CN112967481A - Security alarm information intelligent processing method, security equipment and computer readable storage medium - Google Patents

Security alarm information intelligent processing method, security equipment and computer readable storage medium Download PDF

Info

Publication number
CN112967481A
CN112967481A CN202110388443.2A CN202110388443A CN112967481A CN 112967481 A CN112967481 A CN 112967481A CN 202110388443 A CN202110388443 A CN 202110388443A CN 112967481 A CN112967481 A CN 112967481A
Authority
CN
China
Prior art keywords
alarm information
alarm
network host
security
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110388443.2A
Other languages
Chinese (zh)
Other versions
CN112967481B (en
Inventor
俞威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Oribo Technology Co Ltd
Original Assignee
Shenzhen Oribo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Oribo Technology Co Ltd filed Critical Shenzhen Oribo Technology Co Ltd
Priority to CN202110388443.2A priority Critical patent/CN112967481B/en
Publication of CN112967481A publication Critical patent/CN112967481A/en
Application granted granted Critical
Publication of CN112967481B publication Critical patent/CN112967481B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/182Level alarms, e.g. alarms responsive to variables exceeding a threshold
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/001Alarm cancelling procedures or alarm forwarding decisions, e.g. based on absence of alarm confirmation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

The invention provides an intelligent security alarm information processing method, security equipment and a computer readable storage medium. Wherein, the method comprises the following steps: when the network host receives the alarm information, judging whether the network host meets a preset condition or not; if yes, sending the alarm information to a central management machine; if the alarm information does not meet the preset requirement, the alarm information is forwarded to the preset network host, and the preset network host sends the alarm information to the central management machine, so that the alarm information of each unit area is only sent to the central management machine through a unique uploading channel, and the problems of channel congestion and processing resource waste caused by the fact that a plurality of devices in each unit area repeatedly send the same alarm information are avoided.

Description

Security alarm information intelligent processing method, security equipment and computer readable storage medium
Technical Field
The invention relates to the technical field of security protection, in particular to an intelligent security protection alarm information processing method, security protection equipment and a computer readable storage medium.
Background
With the rapid development of the internet of things technology and the continuous increase of security requirements, the popularity of security equipment is higher and higher.
The existing alarm information processing mechanism of security equipment is to send corresponding security alarm information to a community management center machine through the security equipment under the condition that related sensors trigger security alarms, so that a management center of property and the like can timely perform door-to-door processing on the current security problem.
However, since there may be a plurality of security devices under a place such as a home, when one or more sensors alarm, all security devices under the place such as the home will alarm, and if each security device under the place such as the home sends security alarm information to the management center of the community once, the management center may receive a plurality of repeated security alarm information, and if only one of the security devices under the place such as the home is designated to send security alarm information to the management center, the designated security device needs to process more security alarm information, which may cause the problem that the processing pressure is too high and the application operation is not smooth.
Disclosure of Invention
In order to solve the technical defects in the prior art, the invention provides an intelligent security alarm information processing method, which is characterized by comprising the following steps:
when the network host receives the alarm information, judging whether the network host meets a preset condition or not;
if yes, sending the alarm information to a central management machine;
if not, the alarm information is forwarded to the preset network host, and the preset network host sends the alarm information to the central management machine.
Optionally, the preset condition is that the network host is a preset network host.
Optionally, when there are a plurality of alarm information, before the step of sending the alarm information to the central management machine, the method further includes the steps of:
acquiring equipment information of a plurality of pieces of alarm information, and judging whether alarm equipment corresponding to the plurality of pieces of equipment information is the same alarm equipment;
if the alarm equipment is the same alarm equipment, only one alarm message is sent to the central management machine;
and if the alarm devices are different, sending alarm information corresponding to all different alarm devices to the central management machine.
Optionally, if the alarm devices are different alarm devices, the step of sending alarm information corresponding to all different alarm devices specifically includes the following steps:
classifying the alarm information according to the equipment information to generate at least one alarm information set, wherein each alarm information set only contains the alarm information with the same equipment information;
and sending one alarm message in each alarm message set to the central management machine.
Optionally, when there are a plurality of alarm information, before the step of sending the alarm information to the central management machine, the method further includes the steps of:
monitoring whether the number of the received and unsent alarm information exceeds a preset threshold value in real time;
and if the alarm information exceeds the preset threshold value, sending the subsequently received alarm information to a server, and sending the alarm information to a central management machine by the server.
Optionally, the specific step of monitoring whether the number of received and unsent alarm messages exceeds a preset threshold in real time includes:
acquiring equipment information of alarm equipment corresponding to the received and unsent alarm information, and judging whether the number of the alarm equipment exceeds a preset threshold value or not according to the number of different equipment information;
and if the number of the alarm messages exceeds the preset threshold value, determining that the number of the alarm messages exceeds the preset threshold value.
Optionally, if the alarm information exceeds the preset threshold, the specific step of sending the subsequently received alarm information to the server includes:
determining the overflow quantity of the received and unsent alarm information exceeding a preset threshold;
and sending the alarm information of the overflow quantity to the server.
Optionally, if the alarm information does not match the preset network host, forwarding the alarm information to the preset network host, and sending the alarm information to the central management machine by the preset network host, specifically including the following steps:
searching a preset network host connected with the network host;
sending the alarm information to a preset network host;
and when the preset network host receives the alarm information, sending the alarm information to the central management machine.
The invention also provides security equipment which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein when the computer program is executed by the processor, the steps of the security alarm information intelligent processing method can be realized.
The invention also provides a computer readable storage medium, wherein the computer readable storage medium stores a security alarm information intelligent processing program, and the security alarm information intelligent processing program realizes the steps of the security alarm information intelligent processing method.
By implementing the intelligent security alarm information processing method, the security equipment and the computer readable storage medium, whether the network host meets the preset condition is judged by recognizing that the network host receives the alarm information; if yes, sending the alarm information to a central management machine; if the alarm information does not meet the preset requirement, the alarm information is forwarded to the preset network host, and the preset network host sends the alarm information to the central management machine, so that the alarm information of each unit area is only sent to the central management machine through a unique uploading channel, and the problems of channel congestion and processing resource waste caused by the fact that a plurality of devices in each unit area repeatedly send the same alarm information are avoided.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
FIG. 1 is a flowchart of a method for intelligently processing security alarm information according to an embodiment of the present application;
FIG. 2 is a flowchart of a method for intelligently processing security alarm information according to another embodiment of the present application;
FIG. 3 is a flowchart of a method for intelligently processing security alarm information according to yet another embodiment of the present application;
FIG. 4 is a flowchart of a method for intelligently processing security alarm information according to yet another embodiment of the present application;
FIG. 5 is a flowchart of a method for intelligently processing security alarm information according to yet another embodiment of the present application;
FIG. 6 is a flowchart of a method for intelligently processing security alarm information according to yet another embodiment of the present application;
FIG. 7 is a flowchart of a method for intelligently processing security alarm information according to yet another embodiment of the present application;
FIG. 8 is a block diagram of a security device according to an embodiment of the present disclosure;
fig. 9 is a block diagram of a computer-readable storage medium according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
With the rapid development of the internet of things technology and the continuous increase of security requirements, the popularity of security equipment is higher and higher. The existing alarm information processing mechanism of security equipment is that under the condition that related sensors trigger security alarms, corresponding security alarm information is sent to a community management center machine through the security equipment, so that a management center such as a property management center can timely perform door-to-door processing on the current security problem.
However, since there may be a plurality of security devices under a place such as a home, when one or more sensors alarm, all security devices under the place such as the home will alarm, and if each security device under the place such as the home sends security alarm information to the management center of the community once, the management center may receive a plurality of repeated security alarm information, and if only one of the security devices under the place such as the home is designated to send security alarm information to the management center, the designated security device needs to process more security alarm information, which may cause the problem that the processing pressure is too high and the application operation is not smooth. Therefore, an intelligent control scheme is urgently needed for a security alarm information processing and uploading mechanism in the prior art.
Therefore, the inventor provides the intelligent security alarm information processing method, the security equipment and the computer readable storage medium provided by the embodiment of the application, and judges whether the network host meets the preset condition or not by recognizing that the network host receives the alarm information; if yes, sending the alarm information to a central management machine; if the received security alarm information does not conform to the preset network host, the alarm information is forwarded to the preset network host, and the preset network host sends the alarm information to the central management machine, so that the reporting operation of the security alarm information cannot be centralized to be executed by one security device, the uploading and division of the security alarm information are determined, the processing efficiency of the security alarm information is improved, the central management machine is prevented from receiving a plurality of repeated security alarm information, and the central management machine can conveniently process the received security alarm information in time.
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Example one
Referring to fig. 1, fig. 1 shows a flowchart of an intelligent security alarm information processing method according to an embodiment of the present application. The embodiment provides an intelligent processing method for security alarm information, which is characterized by comprising the following steps:
and S1, when the network host receives the alarm information, judging whether the network host meets the preset condition.
In this embodiment, a plurality of network hosts are generally arranged in one security location or any unit area thereof, and each network host is used for managing and controlling a plurality of security sensors on one hand and uploading alarm information generated by the security sensors to a central management machine on the other hand. In the existing security alarm information reporting mechanism, when a network host receives alarm information, the alarm information may be directly uploaded to a central management machine, and if a plurality of network hosts receive alarm information generated by a plurality of security sensors in the same monitoring area, the central management machine may receive a plurality of repeated alarm information sent by the plurality of network hosts and aiming at the same monitoring area, so that certain interference may be brought to the central management machine in processing the alarm information. Therefore, in order to avoid the above technical problem, although any network host may receive the alarm information sent from the security sensor, when any network host receives the alarm information, it is determined whether the network host meets a preset condition, where the preset condition is used to determine whether the network host currently receiving the alarm information has the authority to upload the alarm information to the central management machine. It can be seen that, in this embodiment, when the security sensor sends the alarm information, if the plurality of network hosts receive the same alarm information, the plurality of network hosts determine their own rights according to the preset condition, so as to obtain the network host having the right to upload the alarm information to the central management machine and the network host not having the right to upload the alarm information to the central management machine.
Optionally, in this embodiment, when the plurality of network hosts receive the alarm information sent by the security sensor in the same area, the plurality of network hosts respectively determine whether themselves meet the preset condition, and meanwhile, each determined network host records the determination result, so that when the alarm information sent by the security sensor is received again, it is directly determined whether itself has the authority to upload the alarm information to the central management machine, thereby further improving the determination efficiency and saving processing resources and network resources.
And S2, if the alarm information is matched with the alarm information, sending the alarm information to the central management machine.
In this embodiment, if the network host meets the preset condition, it is determined that the network host has the authority to upload the alarm information to the central management machine, and thus the network host uploads the received alarm information to the central management machine in time. It can be seen that, in the present embodiment, the uploading target of the alarm information is not specified or unique, but is obtained according to the determination result of the preset condition.
In an optional embodiment, the preset condition is: the network host is a preset network host, and specifically, for example, the network host is configured as a preset network host within a period of use, or the network host is configured as a preset network host when being shipped from a factory, or the network host receives configuration upgrade as a preset network host during use, or the network host receives the alarm information and receives a designation of a central management machine as a preset network host before determining whether the preset condition is met, or the network host receives the alarm information and receives votes of other network hosts as a preset network host before determining whether the preset condition is met. Therefore, through a more flexible network host condition specification and judgment mode, the uploading object of the alarm information is more clear, and the alarm information uploaded to the central management machine is more accurate.
And S3, if the alarm information is not matched with the preset network host, forwarding the alarm information to the preset network host, and sending the alarm information to the central management machine by the preset network host.
In this embodiment, if the network host that receives the alarm information does not meet the preset condition, that is, it is determined that the network host does not have the authority to upload the alarm information to the central management machine, so that, in order to avoid that the network host delays uploading or cannot upload the alarm information to the central management machine when receiving the alarm information, in this embodiment, the network host forwards the alarm information to the preset network host in time, so that the preset network host sends the alarm information to the central management machine. It can be seen that, in the present embodiment, the uploading target of the alarm information is not specified or unique, but is obtained according to the determination result of the preset condition. In an optional embodiment, the preset network host is configured as a preset network host, specifically, for example, the network host is configured as a preset network host within a period of use, or the network host is configured as a preset network host when it leaves a factory, or the network host receives a configuration upgrade as a preset network host during use, or the network host receives the designation of a central management machine as a preset network host after receiving the alarm information and before determining whether the preset condition is met, or the network host receives the vote of another network host as a preset network host after receiving the alarm information and before determining whether the preset condition is met. Therefore, the alarm information is forwarded by the preset network host instead of the network host which does not accord with the preset condition in a more flexible preset network host appointed mode, so that the uploading object of the alarm information is more definite, and the alarm information uploaded to the central management machine is more accurate.
The method has the advantages that whether the network host meets the preset conditions or not is judged by recognizing that the network host receives the alarm information; if yes, sending the alarm information to a central management machine; if the alarm information does not meet the preset requirement, the alarm information is forwarded to the preset network host, and the preset network host sends the alarm information to the central management machine, so that the alarm information of each unit area is only sent to the central management machine through a unique uploading channel, and the problems of channel congestion and processing resource waste caused by the fact that a plurality of devices in each unit area repeatedly send the same alarm information are avoided.
Example two
In this embodiment, the predetermined condition is that the network host is a predetermined network host. As described in the above example, in an optional embodiment, the preset network host is configured as a preset network host, and specifically, for example, the network host is configured as a preset network host in a period of use, or the network host is configured as a preset network host at the time of factory shipment, or the network host receives a configuration upgrade as a preset network host during use, or the network host receives the alarm information and receives a designation of a central management machine as a preset network host before determining whether the preset condition is met, or the network host receives the alarm information and receives votes of other network hosts as a preset network host before determining whether the preset condition is met. Specifically, for example, a network host a, a network host B, a network host C, a network host D, and a network host E exist in a security application site, where the network host B, the network host C, the network host D, and the network host E do not meet the preset condition, that is, the network host B, the network host C, the network host D, and the network host E are common network hosts, and the network host a meets the preset condition, that is, the network host a is a preset network host. Therefore, when any one of the network hosts B, C, D and E receives the alarm information, the alarm information is forwarded to the network host a, and the network host a uploads the alarm information to the central management machine, and when the network host a receives the alarm information, the network host a directly uploads the received alarm information to the central management machine because the network host a itself meets the preset condition.
Referring to fig. 2, fig. 2 is a flowchart illustrating an intelligent security alarm information processing method according to another embodiment of the present application. Based on the above embodiment, in this embodiment, when there are a plurality of alarm information, before the step of sending the alarm information to the central management machine, the following steps are further included:
s11, acquiring the device information of the plurality of alarm information, and determining whether the alarm devices corresponding to the plurality of device information are the same alarm device.
In this embodiment, in a real security scene, a plurality of alarm information are generated by the same security sensor, that is, the plurality of alarm information may include the same security event, and therefore, if the plurality of alarm information are uploaded to the central management machine, the problems such as delayed alert processing of the central management machine may be caused. Therefore, in this embodiment, when the network host acquires the plurality of pieces of alarm information, the device information included in the plurality of pieces of alarm information is acquired, and whether the alarm devices of the alarm information are the same alarm device is determined by the plurality of pieces of device information. Specifically, whether the alarm devices of the alarm information are the same alarm device is determined by the device ID (identity information) in the device information.
And S12, if the alarm equipment is the same alarm equipment, only one alarm message is sent to the central management machine.
In the present embodiment, when the network host a receives the alarm information P1, the alarm information P2, the alarm information P3, the alarm information P4, and the alarm information P5 in a certain period of time, the alarm information P2, the alarm information P3, the alarm information P4, and the alarm information P5 are generated from the same door lock in the same location area, and the alarm information P1 is generated from a motorized window shade in another location area, it is determined that the alarm devices corresponding to the alarm information P2, the alarm information P3, the alarm information P4, and the alarm information P5 are the same alarm device and different from the alarm device corresponding to the alarm information P1.
And S13, if the alarm devices are different, sending alarm information corresponding to all different alarm devices to the central management machine.
In this embodiment, as described in the above example, when it is determined that the alarm devices corresponding to the alarm information P2, the alarm information P3, the alarm information P4, and the alarm information P5 are the same alarm device and are different from the alarm device of the alarm information P1, any one of the alarm information P1 and the alarm information P2, the alarm information P3, the alarm information P4, and the alarm information P5 is uploaded to the central management machine, so that the central management machine can process the current two alarm information in time.
The method and the device for alarming the information of the equipment have the advantages that whether the alarming equipment corresponding to the information of the equipment is the same alarming equipment or not is judged by obtaining the equipment information of the alarming information, if the alarming equipment is the same alarming equipment, only one alarming information is sent to the central management machine, and if the alarming equipment is different, all alarming information corresponding to different alarming equipment is sent to the central management machine. The unique identification of the alarm equipment is realized, and the problems of channel congestion and processing resource waste caused by the repeated sending of the same alarm information by a plurality of same alarm equipment in each unit area are avoided.
Referring to fig. 3, fig. 3 is a flowchart illustrating an intelligent security alarm information processing method according to another embodiment of the present application. Based on the foregoing embodiment, in this embodiment, if the alarm devices are different alarm devices, the step of sending alarm information corresponding to all different alarm devices specifically includes the following steps:
s131, classifying the alarm information according to the equipment information to generate at least one alarm information set, wherein each alarm information set only contains the alarm information with the same equipment information.
In this embodiment, the device information may include one or more of a device location, a device function, and a device attribute in addition to the device ID described above.
In the present embodiment, the above-described alarm information is classified according to one or more of a device ID, a device location, a device function, and a device attribute.
In this embodiment, after classifying the alarm information according to one or more of the device ID, the device location, the device function, and the device attribute, an alarm information set based on the one or more of the device ID, the device location, the device function, and the device attribute is obtained. Specifically, for example, when the device ID is taken as the classification criterion, the alarm information sets generated by devices of different IDs are obtained, and when the device location is taken as the classification criterion, the alarm information sets generated by devices of different locations are obtained. It is understood that each alarm information set contains only alarm information having the same device information, that is, one alarm information set contains only one ID for alarm information sets generated by devices having different IDs. Preferably, in this embodiment, a combination of multiple types of device IDs, device locations, device functions, and device attributes may also be used as a classification basis, for example, if an alarm information set is used in which a device ID and a device location are combined as a classification basis, alarm information of multiple devices in the same location may be summarized.
S132, one alarm message in each alarm message set is sent to the central management machine.
In the present embodiment, as described in the above example, in order to facilitate the central management machine to process a plurality of alarm messages in time, only one alarm message in each alarm message set is sent to the central management machine. Optionally, sending the first alarm information in each alarm information set to a central management machine; optionally, sending the last alarm information in each alarm information set to the central management machine; optionally, one alarm message in each alarm message set is randomly selected and sent to the central management machine.
The method has the advantages that the alarm information is classified through the equipment information, at least one alarm information set is generated, and then one alarm information in each alarm information set is sent to the central management machine. The alarm information classification processing is realized, and the alarm information is sent through corresponding and unique channels according to different alarm information types, different sending equipment types or other classification modes, so that the problems of channel congestion and processing resource waste caused by repeated sending of a plurality of same alarm information in each unit area are avoided.
Referring to fig. 4, fig. 4 is a flowchart illustrating an intelligent security alarm information processing method according to another embodiment of the present application. Based on the above embodiment, in this embodiment, when there are a plurality of alarm information, before the step of sending the alarm information to the central management machine, the following steps are further included:
and S14, monitoring whether the number of the received alarm information which is not sent exceeds a preset threshold value in real time.
In this embodiment, in consideration of the problems that a processing burden is large and the alarm information is not uploaded timely if a large amount of alarm information is sent by the same network host in a real security scene, the embodiment provides a method for monitoring whether the number of received and unsent alarm information exceeds a preset threshold in real time. It can be understood that the number monitoring and determining operation is performed based on one network host, optionally, different network hosts determine corresponding preset thresholds according to their own configuration states, and optionally, intelligently allocate the preset thresholds corresponding to the respective network hosts according to different operation periods. In this embodiment, in order to avoid the problems that a large processing load may be caused by sending a large amount of alarm information by the same network host, the alarm information is not uploaded in time, and the like, and meanwhile, in order to enable the processing capability of the same network host to be utilized to the maximum, in this embodiment, the method is used for determining whether the number of the alarm information exceeding the preset threshold is the number of the received alarm information that is not sent, that is, the sent alarm information is not counted into the determination number of the preset threshold.
And S15, if the alarm information exceeds the preset threshold value, sending the subsequently received alarm information to the server, and sending the alarm information to the central management machine by the server.
In this embodiment, in consideration of the problems that a processing burden is large and alarm information is not uploaded timely if a large amount of alarm information is sent by the same network host in a real security scene, the present embodiment proposes that the alarm information which is received in real time and is not sent and exceeds a preset threshold is directly forwarded to the server and sent to the central management machine by the server, so as to avoid network congestion caused by a large amount of alarm information in the same time period. Meanwhile, if the number of alarm information which is received and not sent exceeds the preset threshold value, the alarm information is not forwarded to the server.
Referring to fig. 5, fig. 5 is a flowchart illustrating an intelligent security alarm information processing method according to another embodiment of the present application. Based on the foregoing embodiment, in this embodiment, the specific step of monitoring whether the number of the received and unsent alarm messages exceeds the preset threshold in real time includes:
s141, acquiring the device information of the alarm device corresponding to the received and unsent alarm information, and judging whether the number of the alarm devices exceeds a preset threshold value according to the number of different device information.
In this embodiment, similarly, as described in the above example, after classifying the alarm information according to one or more of the device ID, the device location, the device function, and the device attribute, an alarm information set based on the classification of one or more of the device ID, the device location, the device function, and the device attribute is obtained. Therefore, it is not necessary to determine whether the current number exceeds the preset threshold value according to a plurality of repeated alarm information, but it is only necessary to determine whether the number of alarm devices exceeds the preset threshold value according to the number of different device information. For example, when the alarm information sets generated by the devices with different IDs are obtained, whether the number of alarm devices exceeds a preset threshold is determined according to the number of different IDs, and for example, when the alarm information sets generated by the devices with different locations are obtained, whether the number of alarm devices exceeds a preset threshold is determined according to the number of different locations.
And S142, if the number of the alarm messages exceeds the preset threshold value, determining that the number of the alarm messages exceeds the preset threshold value.
In this embodiment, it is considered that a single piece of device information is used as a classification basis in the above embodiment, for example, when alarm information sets generated by devices with different IDs are obtained, whether the number of alarm devices exceeds a preset threshold is determined according to the number of different IDs, and for example, when alarm information sets generated by devices with different locations are obtained, whether the number of alarm devices exceeds a preset threshold is determined according to the number of different locations. In this embodiment, two or more pieces of device information may also be used as a classification basis, for example, when obtaining alarm information sets generated by devices with different IDs and different locations, it is determined whether the number of alarm devices exceeds a preset threshold according to the number of different IDs and different locations, and for example, when obtaining alarm information sets generated by devices with different IDs or different locations, it is determined whether the number of alarm devices exceeds a preset threshold according to the number of different IDs or different locations.
Referring to fig. 6, fig. 6 is a flowchart illustrating an intelligent security alarm information processing method according to another embodiment of the present application. Based on the foregoing embodiment, in this embodiment, if the threshold exceeds the preset threshold, the specific step of sending the subsequently received alarm information to the server includes:
and S151, determining the overflow quantity of the alarm information which is received and not transmitted and exceeds the preset threshold value.
In this embodiment, when the number of received and unsent alarm messages exceeds the preset threshold value, the number of received and unsent alarm messages exceeding the preset threshold value is further determined in real time, and it can be understood that, since each alarm message is dynamically transmitted or forwarded in the above manner, this embodiment only counts the number of spills in real time, not the spilled alarm messages themselves. Optionally, in this embodiment, a monitoring period for counting the number of overflows is preset, when the number of alarm information received and not sent in real time exceeds a preset threshold, timing is started, and the number of overflows of the alarm information received and not sent, which exceeds the preset threshold, is determined in one monitoring period. Optionally, a monitoring start number for counting the overflow number is preset, and when the number of the alarm information which is received in real time and is not sent exceeds a preset threshold and the start number which exceeds the preset threshold is greater than the monitoring start number, the overflow number of the alarm information which is received and is not sent and exceeds the preset threshold is counted.
And S152, sending the alarm information of the overflow quantity to a server.
In this embodiment, a sending period for sending the alarm information with the overflow amount to the server is preset, when it is monitored that the amount of the received alarm information which is not sent exceeds a preset threshold value in real time, timing is started, the alarm information with the overflow amount in one sending period is sent to the server at one time, and the alarm information with the overflow amount is collected in the next sending period and is sent to the server again. Optionally, the sending start number related to the overflow number is preset to determine, and when the number of received and unsent alarm messages exceeds a preset threshold and the start number exceeding the preset threshold is greater than the monitoring start number, the overflow number of the received and unsent alarm messages exceeding the preset threshold is counted, so that when the alarm messages of the overflow number are sent to the server, congestion of information forwarding due to a large overflow number is avoided.
Referring to fig. 7, fig. 7 is a flowchart illustrating an intelligent security alarm information processing method according to another embodiment of the present application. Based on the foregoing embodiment, in this embodiment, if the alarm information does not match, the step of forwarding the alarm information to the preset network host and sending the alarm information to the central management machine by the preset network host specifically includes the following steps:
and S31, searching a preset network host connected with the network host.
In this embodiment, in a security scenario, a plurality of network hosts are connected to one or more preset network hosts. For example, when a plurality of network hosts are connected to a preset network host, the preset network host connected to any one of the network hosts serves as a forwarding device for subsequent alarm information. For another example, when one network host is connected to a plurality of preset network hosts, the network host selects any one of the plurality of connected preset network hosts as a forwarding device for subsequent alarm information.
And S32, sending the alarm information to a preset network host.
In this embodiment, as described in the above example, when a plurality of network hosts are connected to one preset network host, the preset network host connected to any one of the network hosts serves as a forwarding device for subsequent alarm information, and at this time, when any one of the network hosts receives the alarm information, the alarm information is sent to the only preset network host. For another example, when one network host and a plurality of preset network hosts are connected, the network host selects any one preset network host from the plurality of connected preset network hosts as forwarding equipment for subsequent alarm information, and at this time, when the network host receives the alarm information, the network host forwards the alarm information to any one preset network host selected from the plurality of preset network hosts.
And S33, when the preset network host receives the alarm information, sending the alarm information to the central management machine.
Similarly, as described in the above example, when a plurality of network hosts are connected to one predetermined intelligent network host, the predetermined network host connected to any one of the network hosts serves as a forwarding device for subsequent alarm information, and at this time, when any one of the network hosts receives the alarm information, the alarm information is sent to the unique predetermined intelligent network host, and the unique predetermined network host uploads the alarm information to the central management machine. For another example, when one network host is connected to a plurality of preset network hosts, the network host selects any one of the preset network hosts as a forwarding device for subsequent alarm information, at this time, when the network host receives the alarm information, the alarm information is forwarded to any one of the preset network hosts, and then the selected preset network host uploads the alarm information to the central management machine, or the selected preset network host forwards the alarm information to another preset network host, and the other preset network host uploads the alarm information to the central management machine.
EXAMPLE III
Referring to fig. 8, fig. 8 shows a block diagram of a security device according to an embodiment of the present application. The invention also provides a security device 800, the security device 800 includes a memory 801, a processor 802 and a computer program stored on the memory and capable of running on the processor, when the computer program is executed by the processor, the steps of the security alarm information intelligent processing method of any one of the following items are realized:
and S1, when the network host receives the alarm information, judging whether the network host meets the preset condition.
In this embodiment, a plurality of network hosts are generally arranged in one security location or any unit area thereof, and each network host is used for managing and controlling a plurality of security sensors on one hand and uploading alarm information generated by the security sensors to a central management machine on the other hand. In the existing security alarm information reporting mechanism, when a network host receives alarm information, the alarm information may be directly uploaded to a central management machine, and if a plurality of network hosts receive alarm information generated by a plurality of security sensors in the same monitoring area, the central management machine may receive a plurality of repeated alarm information sent by the plurality of network hosts and aiming at the same monitoring area, so that certain interference may be brought to the central management machine in processing the alarm information. Therefore, in order to avoid the above technical problem, although any network host may receive the alarm information sent from the security sensor, when any network host receives the alarm information, it is determined whether the network host meets a preset condition, where the preset condition is used to determine whether the network host currently receiving the alarm information has the authority to upload the alarm information to the central management machine. It can be seen that, in this embodiment, when the security sensor sends the alarm information, if the plurality of network hosts receive the same alarm information, the plurality of network hosts determine their own rights according to the preset condition, so as to obtain the network host having the right to upload the alarm information to the central management machine and the network host not having the right to upload the alarm information to the central management machine.
Optionally, in this embodiment, when the plurality of network hosts receive the alarm information sent by the security sensor in the same area, the plurality of network hosts respectively determine whether themselves meet the preset condition, and meanwhile, each determined network host records the determination result, so that when the alarm information sent by the security sensor is received again, it is directly determined whether itself has the authority to upload the alarm information to the central management machine, thereby further improving the determination efficiency and saving processing resources and network resources.
And S2, if the alarm information is matched with the alarm information, sending the alarm information to the central management machine.
In this embodiment, if the network host meets the preset condition, it is determined that the network host has the authority to upload the alarm information to the central management machine, and thus the network host uploads the received alarm information to the central management machine in time. It can be seen that, in the present embodiment, the uploading target of the alarm information is not specified or unique, but is obtained according to the determination result of the preset condition.
In an optional embodiment, the preset condition is: the network host is a preset network host, and specifically, for example, the network host is configured as a preset network host within a period of use, or the network host is configured as a preset network host when being shipped from a factory, or the network host receives configuration upgrade as a preset network host during use, or the network host receives the alarm information and receives a designation of a central management machine as a preset network host before determining whether the preset condition is met, or the network host receives the alarm information and receives votes of other network hosts as a preset network host before determining whether the preset condition is met. Therefore, through a more flexible network host condition specification and judgment mode, the uploading object of the alarm information is more clear, and the alarm information uploaded to the central management machine is more accurate.
And S3, if the alarm information is not matched with the preset network host, forwarding the alarm information to the preset network host, and sending the alarm information to the central management machine by the preset network host.
In this embodiment, if the network host that receives the alarm information does not meet the preset condition, that is, it is determined that the network host does not have the authority to upload the alarm information to the central management machine, so that, in order to avoid that the network host delays uploading or cannot upload the alarm information to the central management machine when receiving the alarm information, in this embodiment, the network host forwards the alarm information to the preset network host in time, so that the preset network host sends the alarm information to the central management machine. It can be seen that, in the present embodiment, the uploading target of the alarm information is not specified or unique, but is obtained according to the determination result of the preset condition. In an optional embodiment, the preset network host is configured as a preset network host, specifically, for example, the network host is configured as a preset network host within a period of use, or the network host is configured as a preset network host when it leaves a factory, or the network host receives a configuration upgrade as a preset network host during use, or the network host receives the designation of a central management machine as a preset network host after receiving the alarm information and before determining whether the preset condition is met, or the network host receives the vote of another network host as a preset network host after receiving the alarm information and before determining whether the preset condition is met. Therefore, the alarm information is forwarded by the preset network host instead of the network host which does not accord with the preset condition in a more flexible preset network host appointed mode, so that the uploading object of the alarm information is more definite, and the alarm information uploaded to the central management machine is more accurate.
In this embodiment, the security device 800 may be a central management machine of a community property, and a control panel installed in each home is used as a network host of this embodiment, where the control panel is used to connect each function sensor in each home area, and when any function sensor sends out alarm information and uploads the alarm information to the control panel of this embodiment, the central management machine may execute the steps of the security alarm information intelligent processing method according to the above embodiment to manage and control the alarm information transmission of the control panel. For example, a door/window sensor is installed in a child bedroom of a home, and generates alarm information when the door/window sensor monitors a windowing signal in the morning period, and the door/window sensor is connected to a plurality of control panels of the home, so that the plurality of control panels of the home can receive the alarm information when the alarm information is generated, and at the moment, if the plurality of control panels upload the received alarm information to a central management machine, the situation that a plurality of repeated information is sent at the same time may occur. Therefore, in order to solve the above problems, the present embodiment determines the information uploading authority of each control panel receiving the alarm information, thereby determining a unique channel for sending the alarm information to the central management machine in one area, and avoiding the problems of channel congestion and processing resource waste caused by repeatedly sending the same alarm information by a plurality of control panels in the home area.
In this embodiment, the security device 800 may also be a central management machine in a storage place, and the control terminal installed in each storage area is used as the network host of this embodiment, and the control terminal is used to connect each function sensor in each storage area. Similarly, when any functional sensor sends out alarm information and uploads the alarm information to the control terminal of the embodiment, the central management machine can execute the steps of the intelligent security alarm information processing method according to the embodiment and manage and control the alarm information transmission of the control terminal, so that the alarm information in each warehousing area range can be only sent to the central management machine through a unique uploading channel, and the problems of channel congestion and processing resource waste caused by the fact that a plurality of control terminals in each warehousing area range repeatedly send the same alarm information are avoided.
The method has the advantages that whether the network host meets the preset conditions or not is judged by recognizing that the network host receives the alarm information; if yes, sending the alarm information to a central management machine; if the alarm information does not meet the preset requirement, the alarm information is forwarded to the preset network host, and the preset network host sends the alarm information to the central management machine, so that the alarm information of each unit area is only sent to the central management machine through a unique uploading channel, and the problems of channel congestion and processing resource waste caused by the fact that a plurality of devices in each unit area repeatedly send the same alarm information are avoided.
Example four
Referring to fig. 9, fig. 9 is a block diagram illustrating a computer-readable storage medium according to an embodiment of the present application. The invention also provides a computer-readable storage medium 900, the computer-readable storage medium 900 stores a security alarm information processing program 901, and when the security alarm information processing program 901 is executed by a processor, the steps of the security alarm information intelligent processing method as described in any one of the above are realized.
It should be noted that the media embodiment and the method embodiment belong to the same concept, and specific implementation processes thereof are detailed in the method embodiment, and technical features in the method embodiment are correspondingly applicable in the media embodiment, which is not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. An intelligent processing method for security alarm information is characterized by comprising the following steps:
when the network host receives the alarm information, judging whether the network host meets a preset condition or not;
if yes, sending the alarm information to a central management machine;
if not, forwarding the alarm information to a preset network host, and sending the alarm information to the central management machine by the preset network host.
2. The intelligent processing method for security alarm information according to claim 1, wherein the preset condition is that the network host is the preset network host.
3. The intelligent processing method for security alarm information according to claim 1, wherein when the alarm information is multiple, before the step of sending the alarm information to the central management machine, the method further comprises the following steps:
acquiring equipment information of a plurality of pieces of alarm information, and judging whether alarm equipment corresponding to the plurality of pieces of equipment information is the same alarm equipment;
if the alarm equipment is the same alarm equipment, only one alarm information is sent to the central management machine;
and if the alarm devices are different, sending the alarm information corresponding to all the different alarm devices to the central management machine.
4. The intelligent processing method for the security alarm information according to claim 3, wherein if the alarm devices are different alarm devices, the step of sending the alarm information corresponding to all the different alarm devices specifically comprises the following steps:
classifying the alarm information according to the equipment information to generate at least one alarm information set, wherein each alarm information set only contains the alarm information with the same equipment information;
and sending one alarm information in each alarm information set to the central management machine.
5. The intelligent processing method for the security alarm information according to claim 1, wherein when the alarm information is multiple, before the step of sending the alarm information to the central management machine, the method further comprises the following steps:
monitoring whether the number of the received and unsent alarm information exceeds a preset threshold value in real time;
and if the alarm information exceeds the preset threshold value, sending the subsequently received alarm information to a server, and sending the alarm information to the central management machine by the server.
6. The intelligent processing method for the security alarm information according to claim 5, wherein the specific step of monitoring whether the number of the alarm information which is received and not sent in real time exceeds a preset threshold value comprises:
acquiring the received and unsent equipment information of alarm equipment corresponding to the alarm information, and judging whether the number of the alarm equipment exceeds a preset threshold value according to the number of different equipment information;
and if the number of the alarm messages exceeds the preset threshold value, determining that the number of the alarm messages exceeds the preset threshold value.
7. The intelligent processing method for the security alarm information according to claim 5, wherein if the preset threshold value is exceeded, the specific step of sending the subsequently received alarm information to the server includes:
determining the overflow quantity of the received and unsent alarm information exceeding the preset threshold value;
sending the overflow amount of the alert information to the server.
8. The intelligent processing method for security alarm information according to claim 1, wherein if the alarm information does not match, the step of forwarding the alarm information to a preset network host and sending the alarm information to the central management machine by the preset network host specifically includes the following steps:
searching the preset network host connected with the network host;
sending the alarm information to the preset network host;
and when the preset network host receives the alarm information, sending the alarm information to the central management machine.
9. A security device, characterized in that the security device comprises a memory, a processor and a computer program stored on the memory and operable on the processor, wherein the computer program, when executed by the processor, implements the steps of the intelligent security alarm information processing method according to any one of claims 1 to 8.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon an intelligent security alarm information processing program, which when executed by a processor implements the steps of the intelligent security alarm information processing method according to any one of claims 1 to 8.
CN202110388443.2A 2021-04-12 2021-04-12 Security alarm information intelligent processing method, security equipment and computer readable storage medium Active CN112967481B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110388443.2A CN112967481B (en) 2021-04-12 2021-04-12 Security alarm information intelligent processing method, security equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110388443.2A CN112967481B (en) 2021-04-12 2021-04-12 Security alarm information intelligent processing method, security equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN112967481A true CN112967481A (en) 2021-06-15
CN112967481B CN112967481B (en) 2023-07-25

Family

ID=76280110

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110388443.2A Active CN112967481B (en) 2021-04-12 2021-04-12 Security alarm information intelligent processing method, security equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN112967481B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090248967A1 (en) * 2008-03-31 2009-10-01 Tyco Safety Products Canada Ltd. Portable alarm configuration/update tool
CN201590144U (en) * 2009-12-01 2010-09-22 深圳市赛邦特通信科技有限公司 Intelligent alarm device and system
CN102082677A (en) * 2009-11-30 2011-06-01 中国移动通信集团天津有限公司 Alarm information processing method, device and system
CN105513266A (en) * 2015-12-15 2016-04-20 杭州万联网络科技有限公司 Monitoring and alarming system
CN109870920A (en) * 2019-03-08 2019-06-11 金蝉科技(江苏)股份有限公司 A kind of remote monitoring system and its communication means of smart home
CN110597693A (en) * 2019-08-06 2019-12-20 浙江大华技术股份有限公司 Alarm information sending method, device, equipment, system and storage medium
CN114376512A (en) * 2020-10-20 2022-04-22 深圳迈瑞生物医疗电子股份有限公司 Alarm processing method, central display device and monitoring or treating device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090248967A1 (en) * 2008-03-31 2009-10-01 Tyco Safety Products Canada Ltd. Portable alarm configuration/update tool
CN102082677A (en) * 2009-11-30 2011-06-01 中国移动通信集团天津有限公司 Alarm information processing method, device and system
CN201590144U (en) * 2009-12-01 2010-09-22 深圳市赛邦特通信科技有限公司 Intelligent alarm device and system
CN105513266A (en) * 2015-12-15 2016-04-20 杭州万联网络科技有限公司 Monitoring and alarming system
CN109870920A (en) * 2019-03-08 2019-06-11 金蝉科技(江苏)股份有限公司 A kind of remote monitoring system and its communication means of smart home
CN110597693A (en) * 2019-08-06 2019-12-20 浙江大华技术股份有限公司 Alarm information sending method, device, equipment, system and storage medium
CN114376512A (en) * 2020-10-20 2022-04-22 深圳迈瑞生物医疗电子股份有限公司 Alarm processing method, central display device and monitoring or treating device

Also Published As

Publication number Publication date
CN112967481B (en) 2023-07-25

Similar Documents

Publication Publication Date Title
US10783768B2 (en) Providing internet access through a property monitoring system
US20080196083A1 (en) Sensor discovery and configuration
JP6442051B2 (en) How to detect attacks on computer networks
CN110351198B (en) Flow regulation method, data transmission system, storage medium and equipment
CN109753034B (en) Control method, control device, electronic equipment and storage medium
US8271102B2 (en) Control of concept zones
CN107959812B (en) Monitoring data storage method, device and system and routing equipment
CN112671870B (en) Data processing method and device, electronic equipment and storage medium
US20230084594A1 (en) Gateway With Backup Power And Communications System
CN111083676B (en) Wireless linkage monitoring method, device and system
EP3647982B1 (en) Cyber attack evaluation method and cyber attack evaluation device
CN107911229B (en) Running state change reminding method and device, electronic equipment and storage medium
CN112967481B (en) Security alarm information intelligent processing method, security equipment and computer readable storage medium
CN113709083A (en) Network attack detection control method, device, base station and computer storage medium
CN116225834A (en) Alarm information sending method and device, storage medium and electronic device
CN110521233A (en) Network failure discovery
EP3236442A1 (en) Anti-theft method and device
CN112199142A (en) Message display method, device, equipment and computer readable medium
CN112004161A (en) Processing method and device of address resources, terminal equipment and storage medium
CN112866172A (en) Safety protection method and device, smart home system and computer readable medium
CN111766786B (en) Intelligent control method and controller
WO2024000754A1 (en) Sensing event reporting method and apparatus, storage medium, and electronic apparatus
US11854370B1 (en) Security sharing systems and methods
CN109302403B (en) Network intrusion detection method, system, device and computer readable storage medium
CN114338189B (en) Situation awareness defense method, device and system based on node topology relation chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant