CN113689686B - Intelligent security method and system applying big data service - Google Patents

Intelligent security method and system applying big data service Download PDF

Info

Publication number
CN113689686B
CN113689686B CN202110821576.4A CN202110821576A CN113689686B CN 113689686 B CN113689686 B CN 113689686B CN 202110821576 A CN202110821576 A CN 202110821576A CN 113689686 B CN113689686 B CN 113689686B
Authority
CN
China
Prior art keywords
terminal
information
area
alarm information
time period
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110821576.4A
Other languages
Chinese (zh)
Other versions
CN113689686A (en
Inventor
白锦文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Judun Technology Development Co ltd
Original Assignee
Guangzhou Judun Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Judun Technology Development Co ltd filed Critical Guangzhou Judun Technology Development Co ltd
Priority to CN202110821576.4A priority Critical patent/CN113689686B/en
Publication of CN113689686A publication Critical patent/CN113689686A/en
Application granted granted Critical
Publication of CN113689686B publication Critical patent/CN113689686B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B31/00Predictive alarm systems characterised by extrapolation or other computation using updated historic data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Computation (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Artificial Intelligence (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)

Abstract

The invention relates to the technical field of intelligent security, in particular to an intelligent security method and system applying big data service, which comprises the following steps: receiving trigger information from a first area; under the condition that the trigger information from the first area is obtained, sending first alarm information to at least one second terminal; when receiving execution information from a first terminal within a preset time period, sending completion information to a second terminal which has sent first alarm information in advance, and after receiving second alarm information, a security worker in a first area associated with the first terminal can send the execution information through the first terminal, wherein the preset time period refers to a time period when a time span from a starting point to an ending point when the first alarm information is sent reaches a preset time span. The method and the device have the effect of supervising the work of security personnel, so that the security personnel can respond to emergencies in time.

Description

Intelligent security method and system applying big data service
Technical Field
The invention relates to the technical field of intelligent security, in particular to an intelligent security method and system applying big data service.
Background
In the security protection mode of some buildings in the prior art, the building is generally divided into a plurality of areas, each area of the building is monitored by using a camera device and the like, a plurality of security protection personnel are arranged to patrol the plurality of areas respectively, and the security protection personnel in one area are responsible for security protection of one area. However, the inventors believe that this approach has the following disadvantages: in the event of negligence or poor driving, etc., of security personnel in charge of the area, the response to the emergency is not timely, and thus, improvement is awaited.
Disclosure of Invention
In order to play a role in monitoring the work of security personnel and enable the security personnel to respond to emergencies in time, the application provides the intelligent security method and system applying the big data service.
The above object of the present invention is achieved by the following technical solutions:
an intelligent security method applying big data service comprises the following steps:
receiving trigger information from a first area, wherein the trigger information is generated by a front-end camera device, the front-end camera device shoots the first area in real time to obtain video stream data, and the front-end camera device analyzes the video stream data and generates the trigger information according to an analysis result;
under the condition that trigger information from a first area is obtained, first alarm information is sent to at least one second terminal, the second terminal is associated with security personnel in a second area, and after the second terminal receives the first alarm information, the security personnel associated with the second terminal can send out second alarm information through the second terminal;
receiving execution information from a first terminal, wherein the first terminal is associated with security personnel in the first area, and after the first terminal receives second alarm information, the security personnel in the first area associated with the first terminal can send the execution information through the first terminal;
when receiving execution information from a first terminal within a preset time period, sending completion information to a second terminal which has sent first alarm information in advance, wherein after the first terminal receives the second alarm information, security personnel in a first area associated with the first terminal can send the execution information through the first terminal, and the preset time period refers to a time period when a time span from a starting point to a terminating point when the first alarm information is sent reaches a preset time span.
By adopting the technical scheme, the front-end camera device shoots the first area in real time to obtain video stream data, analyzes the obtained video stream data, generates trigger information according to an analysis result, namely when an emergency occurs in the first area, the trigger information can be generated, after receiving the trigger information, first alarm information is sent to at least one second terminal, after receiving the first alarm information, the second terminal can send second alarm information to the first terminal through the second terminal by security personnel associated with the second terminal, at the moment, the security personnel associated with the first terminal can send execution information through the first terminal, and when the security personnel send the execution information in a preset time period, the security personnel can timely perform accident processing, so that a mutual supervision effect is achieved among the security personnel.
The application may be further configured in a preferred example to: further comprising:
when the request information from the first terminal is received within a preset time period, or,
when any one of the execution information and the request information is not received from the first terminal within a preset time period:
the method comprises the steps of obtaining video stream data in a specified time period of a first area, analyzing the video stream data to generate recommended processing people, sending first assistance information to second terminals which are screened out according to a preset rule and have the same number as the recommended processing people, sending request information to security personnel in the first area related to the first terminal through the first terminal after the first terminal receives second alarm information, wherein the first assistance information comprises position information of the first terminal;
and when the second terminal reaches the position corresponding to the position information of the first terminal, sending a completion message to the second terminal which has sent the first assistance message in advance.
By adopting the technical scheme, the request information indicates that the security protection personnel in the first area need assistance, when the request information is received, the video stream data is analyzed to generate the recommended number of people to be processed, then the first assistance information is sent to the second terminals which are screened out according to the preset rule and have the same number as the recommended number of people to be processed, and when the security protection personnel related to the second terminals reach the position of the first terminal, the completion information is sent to the second terminal which sends the first assistance information in advance, so that when accidents or accidents occur to the security protection personnel in the first area, or the security protection personnel in the first area need assistance, the security protection personnel in other areas can support the first area according to the specific conditions of the emergency.
The present application may be further configured in a preferred example to: the second terminal is a terminal other than the first terminal, which has not received the second alarm information the latest time.
By adopting the technical scheme, the terminal is screened, so that the workload of security personnel processing the region is reduced.
The present application may be further configured in a preferred example to: the second terminals which are screened out according to the preset rule and have the same number as the recommended number of the processing people comprise the following steps:
and screening out the second terminals with the same quantity according to the sorting from far to near of the first sequence table, wherein the first sequence table is used for sorting each second terminal from far to near according to the position corresponding to the position information of the first terminal.
By adopting the technical scheme, the security personnel in the area with relatively short distance can be supported.
The present application may be further configured in a preferred example to: analyzing the video stream data to generate a recommended number of processing people comprises:
inputting the video stream data into a neural network model trained in advance through big data to generate recommended treatment population, wherein the neural network model is obtained by a plurality of groups of experimental data through machine learning training, and each group of experimental data in the plurality of groups of experimental data comprises: video stream data, and a recommended number of processing people corresponding to the video stream data.
The application also provides an intelligent security system applying the big data service.
An intelligent security system applying big data service, comprising:
the trigger information receiving module is used for receiving trigger information from a first area, the trigger information is generated by front-end camera equipment, the front-end camera equipment shoots the first area in real time to obtain video stream data, and the front-end camera equipment analyzes the video stream data and generates the trigger information according to an analysis result;
the alarm information sending module is used for sending first alarm information to at least one second terminal under the condition that trigger information from a first area is obtained, the second terminal is associated with security personnel in the second area, and after the second terminal receives the first alarm information, the security personnel associated with the second terminal can send out second alarm information through the second terminal;
the execution information receiving module is used for receiving execution information from a first terminal, the first terminal is associated with security personnel in the first area, and after the first terminal receives second alarm information, the security personnel in the first area associated with the first terminal can send out the execution information through the first terminal;
the system comprises a completion information sending module and a second terminal, wherein the completion information sending module is used for sending completion information to a second terminal which sends first alarm information in advance when receiving execution information from a first terminal within a preset time period, after the first terminal receives second alarm information, security personnel in a first area associated with the first terminal can send the execution information through the first terminal, and the preset time period refers to a time period when a time span from a starting point to a terminating point when the first alarm information is sent reaches a preset time span.
The application may be further configured in a preferred example to: further comprising:
an assistance information sending module, configured to, when the request information is received from the first terminal within a preset time period, or when any one of the execution information and the request information is not received from the first terminal within the preset time period: the method comprises the steps of obtaining video stream data in a specified time period of a first area, analyzing the video stream data to generate recommended processing people, sending first assistance information to second terminals which are screened out according to a preset rule and have the same number as the recommended processing people, sending request information to security personnel in the first area related to the first terminal through the first terminal after the first terminal receives second alarm information, wherein the first assistance information comprises position information of the first terminal;
and the assistance completion sending module is used for sending completion information to the second terminal which previously sends the first assistance information when the second terminal reaches the position corresponding to the position information of the first terminal.
The present application may be further configured in a preferred example to: the second terminals which are screened out according to the preset rule and have the same number as the recommended number of the processing persons comprise the following steps:
and screening out the second terminals with the same quantity according to the sorting from far to near of the first sequence table, wherein the first sequence table is used for sorting each second terminal from far to near according to the position corresponding to the position information of the first terminal.
In summary, the present application includes at least one of the following beneficial technical effects:
1. the method comprises the steps that a front-end camera device shoots a first area in real time to obtain video stream data, analyzes the obtained video stream data, generates trigger information according to an analysis result, namely when an emergency occurs in the first area, the trigger information can be generated, after the trigger information is received, first alarm information is sent to at least one second terminal, after the second terminal receives the first alarm information, security personnel associated with the second terminal can send second alarm information to the first terminal through the second terminal, at the moment, the security personnel associated with the first terminal can send execution information through the first terminal, and when the security personnel send the execution information within a preset time period, the security personnel can timely carry out accident processing, so that a mutual supervision effect is achieved among the security personnel;
2. the request information indicates that security personnel in the first area need assistance, when the request information is received, video stream data are analyzed to generate recommended processing people, then the first assistance information is sent to second terminals which are screened out according to a preset rule and are as many as the recommended processing people, when the security personnel related to the second terminals reach the position of the first terminal, completion information is sent to the second terminals which send the first assistance information in advance, and therefore when accidents or accidents occur to the security personnel in the first area or the security personnel in the first area need assistance, the security personnel in other areas can support the first area according to specific conditions of the emergency.
Drawings
FIG. 1 is a flowchart of an intelligent security method using big data service according to an embodiment of the present application;
FIG. 2 is a schematic block diagram of an embodiment of an intelligent security system using big data service;
fig. 3 is a schematic diagram of an apparatus in an embodiment of the present application.
Detailed Description
The present application is described in further detail below with reference to the accompanying drawings.
The application discloses an intelligent security method applying big data service, which specifically comprises the following steps with reference to fig. 1:
s1, receiving trigger information from a first area;
the trigger information is generated by front-end camera equipment, the front-end camera equipment shoots the first area in real time to obtain video stream data, and the front-end camera equipment analyzes the video stream data and generates the trigger information according to an analysis result;
in one embodiment, a building group consisting of a building and a plurality of buildings, or an area needing security precaution, is divided into a plurality of areas, including a first area to an nth area, each area is provided with a front-end camera device, the corresponding area is shot in real time, video stream data of the first area is obtained, after the video stream data is obtained, the front-end camera device analyzes the video stream data, specifically, behavior analysis is performed, the front-end camera device can adopt an intelligent network camera with the model of iDS-2CD6124FWD-I (Z)/B behavior analysis, and the front-end camera device generates trigger information according to a behavior analysis result when behaviors such as fighting, mechanical holding and the like are obtained through analysis; the terminal can be a handheld device, such as an intelligent device with a communication function, such as an interphone, a mobile phone and the like with a screen display function and a positioning function.
S2, sending first alarm information to at least one second terminal under the condition of acquiring the trigger information from the first area;
the second terminal is associated with security personnel in a second area, after the second terminal receives the first alarm information, the security personnel associated with the second terminal can send out second alarm information through the second terminal, and the first terminal is associated with the security personnel in the first area;
the areas can be distinguished by numbering the front-end camera equipment, and identifying the trigger information sent by different front-end camera equipment through identifying the numbers, so that the area where the trigger information is located is determined, and the association can be equipment, and security personnel in charge of the area can be equipped with a terminal. For example, security personnel in the first area are provided with the first terminal. When the second terminal receives the first alarm information, after security personnel consult the first alarm information, the second terminal can send out second alarm information, and before the second terminal receives the first alarm information, the second terminal cannot send out the second alarm information.
In a preferred embodiment, the second terminal is a terminal other than the first terminal, which has received the information not the second alarm information most recently.
This kind of setting for the security personnel who just received second alarm information can not receive first alarm information, and then has reduced the security personnel of second alarm information and received the possibility of first alarm information again, thereby can comparatively focus on and handle emergency.
S3, receiving execution information from the first terminal;
after the first terminal receives the second alarm information, security personnel in a first area associated with the first terminal can send out execution information through the first terminal;
the first terminal receives the second alarm information from the second terminal, at this time, security personnel associated with the first terminal can send execution information through the first terminal, and before the first terminal receives the second alarm information, the first terminal cannot send the execution information, so that when the security personnel send the execution information through the first terminal, the execution confirmation of the security personnel in the first area is represented.
S4, when the execution information from the first terminal is received within a preset time period, sending completion information to a second terminal which has sent first alarm information in advance;
after the first terminal receives the second alarm information, security personnel in the first area associated with the first terminal can send execution information through the first terminal, and the preset time period refers to a time period from a starting point to a termination point when the first alarm information is sent to the time period when the time span reaches the preset time span.
For example, the preset time period may be a time period having a time span of 30s from when the first alarm information is issued, and the time span may be set autonomously in advance, and when the execution information from the first terminal is received within the time period, the completion information is transmitted to the second terminal that has previously transmitted the first alarm information.
S5, when the request information from the first terminal is received in the preset time period, or when any one of the execution information and the request information from the first terminal is not received in the preset time period: acquiring video stream data in a designated time period of a first area, analyzing the video stream data to generate recommended processing people, and sending first assistance information to second terminals which are screened out according to a preset rule and have the same number as the recommended processing people;
after the first terminal receives the second alarm information, security personnel in a first area associated with the first terminal can send request information through the first terminal, and the first assistance information comprises position information of the first terminal;
when a security worker sends a request information representation request for assistance through a first terminal, or when the security worker does not send any one of request information and execution information through the first terminal within a preset time period, the fact that the security worker in a first area possibly needs assistance or cannot handle an emergency is indicated, when the request information of the first terminal is received, video stream data in a specified time period of the first area are obtained, the specified time period can be a time period with a time span from a starting point to an ending point of receiving trigger information as a preset time span, for example, the preset time span is 20s, the video stream data are analyzed, and accordingly a recommended processing number of people is generated, first assistance information is sent to second terminals which are screened out according to a preset rule and have the same number as the recommended processing number of people, when the security worker associated with the second terminals arrives at the position of the first terminal, completion information is sent to second terminals which have sent first assistance information in advance, and accordingly, when an accident or an accident occurs to the security worker in the first area, or when the security worker in the first area needs assistance, the security worker in the other areas can specifically support the emergency according to the first area.
Wherein analyzing the video stream data to generate the recommended number of people to process comprises:
inputting video stream data into a neural network model trained in advance through big data to generate recommended treatment population, wherein the neural network model is obtained by a plurality of groups of experimental data through machine learning training, and each group of experimental data in the plurality of groups of experimental data comprises: video stream data, and a recommended number of processing people corresponding to the video stream data.
And with the increase of experimental data, the reasoning of recommended treatment population is more accurate.
The second terminals which are screened out according to the preset rule and have the same number as the recommended number of the processing people comprise the following steps:
and screening out the second terminals with the same quantity according to the sorting from far to near of the first sequence table, wherein the first sequence table is used for sorting each second terminal from far to near according to the position corresponding to the position information of the first terminal.
For example, there are 10 second terminals, the first sequence list sorts the 10 second terminals according to their distance from the first terminal, and the recommended number of people to be treated is 3, then the first assistance information is sent to the first three second terminals in the first sequence list.
And S6, when the second terminal reaches the position corresponding to the position information of the first terminal, sending completion information to the second terminal which has sent the first assistance information in advance.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
In an embodiment, an intelligent security system using big data service is provided, and the intelligent security system using big data service corresponds to the intelligent security method using big data service in the above embodiment one to one. As shown in fig. 2, the smart security system using big data service includes a trigger information receiving module, an alarm information sending module, an execution information receiving module, and a completion information sending module. The functional modules are explained in detail as follows:
the trigger information receiving module is used for receiving trigger information from the first area, the trigger information is generated by front-end camera equipment, the front-end camera equipment shoots the first area in real time to obtain video stream data, the front-end camera equipment analyzes the video stream data and generates the trigger information according to an analysis result;
the alarm information sending module is used for sending first alarm information to at least one second terminal under the condition that the trigger information from the first area is obtained, the second terminal is associated with security personnel in the second area, and after the second terminal receives the first alarm information, the security personnel associated with the second terminal can send out second alarm information through the second terminal;
the execution information receiving module is used for receiving execution information from the first terminal, the first terminal is associated with security personnel in the first area, and after the first terminal receives the second alarm information, the security personnel in the first area associated with the first terminal can send the execution information through the first terminal;
the system comprises a completion information sending module and a second terminal, wherein the completion information sending module is used for sending the completion information to the second terminal which sends first alarm information in advance when receiving execution information from the first terminal in a preset time period, after the first terminal receives the second alarm information, security personnel in a first area associated with the first terminal can send the execution information through the first terminal, and the preset time period refers to a time period when a time span from a starting point to a terminating point when the first alarm information is sent reaches a preset time span.
Optionally, the method further includes:
an assistance information sending module, configured to, when the request information is received from the first terminal within a preset time period, or when any one of the execution information and the request information is not received from the first terminal within the preset time period: acquiring video stream data in a specified time period of a first area, analyzing the video stream data to generate a recommended processing number of people, sending first assistance information to second terminals which are screened out according to a preset rule and have the same number as the recommended processing number of people, and sending request information by security personnel in the first area related to the first terminal through the first terminal after the first terminal receives second alarm information, wherein the first assistance information comprises position information of the first terminal;
and the assistance completion sending module is used for sending completion information to the second terminal which has sent the first assistance information before when the second terminal reaches the position corresponding to the position information of the first terminal.
For specific limitations of the smart security system using the big data service, reference may be made to the above limitations of the smart security method using the big data service, which are not described herein again. All modules in the intelligent security system applying the big data service can be completely or partially realized through software, hardware and a combination of the software and the hardware. The modules can be embedded in a hardware form or independent of a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 3. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to realize an intelligent security method applying big data service.
In one embodiment, there is provided a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
receiving trigger information from the first area, wherein the trigger information is generated by front-end camera equipment, the front-end camera equipment shoots the first area in real time to obtain video stream data, and the front-end camera equipment analyzes the video stream data and generates the trigger information according to an analysis result;
under the condition that the trigger information from the first area is obtained, sending first alarm information to at least one second terminal, wherein the second terminal is associated with security personnel in the second area, and after receiving the first alarm information, the security personnel associated with the second terminal can send out second alarm information through the second terminal;
receiving execution information from the first terminal, wherein the first terminal is associated with security personnel in the first area, and after the first terminal receives the second alarm information, the security personnel in the first area associated with the first terminal can send the execution information through the first terminal;
when receiving execution information from a first terminal within a preset time period, sending completion information to a second terminal which has sent first alarm information in advance, and after receiving second alarm information, a security worker in a first area associated with the first terminal can send the execution information through the first terminal, wherein the preset time period refers to a time period when a time span from a starting point to an ending point when the first alarm information is sent reaches a preset time span.
When the computer program is executed by a processor, the intelligent security method applying the big data service in the method embodiment can be realized.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
receiving trigger information from the first area, wherein the trigger information is generated by front-end camera equipment, the front-end camera equipment shoots the first area in real time to obtain video stream data, and the front-end camera equipment analyzes the video stream data and generates the trigger information according to an analysis result;
under the condition that the trigger information from the first area is obtained, sending first alarm information to at least one second terminal, wherein the second terminal is associated with security personnel in the second area, and after receiving the first alarm information, the security personnel associated with the second terminal can send out second alarm information through the second terminal;
receiving execution information from the first terminal, wherein the first terminal is associated with security personnel in the first area, and after the first terminal receives the second alarm information, the security personnel in the first area associated with the first terminal can send the execution information through the first terminal;
when receiving execution information from a first terminal within a preset time period, sending completion information to a second terminal which has sent first alarm information in advance, and after receiving second alarm information, a security worker in a first area associated with the first terminal can send the execution information through the first terminal, wherein the preset time period refers to a time period when a time span from a starting point to an ending point when the first alarm information is sent reaches a preset time span.
The computer program can realize the intelligent security method applying the big data service in any one of the above method embodiments when being executed by the processor.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above may be implemented by hardware that is instructed by a computer program, and the computer program may be stored in a non-volatile computer-readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the system is divided into different functional units or modules to perform all or part of the above-mentioned functions.
The above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (4)

1. An intelligent security method applying big data service is characterized by comprising the following steps:
receiving trigger information from a first area, wherein the trigger information is generated by a front-end camera device, the front-end camera device shoots the first area in real time to obtain video stream data, and the front-end camera device analyzes the video stream data and generates the trigger information according to an analysis result;
under the condition that trigger information from a first area is obtained, first alarm information is sent to at least one second terminal, the second terminal is associated with security personnel in a second area, and after the second terminal receives the first alarm information, the security personnel associated with the second terminal can send out second alarm information through the second terminal;
receiving execution information from a first terminal, wherein the first terminal is associated with security personnel in the first area, and after the first terminal receives second alarm information, the security personnel in the first area associated with the first terminal can send the execution information through the first terminal;
when receiving execution information from a first terminal within a preset time period, sending completion information to a second terminal which has sent first alarm information in advance, wherein after the first terminal receives second alarm information, security personnel in a first area associated with the first terminal can send the execution information through the first terminal, and the preset time period refers to a time period when a time span from a starting point to a terminating point when the first alarm information is sent reaches a preset time span;
when the request information from the first terminal is received within a preset time period, or,
when any one of the execution information and the request information is not received from the first terminal within a preset time period:
the method comprises the steps that video stream data in a designated time period of a first area are obtained, the video stream data are analyzed to generate the recommended number of people to be processed, first assistance information is sent to second terminals which are screened out according to a preset rule and are the same as the recommended number of people to be processed, after the first terminals receive second alarm information, security personnel in the first area related to the first terminals can send request information through the first terminals, and the first assistance information comprises position information of the first terminals;
when the second terminal reaches the position corresponding to the position information of the first terminal, sending a completion message to the second terminal which has sent the first assistance message in advance;
the second terminal is a terminal other than the first terminal, in which the information received last time is not the second alarm information.
2. The intelligent security method using big data services according to claim 1, wherein the second terminals screened out according to the preset rules and having the same number of people as the recommended processing people comprise the steps of:
and screening out the second terminals with the same quantity according to the sorting from far to near of the first sequence table, wherein the first sequence table is used for sorting each second terminal from far to near according to the position corresponding to the position information of the first terminal.
3. The smart security method applying big data service as claimed in claim 1, wherein analyzing the video stream data to generate a recommended number of people to handle comprises:
inputting the video stream data into a neural network model trained in advance through big data to generate a recommended number of people to be treated, wherein the neural network model is obtained by carrying out machine learning training on a plurality of groups of experimental data, and each group of experimental data in the plurality of groups of experimental data comprises: video stream data, and a recommended number of processing people corresponding to the video stream data.
4. The utility model provides an use intelligent security system of big data service which characterized in that includes:
the trigger information receiving module is used for receiving trigger information from a first area, the trigger information is generated by front-end camera equipment, the front-end camera equipment shoots the first area in real time to obtain video stream data, and the front-end camera equipment analyzes the video stream data and generates the trigger information according to an analysis result;
the alarm information sending module is used for sending first alarm information to at least one second terminal under the condition that trigger information from a first area is obtained, the second terminal is associated with security personnel in the second area, and after the second terminal receives the first alarm information, the security personnel associated with the second terminal can send out second alarm information through the second terminal;
the execution information receiving module is used for receiving execution information from a first terminal, the first terminal is associated with security personnel in the first area, and after the first terminal receives second alarm information, the security personnel in the first area associated with the first terminal can send out the execution information through the first terminal;
the system comprises a completion information sending module, a completion information sending module and a second terminal, wherein the completion information sending module is used for sending completion information to a second terminal which sends first alarm information in advance when receiving execution information from a first terminal in a preset time period, after the first terminal receives second alarm information, security personnel in a first area related to the first terminal can send the execution information through the first terminal, and the preset time period refers to a time period when a time span from a starting point to a terminating point when the first alarm information is sent reaches a preset time span;
an assistance information sending module, configured to, when the request information is received from the first terminal within a preset time period, or when any one of the execution information and the request information is not received from the first terminal within the preset time period: the method comprises the steps of obtaining video stream data in a specified time period of a first area, analyzing the video stream data to generate recommended processing people, sending first assistance information to second terminals which are screened out according to a preset rule and have the same number as the recommended processing people, sending request information to security personnel in the first area related to the first terminal through the first terminal after the first terminal receives second alarm information, wherein the first assistance information comprises position information of the first terminal;
the assistance completion sending module is used for sending completion information to a second terminal which sends first assistance information before when the second terminal reaches the position corresponding to the position information of the first terminal; the second terminals which are screened out according to the preset rule and have the same number as the recommended number of the processing persons comprise:
screening out the second terminals with the same quantity according to the sorting of a first sequence table from far to near, wherein the first sequence table is used for sorting each second terminal from far to near according to the position corresponding to the position information of the first terminal;
the second terminal is a terminal other than the first terminal, in which the information received last time is not the second alarm information.
CN202110821576.4A 2021-07-20 2021-07-20 Intelligent security method and system applying big data service Active CN113689686B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110821576.4A CN113689686B (en) 2021-07-20 2021-07-20 Intelligent security method and system applying big data service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110821576.4A CN113689686B (en) 2021-07-20 2021-07-20 Intelligent security method and system applying big data service

Publications (2)

Publication Number Publication Date
CN113689686A CN113689686A (en) 2021-11-23
CN113689686B true CN113689686B (en) 2022-11-01

Family

ID=78577495

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110821576.4A Active CN113689686B (en) 2021-07-20 2021-07-20 Intelligent security method and system applying big data service

Country Status (1)

Country Link
CN (1) CN113689686B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5844481A (en) * 1997-03-11 1998-12-01 Quintus; John J. Intrusion detector for security systems
CN102930702A (en) * 2012-10-31 2013-02-13 深圳辉锐天眼科技有限公司 Zero false alarm networking video security method and system thereof
CN206696985U (en) * 2017-03-09 2017-12-01 广东中安金狮科创有限公司 Intelligent alarm device and warning system
CN109769204A (en) * 2019-03-15 2019-05-17 上海救要救信息科技有限公司 A kind of method and apparatus for rescuer's offer rescue information
CN110267250A (en) * 2019-07-04 2019-09-20 长沙环康科技有限公司 Intelligent rescue system and its backstage response rescue signal method
CN112535832A (en) * 2020-11-06 2021-03-23 珠海格力电器股份有限公司 Intelligent fire regulation and control method, system and intelligent equipment
CN113076369A (en) * 2021-04-20 2021-07-06 广东粤安科技股份有限公司 Real-time fire-fighting supervision method and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100060783A (en) * 2008-11-28 2010-06-07 삼성전자주식회사 System and method for sos rescue and prevention of crime
CN104348894B (en) * 2013-08-09 2019-01-15 联想(北京)有限公司 A kind of information processing method, cloud server, mobile terminal
CN103957514B (en) * 2014-04-17 2018-03-16 小米科技有限责任公司 Prompt the method and device of user

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5844481A (en) * 1997-03-11 1998-12-01 Quintus; John J. Intrusion detector for security systems
CN102930702A (en) * 2012-10-31 2013-02-13 深圳辉锐天眼科技有限公司 Zero false alarm networking video security method and system thereof
CN206696985U (en) * 2017-03-09 2017-12-01 广东中安金狮科创有限公司 Intelligent alarm device and warning system
CN109769204A (en) * 2019-03-15 2019-05-17 上海救要救信息科技有限公司 A kind of method and apparatus for rescuer's offer rescue information
CN110267250A (en) * 2019-07-04 2019-09-20 长沙环康科技有限公司 Intelligent rescue system and its backstage response rescue signal method
CN112535832A (en) * 2020-11-06 2021-03-23 珠海格力电器股份有限公司 Intelligent fire regulation and control method, system and intelligent equipment
CN113076369A (en) * 2021-04-20 2021-07-06 广东粤安科技股份有限公司 Real-time fire-fighting supervision method and system

Also Published As

Publication number Publication date
CN113689686A (en) 2021-11-23

Similar Documents

Publication Publication Date Title
CN1766771A (en) Scalable and flexible information security for industrial automation
CN110276458A (en) Processing method, device, storage medium and the electronic device of vehicle trouble
CN111046075A (en) Project supervision informatization construction and management method and device
CN108171346B (en) Method and device for processing instrument control maintenance data of nuclear power plant and computer equipment
WO2022165965A1 (en) Behavior data monitoring method and apparatus, and device and medium
CN111401799A (en) Man-machine cooperative scheduling method and device, electronic equipment and storage medium
CN116822715A (en) Safety production monitoring and early warning system based on artificial intelligence
CN112489252A (en) Real-time network engineering monitoring alarm system
CN113160509A (en) Risk sensing method and system suitable for communities and construction sites
CN113689686B (en) Intelligent security method and system applying big data service
CN115311825A (en) Alarm data pushing method and device for PCB (printed Circuit Board) equipment, computer equipment and storage medium
CN112434335A (en) Business problem processing method and device, computer equipment and storage medium
CN111901554A (en) Call channel construction method and device based on semantic clustering and computer equipment
CN111178714A (en) Intimacy degree determination method and device, computer equipment and storage medium
CN108307081B (en) Harassment data batch processing method and device
CN109302441B (en) Electronic supervision method for patrol visit service
CN112541741A (en) Intelligent nursing home personnel management method, system, equipment and medium
CN112738027B (en) Data processing method and device and electronic equipment
CN117994887B (en) Gate system
CN110647450B (en) Method and device for repairing break point of business process, computer equipment and storage medium
CN116958903B (en) Intelligent factory safety supervision method under multi-linkage safety control mechanism
CN111722983B (en) Configurable event operation control method and system
CN115527282A (en) Smart campus student supervision method, system, equipment and storage medium
CN116166891B (en) Event re-pushing method and related device based on real estate management system
CN113743249B (en) Method, device and equipment for identifying violations and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant