CN113341856B - Security monitoring system, security monitoring method and security monitoring equipment - Google Patents

Security monitoring system, security monitoring method and security monitoring equipment Download PDF

Info

Publication number
CN113341856B
CN113341856B CN202110699893.3A CN202110699893A CN113341856B CN 113341856 B CN113341856 B CN 113341856B CN 202110699893 A CN202110699893 A CN 202110699893A CN 113341856 B CN113341856 B CN 113341856B
Authority
CN
China
Prior art keywords
security
cloud server
security monitoring
equipment
image data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110699893.3A
Other languages
Chinese (zh)
Other versions
CN113341856A (en
Inventor
单志胜
蒋海青
金静阳
陈晓锋
邵峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Ezviz Software Co Ltd
Original Assignee
Hangzhou Ezviz Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Ezviz Software Co Ltd filed Critical Hangzhou Ezviz Software Co Ltd
Priority to CN202110699893.3A priority Critical patent/CN113341856B/en
Publication of CN113341856A publication Critical patent/CN113341856A/en
Application granted granted Critical
Publication of CN113341856B publication Critical patent/CN113341856B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/048Monitoring; Safety

Abstract

The embodiment of the application provides a security monitoring system, a security monitoring method and security monitoring equipment, wherein the security monitoring system comprises portable equipment, security monitoring equipment and a cloud server; the portable equipment is used for sending a security protection request to the cloud server; the cloud server is used for receiving the security request, determining security monitoring equipment corresponding to the portable equipment according to first related information carried in the security request, and sending a security instruction to the security monitoring equipment; the security monitoring equipment is used for receiving the security instruction and executing security operation aiming at the user corresponding to the portable equipment according to the instruction of the security instruction; the first related information comprises identification information of the portable device and the geographical location information of the portable device. According to the embodiment of the application, the portable device, the security monitoring device and the cloud server are matched with one another, security operation aiming at a user can be executed in time when the user needs security protection, and timeliness and effectiveness of user security protection are enhanced.

Description

Security monitoring system, security monitoring method and security monitoring equipment
Technical Field
The application relates to the technical field of security and protection, in particular to a security and protection monitoring system, a security and protection monitoring method and security and protection monitoring equipment.
Background
With the development of society, people pay more and more attention to safety precaution (security for short), such as the prevention of missing of the old and children, the prevention of falling of the old, the safety problems of people and products in a certain area, and the like. At present, in order to realize security precaution under various scenes, corresponding measures are also made, such as installing monitoring equipment in certain specific areas, or wearing positioning and tracking equipment for certain specific people, and the like; although some security measures have been made for some scenes at present, the problem of inadequate security guarantee still exists due to lack of linkage cooperation among different types of equipment.
Disclosure of Invention
The embodiment of the application adopts the following technical scheme:
in a first aspect, an embodiment of the present application provides a security monitoring system, including: the system comprises portable equipment, security monitoring equipment and a cloud server;
the portable equipment is used for sending a security protection request to the cloud server; the security request carries first related information of the portable equipment; the first related information comprises identification information of the portable equipment and the current geographical position information of the portable equipment;
the cloud server is used for receiving the security request sent by the portable equipment, determining security monitoring equipment corresponding to the portable equipment according to the first relevant information carried in the security request, and sending a security instruction to the security monitoring equipment; the security instruction carries the first relevant information;
the security monitoring device is used for receiving the security instruction sent by the cloud server and executing security operation aiming at the user corresponding to the portable device according to the instruction of the security instruction.
In a second aspect, an embodiment of the present application further provides a security monitoring method, which is applied to a security monitoring device, and the method includes:
detecting whether the security monitoring equipment is in an online state;
if yes, receiving a security instruction sent by the cloud server, and executing security operation aiming at a user corresponding to the portable equipment according to the instruction of the security instruction; the security instruction is generated by the cloud server based on a security request sent by the portable device; the security instruction carries first related information corresponding to the portable equipment, wherein the first related information comprises identification information of the portable equipment and current geographical position information of the portable equipment;
otherwise, according to the security request sent by the portable equipment, performing security operation aiming at the user corresponding to the portable equipment according to a preset offline security policy.
In a third aspect, an embodiment of the present application further provides a security monitoring device, where the device includes:
the detection module is used for detecting whether the security monitoring equipment is in an online state or not;
the communication module is used for receiving a security instruction sent by a cloud server when the security monitoring equipment is in an online state, and receiving a security request sent by portable equipment when the security monitoring equipment is in a non-online state;
the processor is used for executing security operation aiming at a user corresponding to the portable equipment according to the instruction of the security instruction, or executing the security operation aiming at the user corresponding to the portable equipment according to a preset offline security policy according to the security request sent by the portable equipment; the security instruction is generated by the cloud server based on a security request sent by the portable device; the security instruction carries first related information corresponding to the portable device, and the first related information comprises identification information of the portable device and current geographic position information of the portable device.
In a fourth aspect, an embodiment of the present application further provides a computer device, including a processor, a communication interface, a memory, and a communication bus; the processor, the communication interface and the memory are communicated with each other through a bus; the memory is used for storing a computer program; the processor is configured to execute the program stored in the memory, and implement the method steps of any of the second aspects.
In a fifth aspect, this application further provides a computer-readable storage medium, in which a computer program is stored, and the computer program, when executed by a processor, implements the method steps of any one of the above second aspects.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects:
the security monitoring system provided by the embodiment of the application comprises a portable device, a security monitoring device and a cloud server, wherein the portable device can send a security request to the cloud server, and after the cloud server receives the security request sent by the portable device, the security monitoring device corresponding to the portable device can be determined based on identification information and geographical position information of the portable device carried in the security request, so that security operation aiming at a user corresponding to the portable device is executed based on the security monitoring device; that is, in the embodiment of the application, through mutual cooperation of the portable device, the security monitoring device and the cloud server, the security operation for the user can be executed in time when the user needs security protection, and timeliness and effectiveness of the security protection of the user are enhanced.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic structural diagram of a first system of a security monitoring system provided in an embodiment of the present application;
fig. 2 is a first flowchart of a security monitoring method according to an embodiment of the present application;
fig. 3 is a second flowchart of the security monitoring method according to the embodiment of the present application;
fig. 4 is a schematic diagram of module composition of a security monitoring device provided in an embodiment of the present application;
fig. 5 is a schematic diagram illustrating a module composition of a network device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
First, an embodiment of the present application provides a security monitoring system, as shown in fig. 1, the security monitoring system includes a portable device 110, a security monitoring device 120, and a cloud server 130; in one embodiment, in order to facilitate data communication or connection between the security monitoring device 120 and the portable device 110, the security monitoring device 120 may further include a wireless module, that is, the security monitoring device 120 may be an IPC having a wireless capability; in addition, in order to realize the linkage between the portable device 110 and the security monitoring device 120 and the cloud server 130, the portable device 110 has a wireless module; certainly, besides the wireless module, the portable device may further have other additional functions, such as a positioning function, an internet function, and the like, and the additional functions required by the portable device may be set according to actual requirements, which is not limited in the embodiments of the present application;
the portable device 110 may be a smart watch, a mobile phone terminal, a smart band, or the like; the specific representation form of the portable device 110 may be set according to actual requirements, as long as it has the functional modules required by the embodiments of the present application.
In a specific embodiment, in order to implement linkage security between the portable device 110, the security monitoring device 120, and the cloud server 130, both the portable device 110 and the security monitoring device 120 are connected to the cloud server 130;
specifically, the portable device 110 and the security monitoring device 120 access the cloud server 130, and it can also be understood that the portable device 110 and the security monitoring device 120 need to be registered in the cloud server 130 in advance.
The portable device 110 is configured to send a security request to the cloud server 130; the security request carries first related information of the portable equipment, wherein the first related information comprises identification information of the portable equipment and current geographic position information of the portable equipment;
the cloud server 130 is configured to receive a security request sent by a portable device, determine, according to first related information carried in the security request, a security monitoring device corresponding to the portable device, and send a security instruction to the security monitoring device; the security instruction carries first related information;
the security monitoring device 120 is configured to receive a security instruction returned by the cloud server 130, and execute a security operation for a user corresponding to the portable device 110 according to an instruction of the security instruction.
Optionally, in an embodiment, in order to implement communication between the portable device 110 and the cloud server 130, a Subscriber Identity Module (SIM) card Module may be built in the portable device 110, and the SIM Module communicates with the cloud server 130 through SIM data.
In addition, it should be noted that, in the embodiment of the present application, the security request sent by the portable device 110 to the cloud server 130 carries the current geographic location information of the portable device 110, so that the portable device 110 has a positioning function; in one embodiment, a Global Positioning System (GPS) module may be built into the portable device 110.
Specifically, the security request sent by the portable device 110 to the cloud server 130 may be in the form of a help request, an alarm request, or a video recording request; the concrete expression form corresponding to the security request can be set according to actual requirements, and the embodiment of the application does not limit the concrete expression form of the security request.
In specific implementation, the specific trigger form of the security request may be that a user corresponding to the portable device 110 (that is, a user carried on the portable device) performs a specific operation on the portable device 110, such as pressing a specific key, touching a certain area of a screen, or performing a specific gesture operation on the portable device 110 (such as shaking the portable device up and down), and the like; after a user performs a specific operation on the portable device 110, triggering the portable device 110 to send a security request to the cloud server 130;
for example, in one embodiment, after the user corresponding to the portable device 110 falls down, the user may press a help-seeking key provided on the portable device 110, thereby triggering the portable device 110 to send a help-seeking request to the cloud server;
the identification information of the portable device may be any one or more of information such as a local model of the portable device 110, a device serial number, a Media Access Control (Mac) address, and the like;
in the embodiment of the application, by carrying the identification information and the geographic position information of the portable device 110 in the security request, the cloud server can determine the security monitoring device 120 corresponding to the portable device 110 based on the information;
after receiving the security request reported by the portable device 110, the cloud server 130 determines the security monitoring device 120 corresponding to the portable device 110 according to the first related information corresponding to the portable device 110 carried in the security request, and sends a security instruction to the security monitoring device;
specifically, since the sim card module is built in the portable device 110 in the embodiment of the present application, the security instruction may be a rescue request sent to a linkage platform (e.g., a 110 alarm platform, a 120 first-aid platform, etc.); certainly, in other embodiments, the security instruction may also be to collect image data in an area to be monitored corresponding to the security instruction, or to instruct a buzzer or the like to perform an alarm, and the like; the specific content corresponding to the security instruction can be set according to an actual application scene, which is not limited in the embodiment of the application;
in addition, it should be noted that, in the embodiment of the present application, the security instruction carries first relevant information of the portable device 110, so that the security monitoring device 120 is convenient to clearly determine which portable device 110 executes a corresponding security operation.
Optionally, in a specific embodiment, the specific content of the executed security operation may be to acquire image data in an area to be monitored corresponding to the security monitoring device 120, and then the cloud server 130 performs corresponding analysis or record keeping and the like based on the image data;
therefore, in a specific embodiment, the security instruction is used to instruct the security monitoring device 120 to collect image data;
correspondingly, under this kind of condition, the security monitoring device 120 is specifically configured to:
acquiring image data in a region to be monitored corresponding to the image data, adding the first related information into the image data, and uploading the image data added with the first related information to a cloud server.
It should be noted that there may be one or more security monitoring devices 120 corresponding to the portable device 110; when the number of the security monitoring devices 120 corresponding to the portable device 110 is multiple, one security monitoring device 120 may be selected to execute a corresponding security instruction according to a preset rule, or the security instruction may be executed for each corresponding security monitoring device 120, and if the security instruction is an image acquisition instruction, the security instruction may be simultaneously sent to each security monitoring device corresponding to the portable device 110 in order to ensure the comprehensiveness of the acquired image data.
For different security monitoring devices 120, the setting positions thereof are different, and therefore, the areas to be monitored corresponding to the security monitoring devices 120 are also different, and therefore, for each security monitoring device 120, it is enough to acquire image data in the area to be monitored corresponding to the security monitoring device itself.
In the embodiment of the present application, the image data may be a static picture or a dynamic video.
Certainly, in a specific embodiment, the security monitoring device 120 may also be a network monitoring camera with a pan/tilt head, so that after the security monitoring device 120 receives a security instruction issued by a cloud server, image data is collected according to a preset working mode;
the preset working mode can be that image data are collected rotationally according to a specified frequency, or image data in an area corresponding to a certain fixed direction are collected; the method and the device can be specifically set according to actual requirements, and the method and the device are not limited in the embodiment of the application.
The adding of the first related information to the image data may be understood as associating the first related information with the image data, so that the cloud server may accurately find the image data corresponding to the portable device 110 when performing subsequent query or analysis on the image data;
an implementation precondition of the foregoing described embodiment of the present application is that the security monitoring device is in an online state, that is, the security monitoring device 120 is in a state of accessing the cloud server 130; however, for the security monitoring device, there may be an offline or offline situation in some emergency situations; therefore, in order to implement security protection under such a situation, an offline security policy may be set in the security monitoring device 120 in advance; the offline security policy may be understood as a policy that is pre-selected and stored in the security monitoring device 120 and can be executed for the security monitoring device 120 in an offline state;
therefore, in a specific implementation, the portable device 110 sends a security request to the security monitoring device 120 in addition to sending the security request to the cloud server 130;
correspondingly, the security monitoring device 120 is further configured to receive a security request sent by the portable device 110, and when the security monitoring device is in an offline state, perform security operation for a user corresponding to the portable device according to the security request and a preset offline security policy.
In specific implementation, the security monitoring device 120 may detect whether the device is in an online state, and if the device is in the online state, after receiving a security instruction sent by the cloud server, execute a corresponding security operation according to an instruction of the security instruction; if the security monitoring device 120 is in an offline state, after receiving a security request sent by the portable device, executing a corresponding security policy according to a preset offline security policy.
Optionally, in this embodiment of the application, the security monitoring device 120 may determine whether it is in an online state by detecting whether it is in normal communication with the cloud server; if the communication between the security monitoring device 120 and the cloud server is normal, it may be determined that the security monitoring device is in an online state, and if the communication between the security monitoring device 120 and the cloud server is abnormal, it may be determined that the security monitoring device is in an offline state.
For example, in one embodiment, the offline security policy may be to activate an alarm device, such as a buzzer, or may be to send a help signal to an associated platform, such as a medical aid platform, or the like; or, the offline security policy may also be to collect image data in an area to be monitored corresponding to the offline security policy, add first related information corresponding to the portable device to the image data, and report the image data added with the first related information to the cloud server after the security monitoring device is in an online state.
Therefore, in a specific embodiment, the security monitoring device 120 executes a security operation for a user corresponding to the portable device 110 according to the security request and according to a preset offline security policy, which may specifically be implemented by the following processes:
the method comprises the steps of collecting image data in a region to be monitored corresponding to the image data, adding the first related information into the image data, and uploading the image data added with the first related information to a cloud server when the image data is in an online state.
Optionally, in specific implementation, besides that the user performs a specific operation through the portable device 110 to trigger the portable device 110 to send a security request to the cloud server, after detecting that the portable device enters a security area, the user may perform corresponding image data acquisition work, so as to detect whether a potential safety hazard exists in the user corresponding to the portable device in real time;
therefore, in a specific embodiment, the security monitoring device 120 is further configured to:
when it is monitored that the portable equipment enters the area to be monitored, acquiring image data in the area to be monitored, determining whether potential safety hazards exist in a user corresponding to the portable equipment or not according to the image data, and if yes, executing corresponding security protection operation;
alternatively, the first and second electrodes may be,
when it is monitored that the portable equipment enters the area to be monitored, image data in the area to be monitored are collected, and the image data are sent to the cloud server, so that the cloud server can determine whether potential safety hazards exist in a user corresponding to the portable equipment or not according to the image data.
Specifically, in the embodiment of the present application, the security monitoring device 120 may analyze the image data itself to determine whether a user has a potential safety hazard; the method may also be executed by the cloud server, and may be specifically implemented in what manner, and the setting may be performed according to an actual application scenario, which is not limited in the embodiment of the present application.
Optionally, in a specific embodiment, in order to facilitate determining the security monitoring device corresponding to the portable device, the wireless detection request frame may be sent to the outside by the portable device and/or the security monitoring device; in a specific implementation, the portable device 110 may send the wireless probe request frame outwards, the security monitoring device may send the wireless probe request frame outwards, or the portable device 110 and the security monitoring device 120 may simultaneously execute an operation of sending the wireless probe request frame outwards.
Therefore, in an embodiment, the portable device 110 is further configured to:
when the security monitoring equipment is in a non-emergency working mode, sending a Wireless detection request frame to the surroundings through Wireless-Fidelity (Wi-Fi) according to a first frequency, receiving a Wireless detection response frame returned by the security monitoring equipment, and correspondingly uploading first related information and second related information to a cloud server; the wireless detection request frame carries first related information; the wireless detection response frame carries second related information corresponding to the security monitoring equipment.
Optionally, in a specific embodiment, the portable device 110 sends out a wireless Probe Request (Probe Request) frame to inquire whether an 802.11 network exists in a surrounding preset area; if the security monitoring equipment of the 802.11 network exists in the surrounding preset area, after monitoring the wireless detection request frame, the security monitoring equipment returns a wireless detection Response (Probe Response) frame to the portable equipment, wherein the wireless detection Response frame returned by the security monitoring equipment carries second related information corresponding to the security monitoring equipment; after receiving the wireless detection response frame returned by the security monitoring equipment, the portable equipment 110 analyzes the wireless detection response frame to obtain second related information carried by the wireless detection response frame; and then uploading the second relevant information to a cloud server correspondingly.
It should be noted that the second related information may include any one or more of a device model, a serial number, an MAC address, geographical location information, and the like corresponding to the security monitoring device;
in the embodiment of the application, in order to facilitate the cloud server to determine each security monitoring device corresponding to the portable device, after receiving a wireless detection response frame returned by the security monitoring device, the portable device analyzes the received wireless detection response frame to obtain corresponding second related information, and the second related information is uploaded to the cloud server, so that the cloud server can determine the corresponding relationship between the portable device and the security monitoring device based on the first related information and the second related information of the portable device; in this way, after receiving a security request triggered by a portable device, based on first related information carried in the security request, a security monitoring device corresponding to the portable device may be determined from a mapping relationship between the portable device (corresponding to the first related information) and the security monitoring device (corresponding to the second related information) stored in advance.
In specific implementation, the portable device 110 may send a wireless probe request frame to the surroundings according to a first frequency (a specific frequency value of which may be set according to actual requirements), where a specific value of the first frequency may be smaller than a preset threshold;
in the embodiment of the application, in order to better serve users and meet different security requirements of the users, the working mode of the portable equipment can be set to an emergency working mode and a non-emergency working mode, and a wireless detection request frame can be sent outwards according to lower frequency when the portable equipment is in the non-emergency working mode; when the wireless probe request frame is in the emergency working mode, the wireless probe request frame can be sent outwards according to a higher frequency;
therefore, in practical implementation, the portable device is further configured to:
when the mobile terminal is in an emergency working mode, sending a wireless detection request frame to the periphery through Wi-Fi according to a second frequency, and executing an emergency security strategy stored by the mobile terminal; receiving a wireless detection response frame returned by the security monitoring equipment; uploading the second related information to a cloud server; the wireless detection request frame carries related information of the portable device, the wireless detection response frame carries second related information corresponding to the security monitoring device, and the second frequency is greater than or equal to a preset threshold value.
In addition, the second frequency is greater than the first frequency.
In this embodiment of the present application, in addition to the portable device 110 sending the wireless probe request frame to the outside, the security monitoring device may also perform an operation of sending the wireless probe request frame to the outside, and therefore, in this embodiment of the present application, the security monitoring device 120 is further configured to:
sending a wireless detection request frame to the periphery through Wi-Fi according to a third frequency; receiving a wireless probe response frame returned by the portable equipment; uploading the first related information to a cloud server;
the wireless detection response frame carries second related information, and the wireless detection request frame carries first related information corresponding to the security monitoring equipment.
Optionally, in this embodiment of the present application, in order to ensure security of the first relevant information and the second relevant information and prevent the data from being leaked, in this embodiment of the present application, the security monitoring device is further specifically configured to:
and encrypting the first related information according to a preset encryption algorithm, and uploading first ciphertext data corresponding to the first related information to the cloud server.
And, the portable device is further specifically configured to:
and encrypting the second related information according to a preset encryption algorithm, and uploading second ciphertext data corresponding to the second related information to the cloud server.
Of course, in a specific embodiment, the first related information or the second related information carried in the wireless probe request frame may also be encrypted, so as to ensure data security.
Optionally, in a specific embodiment, the preset encryption algorithm may also be an AES-128-CFB encryption algorithm, and certainly, other encryption algorithms may also be used, and specifically which encryption algorithm is used to encrypt the first related information or the second related information may be selected according to actual requirements, which is not limited in the embodiment of the present application.
In addition, in the embodiment of the present application, when encrypting the first related information or the second related information, only the key field in the first related information or the second related information may be encrypted, for example, the MAC address: XXX; when this field is encrypted, XXX may be encrypted only, while the character "MAC address" is still in plaintext form.
The security monitoring system provided by the embodiment of the application comprises portable equipment, security monitoring equipment and a cloud server, wherein the portable equipment can send a security request to the cloud server, and after the cloud server receives the security request sent by the portable equipment, the security monitoring equipment corresponding to the portable equipment can be determined based on identification information and geographical position information of the portable equipment carried in the security request, so that security operation aiming at a user corresponding to the portable equipment is executed based on the security monitoring equipment; that is, in this application embodiment, through the mutual cooperation of portable equipment, security protection supervisory equipment and cloud ware three, can in time carry out the security protection operation to the user when the user needs to carry out the security protection guarantee, strengthened the promptness and the validity of user security protection guarantee.
On the basis of the same idea, a security monitoring method is provided in an embodiment of the present application, which is applied to a security monitoring device, corresponding to the security monitoring system provided in the embodiment shown in fig. 1 of the present application, and fig. 2 is a first method flowchart of the security monitoring method provided in the embodiment of the present application, and as shown in fig. 2, the method at least includes the following steps:
step 202, detecting whether security monitoring equipment is in an online state; if yes, go to step 204, otherwise go to step 206;
step 204, receiving a security instruction sent by a cloud server, and executing security operation aiming at a user corresponding to the portable equipment according to the instruction of the security instruction; the security instruction is generated by the cloud server based on a security request sent by the portable device; the security instruction carries first related information corresponding to the portable equipment, wherein the first related information comprises identification information of the portable equipment and current geographical position information of the portable equipment;
and step 206, according to the security request sent by the portable device, executing security operation for the user corresponding to the portable device according to a preset offline security policy.
Optionally, the method provided in the embodiment of the present application further includes:
sending a wireless detection request frame to the periphery through Wi-Fi according to a preset frequency; the wireless detection request frame carries second relevant information corresponding to the security monitoring equipment;
receiving a wireless probe response frame returned by the portable equipment; wherein the wireless probe response frame carries the first related information;
uploading the first relevant information to the cloud server.
Optionally, in a specific embodiment, the uploading the first related information to the cloud server specifically includes:
encrypting the first related information according to a preset encryption algorithm;
and uploading first ciphertext data corresponding to the first relevant information to the cloud server.
Optionally, in a specific implementation manner, the method provided in the embodiment of the present application further includes:
when it is monitored that the portable equipment enters an area to be monitored, acquiring image data in the area to be monitored;
determining whether a user corresponding to the portable equipment has danger or not according to the image data;
and if so, executing corresponding security operation.
To facilitate understanding of the method provided in the embodiment of the present application, the method provided in the embodiment of the present application is described below in a manner that the portable device is an intelligent watch, and the intelligent watch, the security monitoring device, and the cloud server interact with each other, and fig. 3 is a second flowchart of the security monitoring method provided in the embodiment of the present application, and as shown in fig. 3, the method at least includes the following steps:
step 302, the smart watch detects whether the smart watch is in an emergency working mode; if yes, go to step 304, otherwise go to step 306;
step 304, the smart watch sends a wireless detection request frame to the surroundings through Wi-Fi according to a second frequency;
the wireless detection request frame carries first related information of the smart watch;
step 306, the smart watch sends a wireless detection request frame to the surroundings through Wi-Fi according to a first frequency;
308, after receiving the wireless detection request frame sent by the smart watch, the security monitoring equipment returns a wireless detection response frame to the smart watch;
the wireless detection response frame carries second relevant information corresponding to the security monitoring equipment;
step 310, the smart watch uploads the second relevant information to a cloud server;
step 312, the smart watch sends a security request to the cloud server;
the security request carries first relevant information corresponding to the intelligent watch.
Step 314, the cloud server receives a security request sent by the smart watch, and determines security monitoring equipment corresponding to the smart watch according to first related information carried in the security request;
step 316, the cloud server sends an image acquisition instruction to the security monitoring equipment;
the image acquisition instruction carries first related information corresponding to the intelligent watch;
step 318, detecting that the security monitoring equipment is in an online state; if yes, go to step 320; otherwise, go to step 322;
step 320, the security monitoring equipment performs image acquisition according to an image acquisition instruction issued by the cloud server, and adds the first relevant information to the image data and reports the image data to the cloud server;
step 322, the security monitoring device performs image acquisition, adds the first relevant information to the image data, and reports the image data to the cloud server when the security monitoring device is in an online state;
in step 324, the cloud server analyzes or stores the image data.
The specific implementation process of each step in the method provided in the embodiment of the present application may refer to the embodiment shown in fig. 1, which is not described herein again.
According to the security monitoring method provided by the embodiment of the application, the portable device can send a security request to the cloud server, and after the cloud server receives the security request sent by the portable device, the security monitoring device corresponding to the portable device can be determined based on the identification information and the geographical position information of the portable device carried in the security request, so that the security operation aiming at the user corresponding to the portable device is executed based on the security monitoring device; that is, in this application embodiment, through the mutual cooperation of portable equipment, security protection supervisory equipment and cloud ware three, can in time carry out the security protection operation to the user when the user needs to carry out the security protection guarantee, strengthened the promptness and the validity of user security protection guarantee.
Corresponding to the method provided by the embodiment shown in fig. 2, based on the same idea, an embodiment of the present application further provides a security monitoring device, configured to execute the method provided by the embodiment shown in fig. 2, and fig. 4 is a schematic diagram of module composition of the security monitoring device provided by the embodiment of the present application, and as shown in fig. 4, the device includes:
a detection module 402, configured to detect whether the security monitoring device is in an online state;
the communication module 404 is configured to receive a security instruction sent by a cloud server when the security monitoring device is in an online state, and receive a security request sent by a portable device when the security monitoring device is in an offline state;
the processor 406 is configured to execute a security operation for a user corresponding to the portable device according to the instruction of the security instruction, or execute a security operation for a user corresponding to the portable device according to a preset offline security policy according to the security request sent by the portable device; the security instruction is generated by the cloud server based on a security request sent by the portable device; the security instruction carries first related information corresponding to the portable device, and the first related information comprises identification information of the portable device and current geographic position information of the portable device.
Optionally, the security monitoring device provided in the embodiment of the present application may implement all the method steps in the embodiment shown in fig. 2, which is not described herein again.
The security protection monitoring equipment provided by the embodiment of the application can timely execute security protection operation aiming at a user when the user needs security protection guarantee, and the timeliness and effectiveness of the user security protection guarantee are enhanced.
Corresponding to the security monitoring method provided in the embodiment of the present application, the embodiment of the present application provides a network device, and referring to fig. 5, the network device includes a processor 510, a transceiver 520, a memory 530, and a bus interface. Wherein:
in this embodiment of the present invention, the network device 500 further includes: a computer program stored in the memory 530 and capable of running on the processor 510, where the computer program, when executed by the processor 510, implements all the method steps of the security monitoring method, and can achieve the same technical effect, and is not described herein again to avoid repetition.
In FIG. 5, the bus architecture may include any number of interconnected buses and bridges, with various circuits being linked together, in particular, one or more processors, represented by processor 510, and a memory, represented by memory 530. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The transceiver 520 may be a number of elements including a transmitter and a receiver that provide a means for communicating with various other apparatus over a transmission medium.
The processor 510 is responsible for managing the bus architecture and general processing, and the memory 530 may store data used by the processor 510 in performing operations.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the processes of the method embodiments, and can achieve the same technical effects, and in order to avoid repetition, the details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the particular illustrative embodiments, it is to be understood that the invention is not limited to the disclosed embodiments, but is intended to cover various modifications, equivalent arrangements, and equivalents thereof, which may be made by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (15)

1. A security monitoring system, comprising: the system comprises portable equipment, security monitoring equipment and a cloud server;
the portable equipment is used for sending a security protection request to the cloud server; the security request carries first related information of the portable equipment; the first related information comprises identification information of the portable equipment and the current geographical position information of the portable equipment;
the cloud server is used for receiving the security request sent by the portable equipment, determining security monitoring equipment corresponding to the portable equipment according to the first relevant information carried in the security request, and sending a security instruction to the security monitoring equipment; the security instruction carries the first relevant information;
the security monitoring device is used for receiving the security instruction sent by the cloud server and executing security operation aiming at a user corresponding to the portable device according to the instruction of the security instruction;
the security instruction is used for indicating the security monitoring equipment to acquire image data;
the security protection supervisory equipment specifically is used for:
the method comprises the steps of collecting image data in a region to be monitored corresponding to the cloud server, adding first relevant information into the image data, and uploading the image data added with the first relevant information to the cloud server.
2. The system of claim 1,
the portable equipment is further used for sending the security request to the security monitoring equipment;
the security monitoring device is further configured to receive the security request sent by the portable device, and when the security monitoring device is in an offline state, perform security operation for a user corresponding to the portable device according to the security request and a preset offline security policy.
3. The system of claim 2, wherein the security monitoring device is specifically configured to:
the method comprises the steps of collecting image data in a region to be monitored corresponding to the cloud server, adding first relevant information into the image data, and uploading the image data added with the first relevant information to the cloud server when the cloud server is in an online state.
4. The system of claim 1, wherein the portable device is further configured to:
when the mobile terminal is in a non-emergency working mode, sending a wireless detection request frame to the periphery through wireless fidelity Wi-Fi according to a first frequency; wherein the wireless probe request frame carries the first related information; the first frequency is less than a preset threshold;
receiving a wireless detection response frame returned by the security monitoring equipment; the wireless detection response frame carries second relevant information corresponding to the security monitoring equipment;
uploading the second related information to the cloud server.
5. The system of claim 1, wherein the portable device is further configured to:
when the mobile terminal is in an emergency working mode, sending a wireless detection request frame to the periphery through Wi-Fi according to a second frequency, and executing an emergency security strategy stored by the mobile terminal; wherein the wireless probe request frame carries the first related information; the second frequency is greater than or equal to a preset threshold;
receiving a wireless detection response frame returned by the security monitoring equipment; the wireless detection response frame carries second relevant information corresponding to the security monitoring equipment;
uploading the second related information to the cloud server.
6. The system of claim 1, wherein the security monitoring device is further configured to:
sending a wireless detection request frame to the periphery through Wi-Fi according to a third frequency; the wireless detection request frame carries second relevant information corresponding to the security monitoring equipment;
receiving a wireless probe response frame returned by the portable equipment; wherein the wireless probe response frame carries the first related information;
uploading the first relevant information to the cloud server.
7. The system of claim 6, wherein the security monitoring device is specifically configured to:
and encrypting the first related information according to a preset encryption algorithm, and uploading first ciphertext data corresponding to the first related information to the cloud server.
8. The system of claim 1, wherein the security monitoring device is further configured to:
when it is monitored that the portable equipment enters an area to be monitored, acquiring image data in the area to be monitored, determining whether potential safety hazards exist in a user corresponding to the portable equipment or not according to the image data, and if yes, executing corresponding security operation;
alternatively, the first and second electrodes may be,
when it is monitored that the portable equipment enters the area to be monitored, image data in the area to be monitored are collected, and the image data are sent to the cloud server, so that the cloud server can determine whether potential safety hazards exist in a user corresponding to the portable equipment or not according to the image data.
9. A security monitoring method is applied to security monitoring equipment and is characterized by comprising the following steps:
detecting whether the security monitoring equipment is in an online state;
if yes, receiving a security instruction sent by the cloud server, and executing security operation aiming at a user corresponding to the portable equipment according to the instruction of the security instruction; the security instruction is generated by the cloud server based on a security request sent by the portable equipment; the security instruction carries first related information corresponding to the portable equipment, wherein the first related information comprises identification information of the portable equipment and current geographical position information of the portable equipment;
otherwise, according to the security request sent by the portable equipment, executing security operation aiming at the user corresponding to the portable equipment according to a preset offline security strategy;
the security instruction is used for indicating the security monitoring equipment to collect image data, and the security operation aiming at the user corresponding to the portable equipment is executed according to the indication of the security instruction, and the security operation comprises the following steps:
the method comprises the steps of collecting image data in a region to be monitored corresponding to the cloud server, adding first relevant information into the image data, and uploading the image data added with the first relevant information to the cloud server.
10. The method of claim 9, wherein the method further comprises:
sending a wireless detection request frame to the periphery through Wi-Fi according to a preset frequency; the wireless detection request frame carries second relevant information corresponding to the security monitoring equipment;
receiving a wireless probe response frame returned by the portable equipment; wherein the wireless probe response frame carries the first related information;
uploading the first relevant information to the cloud server.
11. The method of claim 10, wherein uploading the first related information to the cloud server comprises:
encrypting the first related information according to a preset encryption algorithm;
and uploading first ciphertext data corresponding to the first relevant information to the cloud server.
12. The method of claim 10, wherein the method further comprises:
when it is monitored that the portable equipment enters an area to be monitored, acquiring image data in the area to be monitored;
determining whether a user corresponding to the portable equipment has danger or not according to the image data;
and if so, executing corresponding security operation.
13. A security monitoring device, the device comprising:
the detection module is used for detecting whether the security monitoring equipment is in an online state or not;
the communication module is used for receiving a security instruction sent by a cloud server when the security monitoring equipment is in an online state, and receiving a security request sent by portable equipment when the security monitoring equipment is in a non-online state;
the processor is used for executing security protection operation aiming at a user corresponding to the portable equipment according to the instruction of the security protection instruction, or executing the security protection operation aiming at the user corresponding to the portable equipment according to a preset offline security protection strategy according to the security protection request sent by the portable equipment; the security instruction is generated by the cloud server based on a security request sent by the portable device; the security instruction carries first related information corresponding to the portable equipment, wherein the first related information comprises identification information of the portable equipment and current geographical position information of the portable equipment;
the security instruction is used for indicating the security monitoring equipment to collect image data, and the processor is specifically used for:
the method comprises the steps of collecting image data in a to-be-monitored area corresponding to the security monitoring equipment, adding the first relevant information into the image data, and uploading the image data added with the first relevant information to the cloud server.
14. A computer device comprising a processor, a communication interface, a memory, and a communication bus; the processor, the communication interface and the memory are communicated with each other through a bus; the memory is used for storing a computer program; the processor, configured to execute the program stored in the memory, implements the method steps of any of claims 9-12.
15. A computer-readable storage medium, characterized in that a computer program is stored in the storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of the claims 9-12.
CN202110699893.3A 2021-06-23 2021-06-23 Security monitoring system, security monitoring method and security monitoring equipment Active CN113341856B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110699893.3A CN113341856B (en) 2021-06-23 2021-06-23 Security monitoring system, security monitoring method and security monitoring equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110699893.3A CN113341856B (en) 2021-06-23 2021-06-23 Security monitoring system, security monitoring method and security monitoring equipment

Publications (2)

Publication Number Publication Date
CN113341856A CN113341856A (en) 2021-09-03
CN113341856B true CN113341856B (en) 2023-03-10

Family

ID=77477999

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110699893.3A Active CN113341856B (en) 2021-06-23 2021-06-23 Security monitoring system, security monitoring method and security monitoring equipment

Country Status (1)

Country Link
CN (1) CN113341856B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103838155A (en) * 2012-11-27 2014-06-04 海尔集团公司 Family security control method, family server and security control system
WO2017219530A1 (en) * 2016-06-23 2017-12-28 乐视控股(北京)有限公司 Safety monitoring method, device, and system, monitoring system, and electronic apparatus
CN107979741A (en) * 2016-10-25 2018-05-01 杭州萤石网络有限公司 A kind of security-protecting and monitoring method, autonomous actions device and safety defense monitoring system
CN109802871A (en) * 2019-03-04 2019-05-24 佛山大鱼智能家居科技有限公司 The control method of intelligent safety and defence system
CN111770067A (en) * 2020-06-12 2020-10-13 山东浪潮通软信息科技有限公司 Security video acquisition method, device and system based on Internet of things
CN112911703A (en) * 2021-01-18 2021-06-04 浙江大华技术股份有限公司 WIFI detection method and system, WIFI probe device, monitoring device and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103838155A (en) * 2012-11-27 2014-06-04 海尔集团公司 Family security control method, family server and security control system
WO2017219530A1 (en) * 2016-06-23 2017-12-28 乐视控股(北京)有限公司 Safety monitoring method, device, and system, monitoring system, and electronic apparatus
CN107979741A (en) * 2016-10-25 2018-05-01 杭州萤石网络有限公司 A kind of security-protecting and monitoring method, autonomous actions device and safety defense monitoring system
CN109802871A (en) * 2019-03-04 2019-05-24 佛山大鱼智能家居科技有限公司 The control method of intelligent safety and defence system
CN111770067A (en) * 2020-06-12 2020-10-13 山东浪潮通软信息科技有限公司 Security video acquisition method, device and system based on Internet of things
CN112911703A (en) * 2021-01-18 2021-06-04 浙江大华技术股份有限公司 WIFI detection method and system, WIFI probe device, monitoring device and storage medium

Also Published As

Publication number Publication date
CN113341856A (en) 2021-09-03

Similar Documents

Publication Publication Date Title
US10854095B2 (en) Flight control method and apparatus, flight clearance method, flight safety maintenance method and apparatus, server, and aerial vehicle
CN114153343B (en) Health code display method and electronic equipment
JP6125035B2 (en) Video surveillance system using mobile terminals
CN107948199B (en) Method and device for rapidly detecting terminal shared access
CN104253714A (en) Monitoring method, system, browser and server
CN108366374A (en) A suspect's judgment method and device
CN113408006A (en) Monitoring data access method and device, indoor monitoring system and storage medium
CN109918944B (en) Information protection method and device, mobile terminal and storage medium
CA2846026C (en) Radio frequency identification notification system
KR101324933B1 (en) Position tracing method and system using wireless lan
CN113438306B (en) Security monitoring system, security monitoring method and security monitoring equipment
CN113341856B (en) Security monitoring system, security monitoring method and security monitoring equipment
KR102093650B1 (en) Security service system and method based on cloud
KR101973805B1 (en) Avoidance support system for hazard
EP3809386A1 (en) Guardian service provision system, program, and guardian service provision method
CN108765823B (en) Alarm method, device and system
CN112486573B (en) Data processing method, data processing equipment and storage medium of monitoring system
CN110856173B (en) Network access method and device and electronic equipment
CN110798444B (en) Data synchronization method and device based on Internet of things
CN108959960B (en) Method, device and computer readable storage medium for preventing privacy disclosure
CN105471668A (en) Environment information collection method and device for network access party
CN114333098B (en) Night patrol method, night patrol device, electronic equipment and computer readable medium
CN111405472B (en) Positioning terminal and control method
CN114386097B (en) User information management method based on cloud architecture and related equipment
KR101458365B1 (en) Video recoder voice alarm system and operating method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant