CN113055843A - Security communication method and device - Google Patents
Security communication method and device Download PDFInfo
- Publication number
- CN113055843A CN113055843A CN202110281194.7A CN202110281194A CN113055843A CN 113055843 A CN113055843 A CN 113055843A CN 202110281194 A CN202110281194 A CN 202110281194A CN 113055843 A CN113055843 A CN 113055843A
- Authority
- CN
- China
- Prior art keywords
- early warning
- data
- security
- terminal
- real
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/38—Services specially adapted for particular environments, situations or purposes for collecting sensor information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a security communication method and device. Wherein, the method comprises the following steps: acquiring real-time sensing data; generating security data according to the real-time sensing data and preset rule data; sending the security data to a first terminal for early warning analysis to obtain early warning information; and sending the early warning information and the security data to a second terminal. The invention solves the technical problems that in the prior art, the security data only show the security early warning information, but not show and send the original security data and the early warning condition together, so that the security communication efficiency is reduced.
Description
Technical Field
The invention relates to the field of data communication, in particular to a security communication method and device.
Background
With the continuous development of intellectualization and informatization, the intelligent communication method is increasingly applied to life, work and study of people, for example, in the field of security data processing, security data are often collected in real time through a sensor, and corresponding security data are analyzed and early warned.
At present, in the process of security data communication, a sensor is usually adopted to collect security data in real time and perform early warning on the security data, but the early-warning security data is only displayed or reminded through a related terminal and is not sent and analyzed together with the security data, meanwhile, in the security data communication mode in the prior art, the collection and the acquisition of the security data are only acquired through the sensor data in related environments, the acquisition channel is single, and the data limitation is large.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a security communication method and a security communication device, which are used for at least solving the technical problems that in the prior art, security data only show security early warning information, original security data and early warning conditions cannot be shown and sent together, and the security communication efficiency is reduced.
According to an aspect of an embodiment of the present invention, a security communication method is provided, including: acquiring real-time sensing data; generating security data according to the real-time sensing data and preset rule data; sending the security data to a first terminal for early warning analysis to obtain early warning information; and sending the early warning information and the security data to a second terminal.
Optionally, the real-time sensing data includes: sensor data, server data.
Optionally, the sending the security data to the first terminal for early warning analysis, and obtaining early warning information includes: acquiring a preset early warning rule stored in the first terminal; and analyzing the security data according to the preset early warning rule to obtain the early warning information.
Optionally, the preset early warning rule includes: image rules, numerical rules.
According to another aspect of the embodiments of the present invention, there is also provided a security communication apparatus, including: the acquisition module is used for acquiring real-time sensing data; the generating module is used for generating security data according to the real-time sensing data and preset rule data; the first sending module is used for sending the security data to a first terminal for early warning analysis to obtain early warning information; and the second sending module is used for sending the early warning information and the security data to a second terminal.
Optionally, the real-time sensing data includes: sensor data, server data.
Optionally, the first sending module includes: the acquisition unit is used for acquiring a preset early warning rule stored in the first terminal; and the analysis unit is used for analyzing the security data according to the preset early warning rule to obtain the early warning information.
Optionally, the preset early warning rule includes: image rules, numerical rules.
According to another aspect of the embodiments of the present invention, there is also provided a computer program product including instructions that, when run on a computer, cause the computer to perform a security communication method.
According to another aspect of the embodiment of the present invention, a non-volatile storage medium is further provided, where the non-volatile storage medium includes a stored program, and the program controls, when running, a device in which the non-volatile storage medium is located to execute a security communication method.
In the embodiment of the invention, the acquisition of real-time sensing data is adopted; generating security data according to the real-time sensing data and preset rule data; sending the security data to a first terminal for early warning analysis to obtain early warning information; the mode that the early warning information and the security data are sent to the second terminal solves the technical problem that in the prior art, the security data only show the security early warning information, but not show and send the original security data and the early warning condition together, and the security communication efficiency is reduced.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
fig. 1 is a flowchart of a security communication method according to an embodiment of the present invention;
fig. 2 is a block diagram of a security communication method according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In accordance with an embodiment of the present invention, there is provided a method embodiment of a security communication method, it should be noted that the steps illustrated in the flowchart of the accompanying drawings may be executed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowchart, in some cases, the steps illustrated or described may be executed in an order different than that described herein.
Example one
Fig. 1 is a flowchart of a security communication method according to an embodiment of the present invention, and as shown in fig. 1, the method includes the following steps:
and step S102, acquiring real-time sensing data.
Optionally, the real-time sensing data includes: sensor data, server data.
Specifically, in order to transmit the security data to a specified terminal in a specific manner, the embodiment of the present invention needs to first acquire real-time sensing data, which is used as original data for subsequent generation of the security data and analysis of the early warning information. The sensing data can be sensor data transmitted in real time through a security sensor or server data transmitted through remote data, and the server data records a plurality of security sensing data of a target security area in real time.
And S104, generating security data according to the real-time sensing data and preset rule data.
Specifically, in order to convert the acquired real-time sensing data into security data, the embodiment of the invention needs to process the real-time sensing data according to preset rule data, wherein the preset rule data is a rule requirement with pertinence on the real-time sensing data according to the requirement of a security scene.
And S106, sending the security data to a first terminal for early warning analysis to obtain early warning information.
Optionally, the sending the security data to the first terminal for early warning analysis, and obtaining early warning information includes: acquiring a preset early warning rule stored in the first terminal; and analyzing the security data according to the preset early warning rule to obtain the early warning information.
Optionally, the preset early warning rule includes: image rules, numerical rules.
Specifically, in order to obtain the early warning information, after the security data is obtained in the embodiment of the present invention, a preset early warning rule stored in the first terminal is obtained; and analyzing the security data according to the preset early warning rule to obtain the early warning information, wherein the preset early warning rule comprises an image rule and a numerical value rule, the image rule is used as a standard in the aspect of early warning images according to the image data during early warning, and the numerical value rule is used as a standard for early warning according to the numerical value during early warning, so that the early warning information is judged and generated.
And S108, sending the early warning information and the security data to a second terminal.
Specifically, after the security data and the early warning information are acquired, the two data need to be sent to the second terminal together, and the second terminal can be a user terminal or a server terminal and is used for storing the related security data.
Through the embodiment, the technical problems that in the prior art, the security data only show the security early warning information, the original security data and the early warning condition cannot be shown and sent together, and the security communication efficiency is reduced are solved.
Example two
Fig. 2 is a block diagram of a security communication method according to an embodiment of the present invention, and as shown in fig. 2, the apparatus includes:
and the acquisition module 20 is used for acquiring real-time sensing data.
Optionally, the real-time sensing data includes: sensor data, server data.
Specifically, in order to transmit the security data to a specified terminal in a specific manner, the embodiment of the present invention needs to first acquire real-time sensing data, which is used as original data for subsequent generation of the security data and analysis of the early warning information. The sensing data can be sensor data transmitted in real time through a security sensor or server data transmitted through remote data, and the server data records a plurality of security sensing data of a target security area in real time.
And the generating module 22 is configured to generate security data according to the real-time sensing data and preset rule data.
Specifically, in order to convert the acquired real-time sensing data into security data, the embodiment of the invention needs to process the real-time sensing data according to preset rule data, wherein the preset rule data is a rule requirement with pertinence on the real-time sensing data according to the requirement of a security scene.
And the first sending module 24 is configured to send the security data to a first terminal for early warning analysis, so as to obtain early warning information.
Optionally, the first sending module includes: the acquisition unit is used for acquiring a preset early warning rule stored in the first terminal; and the analysis unit is used for analyzing the security data according to the preset early warning rule to obtain the early warning information.
Optionally, the preset early warning rule includes: image rules, numerical rules.
Specifically, in order to obtain the early warning information, after the security data is obtained in the embodiment of the present invention, a preset early warning rule stored in the first terminal is obtained; and analyzing the security data according to the preset early warning rule to obtain the early warning information, wherein the preset early warning rule comprises an image rule and a numerical value rule, the image rule is used as a standard in the aspect of early warning images according to the image data during early warning, and the numerical value rule is used as a standard for early warning according to the numerical value during early warning, so that the early warning information is judged and generated.
And the second sending module 26 is configured to send the early warning information and the security data to a second terminal.
Specifically, after the security data and the early warning information are acquired, the two data need to be sent to the second terminal together, and the second terminal can be a user terminal or a server terminal and is used for storing the related security data.
According to another aspect of the embodiments of the present invention, there is also provided a computer program product including instructions that, when run on a computer, cause the computer to perform a security communication method.
Specifically, the security communication method includes: acquiring real-time sensing data; generating security data according to the real-time sensing data and preset rule data; sending the security data to a first terminal for early warning analysis to obtain early warning information; and sending the early warning information and the security data to a second terminal.
According to another aspect of the embodiment of the present invention, a non-volatile storage medium is further provided, where the non-volatile storage medium includes a stored program, and the program controls, when running, a device in which the non-volatile storage medium is located to execute a security communication method.
Specifically, the security communication method includes: acquiring real-time sensing data; generating security data according to the real-time sensing data and preset rule data; sending the security data to a first terminal for early warning analysis to obtain early warning information; and sending the early warning information and the security data to a second terminal.
Through the embodiment, the technical problems that in the prior art, the security data only show the security early warning information, the original security data and the early warning condition cannot be shown and sent together, and the security communication efficiency is reduced are solved.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.
Claims (10)
1. A security communication method is characterized by comprising the following steps:
acquiring real-time sensing data;
generating security data according to the real-time sensing data and preset rule data;
sending the security data to a first terminal for early warning analysis to obtain early warning information;
and sending the early warning information and the security data to a second terminal.
2. The method of claim 1, wherein the real-time sensory data comprises: sensor data, server data.
3. The method according to claim 1, wherein the sending the security data to a first terminal for early warning analysis to obtain early warning information comprises:
acquiring a preset early warning rule stored in the first terminal;
and analyzing the security data according to the preset early warning rule to obtain the early warning information.
4. The method of claim 3, wherein the pre-set pre-warning rules comprise: image rules, numerical rules.
5. A security communication device, comprising:
the acquisition module is used for acquiring real-time sensing data;
the generating module is used for generating security data according to the real-time sensing data and preset rule data;
the first sending module is used for sending the security data to a first terminal for early warning analysis to obtain early warning information;
and the second sending module is used for sending the early warning information and the security data to a second terminal.
6. The apparatus of claim 5, wherein the real-time sensory data comprises: sensor data, server data.
7. The apparatus of claim 5, wherein the first sending module comprises:
the acquisition unit is used for acquiring a preset early warning rule stored in the first terminal;
and the analysis unit is used for analyzing the security data according to the preset early warning rule to obtain the early warning information.
8. The apparatus of claim 7, wherein the preset pre-warning rules comprise: image rules, numerical rules.
9. A computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any one of claims 1 to 4.
10. A non-volatile storage medium, comprising a stored program, wherein the program, when executed, controls an apparatus in which the non-volatile storage medium is located to perform the method of any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110281194.7A CN113055843A (en) | 2021-03-16 | 2021-03-16 | Security communication method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110281194.7A CN113055843A (en) | 2021-03-16 | 2021-03-16 | Security communication method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113055843A true CN113055843A (en) | 2021-06-29 |
Family
ID=76512643
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110281194.7A Withdrawn CN113055843A (en) | 2021-03-16 | 2021-03-16 | Security communication method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113055843A (en) |
-
2021
- 2021-03-16 CN CN202110281194.7A patent/CN113055843A/en not_active Withdrawn
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2688296B1 (en) | Video monitoring system and method | |
US9740940B2 (en) | Event triggered location based participatory surveillance | |
CN104967875A (en) | Method and device for controlling monitoring video checking authority | |
CN104836781A (en) | Method distinguishing identities of access users, and device | |
CN111010547A (en) | Target object tracking method and device, storage medium and electronic device | |
CN112906806A (en) | Data optimization method and device based on neural network | |
CN113808037A (en) | Image optimization method and device | |
CN114999092A (en) | Disaster early warning method and device based on multiple forest fire model | |
CN112836807A (en) | Data processing method and device based on neural network | |
CN111506769B (en) | Video file processing method and device, storage medium and electronic device | |
CN113055843A (en) | Security communication method and device | |
CN109120896B (en) | Security video monitoring guard system | |
CN111104952A (en) | Method, system and device for identifying food types and refrigerator | |
CN114416786A (en) | Stream data processing method and device, storage medium and computer equipment | |
CN112860956A (en) | Multivariate environmental data analysis method and system | |
CN110381339B (en) | Picture transmission method and device | |
CN113313615A (en) | Method and device for quantitatively grading and grading enterprise judicial risks | |
CN112910595A (en) | Real-time communication method and device | |
CN106469086B (en) | Event processing method and device | |
CN113535655A (en) | Log analysis method and device | |
CN113342754A (en) | Method and device for extracting log abnormal data | |
CN112863144A (en) | Environment early warning method and device | |
CN113506359A (en) | Animation element acquisition method and device | |
CN113537190A (en) | Multi-image identification method and device | |
CN113746800A (en) | Intelligent multi-platform cooperative defense method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20210629 |