency function
CN109215264A (en) * 2017-07-04 2019-01-15 北京航天长峰科技工业集团有限公司 A kind of alarm linkage method for security system
CN109255937A (en) * 2018-09-03 2019-01-22 平安科技(深圳)有限公司 Alarm processing method and terminal device
CN109544879A (en) * 2018-10-29 2019-03-29 视联动力信息技术股份有限公司 A kind of processing method and system of alert data
KR20190057818A (en) * 2017-11-20 2019-05-29 광운대학교 산학협력단 Priority-based MQTT System and method to provide Differentiated IoT Services
CN110191478A (en) * 2019-04-23 2019-08-30 深圳市荣盛智能装备有限公司 Take into account system, charging equipment and the terminal device of charging and data transfer management

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1412686A (en) * 2002-11-26 2003-04-23 深圳市海星信力德智能系统工程有限公司 Computer integrated control system for stadium and gym.
JP2010134724A (en) * 2008-12-05 2010-06-17 Canon It Solutions Inc Device and method for monitoring message queuing, program and recording medium
CN104125095A (en) * 2014-06-25 2014-10-29 世纪禾光科技发展(北京)有限公司 System and method for monitoring event failure in real time
CN105204471A (en) * 2015-09-30 2015-12-30 青岛海尔智能家电科技有限公司 Household appliance linkage method and device, server and household appliance
CN105491066A (en) * 2016-01-05 2016-04-13 李景泉 Social security protection video monitoring cloud platform and monitoring method
CN106656632A (en) * 2017-02-03 2017-05-10 上海中信信息发展股份有限公司 Machine room monitoring system fusing Ethernet protocol with Internet of Things protocol, and information processing and control method
CN107864174A (en) * 2017-07-03 2018-03-30 华南理工大学 A kind of rule-based internet of things equipment interlock method
CN109215264A (en) * 2017-07-04 2019-01-15 北京航天长峰科技工业集团有限公司 A kind of alarm linkage method for security system
CN107632285A (en) * 2017-09-19 2018-01-26 北京小米移动软件有限公司 Map building and amending method and device
CN107481472A (en) * 2017-09-22 2017-12-15 广州地铁设计研究院有限公司 A kind of security protection and fire protection linkage control method
KR20190057818A (en) * 2017-11-20 2019-05-29 광운대학교 산학협력단 Priority-based MQTT System and method to provide Differentiated IoT Services
CN108572606A (en) * 2018-07-12 2018-09-25 上海市城市建设设计研究总院(集团)有限公司 Rail traffic security protection integrated platform with linkage, disaster prevention emergency function
CN109255937A (en) * 2018-09-03 2019-01-22 平安科技(深圳)有限公司 Alarm processing method and terminal device
CN109544879A (en) * 2018-10-29 2019-03-29 视联动力信息技术股份有限公司 A kind of processing method and system of alert data
CN110191478A (en) * 2019-04-23 2019-08-30 深圳市荣盛智能装备有限公司 Take into account system, charging equipment and the terminal device of charging and data transfer management

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
入侵检测系统中分层报警处理模型的研究;肖立中;刘云翔;戴蒙;;计算机应用研究;20090815(第08期);2995-2999 *

Also Published As

Publication number Publication date
CN112447033A (en) 2021-03-05

Similar Documents

Publication Publication Date Title
CN112447033B (en) Security data processing method, system, computer equipment and storage medium
CN102684944B (en) Method and device for detecting intrusion
CN106445817B (en) Processing method, the device and system of test data
CN110705643A (en) Intelligent tool management method and device, computer equipment and storage medium
CN112004067A (en) Video monitoring method, device and storage medium
CN111161541A (en) Vehicle monitoring method, device and system and vehicle monitoring equipment
CN113095132A (en) Neural network-based gas field target detection and behavior identification method, system, terminal and storage medium
CN114448693A (en) Safety control method, device, electronic equipment and medium combining RPA and AI
CN109328453A (en) The method and integrity checking system that integrality for low-disturbance monitors
CN111754653A (en) Embedded system on an aircraft for detecting and responding to incidents using logging
CN105681388B (en) Visualization system and method based on cloud internet of things monitoring
CN112039686B (en) Data stream transmission control method, device, monitoring equipment and storage medium
CN110688418A (en) Intelligent prison patrol method and device, computer equipment and storage medium
US20100265039A1 (en) Systems and Methods for Securing Control Systems
DE102020130166A1 (en) DEVICES AND PROCEDURES FOR SECURE DATA LOGGING
CN112507169A (en) Patrol information processing method and device and readable storage medium
CN106385413A (en) Intruding message flow processing method and device
CN115880631A (en) Power distribution station fault identification system, method and medium
CN115100812A (en) Intelligent security monitoring method, system and device and electronic equipment
CN115509854A (en) Inspection processing method, inspection server and inspection system
CN115311825A (en) Alarm data pushing method and device for PCB (printed Circuit Board) equipment, computer equipment and storage medium
CN112162906A (en) Server behavior monitoring method of probe management platform architecture
CN112800896A (en) Security emergency measure self-response method and system based on knowledge graph
CN109508906A (en) The control method and device of well lid operation
CN105629857A (en) System for monitoring environment of flight training device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant