CN113055843A - Security communication method and device - Google Patents

Security communication method and device Download PDF

Info

Publication number
CN113055843A
CN113055843A CN202110281194.7A CN202110281194A CN113055843A CN 113055843 A CN113055843 A CN 113055843A CN 202110281194 A CN202110281194 A CN 202110281194A CN 113055843 A CN113055843 A CN 113055843A
Authority
CN
China
Prior art keywords
early warning
data
security
terminal
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110281194.7A
Other languages
Chinese (zh)
Inventor
谢炳泉
丁鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiang Jianliang
Original Assignee
Jiang Jianliang
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiang Jianliang filed Critical Jiang Jianliang
Priority to CN202110281194.7A priority Critical patent/CN113055843A/en
Publication of CN113055843A publication Critical patent/CN113055843A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a security communication method and device. Wherein, the method comprises the following steps: acquiring real-time sensing data; generating security data according to the real-time sensing data and preset rule data; sending the security data to a first terminal for early warning analysis to obtain early warning information; and sending the early warning information and the security data to a second terminal. The invention solves the technical problems that in the prior art, the security data only show the security early warning information, but not show and send the original security data and the early warning condition together, so that the security communication efficiency is reduced.

Description

Security communication method and device
Technical Field
The invention relates to the field of data communication, in particular to a security communication method and device.
Background
With the continuous development of intellectualization and informatization, the intelligent communication method is increasingly applied to life, work and study of people, for example, in the field of security data processing, security data are often collected in real time through a sensor, and corresponding security data are analyzed and early warned.
At present, in the process of security data communication, a sensor is usually adopted to collect security data in real time and perform early warning on the security data, but the early-warning security data is only displayed or reminded through a related terminal and is not sent and analyzed together with the security data, meanwhile, in the security data communication mode in the prior art, the collection and the acquisition of the security data are only acquired through the sensor data in related environments, the acquisition channel is single, and the data limitation is large.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a security communication method and a security communication device, which are used for at least solving the technical problems that in the prior art, security data only show security early warning information, original security data and early warning conditions cannot be shown and sent together, and the security communication efficiency is reduced.
According to an aspect of an embodiment of the present invention, a security communication method is provided, including: acquiring real-time sensing data; generating security data according to the real-time sensing data and preset rule data; sending the security data to a first terminal for early warning analysis to obtain early warning information; and sending the early warning information and the security data to a second terminal.
Optionally, the real-time sensing data includes: sensor data, server data.
Optionally, the sending the security data to the first terminal for early warning analysis, and obtaining early warning information includes: acquiring a preset early warning rule stored in the first terminal; and analyzing the security data according to the preset early warning rule to obtain the early warning information.
Optionally, the preset early warning rule includes: image rules, numerical rules.
According to another aspect of the embodiments of the present invention, there is also provided a security communication apparatus, including: the acquisition module is used for acquiring real-time sensing data; the generating module is used for generating security data according to the real-time sensing data and preset rule data; the first sending module is used for sending the security data to a first terminal for early warning analysis to obtain early warning information; and the second sending module is used for sending the early warning information and the security data to a second terminal.
Optionally, the real-time sensing data includes: sensor data, server data.
Optionally, the first sending module includes: the acquisition unit is used for acquiring a preset early warning rule stored in the first terminal; and the analysis unit is used for analyzing the security data according to the preset early warning rule to obtain the early warning information.
Optionally, the preset early warning rule includes: image rules, numerical rules.
According to another aspect of the embodiments of the present invention, there is also provided a computer program product including instructions that, when run on a computer, cause the computer to perform a security communication method.
According to another aspect of the embodiment of the present invention, a non-volatile storage medium is further provided, where the non-volatile storage medium includes a stored program, and the program controls, when running, a device in which the non-volatile storage medium is located to execute a security communication method.
In the embodiment of the invention, the acquisition of real-time sensing data is adopted; generating security data according to the real-time sensing data and preset rule data; sending the security data to a first terminal for early warning analysis to obtain early warning information; the mode that the early warning information and the security data are sent to the second terminal solves the technical problem that in the prior art, the security data only show the security early warning information, but not show and send the original security data and the early warning condition together, and the security communication efficiency is reduced.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
fig. 1 is a flowchart of a security communication method according to an embodiment of the present invention;
fig. 2 is a block diagram of a security communication method according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In accordance with an embodiment of the present invention, there is provided a method embodiment of a security communication method, it should be noted that the steps illustrated in the flowchart of the accompanying drawings may be executed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowchart, in some cases, the steps illustrated or described may be executed in an order different than that described herein.
Example one
Fig. 1 is a flowchart of a security communication method according to an embodiment of the present invention, and as shown in fig. 1, the method includes the following steps:
and step S102, acquiring real-time sensing data.
Optionally, the real-time sensing data includes: sensor data, server data.
Specifically, in order to transmit the security data to a specified terminal in a specific manner, the embodiment of the present invention needs to first acquire real-time sensing data, which is used as original data for subsequent generation of the security data and analysis of the early warning information. The sensing data can be sensor data transmitted in real time through a security sensor or server data transmitted through remote data, and the server data records a plurality of security sensing data of a target security area in real time.
And S104, generating security data according to the real-time sensing data and preset rule data.
Specifically, in order to convert the acquired real-time sensing data into security data, the embodiment of the invention needs to process the real-time sensing data according to preset rule data, wherein the preset rule data is a rule requirement with pertinence on the real-time sensing data according to the requirement of a security scene.
And S106, sending the security data to a first terminal for early warning analysis to obtain early warning information.
Optionally, the sending the security data to the first terminal for early warning analysis, and obtaining early warning information includes: acquiring a preset early warning rule stored in the first terminal; and analyzing the security data according to the preset early warning rule to obtain the early warning information.
Optionally, the preset early warning rule includes: image rules, numerical rules.
Specifically, in order to obtain the early warning information, after the security data is obtained in the embodiment of the present invention, a preset early warning rule stored in the first terminal is obtained; and analyzing the security data according to the preset early warning rule to obtain the early warning information, wherein the preset early warning rule comprises an image rule and a numerical value rule, the image rule is used as a standard in the aspect of early warning images according to the image data during early warning, and the numerical value rule is used as a standard for early warning according to the numerical value during early warning, so that the early warning information is judged and generated.
And S108, sending the early warning information and the security data to a second terminal.
Specifically, after the security data and the early warning information are acquired, the two data need to be sent to the second terminal together, and the second terminal can be a user terminal or a server terminal and is used for storing the related security data.
Through the embodiment, the technical problems that in the prior art, the security data only show the security early warning information, the original security data and the early warning condition cannot be shown and sent together, and the security communication efficiency is reduced are solved.
Example two
Fig. 2 is a block diagram of a security communication method according to an embodiment of the present invention, and as shown in fig. 2, the apparatus includes:
and the acquisition module 20 is used for acquiring real-time sensing data.
Optionally, the real-time sensing data includes: sensor data, server data.
Specifically, in order to transmit the security data to a specified terminal in a specific manner, the embodiment of the present invention needs to first acquire real-time sensing data, which is used as original data for subsequent generation of the security data and analysis of the early warning information. The sensing data can be sensor data transmitted in real time through a security sensor or server data transmitted through remote data, and the server data records a plurality of security sensing data of a target security area in real time.
And the generating module 22 is configured to generate security data according to the real-time sensing data and preset rule data.
Specifically, in order to convert the acquired real-time sensing data into security data, the embodiment of the invention needs to process the real-time sensing data according to preset rule data, wherein the preset rule data is a rule requirement with pertinence on the real-time sensing data according to the requirement of a security scene.
And the first sending module 24 is configured to send the security data to a first terminal for early warning analysis, so as to obtain early warning information.
Optionally, the first sending module includes: the acquisition unit is used for acquiring a preset early warning rule stored in the first terminal; and the analysis unit is used for analyzing the security data according to the preset early warning rule to obtain the early warning information.
Optionally, the preset early warning rule includes: image rules, numerical rules.
Specifically, in order to obtain the early warning information, after the security data is obtained in the embodiment of the present invention, a preset early warning rule stored in the first terminal is obtained; and analyzing the security data according to the preset early warning rule to obtain the early warning information, wherein the preset early warning rule comprises an image rule and a numerical value rule, the image rule is used as a standard in the aspect of early warning images according to the image data during early warning, and the numerical value rule is used as a standard for early warning according to the numerical value during early warning, so that the early warning information is judged and generated.
And the second sending module 26 is configured to send the early warning information and the security data to a second terminal.
Specifically, after the security data and the early warning information are acquired, the two data need to be sent to the second terminal together, and the second terminal can be a user terminal or a server terminal and is used for storing the related security data.
According to another aspect of the embodiments of the present invention, there is also provided a computer program product including instructions that, when run on a computer, cause the computer to perform a security communication method.
Specifically, the security communication method includes: acquiring real-time sensing data; generating security data according to the real-time sensing data and preset rule data; sending the security data to a first terminal for early warning analysis to obtain early warning information; and sending the early warning information and the security data to a second terminal.
According to another aspect of the embodiment of the present invention, a non-volatile storage medium is further provided, where the non-volatile storage medium includes a stored program, and the program controls, when running, a device in which the non-volatile storage medium is located to execute a security communication method.
Specifically, the security communication method includes: acquiring real-time sensing data; generating security data according to the real-time sensing data and preset rule data; sending the security data to a first terminal for early warning analysis to obtain early warning information; and sending the early warning information and the security data to a second terminal.
Through the embodiment, the technical problems that in the prior art, the security data only show the security early warning information, the original security data and the early warning condition cannot be shown and sent together, and the security communication efficiency is reduced are solved.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (10)

1. A security communication method is characterized by comprising the following steps:
acquiring real-time sensing data;
generating security data according to the real-time sensing data and preset rule data;
sending the security data to a first terminal for early warning analysis to obtain early warning information;
and sending the early warning information and the security data to a second terminal.
2. The method of claim 1, wherein the real-time sensory data comprises: sensor data, server data.
3. The method according to claim 1, wherein the sending the security data to a first terminal for early warning analysis to obtain early warning information comprises:
acquiring a preset early warning rule stored in the first terminal;
and analyzing the security data according to the preset early warning rule to obtain the early warning information.
4. The method of claim 3, wherein the pre-set pre-warning rules comprise: image rules, numerical rules.
5. A security communication device, comprising:
the acquisition module is used for acquiring real-time sensing data;
the generating module is used for generating security data according to the real-time sensing data and preset rule data;
the first sending module is used for sending the security data to a first terminal for early warning analysis to obtain early warning information;
and the second sending module is used for sending the early warning information and the security data to a second terminal.
6. The apparatus of claim 5, wherein the real-time sensory data comprises: sensor data, server data.
7. The apparatus of claim 5, wherein the first sending module comprises:
the acquisition unit is used for acquiring a preset early warning rule stored in the first terminal;
and the analysis unit is used for analyzing the security data according to the preset early warning rule to obtain the early warning information.
8. The apparatus of claim 7, wherein the preset pre-warning rules comprise: image rules, numerical rules.
9. A computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any one of claims 1 to 4.
10. A non-volatile storage medium, comprising a stored program, wherein the program, when executed, controls an apparatus in which the non-volatile storage medium is located to perform the method of any one of claims 1 to 4.
CN202110281194.7A 2021-03-16 2021-03-16 Security communication method and device Withdrawn CN113055843A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110281194.7A CN113055843A (en) 2021-03-16 2021-03-16 Security communication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110281194.7A CN113055843A (en) 2021-03-16 2021-03-16 Security communication method and device

Publications (1)

Publication Number Publication Date
CN113055843A true CN113055843A (en) 2021-06-29

Family

ID=76512643

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110281194.7A Withdrawn CN113055843A (en) 2021-03-16 2021-03-16 Security communication method and device

Country Status (1)

Country Link
CN (1) CN113055843A (en)

Similar Documents

Publication Publication Date Title
EP2688296B1 (en) Video monitoring system and method
US9740940B2 (en) Event triggered location based participatory surveillance
CN104967875A (en) Method and device for controlling monitoring video checking authority
CN104836781A (en) Method distinguishing identities of access users, and device
CN111010547A (en) Target object tracking method and device, storage medium and electronic device
CN112906806A (en) Data optimization method and device based on neural network
CN113808037A (en) Image optimization method and device
CN114999092A (en) Disaster early warning method and device based on multiple forest fire model
CN112836807A (en) Data processing method and device based on neural network
CN111506769B (en) Video file processing method and device, storage medium and electronic device
CN113055843A (en) Security communication method and device
CN109120896B (en) Security video monitoring guard system
CN111104952A (en) Method, system and device for identifying food types and refrigerator
CN114416786A (en) Stream data processing method and device, storage medium and computer equipment
CN112860956A (en) Multivariate environmental data analysis method and system
CN110381339B (en) Picture transmission method and device
CN113313615A (en) Method and device for quantitatively grading and grading enterprise judicial risks
CN112910595A (en) Real-time communication method and device
CN106469086B (en) Event processing method and device
CN113535655A (en) Log analysis method and device
CN113342754A (en) Method and device for extracting log abnormal data
CN112863144A (en) Environment early warning method and device
CN113506359A (en) Animation element acquisition method and device
CN113537190A (en) Multi-image identification method and device
CN113746800A (en) Intelligent multi-platform cooperative defense method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20210629