CN113438306A - Security monitoring system, security monitoring method and security monitoring equipment - Google Patents

Security monitoring system, security monitoring method and security monitoring equipment Download PDF

Info

Publication number
CN113438306A
CN113438306A CN202110699892.9A CN202110699892A CN113438306A CN 113438306 A CN113438306 A CN 113438306A CN 202110699892 A CN202110699892 A CN 202110699892A CN 113438306 A CN113438306 A CN 113438306A
Authority
CN
China
Prior art keywords
security
equipment
security monitoring
cloud server
portable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110699892.9A
Other languages
Chinese (zh)
Other versions
CN113438306B (en
Inventor
单志胜
蒋海青
金静阳
陈晓锋
邵峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Ezviz Software Co Ltd
Original Assignee
Hangzhou Ezviz Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Ezviz Software Co Ltd filed Critical Hangzhou Ezviz Software Co Ltd
Priority to CN202110699892.9A priority Critical patent/CN113438306B/en
Publication of CN113438306A publication Critical patent/CN113438306A/en
Priority to PCT/CN2022/094993 priority patent/WO2022267803A1/en
Application granted granted Critical
Publication of CN113438306B publication Critical patent/CN113438306B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

The embodiment of the application provides a security monitoring system, a security monitoring method and security monitoring equipment, wherein the security monitoring system comprises portable equipment, security monitoring equipment and a cloud server; the portable equipment is used for sending a wireless detection request message to the outside; the security monitoring equipment is used for monitoring the wireless detection request message and reporting the message content information of the monitored wireless detection request message to the cloud service when the wireless detection request message is monitored; receiving a security instruction issued by the cloud server, and executing corresponding security operation according to the instruction of the security instruction; and the cloud server is used for receiving the message content information and issuing a security instruction aiming at the user corresponding to the portable equipment to the security monitoring equipment. According to the embodiment of the application, the portable device, the security monitoring device and the cloud server are matched with one another, security operation aiming at a user can be executed in time when the user needs security protection, and timeliness and effectiveness of user security protection are enhanced.

Description

Security monitoring system, security monitoring method and security monitoring equipment
Technical Field
The application relates to the technical field of security and protection, in particular to a security and protection monitoring system, a security and protection monitoring method and security and protection monitoring equipment.
Background
With the development of society, people pay more and more attention to safety precautions (security for short), such as the prevention of the elderly and children from getting lost, the prevention of the elderly from falling down, the safety precautions of people and articles in a specific area, and the like. At present, in order to realize safety precaution under various scenes, corresponding measures are also made, such as installing monitoring equipment in certain specific areas, or wearing positioning and tracking equipment for certain specific people, and the like; although some security measures have been made for some scenes at present, the problem of inadequate security guarantee still exists due to lack of linkage cooperation among different types of equipment.
Disclosure of Invention
The embodiment of the application adopts the following technical scheme:
in a first aspect, an embodiment of the present application provides a security monitoring system, including: the system comprises portable equipment, security monitoring equipment and a cloud server;
the portable equipment is used for sending a wireless detection request message to the outside; wherein the wireless probe request message carries device-related information of the portable device;
the security monitoring device is used for monitoring the wireless detection request message, and reporting the monitored message content information of the wireless detection request message to the cloud service when the wireless detection request message is monitored; receiving a security instruction issued by the cloud server, and executing corresponding security operation according to the instruction of the security instruction;
and the cloud server is used for receiving the message content information and issuing a security instruction aiming at the user corresponding to the portable equipment to the security monitoring equipment.
In a second aspect, an embodiment of the present application further provides a security monitoring method, which is applied to a security monitoring device, and the method includes:
monitoring a wireless detection request message sent by the portable equipment; wherein the wireless probe request message carries device-related information of the portable device;
when the wireless detection request message is monitored, reporting the monitored message content information of the wireless detection request message to a cloud service;
and receiving a security instruction which is issued by the cloud server and aims at the user corresponding to the portable equipment, and executing corresponding security operation according to the instruction of the security instruction.
In a third aspect, an embodiment of the present application further provides a security monitoring device, where the device includes:
the monitoring module is used for monitoring a wireless detection request message sent by the portable equipment; wherein the wireless probe request message carries device-related information of the portable device;
the communication module is used for reporting the monitored message content information of the wireless detection request message to a cloud service when the wireless detection request message is monitored; receiving a security instruction which is issued by the cloud server and aims at a user corresponding to the portable equipment;
and the processor is used for executing corresponding security operation according to the instruction of the security instruction.
In a fourth aspect, an embodiment of the present application further provides a computer device, including a processor, a communication interface, a memory, and a communication bus; the processor, the communication interface and the memory complete mutual communication through a bus; the memory is used for storing a computer program; the processor is configured to execute the program stored in the memory to implement the method steps of any of the second aspects.
In a fifth aspect, this application further provides a computer-readable storage medium, in which a computer program is stored, and the computer program, when executed by a processor, implements the method steps of any one of the above second aspects.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects:
the security monitoring system provided by the embodiment of the application comprises portable equipment, security monitoring equipment and a cloud server, wherein the portable equipment can send a wireless detection request message outwards, the monitored message content information is reported to the cloud server after the security monitoring equipment monitors the wireless detection request message sent by the portable equipment, and the cloud server sends a security instruction aiming at a user corresponding to the portable equipment to the security monitoring equipment after receiving the message content information reported by the security monitoring equipment, so that the security monitoring equipment executes security operation aiming at the user corresponding to the portable equipment; that is, in this application embodiment, through the mutual cooperation of portable equipment, security protection supervisory equipment and cloud ware three, can in time carry out the security protection operation to the user when the user needs to carry out the security protection guarantee, strengthened the promptness and the validity of user security protection guarantee.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic structural diagram of a first system of a security monitoring system provided in an embodiment of the present application;
fig. 2 is a first flowchart of a security monitoring method according to an embodiment of the present application;
fig. 3 is a second flowchart of the security monitoring method according to the embodiment of the present application;
fig. 4 is a schematic diagram of module composition of a security monitoring device provided in an embodiment of the present application;
fig. 5 is a schematic diagram illustrating a module composition of a network device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
First, an embodiment of the present application provides a security monitoring system, as shown in fig. 1, the security monitoring system includes a portable device 110, a security monitoring device 120, and a cloud server 130; in one embodiment, in order to facilitate data communication or connection between the security monitoring device 120 and the portable device 110, the security monitoring device 120 may further include a wireless module, that is, the security monitoring device 120 may be an IPC having a wireless capability; in addition, in order to realize linkage between the portable device 110 and the security monitoring device 120 and the cloud server 130, the portable device 110 has a wireless module; of course, the portable device 110 may also have other functional modules, or may not have other functional modules, and may be specifically set according to actual requirements, which is not limited in this embodiment of the application.
The portable device 110 may be a wearable smart necklace, a smart ring, a smart bracelet, a smart watch, a card, or the like.
In a specific embodiment, in order to implement protection for a user corresponding to a portable device, the security monitoring device 120 needs to access the cloud server 130;
specifically, the security monitoring device 120 is connected to the cloud server 130, and it can also be understood that the security monitoring device 120 needs to be registered in the cloud server 130 in advance.
The portable device 110 is configured to send a wireless probe request message to the outside; wherein, the wireless detection request message carries the device-related information of the portable device;
the security monitoring device 120 is configured to monitor a wireless detection request message, and when the wireless detection request message is monitored, report message content information of the monitored wireless detection request message to a cloud service; receiving a security instruction issued by the cloud server, and executing corresponding security operation according to the instruction of the security instruction;
the cloud server 130 is configured to receive the message content information, and issue a security instruction for a user corresponding to the portable device to the security monitoring device.
Optionally, in a specific embodiment, the wireless Probe Request message sent by the portable device 110 may be a Probe Request message, a Beacon message, or the like;
the device-related information may be any one or more of a local model of the portable device 110, a device serial number, a Media Access Control (Mac) address, and the like;
in the embodiment of the application, the message content information is reported to the cloud server, so that the cloud server can determine the security monitoring equipment corresponding to the portable equipment, and the mapping relation between the portable equipment and the security monitoring equipment corresponding to the portable equipment is established, so that on one hand, the cloud server can collect information such as image data and the like corresponding to the portable equipment conveniently, and in addition, corresponding security instructions can be issued to the corresponding security monitoring equipment according to the requirements of users corresponding to different portable equipment;
after receiving the message content information reported by the security monitoring device, the cloud server 130 sends a corresponding security instruction to the security monitoring device according to the message content information;
specifically, the security instruction may be to send a rescue request to a linkage platform (e.g., a 110 alarm platform, a 120 emergency platform, etc.), or to collect image data in an area to be monitored corresponding to the linkage platform, or to instruct a buzzer, etc. to perform an alarm; the specific content corresponding to the security instruction can be set according to an actual application scene, which is not limited in the embodiment of the application;
in addition, it should be noted that, in the embodiment of the present application, the security instruction carries the message content information corresponding to the portable device 110, so that the security monitoring device 120 is convenient to clearly determine which portable device 110 executes the corresponding security operation.
Optionally, in a specific embodiment, the specific content of the executed security operation may be to acquire image data in an area to be monitored corresponding to the security monitoring device 120, and then the cloud server 130 performs corresponding analysis or record keeping and the like based on the image data;
therefore, in a specific embodiment, the security instruction is used to instruct the security monitoring device 120 to collect image data;
correspondingly, under this kind of condition, the security monitoring device 120 is specifically configured to:
acquiring image data in a region to be monitored corresponding to the image data, adding the equipment related information into the image data, and uploading the image data added with the equipment related information to a cloud server;
the cloud server is configured to:
and analyzing the image data, and if the analysis result indicates that the user corresponding to the portable equipment has an emergency, executing a security strategy aiming at the emergency.
In the embodiment of the present application, the image data may be a static picture or a dynamic video.
For example, in a specific embodiment, the emergency event may be a theft event, a robbery event, a fall event, and the like, and in the specific implementation, different security policies are set for different emergency events, for example, for a theft or robbery criminal event, the set security policy may be to start a buzzer, alarm, and the like, and for a fall event, the set security policy may be to ask for help from a specified platform, such as a medical assistance platform and the like; of course, the specific form of the emergency and the corresponding specific security policy are only exemplified here, and do not constitute a limitation to the embodiments of the present application.
It should be noted that there may be one or more security monitoring devices 120 corresponding to the portable device 110; when the number of the security monitoring devices 120 corresponding to the portable device 110 is multiple, one security monitoring device 120 may be selected to execute a corresponding security instruction according to a preset rule, or the security instruction may be executed for each corresponding security monitoring device 120, and if the security instruction is an image acquisition instruction, the security instruction may be simultaneously sent to each security monitoring device corresponding to the portable device 110 in order to ensure the comprehensiveness of the acquired image data.
For different security monitoring devices 120, the setting positions are different, and therefore, the corresponding regions to be monitored are also different, and therefore, for each security monitoring device 120, it is sufficient to acquire image data in the region to be monitored corresponding to the security monitoring device.
Certainly, in a specific embodiment, the security monitoring device 120 may also be a network monitoring camera with a pan/tilt head, so that after the security monitoring device 120 receives a security instruction issued by a cloud server, image data is collected according to a preset working mode;
the preset working mode can be that image data are collected rotationally according to a specified frequency, or image data in an area corresponding to a certain fixed direction are collected; the method and the device can be specifically set according to actual requirements, and the method and the device are not limited in the embodiment of the application.
The adding of the device-related information to the image data may be understood as associating the device-related information with the image data, so that the cloud server may accurately find the image data corresponding to the portable device 110 when performing subsequent query or analysis of the image data;
specifically, in a specific embodiment, when the cloud server executes a security policy for an emergency currently existing in a user corresponding to the portable device, the security policy may be:
and issuing an emergency alarm instruction to the security monitoring equipment so that the security monitoring equipment executes corresponding security operation according to the emergency alarm instruction.
For example, in a specific embodiment, if the cloud server determines that the user corresponding to the portable device has a theft risk, a theft event alarm instruction may be issued to the security monitoring device, and when the security monitoring device receives the theft event alarm instruction issued by the cloud server again, the security monitoring device may control the buzzer in the corresponding area to issue a buzzer alarm;
in the embodiment of the application, the portable device may be a card or a necklace which only has a Wi-Fi module and does not have a positioning function, and in this case, in order to facilitate security monitoring, the device may accurately acquire image data in an area where the portable device is located; in the embodiment of the application, the position information corresponding to the portable device can be determined in a positioning mode through the RSSI value;
therefore, in a specific embodiment, the device-related information further carries RSSI data corresponding to the portable device;
correspondingly, the cloud server is further configured to:
when message content information corresponding to the portable equipment reported by the security monitoring equipment is received, determining azimuth information corresponding to the portable equipment according to RSSI values corresponding to the portable equipment reported by the security monitoring equipment, and sending the azimuth information to the security monitoring equipment;
the security monitoring equipment is used for receiving the direction information and adjusting the corresponding monitoring area according to the direction information.
In specific implementation, for each security monitoring device, an area corresponding to the portable device may be determined according to the RSSI data corresponding to the portable device acquired by the security monitoring device, and the orientation information corresponding to the portable device is determined based on an overlapping area of a plurality of areas determined by the plurality of security monitoring devices.
For ease of understanding, the following description will be given by way of example.
For example, in a specific embodiment, the portable device 1 corresponds to three security monitoring devices, which are respectively recorded as the security monitoring device 1, the security monitoring device 2, and the security monitoring device 3, RSSI data of the portable device 1 collected by the security monitoring device 1 is recorded as RSSI1, RSSI data of the portable device 2 collected by the security monitoring device 2 is recorded as RSS2, and RSSI data of the portable device 3 collected by the security monitoring device 3 is recorded as RSSI 3; based on the RSSI1, a circular area with the security monitoring device 1 as the center and the radius of R1 can be determined as a possible area 1 corresponding to the portable device 1, and based on the RSSI2, a circular area with the security monitoring device 2 as the center and the radius of R2 can be determined as a possible area 2 corresponding to the portable device 1; based on the RSSI3, a circular area with the radius of R3 and centered on the security monitoring device 3 can be determined as a possible area 3 corresponding to the portable device 1; determining an overlapping area of the possible area 1, the possible area 2 and the possible area 3 as an area where the portable device 1 is located; therefore, the direction information of the portable device 1 for the security monitoring device can be determined in the above manner.
Optionally, in this embodiment of the present application, in order to ensure the security of the message content information and prevent the data from being leaked, in this embodiment of the present application, the security monitoring device is further specifically configured to:
and encrypting the message content information according to a preset encryption algorithm, and uploading ciphertext data corresponding to the message content information to a cloud server.
Of course, in a specific embodiment, the information related to the second device carried in the wireless probe request message may also be encrypted, so as to ensure data security.
Optionally, in a specific implementation manner, the preset encryption algorithm may also be an AES-128-CFB encryption algorithm, and certainly, may also be other encryption algorithms, and specifically, what encryption algorithm is used to encrypt the message content information may be selected according to actual requirements, which is not limited in the embodiment of the present application.
In addition, it should be noted that, in the embodiment of the present application, when encrypting the message content information, only the key field in the message content information may be encrypted, for example, the MAC address: XXX; when this field is encrypted, XXX may be encrypted only, while the character "MAC address" is still in plaintext form.
Optionally, in a specific embodiment, when a user carrying a portable device enters a security area, the security monitoring device may monitor a wireless request packet sent by the portable device, so as to trigger the security monitoring device to report the monitored packet content information of the portable device to a cloud server, and trigger the cloud server to instruct the security monitoring device to perform security operation for the user corresponding to the portable device; for example, the security monitoring device is instructed to acquire image data corresponding to the area to be controlled, and the like.
Of course, in some specific embodiments, the user may trigger the portable device to send the security request to the corresponding security monitoring device through the portable device;
therefore, in specific implementation, the portable device 110 is further configured to send a security request to the security monitoring device 120;
correspondingly, the security monitoring device 120 is further configured to receive a security request sent by the portable device 110, and execute a security operation for a user corresponding to the portable device according to the security request and a preset security policy.
For example, in a specific embodiment, the preset security policy may be to start an alarm device, such as a buzzer, or may also be to send a help signal to an associated platform, such as a medical aid platform; or, the offline security policy may be to acquire image data in the area to be monitored corresponding to the offline security policy, add device-related information corresponding to the portable device to the image data, and the like.
In specific implementation, the specific trigger form of the security request may be that a user corresponding to the portable device 110 (that is, a user carried on the portable device) performs a specific operation on the portable device 110, such as pressing a specific key, touching a certain area of a screen, or performing a specific gesture operation on the portable device 110 (such as shaking the portable device up and down), and the like; after a user performs a specific operation on the portable device 110, triggering the portable device 110 to send a security request to the cloud server 130;
for example, in one embodiment, after the user corresponding to the portable device 110 falls down, the user may press a help-seeking key provided on the portable device 110, thereby triggering the portable device 110 to send a help-seeking request to the cloud server;
in the embodiment described in the foregoing application, an implementation precondition is that the security monitoring device is in an online state, that is, the security monitoring device 120 is in a state of accessing the cloud server 130; however, for the security monitoring device, there may be an offline or offline situation in some emergency situations; therefore, in order to implement security protection under such a situation, an offline security policy may be set in the security monitoring device 120 in advance; the offline security policy may be understood as a policy that is pre-selected and stored in the security monitoring device 120 and can be executed for the security monitoring device 120 in an offline state;
in specific implementation, the security monitoring device 120 may detect whether itself is in an online state, and if so, after receiving a security instruction sent by the cloud server, execute a corresponding security operation according to an instruction of the security instruction; if the security monitoring device 120 is in an offline state, after receiving a security request sent by the portable device, executing a corresponding security policy according to a preset offline security policy.
Therefore, in a specific embodiment, the security monitoring device 120 executes a security operation for a user corresponding to the portable device 110 according to the security request and according to a preset offline security policy, which may specifically be implemented by the following processes:
when the monitoring system is in an off-line state, acquiring image data in a region to be monitored corresponding to the monitoring system, adding the equipment related information into the image data, and when the monitoring system is in an on-line state, uploading the image data added with the equipment related information to a cloud server.
Optionally, in a specific embodiment, for the portable device, for different operation modes, the wireless probe request packet may be sent outwards according to different frequencies;
therefore, in the embodiment of the present application, the portable device is specifically configured to:
when the wireless probe system is in an emergency working mode, sending a wireless probe request message outwards according to a first preset frequency, and when the wireless probe system is in a non-emergency working mode, sending the wireless probe request message outwards according to a second preset frequency; wherein the first preset frequency is greater than the second preset frequency.
Optionally, in a specific implementation manner, the message content information further carries working mode information corresponding to the portable device; the working modes comprise an emergency working mode and a non-emergency working mode;
the cloud server is specifically configured to:
and judging whether the portable equipment is in an emergency working mode or not according to the message content information, if so, executing emergency security operation aiming at the user corresponding to the portable equipment.
For example, the emergency security operation may be an emergency alarm operation or an emergency rescue operation, and these operations may be executed by the cloud server, or the cloud server may instruct the security monitoring device to execute the operations; in addition, before the emergency security operation is executed, the security monitoring device may also be instructed to acquire image data for the portable device, so that the cloud server performs emergency verification based on the image data to determine whether the user corresponding to the portable device is in an emergency state;
the security monitoring system provided by the embodiment of the application comprises portable equipment, security monitoring equipment and a cloud server, wherein the portable equipment can send a wireless detection request message outwards, the monitored message content information is reported to the cloud server after the security monitoring equipment monitors the wireless detection request message sent by the portable equipment, and the cloud server sends a security instruction aiming at a user corresponding to the portable equipment to the security monitoring equipment after receiving the message content information reported by the security monitoring equipment, so that the security monitoring equipment executes security operation aiming at the user corresponding to the portable equipment; that is, in this application embodiment, through the mutual cooperation of portable equipment, security protection supervisory equipment and cloud ware three, can in time carry out the security protection operation to the user when the user needs to carry out the security protection guarantee, strengthened the promptness and the validity of user security protection guarantee.
On the basis of the same idea, a security monitoring method is provided in an embodiment of the present application, which is applied to a security monitoring device, corresponding to the security monitoring system provided in the embodiment shown in fig. 1 of the present application, and fig. 2 is a first method flowchart of the security monitoring method provided in the embodiment of the present application, and as shown in fig. 2, the method at least includes the following steps:
step 202, monitoring a wireless detection request message sent by a portable device; wherein the wireless probe request message carries device-related information of the portable device;
step 204, when the wireless detection request message is monitored, reporting the monitored message content information of the wireless detection request message to a cloud service;
and step 206, receiving a security instruction for the user corresponding to the portable device issued by the cloud server, and executing corresponding security operation according to the instruction of the security instruction.
Optionally, the executing, according to the instruction of the security instruction, a corresponding security operation includes:
acquiring image data in a region to be monitored corresponding to the monitoring device;
adding the device-related information to the image data, and uploading the image data added with the device-related information to the cloud server;
optionally, the method provided in the embodiment of the present application further includes:
when the monitoring system is in an off-line state, acquiring image data in a region to be monitored corresponding to the monitoring system;
adding the device-related information to the image data, and uploading the image data added with the device-related information to a cloud server when the image data is in an online state.
Optionally, the method provided in the embodiment of the present application further includes:
receiving the security request sent by the portable equipment;
and executing security protection operation aiming at the user corresponding to the portable equipment according to the security protection request and a preset security protection strategy.
To facilitate understanding of the method provided in the embodiment of the present application, the method provided in the embodiment of the present application is described below in a manner that the portable device is a smart card, and the smart card, a security monitoring device and a cloud server interact with each other, and fig. 3 is a second flowchart of the security monitoring method provided in the embodiment of the present application, and as shown in fig. 3, the method at least includes the following steps:
step 302, the smart card detects whether the smart card is in an emergency working mode; if yes, go to step 304, otherwise go to step 306;
step 304, the smart card sends a wireless detection request message to the surroundings through Wi-Fi according to a second frequency;
the wireless detection request frame carries identification information of the smart card;
step 306, the smart card sends a wireless detection request message to the surroundings through Wi-Fi according to a first frequency;
step 308, after monitoring the wireless detection request message sent by the smart card, the security monitoring device reports the message content information of the monitored wireless detection request message to the cloud server;
wherein, the message content information carries the identification information of the intelligent card and the working mode information of the intelligent card;
step 310, the cloud server judges whether the smart card is in an emergency working mode according to the message content information; if yes, go to step 312; otherwise, go to step 314;
step 312, executing a security policy for the emergency event;
step 314, the cloud server sends an image acquisition instruction to the security monitoring equipment;
the image acquisition instruction carries equipment related information corresponding to the intelligent card;
step 316, detecting that the security monitoring equipment is in an online state; if yes, go to step 318; otherwise, go to step 320;
step 318, the security monitoring device performs image acquisition according to an image acquisition instruction issued by the cloud server, and adds the relevant information of the device to the image data and reports the image data to the cloud server;
step 320, the security monitoring equipment performs image acquisition, adds the relevant information of the equipment to the image data, and reports the image data to a cloud server when the security monitoring equipment is in an online state;
in step 322, the cloud server analyzes or stores the image data.
The specific implementation process of each step in the method provided in the embodiment of the present application may refer to the embodiment shown in fig. 1, which is not described herein again.
According to the security monitoring method provided by the embodiment of the application, the portable device can send a wireless detection request message to the outside, after the security monitoring device monitors the wireless detection request message sent by the portable device, the monitored message content information is reported to the cloud server, and after the cloud server receives the message content information reported by the security monitoring device, the cloud server sends a security instruction for a user corresponding to the portable device to the security monitoring device, so that the security monitoring device executes security operation for the user corresponding to the portable device; that is, in this application embodiment, through the mutual cooperation of portable equipment, security protection supervisory equipment and cloud ware three, can in time carry out the security protection operation to the user when the user needs to carry out the security protection guarantee, strengthened the promptness and the validity of user security protection guarantee.
Corresponding to the method provided by the embodiment shown in fig. 2, based on the same idea, an embodiment of the present application further provides a security monitoring device, configured to execute the method provided by the embodiment shown in fig. 2, and fig. 4 is a schematic diagram of module composition of the security monitoring device provided by the embodiment of the present application, and as shown in fig. 4, the device includes:
a monitoring module 402, configured to monitor a wireless detection request packet sent by a portable device; wherein the wireless probe request message carries device-related information of the portable device;
a communication module 404, configured to report, when the wireless detection request packet is monitored, the monitored packet content information of the wireless detection request packet to a cloud service; receiving a security instruction which is issued by the cloud server and aims at a user corresponding to the portable equipment;
and the processor 406 is configured to execute a corresponding security operation according to the instruction of the security instruction.
Optionally, the security monitoring device provided in the embodiment of the present application may implement all the method steps in the embodiment shown in fig. 2, which is not described herein again.
The security protection monitoring equipment provided by the embodiment of the application can timely execute security protection operation aiming at a user when the user needs security protection guarantee, and the timeliness and effectiveness of the user security protection guarantee are enhanced.
Corresponding to the security monitoring method provided in the embodiment of the present application, the embodiment of the present application provides a network device, and referring to fig. 5, the network device includes a processor 510, a transceiver 520, a memory 530, and a bus interface. Wherein:
in this embodiment of the present invention, the network device 500 further includes: a computer program stored in the memory 530 and capable of running on the processor 510, where the computer program, when executed by the processor 510, implements all the method steps of the security monitoring method, and can achieve the same technical effect, and is not described herein again to avoid repetition.
In FIG. 5, the bus architecture may include any number of interconnected buses and bridges, with one or more processors, represented by processor 510, and various circuits, represented by memory 530, being linked together. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The transceiver 520 may be a number of elements including a transmitter and a receiver that provide a means for communicating with various other apparatus over a transmission medium.
The processor 510 is responsible for managing the bus architecture and general processing, and the memory 530 may store data used by the processor 510 in performing operations.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the processes of the method embodiments, and can achieve the same technical effects, and in order to avoid repetition, the details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (16)

1. A security monitoring system, comprising: the system comprises portable equipment, security monitoring equipment and a cloud server;
the portable equipment is used for sending a wireless detection request message to the outside; wherein the wireless probe request message carries device-related information of the portable device;
the security monitoring device is used for monitoring the wireless detection request message, and reporting the monitored message content information of the wireless detection request message to the cloud service when the wireless detection request message is monitored; receiving a security instruction issued by the cloud server, and executing corresponding security operation according to the instruction of the security instruction;
and the cloud server is used for receiving the message content information and issuing a security instruction aiming at the user corresponding to the portable equipment to the security monitoring equipment.
2. The system of claim 1, wherein the security instructions are to instruct the security monitoring device to collect image data;
correspondingly, the security protection supervisory equipment specifically is used for:
acquiring image data in a region to be monitored corresponding to the image data, adding the equipment related information into the image data, and uploading the image data added with the equipment related information to the cloud server;
the cloud server is further configured to:
and analyzing the image data, and if the analysis result indicates that the user corresponding to the portable equipment has an emergency, executing a security strategy aiming at the emergency.
3. The system of claim 2, wherein the device-related information carries signal strength indication (RSSI) data received by the portable device;
the cloud server is further configured to:
when message content information corresponding to the portable equipment reported by the security monitoring equipment is received, determining azimuth information corresponding to the portable equipment according to RSSI values corresponding to the portable equipment reported by the security monitoring equipment, and sending the azimuth information to the security monitoring equipment;
the security monitoring equipment is used for receiving the direction information and adjusting the corresponding monitoring area according to the direction information.
4. The system of claim 2, wherein the cloud server is specifically configured to:
and issuing an emergency alarm instruction to the security monitoring equipment so that the security monitoring equipment executes corresponding security operation according to the indication of the emergency alarm instruction.
5. The system of claim 1, wherein the security monitoring device is specifically configured to:
and encrypting the message content information according to a preset encryption algorithm, and transmitting ciphertext data corresponding to the message content information to the cloud server.
6. The system of claim 1, wherein the security monitoring device is further configured to:
when the device is in an off-line state, acquiring image data in a region to be monitored corresponding to the device, adding the device-related information into the image data, and when the device is in an on-line state, uploading the image data added with the device-related information to a cloud server.
7. The system of claim 1, wherein the portable device is specifically configured to:
when the wireless probe system is in an emergency working mode, sending a wireless probe request message outwards according to a first preset frequency, and when the wireless probe system is in a non-emergency working mode, sending the wireless probe request message outwards according to a second preset frequency; wherein the first preset frequency is greater than the second preset frequency.
8. The system according to claim 1, wherein the message content information further carries working mode information corresponding to the portable device; the working modes comprise an emergency working mode and a non-emergency working mode;
the cloud server is specifically configured to:
and judging whether the portable equipment is in an emergency working mode or not according to the message content information, if so, executing emergency security operation aiming at the user corresponding to the portable equipment.
9. The system of claim 1, wherein the portable device is further configured to send the security request to the security monitoring device;
the security monitoring device is further configured to receive the security request sent by the portable device, and execute security operation for a user corresponding to the portable device according to the security request and a preset security policy.
10. A security monitoring method is applied to security monitoring equipment and is characterized by comprising the following steps:
monitoring a wireless detection request message sent by the portable equipment; wherein the wireless probe request message carries device-related information of the portable device;
when the wireless detection request message is monitored, reporting the monitored message content information of the wireless detection request message to a cloud service;
and receiving a security instruction which is issued by the cloud server and aims at the user corresponding to the portable equipment, and executing corresponding security operation according to the instruction of the security instruction.
11. The method of claim 10, wherein the performing the corresponding security operation according to the indication of the security instruction comprises:
acquiring image data in a region to be monitored corresponding to the monitoring device;
adding the device-related information to the image data, and uploading the image data added with the device-related information to the cloud server.
12. The method of claim 10, wherein the method further comprises:
when the monitoring system is in an off-line state, acquiring image data in a region to be monitored corresponding to the monitoring system;
adding the device-related information to the image data, and uploading the image data added with the device-related information to a cloud server when the image data is in an online state.
13. The method of claim 10, wherein the method further comprises:
receiving the security request sent by the portable equipment;
and executing security protection operation aiming at the user corresponding to the portable equipment according to the security protection request and a preset security protection strategy.
14. A security monitoring device, the device comprising:
the monitoring module is used for monitoring a wireless detection request message sent by the portable equipment; wherein the wireless probe request message carries device-related information of the portable device;
the communication module is used for reporting the monitored message content information of the wireless detection request message to a cloud service when the wireless detection request message is monitored; receiving a security instruction which is issued by the cloud server and aims at a user corresponding to the portable equipment;
and the processor is used for executing corresponding security operation according to the instruction of the security instruction.
15. A computer device comprising a processor, a communication interface, a memory, and a communication bus; the processor, the communication interface and the memory complete mutual communication through a bus; the memory is used for storing a computer program; the processor, configured to execute the program stored in the memory, implements the method steps of any of claims 10-13.
16. A computer-readable storage medium, characterized in that a computer program is stored in the storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of the claims 10-13.
CN202110699892.9A 2021-06-23 2021-06-23 Security monitoring system, security monitoring method and security monitoring equipment Active CN113438306B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110699892.9A CN113438306B (en) 2021-06-23 2021-06-23 Security monitoring system, security monitoring method and security monitoring equipment
PCT/CN2022/094993 WO2022267803A1 (en) 2021-06-23 2022-05-25 Security and protection monitoring system, security and protection monitoring method, and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110699892.9A CN113438306B (en) 2021-06-23 2021-06-23 Security monitoring system, security monitoring method and security monitoring equipment

Publications (2)

Publication Number Publication Date
CN113438306A true CN113438306A (en) 2021-09-24
CN113438306B CN113438306B (en) 2022-07-08

Family

ID=77753600

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110699892.9A Active CN113438306B (en) 2021-06-23 2021-06-23 Security monitoring system, security monitoring method and security monitoring equipment

Country Status (2)

Country Link
CN (1) CN113438306B (en)
WO (1) WO2022267803A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022267803A1 (en) * 2021-06-23 2022-12-29 杭州萤石软件有限公司 Security and protection monitoring system, security and protection monitoring method, and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102201152A (en) * 2011-05-20 2011-09-28 汕头市星达电子科技有限公司 Intelligent security monitoring and alarming system and method thereof
CN103838155A (en) * 2012-11-27 2014-06-04 海尔集团公司 Family security control method, family server and security control system
CN104541312A (en) * 2012-07-05 2015-04-22 株式会社技术未来 Digital smart security system and method, and program
CN107979741A (en) * 2016-10-25 2018-05-01 杭州萤石网络有限公司 A kind of security-protecting and monitoring method, autonomous actions device and safety defense monitoring system
CN109802871A (en) * 2019-03-04 2019-05-24 佛山大鱼智能家居科技有限公司 The control method of intelligent safety and defence system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105163281A (en) * 2015-09-07 2015-12-16 广东欧珀移动通信有限公司 Indoor locating method and user terminal
CN105848094A (en) * 2016-05-11 2016-08-10 大连乐图数字科技有限公司 Tracking method, device and system
CN108242120A (en) * 2017-08-08 2018-07-03 上海仁微电子科技股份有限公司 A kind of identity-based identifies and positions the security protection detection system and method for tracking
CN109379716B (en) * 2018-11-22 2021-06-11 新智道枢(上海)科技有限公司 Indoor positioning method and system for security monitoring project
EP3755010A1 (en) * 2019-06-21 2020-12-23 Pycom Ltd User-requested message transmission to devices near a second device
CN112235711A (en) * 2019-06-28 2021-01-15 北京海益同展信息科技有限公司 Security system and positioning method for security system
CN113438306B (en) * 2021-06-23 2022-07-08 杭州萤石软件有限公司 Security monitoring system, security monitoring method and security monitoring equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102201152A (en) * 2011-05-20 2011-09-28 汕头市星达电子科技有限公司 Intelligent security monitoring and alarming system and method thereof
CN104541312A (en) * 2012-07-05 2015-04-22 株式会社技术未来 Digital smart security system and method, and program
CN103838155A (en) * 2012-11-27 2014-06-04 海尔集团公司 Family security control method, family server and security control system
CN107979741A (en) * 2016-10-25 2018-05-01 杭州萤石网络有限公司 A kind of security-protecting and monitoring method, autonomous actions device and safety defense monitoring system
CN109802871A (en) * 2019-03-04 2019-05-24 佛山大鱼智能家居科技有限公司 The control method of intelligent safety and defence system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022267803A1 (en) * 2021-06-23 2022-12-29 杭州萤石软件有限公司 Security and protection monitoring system, security and protection monitoring method, and device

Also Published As

Publication number Publication date
WO2022267803A1 (en) 2022-12-29
CN113438306B (en) 2022-07-08

Similar Documents

Publication Publication Date Title
EP3729391B1 (en) Monitoring system for securing networks from hacker drones
US10446000B2 (en) Detecting an intruder's wireless device during a break in to a premises
US8700769B2 (en) System and method for providing configurable security monitoring utilizing an integrated information system
US9521505B2 (en) Mobile telephone for internet applications
US8396453B2 (en) Method and apparatus for surreptitiously triggering the collection of data from a lost wireless communications device equipped with audio and/or video collection means
CA2989010C (en) Systems, methods and techniques for device pairing via a short-range pairing mechanism
CN108712561A (en) Right management method, device, mobile terminal and storage medium
US10068077B2 (en) False alarm avoidance
CN101854522B (en) Home wireless intelligent monitoring method
CN108632460A (en) Right management method, device, mobile terminal and storage medium
CN113408006A (en) Monitoring data access method and device, indoor monitoring system and storage medium
CN107094298A (en) Take precautions against module, wireless network access device and the method for illegal wireless network insertion
CN113438306B (en) Security monitoring system, security monitoring method and security monitoring equipment
CN107908939A (en) Terminal alarms method, apparatus and mobile terminal
CN107346597A (en) Internet coprocessing system based on wearable device
AU2014201153A1 (en) Radio frequency identification notification system
CN113341856B (en) Security monitoring system, security monitoring method and security monitoring equipment
CN107026798A (en) A kind of multifunctional intellectual route with safety defense monitoring system
CN110136305A (en) The Internet of Things lock system and its method led to based on the whole network
CN108632822A (en) Detection method, device and the mobile terminal of wireless access point
CN112988496A (en) Alarm prompting method, device and system and electronic equipment
CN201690561U (en) Household wireless intelligent monitor
US10825329B2 (en) Identifying data of a person using of a personal emergency device
KR101983252B1 (en) System and method for gathering neighboring device information
CN111341066B (en) Alarm method and system based on wireless probe

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant