CN115100812A - Intelligent security monitoring method, system and device and electronic equipment - Google Patents

Intelligent security monitoring method, system and device and electronic equipment Download PDF

Info

Publication number
CN115100812A
CN115100812A CN202210792930.XA CN202210792930A CN115100812A CN 115100812 A CN115100812 A CN 115100812A CN 202210792930 A CN202210792930 A CN 202210792930A CN 115100812 A CN115100812 A CN 115100812A
Authority
CN
China
Prior art keywords
monitoring
security
alarm
information
alarm information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210792930.XA
Other languages
Chinese (zh)
Inventor
卢皓
徐坤
徐聪
戴立先
王伟
王剑涛
丁东山
黄敏
王小海
俞庭
刘为飞
茹高明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Science And Industry Co ltd
Original Assignee
China Construction Science And Industry Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Science And Industry Co ltd filed Critical China Construction Science And Industry Co ltd
Priority to CN202210792930.XA priority Critical patent/CN115100812A/en
Publication of CN115100812A publication Critical patent/CN115100812A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B19/00Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
    • G08B19/005Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow combined burglary and fire alarm systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/10Geometric CAD
    • G06F30/13Architectural design, e.g. computer-aided architectural design [CAAD] related to design of buildings, bridges, landscapes, production plants or roads
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/20Checking timed patrols, e.g. of watchman
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/181Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using active radiation detection systems
    • G08B13/183Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using active radiation detection systems by interruption of a radiation beam or barrier
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B7/00Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
    • G08B7/06Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2111/00Details relating to CAD techniques
    • G06F2111/20Configuration CAD, e.g. designing by assembling or positioning modules selected from libraries of predesigned modules

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Geometry (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Architecture (AREA)
  • Civil Engineering (AREA)
  • Structural Engineering (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses an intelligent security monitoring method, a system device and electronic equipment, wherein the intelligent security monitoring method is applied to a monitoring platform, the monitoring platform is in communication connection with a region controller, and the region controller is connected with monitoring alarm equipment and is used for receiving alarm information uploaded by the monitoring alarm equipment; the intelligent security monitoring method comprises the following steps: when alarm information sent by the area controller is received, calling a target BIM model of a building at a corresponding position from a pre-stored BIM model database according to the position information of the building at the intrusion event contained in the alarm information; performing security simulation analysis on the target BIM according to type information and position information of monitoring alarm equipment sending the alarm information, which are contained in the alarm information; and sending the alarm information and the security simulation analysis result to a security management platform.

Description

Intelligent security monitoring method, system and device and electronic equipment
Technical Field
The invention relates to the technical field of intelligent security, in particular to an intelligent security monitoring method, system and device and electronic equipment.
Background
The security monitoring system is an independent and complete system formed by transmitting video signals in a closed loop by using optical fibers, coaxial cables or microwaves, displaying and recording images, can reflect a monitored object in real time, vividly and truly, can replace manual work to monitor for a long time in a severe environment, and records the video signals through a video recorder. At present in the security protection field, most building engineering project sensing equipment mainly adopts traditional sensor, like electromagnetism, chemicals, security protection monitoring is realized to the sensor of types such as electromechanics, it is used in security protection monitoring system, there is the interference of receiving easily, the monitoring coverage is continuous inadequately, be difficult to reflect the defect of the monitoring general appearance of security protection scope, functional module is single, the control level is low, be difficult to handle emergent accident, rely on defects such as manpower completely, be difficult to satisfy people's demand, consequently, need to form one set of high-efficient, the safety protection system of intelligence urgently, provide corresponding technical support for the information-based management of building engineering project, safe operation for the project, emergent the powerful guarantee is provided.
Disclosure of Invention
Therefore, the technical problems to be solved by the invention are to overcome the defects of the existing security system that the interference is easy to receive, the monitoring coverage is not continuous enough, the monitoring overall view of the security range is difficult to reflect, the function module is single, the monitoring level is low, the emergency accident is difficult to process, and the manpower is completely relied on, thereby providing an intelligent security monitoring method, a system, a device and an electronic device.
According to a first aspect, the embodiment of the invention discloses an intelligent security monitoring method which is applied to a monitoring platform, wherein the monitoring platform is in communication connection with a zone controller, and the zone controller is connected with a monitoring alarm device and used for receiving alarm information uploaded by the monitoring alarm device; the method comprises the following steps: when alarm information sent by the area controller is received, calling a target BIM model of a building at a corresponding position from a pre-stored BIM model database according to the position information of the building at the intrusion event contained in the alarm information; performing security simulation analysis on the target BIM according to type information and position information of monitoring alarm equipment sending the alarm information, which are contained in the alarm information; and sending the alarm information and the security simulation analysis result to a security management platform.
According to the intelligent security monitoring method provided by the invention, the alarm information sent by the area controller is received, the target BIM model is called according to the alarm information, security simulation analysis is carried out on the target BIM model according to the alarm information, and then the alarm information and the security simulation analysis result are sent to the security management platform, so that the security management platform can conveniently carry out security processing, and the intelligent level of security monitoring and processing is effectively improved.
Optionally, after the alarm information and the security simulation analysis result are sent to a security management platform, the method further includes: acquiring security processing information generated after the management platform processes the alarm information according to a security simulation analysis result; and inputting the security processing information into the target BIM model for storage.
By the method, the security processing information generated after the management platform processes the alarm information according to the security simulation analysis result is stored in the target BIM, so that BIM model data can be effectively enriched.
Optionally, when receiving the alarm information sent by the zone controller, invoking a target BIM model of a building at a corresponding position from a pre-stored BIM model database according to the intrusion event building position information included in the alarm information, where the invoking includes: and acquiring monitoring image data of a corresponding area of the monitoring alarm equipment which sends the alarm information, and sending the monitoring image data to a security management platform.
By the method, the monitoring image data of the area corresponding to the monitoring alarm equipment which sends the alarm information is sent to the security management platform, so that management personnel can conveniently monitor and analyze the area where the unsafe event occurs through the security management platform.
According to a second aspect, an embodiment of the present invention further discloses an intelligent security monitoring system, including: each zone controller is connected with the monitoring alarm equipment in the corresponding zone and used for receiving alarm information sent by the intrusion monitoring equipment; and the monitoring platform is connected with each zone controller and is used for executing the intelligent security monitoring method according to the first aspect or any optional embodiment of the first aspect.
According to the intelligent security monitoring system provided by the invention, the alarm information sent by the intrusion monitoring equipment is received through the area controller and is sent to the monitoring platform, the monitoring platform calls the target BIM according to the alarm information, security simulation analysis is carried out on the target BIM according to the alarm information, and then the alarm information and the security simulation analysis result are sent to the security management platform, so that the security management platform can conveniently carry out security processing, the intelligent level of security monitoring and processing is effectively improved, and centralized monitoring and unified management are realized.
Optionally, the plurality of intrusion alert area controllers are communicatively connected by a fiber ring network.
The optical fiber ring network is used for carrying out communication connection on the plurality of intrusion alarm area controllers, and effectively preventing any connecting line in the optical fiber network connected with the plurality of area controllers from being broken, thereby influencing the potential network safety hazard brought by one area in connection, preventing one connection from being broken to influence the whole network, and enabling the network to be in a redundant mode.
Optionally, the monitoring alarm device includes any one or more of an alarm, a web camera, a door controller, a night stick, and an infrared correlation detector.
According to a third aspect, the embodiment of the invention further discloses an intelligent security monitoring device, which is applied to a monitoring platform, wherein the monitoring platform is in communication connection with a zone controller, and the zone controller is connected with a monitoring alarm device and used for receiving alarm information uploaded by the monitoring alarm device; the device comprises: the receiving module is used for calling a target BIM model of a building at a corresponding position from a pre-stored BIM model database according to the position information of the intrusion event building contained in the alarm information when the alarm information sent by the zone controller is received; the analysis module is used for performing security simulation analysis on the target BIM according to type information and position information of monitoring alarm equipment which sends the alarm information and is contained in the alarm information; and the sending module is used for sending the alarm information and the security simulation analysis result to a security management platform.
Optionally, the apparatus further comprises: the information generation module is used for acquiring security processing information generated after the management platform processes the alarm information according to a security simulation analysis result; and the storage module is used for inputting the security processing information into the target BIM model for storage.
According to a fourth aspect, an embodiment of the present invention further discloses an electronic device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions being executable by the at least one processor to cause the at least one processor to perform the steps of the intelligent security monitoring method according to the first aspect or any one of the optional embodiments of the first aspect.
According to a fifth aspect, the present invention further discloses a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the intelligent security monitoring method according to the first aspect or any optional embodiment of the first aspect.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flowchart illustrating an example of a security monitoring method according to an embodiment of the present invention;
FIG. 2 is a schematic block diagram of a specific example of an intelligent security monitoring system according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating an embodiment of a security monitoring system according to the present invention;
FIG. 4 is a diagram illustrating an embodiment of a security monitoring system according to the present invention;
FIG. 5 is a schematic block diagram of a specific example of a security monitoring device according to an embodiment of the present invention;
fig. 6 is a diagram of a specific example of an electronic device in an embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc. indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplification of description, but do not indicate or imply that the device or element referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; the two elements may be directly connected or indirectly connected through an intermediate medium, or may be connected through the inside of the two elements, or may be connected wirelessly or through a wire. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
The embodiment of the invention discloses an intelligent security monitoring method which is applied to a monitoring platform, wherein the monitoring platform is in communication connection with a region controller, the region controller is connected with a monitoring alarm device and used for receiving alarm information uploaded by the monitoring alarm device and can be used for security monitoring of construction engineering projects, as shown in figure 1, the method comprises the following steps:
and 101, when receiving alarm information sent by the zone controller, calling a target BIM model of a building at a corresponding position from a pre-stored BIM model database according to the position information of the building at the intrusion event contained in the alarm information.
Illustratively, the alarm information sent by the zone controller may include, but is not limited to, alarm information uploaded by monitoring alarm devices, where the alarm information includes building location information of an intrusion event, the monitoring platform invokes, from a pre-stored BIM model database, a target BIM model of a building at a corresponding location according to the building location information of the intrusion event, the BIM database may pre-store a BIM model corresponding to the building related to the construction project, the BIM model may include electromechanical design attribute information of the building itself, data information (quality information, safety information, etc.) generated based on a construction stage may also be synchronously updated into the BIM model, and the BIM model includes installation locations of all monitoring alarm devices displayed in the corresponding building. In the embodiment of the application, when monitoring unsafe factors, a monitoring alarm device automatically generates alarm information and uploads the alarm information to a regional controller, the regional controller sends the received alarm information to a monitoring platform, the monitoring platform calls a corresponding BIM model according to the alarm information, image elements in a region and a position corresponding to the alarm information in the BIM model flicker, the specific condition of an abnormal position can be checked by clicking the position, the attribute of a component is inquired through an information table in a BIM database, the unique value of the BIM model is associated with an external key of the document to realize calling, the BIM model database has a table, two fields in the BIM model database are used for associating the model with the attribute information of the document, one is the unique value of the document or the attribute, the other is the unique value of the model component, and the model component is clicked to obtain the unique value by inquiring the table, and finding the unique value of the document or the attribute in the table, then inquiring the document to open the document, and inquiring the attribute to display the attribute.
102, performing security simulation analysis on the target BIM according to type information and position information of monitoring alarm equipment sending the alarm information, which are contained in the alarm information.
Illustratively, the monitoring alarm device type information can comprise a fire alarm, a video monitor, an access controller and an infrared correlation detector, and the security simulation analysis is to perform simulation analysis on unsafe factors on a BIM (building information modeling) model according to the monitoring alarm device type information and the position information which send alarm information, and to reckon the reasons of the occurrence of the unsafe factors to obtain a solution. In the embodiment of the application, the specific type of the unsafe factor can be judged according to the type information of the monitoring alarm device, for example, when the alarm information is uploaded by a fire alarm, the fire at the position corresponding to the fire alarm can be determined, and the rescue path simulation analysis is carried out on the corresponding BIM according to the position information of the monitoring alarm device contained in the alarm information.
And 103, sending the alarm information and the security simulation analysis result to a security management platform.
Illustratively, the monitoring platform sends the alarm information and the security simulation analysis result to the security management platform, so that management personnel can monitor and process related information through the security management platform conveniently.
According to the intelligent security monitoring method, the alarm information sent by the area controller is received, the target BIM is called according to the alarm information, security simulation analysis is carried out on the target BIM according to the alarm information, then the alarm information and the security simulation analysis result are sent to the security management platform, the security management platform can conveniently carry out security processing, and the intelligent level of security monitoring and processing is effectively improved.
As an optional implementation manner of the present invention, after the alarm information and the security simulation analysis result are sent to the security management platform, the method further includes: acquiring security processing information generated after the management platform processes the alarm information according to a security simulation analysis result; and inputting the security processing information into the target BIM model for storage.
Exemplarily, the security management platform processes abnormal conditions (unsafe factors) corresponding to the alarm information according to the security simulation analysis result to obtain a processing result, generates security processing information according to the processing result and feeds the security processing information back to the monitoring platform, and the monitoring platform inputs the obtained security processing information into the target BIM model. By the method, the security processing information generated after the security management platform processes the alarm information according to the security simulation analysis result is stored in the target BIM, so that BIM model data can be effectively enriched, and a reference scheme can be provided when similar problems occur.
As an optional embodiment of the present invention, when receiving alarm information sent by the zone controller, the method for calling a target BIM model of a building at a corresponding location from a pre-stored BIM model database according to intrusion event building location information included in the alarm information includes: and acquiring monitoring image data of a corresponding area of the monitoring alarm equipment which sends the alarm information, and sending the monitoring image data to a security management platform.
Illustratively, when the monitoring platform receives the alarm information, the monitoring platform can link a camera in the corresponding area to automatically track the area according to the alarm information to obtain monitoring image data of a relevant site, and sends the monitoring image data of the area corresponding to the monitoring alarm equipment which sends the alarm information to the security management platform, so that managers can conveniently monitor and analyze the area where the unsafe event occurs through the security management platform.
The embodiment of the invention also discloses an intelligent security monitoring system, as shown in fig. 2, the system comprises:
and each zone controller 201 is connected with the monitoring alarm equipment in the corresponding zone and is used for receiving alarm information sent by the intrusion monitoring equipment. Illustratively, the area monitoring device is configured to receive alarm information sent by the intrusion monitoring device in a corresponding area, and send the alarm information out.
And the monitoring platform 202 is connected with each of the zone controllers and is used for executing the intelligent security monitoring method in the embodiment. For example, the specific details of the monitoring platform may be understood with reference to the corresponding related description and effects in the embodiment shown in fig. 1, and are not described herein again.
According to the intelligent security monitoring system provided by the embodiment of the invention, the alarm information sent by the intrusion monitoring equipment is received through the area controller and sent to the monitoring platform, the monitoring platform calls the target BIM according to the alarm information, security simulation analysis is carried out on the target BIM according to the alarm information, and then the alarm information and the security simulation analysis result are sent to the security management platform, so that the security management platform can conveniently carry out security processing, the intelligent level of security monitoring and processing is effectively improved, and centralized monitoring and unified management are realized.
As an optional embodiment of the present invention, the plurality of intrusion alert area controllers are communicatively connected through an optical fiber ring network. Illustratively, the plurality of intrusion alarm area controllers are in communication connection through the optical fiber ring network, so that any connecting line in the optical fiber network connecting the plurality of area controllers is effectively prevented from being broken, the potential network safety hazard brought by one area in connection is influenced, the whole network is prevented from being influenced by the fault of one connection, and the network is in a redundancy mode.
As an optional embodiment of the invention, the monitoring alarm device comprises any one or more of an alarm, a network camera, an entrance guard controller, a night stick and an infrared correlation detector.
Illustratively, the alarm may include, but is not limited to, a fire alarm, which may access the zone controller through a serial port, alarm when an abnormal condition is detected and upload alarm information to the zone controller. The access controller is used for monitoring an access system and giving an alarm in real time when detecting abnormal conditions such as abnormal opening of an access, long-time non-closing of the access, communication interruption, equipment failure and the like. The night watching rod is used for acquiring night watching information, and when night watching personnel find unsafe factors during night watching, alarm information can be uploaded to the region controller through the night watching rod. The access controller and the night watching stick can adopt a network signal transmission mode, access to the monitoring center through an Ethernet backbone network, and also can adopt an RS485 (serial port interface standard, differential mode transmission is adopted for long-distance transmission, differential signals are transmitted) communication mode, so that alarm information is uploaded to the area controller. The network camera can monitor important positions such as an internal environment, an entrance, an exit, a device room and the like in real time and all-around mode, has basic functions of video acquisition, storage, alarming, linkage and the like of a digital video monitoring system, also has image analysis and processing capacity, and automatically alarms illegal intrusion behaviors entering a forbidden area. Video signals are transmitted to a regional controller through a super-five type line (the distance exceeds 100 meters, an optical fiber is adopted for returning, a protective box and a photoelectric converter are additionally arranged), and the signals are transmitted to the hard disk video recorder by utilizing an optical fiber ring network of a security system. The real-time video signals and historical playback images of the network cameras can be called at any time in the monitoring center and put on a large display screen. The external correlation detector actively emits a plurality of beams of infrared rays from an emitting end, forms a mesh of infrared rays when a receiving end receives infrared ray beams, and enters a defense state; when the guard beam is completely blocked for more than 40 milliseconds, the system automatically generates strong acousto-optic alarm information, the alarm information is accessed to a regional controller nearby, and the regional controller sends a signal to a monitoring center to timely treat illegal intrusion behaviors.
In this embodiment, the intelligent security monitoring system is as shown in fig. 3, and the system may further include a monitoring large screen, an external gateway, a dispatching desk (for implementing human-computer interaction), a server cluster, an encryption management host, a firewall, a router, and the like.
In the embodiment of the present application, the body architecture of the platform corresponding to the intelligent security monitoring system is, as shown in fig. 4, four levels, i.e., a base layer, a data layer, an application layer, and a display layer, from bottom to top. The building of a three-dimensional model is realized based on a BIM technology, model data are stored by combining the BIM and the Internet of things, and the data of the Internet of things are received to realize three-dimensional linkage. The first layer is a basic layer and mainly comprises an operating system required by platform construction, software and hardware facilities of a series of computers, a relevant database management system and other basic development environments. The second layer is a data layer, mainly comprises BIM model dimension data, basic geographic information data, electronic patrol data, system maintenance data and the like, and is a data center of the whole management platform. The third layer is an application layer which is combined with specific application requirements to realize real-time intrusion monitoring, equipment state monitoring, electronic patrol monitoring and integrated management of basic information. The fourth layer is a display layer, and security monitoring, emergency prompt alarm and the like are carried out through a large screen of a master control center. And the model information and the basic geographic information are checked in real time, and guarantee is provided for efficient project supervision.
The embodiment of the invention also discloses an intelligent security monitoring device which is applied to a monitoring platform, wherein the monitoring platform is in communication connection with a zone controller, and the zone controller is connected with a monitoring alarm device and is used for receiving alarm information uploaded by the monitoring alarm device; as shown in fig. 5, the apparatus includes: a receiving module 301, configured to, when receiving alarm information sent by the zone controller, call, according to intrusion event building location information included in the alarm information, a target BIM model of a building at a corresponding location from a pre-stored BIM model database; the analysis module 302 is configured to perform security simulation analysis on the target BIM model according to type information and position information of a monitoring alarm device that sends the alarm information and that is included in the alarm information; and the sending module 303 is configured to send the alarm information and the security simulation analysis result to a security management platform.
According to the intelligent security monitoring device, the alarm information sent by the area controller is received, the target BIM model is called according to the alarm information, security simulation analysis is carried out on the target BIM model according to the alarm information, then the alarm information and the security simulation analysis result are sent to the security management platform, the security management platform can conveniently carry out security processing, and the intelligent level of security monitoring and processing is effectively improved.
As an optional embodiment of the present invention, the apparatus further comprises: the information generation module is used for acquiring security processing information generated after the management platform processes the alarm information according to a security simulation analysis result; and the storage module is used for inputting the security processing information into the target BIM model for storage.
As an optional implementation manner of the present invention, the receiving module includes: and the acquisition submodule is used for acquiring the monitoring image data of the area corresponding to the monitoring alarm equipment which sends the alarm information and sending the monitoring image data to the security management platform.
An embodiment of the present invention further provides an electronic device, as shown in fig. 6, the electronic device may include a processor 401 and a memory 402, where the processor 401 and the memory 402 may be connected by a bus or in another manner, and fig. 6 illustrates an example of a connection by a bus.
Processor 401 may be a Central Processing Unit (CPU). Processor 401 may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, or any combination thereof.
The memory 402, which is a non-transitory computer readable storage medium, can be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the smart security monitoring method in the embodiment of the present invention. The processor 401 executes various functional applications and data processing of the processor by running the non-transitory software programs, instructions and modules stored in the memory 402, so as to implement the smart security monitoring method in the above method embodiment.
The memory 402 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created by the processor 401, and the like. Further, the memory 402 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 402 may optionally include memory located remotely from processor 401, which may be connected to processor 401 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The one or more modules are stored in the memory 402, and when executed by the processor 401, perform the security monitoring method in the embodiment shown in fig. 1.
The details of the electronic device may be understood with reference to the corresponding related description and effects in the embodiment shown in fig. 1, and are not described herein again.
It can be understood by those skilled in the art that all or part of the processes in the intelligent security monitoring method according to the above embodiments may be implemented by instructing related hardware through a computer program, where the program may be stored in a computer readable storage medium, and when executed, the program may include the processes of the above embodiments of the methods. The storage medium may be a magnetic Disk, an optical Disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a Flash Memory (Flash Memory), a Hard Disk (Hard Disk Drive, abbreviated as HDD), a Solid State Drive (SSD), or the like; the storage medium may also comprise a combination of memories of the kind described above.
Although the embodiments of the present invention have been described in conjunction with the accompanying drawings, those skilled in the art may make various modifications and variations without departing from the spirit and scope of the invention, and such modifications and variations fall within the scope defined by the appended claims.

Claims (10)

1. An intelligent security monitoring method is characterized by being applied to a monitoring platform, wherein the monitoring platform is in communication connection with a zone controller, and the zone controller is connected with a monitoring alarm device and used for receiving alarm information uploaded by the monitoring alarm device; the method comprises the following steps:
when alarm information sent by the area controller is received, calling a target BIM model of a building at a corresponding position from a pre-stored BIM model database according to the position information of the building at the intrusion event contained in the alarm information;
performing security simulation analysis on the target BIM according to type information and position information of monitoring alarm equipment sending the alarm information, which are contained in the alarm information;
and sending the alarm information and the security simulation analysis result to a security management platform.
2. The method of claim 1, wherein after sending the alarm information and the security simulation analysis result to a security management platform, the method further comprises:
acquiring security processing information generated after the management platform processes the alarm information according to a security simulation analysis result;
and inputting the security processing information into the target BIM model for storage.
3. The method according to claim 1, wherein when receiving alarm information sent by the zone controller, the method for calling a target BIM model of a corresponding location building from a pre-stored BIM model database according to intrusion event building location information contained in the alarm information comprises:
and acquiring monitoring image data of a corresponding area of the monitoring alarm equipment uploading the alarm information, and sending the monitoring image data to a security management platform.
4. The utility model provides an intelligent security protection monitored control system which characterized in that includes:
each zone controller is connected with the monitoring alarm equipment in the corresponding zone and used for receiving alarm information sent by the intrusion monitoring equipment;
a monitoring platform connected with each of the zone controllers for executing the intelligent security monitoring method according to any one of claims 1 to 3.
5. The system of claim 4, wherein the plurality of intrusion alert zone controllers are communicatively coupled via a fiber optic ring network.
6. The system of claim 4, wherein the monitoring alarm device comprises any one or more of an intrusion alarm, a web camera, a door access controller, a night stick, and an infrared correlation detector.
7. An intelligent security monitoring device is characterized by being applied to a monitoring platform, wherein the monitoring platform is in communication connection with a zone controller, and the zone controller is connected with a monitoring alarm device and used for receiving alarm information uploaded by the monitoring alarm device; the device comprises:
the receiving module is used for calling a target BIM model of a building at a corresponding position from a pre-stored BIM model database according to the position information of the intrusion event building contained in the alarm information when the alarm information sent by the zone controller is received;
the analysis module is used for carrying out security simulation analysis on the target BIM according to type information and position information of monitoring alarm equipment which sends the alarm information and is contained in the alarm information;
and the sending module is used for sending the alarm information and the security simulation analysis result to a security management platform.
8. The apparatus of claim 7, further comprising:
the information generation module is used for acquiring security processing information generated after the management platform processes the alarm information according to a security simulation analysis result;
and the storage module is used for inputting the security processing information into the target BIM model for storage.
9. An electronic device, comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to cause the at least one processor to perform the steps of the security monitoring method as recited in any one of claims 1-3.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the smart security monitoring method according to any one of claims 1-3.
CN202210792930.XA 2022-07-05 2022-07-05 Intelligent security monitoring method, system and device and electronic equipment Pending CN115100812A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210792930.XA CN115100812A (en) 2022-07-05 2022-07-05 Intelligent security monitoring method, system and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210792930.XA CN115100812A (en) 2022-07-05 2022-07-05 Intelligent security monitoring method, system and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN115100812A true CN115100812A (en) 2022-09-23

Family

ID=83296326

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210792930.XA Pending CN115100812A (en) 2022-07-05 2022-07-05 Intelligent security monitoring method, system and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN115100812A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116341084A (en) * 2023-04-25 2023-06-27 盐城市建设工程质量检测中心有限公司 Visualization system and method for building engineering detection

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106975191A (en) * 2017-04-18 2017-07-25 江苏省冶金设计院有限公司 A kind of fire-fighting system and its rescue mode
CN107274003A (en) * 2017-05-05 2017-10-20 宁波城市职业技术学院 A kind of wisdom fire-fighting management system and its control method
CN111369018A (en) * 2020-03-02 2020-07-03 广州晟能电子科技有限公司 Alarm correlation method of comprehensive operation and maintenance management platform
CN112862153A (en) * 2020-12-30 2021-05-28 深圳市微筑科技有限公司 BIM-based fire rescue method, device, storage medium and device
CN114445997A (en) * 2022-02-18 2022-05-06 中建科工集团有限公司 Intelligent fire fighting monitoring method and system based on BIM and Internet of things technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106975191A (en) * 2017-04-18 2017-07-25 江苏省冶金设计院有限公司 A kind of fire-fighting system and its rescue mode
CN107274003A (en) * 2017-05-05 2017-10-20 宁波城市职业技术学院 A kind of wisdom fire-fighting management system and its control method
CN111369018A (en) * 2020-03-02 2020-07-03 广州晟能电子科技有限公司 Alarm correlation method of comprehensive operation and maintenance management platform
CN112862153A (en) * 2020-12-30 2021-05-28 深圳市微筑科技有限公司 BIM-based fire rescue method, device, storage medium and device
CN114445997A (en) * 2022-02-18 2022-05-06 中建科工集团有限公司 Intelligent fire fighting monitoring method and system based on BIM and Internet of things technology

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116341084A (en) * 2023-04-25 2023-06-27 盐城市建设工程质量检测中心有限公司 Visualization system and method for building engineering detection
CN116341084B (en) * 2023-04-25 2023-11-10 盐城市建设工程质量检测中心有限公司 Visualization system and method for building engineering detection

Similar Documents

Publication Publication Date Title
KR102554662B1 (en) Safety management system using unmanned detector
CN112288984A (en) Three-dimensional visual unattended substation intelligent linkage system based on video fusion
CN108928700B (en) Hospital elevator safety three-dimensional monitoring cloud platform, system and method thereof, and elevator system
CN109447480A (en) A kind of road and bridge engineering equipment safety monitoring system and method based on BIM+GIS modeling
CN113532621B (en) Power cable monitoring and analyzing system and method based on edge calculation
CN106200526A (en) Pipe gallery online monitoring system and monitoring method thereof
CN106532951A (en) Transformer substation monitoring system
CN104052151A (en) Intelligent auxiliary comprehensive monitoring and D5000 comprehensive linkage platform of transformer substation
CN108750854B (en) Hospital elevator safety three-dimensional monitoring cloud platform, system and method thereof, and elevator system
CN102497573A (en) Intelligent automatic fault alarm system based on internet of things technology
CN213518557U (en) Urban fire control thing networking monitoring management system
KR20210051376A (en) Bigdata based building fire prevention response system and method
CN103326462A (en) Double-vision online monitoring intelligent pre-warning system of transformer substation
CN107947362A (en) Electric railway traction supply intelligent auxiliary system
CN207397051U (en) A kind of intelligent distribution network integrates auxiliary system
CN111753780B (en) Transformer substation violation detection system and violation detection method
CN112447033A (en) Security data processing method and system, computer equipment and storage medium
CN114153167A (en) A safety protection management monitoring system and management platform for wisdom garden
CN115100812A (en) Intelligent security monitoring method, system and device and electronic equipment
CN112671104A (en) Transformer substation multidimensional scene control platform facing complex scene
KR20220071880A (en) Digital twin disaster management system customized for underground public areas
CN110825047A (en) Intelligent linkage customization method of railway comprehensive auxiliary monitoring system
CN115880631A (en) Power distribution station fault identification system, method and medium
CN110753210A (en) Panoramic data display method of railway comprehensive auxiliary monitoring system
CN202916936U (en) Video monitoring optical fiber fence system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination