CN115100812A - Intelligent security monitoring method, system and device and electronic equipment - Google Patents
Intelligent security monitoring method, system and device and electronic equipment Download PDFInfo
- Publication number
- CN115100812A CN115100812A CN202210792930.XA CN202210792930A CN115100812A CN 115100812 A CN115100812 A CN 115100812A CN 202210792930 A CN202210792930 A CN 202210792930A CN 115100812 A CN115100812 A CN 115100812A
- Authority
- CN
- China
- Prior art keywords
- monitoring
- security
- alarm
- information
- alarm information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 143
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000004458 analytical method Methods 0.000 claims abstract description 43
- 238000004088 simulation Methods 0.000 claims abstract description 40
- 238000004891 communication Methods 0.000 claims abstract description 11
- 238000012545 processing Methods 0.000 claims description 32
- 230000015654 memory Effects 0.000 claims description 18
- 230000008569 process Effects 0.000 claims description 13
- 238000012806 monitoring device Methods 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 4
- 239000000835 fiber Substances 0.000 claims description 2
- 239000013307 optical fiber Substances 0.000 description 8
- 230000002159 abnormal effect Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000010276 construction Methods 0.000 description 4
- 230000007547 defect Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000005662 electromechanics Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000010191 image analysis Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B19/00—Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
- G08B19/005—Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow combined burglary and fire alarm systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F30/00—Computer-aided design [CAD]
- G06F30/10—Geometric CAD
- G06F30/13—Architectural design, e.g. computer-aided architectural design [CAAD] related to design of buildings, bridges, landscapes, production plants or roads
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F30/00—Computer-aided design [CAD]
- G06F30/20—Design optimisation, verification or simulation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
- G07C1/20—Checking timed patrols, e.g. of watchman
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/181—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using active radiation detection systems
- G08B13/183—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using active radiation detection systems by interruption of a radiation beam or barrier
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19613—Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/08—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B7/00—Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
- G08B7/06—Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2111/00—Details relating to CAD techniques
- G06F2111/20—Configuration CAD, e.g. designing by assembling or positioning modules selected from libraries of predesigned modules
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Geometry (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Evolutionary Computation (AREA)
- General Engineering & Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Architecture (AREA)
- Civil Engineering (AREA)
- Structural Engineering (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses an intelligent security monitoring method, a system device and electronic equipment, wherein the intelligent security monitoring method is applied to a monitoring platform, the monitoring platform is in communication connection with a region controller, and the region controller is connected with monitoring alarm equipment and is used for receiving alarm information uploaded by the monitoring alarm equipment; the intelligent security monitoring method comprises the following steps: when alarm information sent by the area controller is received, calling a target BIM model of a building at a corresponding position from a pre-stored BIM model database according to the position information of the building at the intrusion event contained in the alarm information; performing security simulation analysis on the target BIM according to type information and position information of monitoring alarm equipment sending the alarm information, which are contained in the alarm information; and sending the alarm information and the security simulation analysis result to a security management platform.
Description
Technical Field
The invention relates to the technical field of intelligent security, in particular to an intelligent security monitoring method, system and device and electronic equipment.
Background
The security monitoring system is an independent and complete system formed by transmitting video signals in a closed loop by using optical fibers, coaxial cables or microwaves, displaying and recording images, can reflect a monitored object in real time, vividly and truly, can replace manual work to monitor for a long time in a severe environment, and records the video signals through a video recorder. At present in the security protection field, most building engineering project sensing equipment mainly adopts traditional sensor, like electromagnetism, chemicals, security protection monitoring is realized to the sensor of types such as electromechanics, it is used in security protection monitoring system, there is the interference of receiving easily, the monitoring coverage is continuous inadequately, be difficult to reflect the defect of the monitoring general appearance of security protection scope, functional module is single, the control level is low, be difficult to handle emergent accident, rely on defects such as manpower completely, be difficult to satisfy people's demand, consequently, need to form one set of high-efficient, the safety protection system of intelligence urgently, provide corresponding technical support for the information-based management of building engineering project, safe operation for the project, emergent the powerful guarantee is provided.
Disclosure of Invention
Therefore, the technical problems to be solved by the invention are to overcome the defects of the existing security system that the interference is easy to receive, the monitoring coverage is not continuous enough, the monitoring overall view of the security range is difficult to reflect, the function module is single, the monitoring level is low, the emergency accident is difficult to process, and the manpower is completely relied on, thereby providing an intelligent security monitoring method, a system, a device and an electronic device.
According to a first aspect, the embodiment of the invention discloses an intelligent security monitoring method which is applied to a monitoring platform, wherein the monitoring platform is in communication connection with a zone controller, and the zone controller is connected with a monitoring alarm device and used for receiving alarm information uploaded by the monitoring alarm device; the method comprises the following steps: when alarm information sent by the area controller is received, calling a target BIM model of a building at a corresponding position from a pre-stored BIM model database according to the position information of the building at the intrusion event contained in the alarm information; performing security simulation analysis on the target BIM according to type information and position information of monitoring alarm equipment sending the alarm information, which are contained in the alarm information; and sending the alarm information and the security simulation analysis result to a security management platform.
According to the intelligent security monitoring method provided by the invention, the alarm information sent by the area controller is received, the target BIM model is called according to the alarm information, security simulation analysis is carried out on the target BIM model according to the alarm information, and then the alarm information and the security simulation analysis result are sent to the security management platform, so that the security management platform can conveniently carry out security processing, and the intelligent level of security monitoring and processing is effectively improved.
Optionally, after the alarm information and the security simulation analysis result are sent to a security management platform, the method further includes: acquiring security processing information generated after the management platform processes the alarm information according to a security simulation analysis result; and inputting the security processing information into the target BIM model for storage.
By the method, the security processing information generated after the management platform processes the alarm information according to the security simulation analysis result is stored in the target BIM, so that BIM model data can be effectively enriched.
Optionally, when receiving the alarm information sent by the zone controller, invoking a target BIM model of a building at a corresponding position from a pre-stored BIM model database according to the intrusion event building position information included in the alarm information, where the invoking includes: and acquiring monitoring image data of a corresponding area of the monitoring alarm equipment which sends the alarm information, and sending the monitoring image data to a security management platform.
By the method, the monitoring image data of the area corresponding to the monitoring alarm equipment which sends the alarm information is sent to the security management platform, so that management personnel can conveniently monitor and analyze the area where the unsafe event occurs through the security management platform.
According to a second aspect, an embodiment of the present invention further discloses an intelligent security monitoring system, including: each zone controller is connected with the monitoring alarm equipment in the corresponding zone and used for receiving alarm information sent by the intrusion monitoring equipment; and the monitoring platform is connected with each zone controller and is used for executing the intelligent security monitoring method according to the first aspect or any optional embodiment of the first aspect.
According to the intelligent security monitoring system provided by the invention, the alarm information sent by the intrusion monitoring equipment is received through the area controller and is sent to the monitoring platform, the monitoring platform calls the target BIM according to the alarm information, security simulation analysis is carried out on the target BIM according to the alarm information, and then the alarm information and the security simulation analysis result are sent to the security management platform, so that the security management platform can conveniently carry out security processing, the intelligent level of security monitoring and processing is effectively improved, and centralized monitoring and unified management are realized.
Optionally, the plurality of intrusion alert area controllers are communicatively connected by a fiber ring network.
The optical fiber ring network is used for carrying out communication connection on the plurality of intrusion alarm area controllers, and effectively preventing any connecting line in the optical fiber network connected with the plurality of area controllers from being broken, thereby influencing the potential network safety hazard brought by one area in connection, preventing one connection from being broken to influence the whole network, and enabling the network to be in a redundant mode.
Optionally, the monitoring alarm device includes any one or more of an alarm, a web camera, a door controller, a night stick, and an infrared correlation detector.
According to a third aspect, the embodiment of the invention further discloses an intelligent security monitoring device, which is applied to a monitoring platform, wherein the monitoring platform is in communication connection with a zone controller, and the zone controller is connected with a monitoring alarm device and used for receiving alarm information uploaded by the monitoring alarm device; the device comprises: the receiving module is used for calling a target BIM model of a building at a corresponding position from a pre-stored BIM model database according to the position information of the intrusion event building contained in the alarm information when the alarm information sent by the zone controller is received; the analysis module is used for performing security simulation analysis on the target BIM according to type information and position information of monitoring alarm equipment which sends the alarm information and is contained in the alarm information; and the sending module is used for sending the alarm information and the security simulation analysis result to a security management platform.
Optionally, the apparatus further comprises: the information generation module is used for acquiring security processing information generated after the management platform processes the alarm information according to a security simulation analysis result; and the storage module is used for inputting the security processing information into the target BIM model for storage.
According to a fourth aspect, an embodiment of the present invention further discloses an electronic device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions being executable by the at least one processor to cause the at least one processor to perform the steps of the intelligent security monitoring method according to the first aspect or any one of the optional embodiments of the first aspect.
According to a fifth aspect, the present invention further discloses a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the intelligent security monitoring method according to the first aspect or any optional embodiment of the first aspect.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flowchart illustrating an example of a security monitoring method according to an embodiment of the present invention;
FIG. 2 is a schematic block diagram of a specific example of an intelligent security monitoring system according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating an embodiment of a security monitoring system according to the present invention;
FIG. 4 is a diagram illustrating an embodiment of a security monitoring system according to the present invention;
FIG. 5 is a schematic block diagram of a specific example of a security monitoring device according to an embodiment of the present invention;
fig. 6 is a diagram of a specific example of an electronic device in an embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc. indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplification of description, but do not indicate or imply that the device or element referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; the two elements may be directly connected or indirectly connected through an intermediate medium, or may be connected through the inside of the two elements, or may be connected wirelessly or through a wire. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
The embodiment of the invention discloses an intelligent security monitoring method which is applied to a monitoring platform, wherein the monitoring platform is in communication connection with a region controller, the region controller is connected with a monitoring alarm device and used for receiving alarm information uploaded by the monitoring alarm device and can be used for security monitoring of construction engineering projects, as shown in figure 1, the method comprises the following steps:
and 101, when receiving alarm information sent by the zone controller, calling a target BIM model of a building at a corresponding position from a pre-stored BIM model database according to the position information of the building at the intrusion event contained in the alarm information.
Illustratively, the alarm information sent by the zone controller may include, but is not limited to, alarm information uploaded by monitoring alarm devices, where the alarm information includes building location information of an intrusion event, the monitoring platform invokes, from a pre-stored BIM model database, a target BIM model of a building at a corresponding location according to the building location information of the intrusion event, the BIM database may pre-store a BIM model corresponding to the building related to the construction project, the BIM model may include electromechanical design attribute information of the building itself, data information (quality information, safety information, etc.) generated based on a construction stage may also be synchronously updated into the BIM model, and the BIM model includes installation locations of all monitoring alarm devices displayed in the corresponding building. In the embodiment of the application, when monitoring unsafe factors, a monitoring alarm device automatically generates alarm information and uploads the alarm information to a regional controller, the regional controller sends the received alarm information to a monitoring platform, the monitoring platform calls a corresponding BIM model according to the alarm information, image elements in a region and a position corresponding to the alarm information in the BIM model flicker, the specific condition of an abnormal position can be checked by clicking the position, the attribute of a component is inquired through an information table in a BIM database, the unique value of the BIM model is associated with an external key of the document to realize calling, the BIM model database has a table, two fields in the BIM model database are used for associating the model with the attribute information of the document, one is the unique value of the document or the attribute, the other is the unique value of the model component, and the model component is clicked to obtain the unique value by inquiring the table, and finding the unique value of the document or the attribute in the table, then inquiring the document to open the document, and inquiring the attribute to display the attribute.
102, performing security simulation analysis on the target BIM according to type information and position information of monitoring alarm equipment sending the alarm information, which are contained in the alarm information.
Illustratively, the monitoring alarm device type information can comprise a fire alarm, a video monitor, an access controller and an infrared correlation detector, and the security simulation analysis is to perform simulation analysis on unsafe factors on a BIM (building information modeling) model according to the monitoring alarm device type information and the position information which send alarm information, and to reckon the reasons of the occurrence of the unsafe factors to obtain a solution. In the embodiment of the application, the specific type of the unsafe factor can be judged according to the type information of the monitoring alarm device, for example, when the alarm information is uploaded by a fire alarm, the fire at the position corresponding to the fire alarm can be determined, and the rescue path simulation analysis is carried out on the corresponding BIM according to the position information of the monitoring alarm device contained in the alarm information.
And 103, sending the alarm information and the security simulation analysis result to a security management platform.
Illustratively, the monitoring platform sends the alarm information and the security simulation analysis result to the security management platform, so that management personnel can monitor and process related information through the security management platform conveniently.
According to the intelligent security monitoring method, the alarm information sent by the area controller is received, the target BIM is called according to the alarm information, security simulation analysis is carried out on the target BIM according to the alarm information, then the alarm information and the security simulation analysis result are sent to the security management platform, the security management platform can conveniently carry out security processing, and the intelligent level of security monitoring and processing is effectively improved.
As an optional implementation manner of the present invention, after the alarm information and the security simulation analysis result are sent to the security management platform, the method further includes: acquiring security processing information generated after the management platform processes the alarm information according to a security simulation analysis result; and inputting the security processing information into the target BIM model for storage.
Exemplarily, the security management platform processes abnormal conditions (unsafe factors) corresponding to the alarm information according to the security simulation analysis result to obtain a processing result, generates security processing information according to the processing result and feeds the security processing information back to the monitoring platform, and the monitoring platform inputs the obtained security processing information into the target BIM model. By the method, the security processing information generated after the security management platform processes the alarm information according to the security simulation analysis result is stored in the target BIM, so that BIM model data can be effectively enriched, and a reference scheme can be provided when similar problems occur.
As an optional embodiment of the present invention, when receiving alarm information sent by the zone controller, the method for calling a target BIM model of a building at a corresponding location from a pre-stored BIM model database according to intrusion event building location information included in the alarm information includes: and acquiring monitoring image data of a corresponding area of the monitoring alarm equipment which sends the alarm information, and sending the monitoring image data to a security management platform.
Illustratively, when the monitoring platform receives the alarm information, the monitoring platform can link a camera in the corresponding area to automatically track the area according to the alarm information to obtain monitoring image data of a relevant site, and sends the monitoring image data of the area corresponding to the monitoring alarm equipment which sends the alarm information to the security management platform, so that managers can conveniently monitor and analyze the area where the unsafe event occurs through the security management platform.
The embodiment of the invention also discloses an intelligent security monitoring system, as shown in fig. 2, the system comprises:
and each zone controller 201 is connected with the monitoring alarm equipment in the corresponding zone and is used for receiving alarm information sent by the intrusion monitoring equipment. Illustratively, the area monitoring device is configured to receive alarm information sent by the intrusion monitoring device in a corresponding area, and send the alarm information out.
And the monitoring platform 202 is connected with each of the zone controllers and is used for executing the intelligent security monitoring method in the embodiment. For example, the specific details of the monitoring platform may be understood with reference to the corresponding related description and effects in the embodiment shown in fig. 1, and are not described herein again.
According to the intelligent security monitoring system provided by the embodiment of the invention, the alarm information sent by the intrusion monitoring equipment is received through the area controller and sent to the monitoring platform, the monitoring platform calls the target BIM according to the alarm information, security simulation analysis is carried out on the target BIM according to the alarm information, and then the alarm information and the security simulation analysis result are sent to the security management platform, so that the security management platform can conveniently carry out security processing, the intelligent level of security monitoring and processing is effectively improved, and centralized monitoring and unified management are realized.
As an optional embodiment of the present invention, the plurality of intrusion alert area controllers are communicatively connected through an optical fiber ring network. Illustratively, the plurality of intrusion alarm area controllers are in communication connection through the optical fiber ring network, so that any connecting line in the optical fiber network connecting the plurality of area controllers is effectively prevented from being broken, the potential network safety hazard brought by one area in connection is influenced, the whole network is prevented from being influenced by the fault of one connection, and the network is in a redundancy mode.
As an optional embodiment of the invention, the monitoring alarm device comprises any one or more of an alarm, a network camera, an entrance guard controller, a night stick and an infrared correlation detector.
Illustratively, the alarm may include, but is not limited to, a fire alarm, which may access the zone controller through a serial port, alarm when an abnormal condition is detected and upload alarm information to the zone controller. The access controller is used for monitoring an access system and giving an alarm in real time when detecting abnormal conditions such as abnormal opening of an access, long-time non-closing of the access, communication interruption, equipment failure and the like. The night watching rod is used for acquiring night watching information, and when night watching personnel find unsafe factors during night watching, alarm information can be uploaded to the region controller through the night watching rod. The access controller and the night watching stick can adopt a network signal transmission mode, access to the monitoring center through an Ethernet backbone network, and also can adopt an RS485 (serial port interface standard, differential mode transmission is adopted for long-distance transmission, differential signals are transmitted) communication mode, so that alarm information is uploaded to the area controller. The network camera can monitor important positions such as an internal environment, an entrance, an exit, a device room and the like in real time and all-around mode, has basic functions of video acquisition, storage, alarming, linkage and the like of a digital video monitoring system, also has image analysis and processing capacity, and automatically alarms illegal intrusion behaviors entering a forbidden area. Video signals are transmitted to a regional controller through a super-five type line (the distance exceeds 100 meters, an optical fiber is adopted for returning, a protective box and a photoelectric converter are additionally arranged), and the signals are transmitted to the hard disk video recorder by utilizing an optical fiber ring network of a security system. The real-time video signals and historical playback images of the network cameras can be called at any time in the monitoring center and put on a large display screen. The external correlation detector actively emits a plurality of beams of infrared rays from an emitting end, forms a mesh of infrared rays when a receiving end receives infrared ray beams, and enters a defense state; when the guard beam is completely blocked for more than 40 milliseconds, the system automatically generates strong acousto-optic alarm information, the alarm information is accessed to a regional controller nearby, and the regional controller sends a signal to a monitoring center to timely treat illegal intrusion behaviors.
In this embodiment, the intelligent security monitoring system is as shown in fig. 3, and the system may further include a monitoring large screen, an external gateway, a dispatching desk (for implementing human-computer interaction), a server cluster, an encryption management host, a firewall, a router, and the like.
In the embodiment of the present application, the body architecture of the platform corresponding to the intelligent security monitoring system is, as shown in fig. 4, four levels, i.e., a base layer, a data layer, an application layer, and a display layer, from bottom to top. The building of a three-dimensional model is realized based on a BIM technology, model data are stored by combining the BIM and the Internet of things, and the data of the Internet of things are received to realize three-dimensional linkage. The first layer is a basic layer and mainly comprises an operating system required by platform construction, software and hardware facilities of a series of computers, a relevant database management system and other basic development environments. The second layer is a data layer, mainly comprises BIM model dimension data, basic geographic information data, electronic patrol data, system maintenance data and the like, and is a data center of the whole management platform. The third layer is an application layer which is combined with specific application requirements to realize real-time intrusion monitoring, equipment state monitoring, electronic patrol monitoring and integrated management of basic information. The fourth layer is a display layer, and security monitoring, emergency prompt alarm and the like are carried out through a large screen of a master control center. And the model information and the basic geographic information are checked in real time, and guarantee is provided for efficient project supervision.
The embodiment of the invention also discloses an intelligent security monitoring device which is applied to a monitoring platform, wherein the monitoring platform is in communication connection with a zone controller, and the zone controller is connected with a monitoring alarm device and is used for receiving alarm information uploaded by the monitoring alarm device; as shown in fig. 5, the apparatus includes: a receiving module 301, configured to, when receiving alarm information sent by the zone controller, call, according to intrusion event building location information included in the alarm information, a target BIM model of a building at a corresponding location from a pre-stored BIM model database; the analysis module 302 is configured to perform security simulation analysis on the target BIM model according to type information and position information of a monitoring alarm device that sends the alarm information and that is included in the alarm information; and the sending module 303 is configured to send the alarm information and the security simulation analysis result to a security management platform.
According to the intelligent security monitoring device, the alarm information sent by the area controller is received, the target BIM model is called according to the alarm information, security simulation analysis is carried out on the target BIM model according to the alarm information, then the alarm information and the security simulation analysis result are sent to the security management platform, the security management platform can conveniently carry out security processing, and the intelligent level of security monitoring and processing is effectively improved.
As an optional embodiment of the present invention, the apparatus further comprises: the information generation module is used for acquiring security processing information generated after the management platform processes the alarm information according to a security simulation analysis result; and the storage module is used for inputting the security processing information into the target BIM model for storage.
As an optional implementation manner of the present invention, the receiving module includes: and the acquisition submodule is used for acquiring the monitoring image data of the area corresponding to the monitoring alarm equipment which sends the alarm information and sending the monitoring image data to the security management platform.
An embodiment of the present invention further provides an electronic device, as shown in fig. 6, the electronic device may include a processor 401 and a memory 402, where the processor 401 and the memory 402 may be connected by a bus or in another manner, and fig. 6 illustrates an example of a connection by a bus.
The memory 402, which is a non-transitory computer readable storage medium, can be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the smart security monitoring method in the embodiment of the present invention. The processor 401 executes various functional applications and data processing of the processor by running the non-transitory software programs, instructions and modules stored in the memory 402, so as to implement the smart security monitoring method in the above method embodiment.
The memory 402 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created by the processor 401, and the like. Further, the memory 402 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 402 may optionally include memory located remotely from processor 401, which may be connected to processor 401 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The one or more modules are stored in the memory 402, and when executed by the processor 401, perform the security monitoring method in the embodiment shown in fig. 1.
The details of the electronic device may be understood with reference to the corresponding related description and effects in the embodiment shown in fig. 1, and are not described herein again.
It can be understood by those skilled in the art that all or part of the processes in the intelligent security monitoring method according to the above embodiments may be implemented by instructing related hardware through a computer program, where the program may be stored in a computer readable storage medium, and when executed, the program may include the processes of the above embodiments of the methods. The storage medium may be a magnetic Disk, an optical Disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a Flash Memory (Flash Memory), a Hard Disk (Hard Disk Drive, abbreviated as HDD), a Solid State Drive (SSD), or the like; the storage medium may also comprise a combination of memories of the kind described above.
Although the embodiments of the present invention have been described in conjunction with the accompanying drawings, those skilled in the art may make various modifications and variations without departing from the spirit and scope of the invention, and such modifications and variations fall within the scope defined by the appended claims.
Claims (10)
1. An intelligent security monitoring method is characterized by being applied to a monitoring platform, wherein the monitoring platform is in communication connection with a zone controller, and the zone controller is connected with a monitoring alarm device and used for receiving alarm information uploaded by the monitoring alarm device; the method comprises the following steps:
when alarm information sent by the area controller is received, calling a target BIM model of a building at a corresponding position from a pre-stored BIM model database according to the position information of the building at the intrusion event contained in the alarm information;
performing security simulation analysis on the target BIM according to type information and position information of monitoring alarm equipment sending the alarm information, which are contained in the alarm information;
and sending the alarm information and the security simulation analysis result to a security management platform.
2. The method of claim 1, wherein after sending the alarm information and the security simulation analysis result to a security management platform, the method further comprises:
acquiring security processing information generated after the management platform processes the alarm information according to a security simulation analysis result;
and inputting the security processing information into the target BIM model for storage.
3. The method according to claim 1, wherein when receiving alarm information sent by the zone controller, the method for calling a target BIM model of a corresponding location building from a pre-stored BIM model database according to intrusion event building location information contained in the alarm information comprises:
and acquiring monitoring image data of a corresponding area of the monitoring alarm equipment uploading the alarm information, and sending the monitoring image data to a security management platform.
4. The utility model provides an intelligent security protection monitored control system which characterized in that includes:
each zone controller is connected with the monitoring alarm equipment in the corresponding zone and used for receiving alarm information sent by the intrusion monitoring equipment;
a monitoring platform connected with each of the zone controllers for executing the intelligent security monitoring method according to any one of claims 1 to 3.
5. The system of claim 4, wherein the plurality of intrusion alert zone controllers are communicatively coupled via a fiber optic ring network.
6. The system of claim 4, wherein the monitoring alarm device comprises any one or more of an intrusion alarm, a web camera, a door access controller, a night stick, and an infrared correlation detector.
7. An intelligent security monitoring device is characterized by being applied to a monitoring platform, wherein the monitoring platform is in communication connection with a zone controller, and the zone controller is connected with a monitoring alarm device and used for receiving alarm information uploaded by the monitoring alarm device; the device comprises:
the receiving module is used for calling a target BIM model of a building at a corresponding position from a pre-stored BIM model database according to the position information of the intrusion event building contained in the alarm information when the alarm information sent by the zone controller is received;
the analysis module is used for carrying out security simulation analysis on the target BIM according to type information and position information of monitoring alarm equipment which sends the alarm information and is contained in the alarm information;
and the sending module is used for sending the alarm information and the security simulation analysis result to a security management platform.
8. The apparatus of claim 7, further comprising:
the information generation module is used for acquiring security processing information generated after the management platform processes the alarm information according to a security simulation analysis result;
and the storage module is used for inputting the security processing information into the target BIM model for storage.
9. An electronic device, comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to cause the at least one processor to perform the steps of the security monitoring method as recited in any one of claims 1-3.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the smart security monitoring method according to any one of claims 1-3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210792930.XA CN115100812A (en) | 2022-07-05 | 2022-07-05 | Intelligent security monitoring method, system and device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210792930.XA CN115100812A (en) | 2022-07-05 | 2022-07-05 | Intelligent security monitoring method, system and device and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115100812A true CN115100812A (en) | 2022-09-23 |
Family
ID=83296326
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210792930.XA Pending CN115100812A (en) | 2022-07-05 | 2022-07-05 | Intelligent security monitoring method, system and device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115100812A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116341084A (en) * | 2023-04-25 | 2023-06-27 | 盐城市建设工程质量检测中心有限公司 | Visualization system and method for building engineering detection |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106975191A (en) * | 2017-04-18 | 2017-07-25 | 江苏省冶金设计院有限公司 | A kind of fire-fighting system and its rescue mode |
CN107274003A (en) * | 2017-05-05 | 2017-10-20 | 宁波城市职业技术学院 | A kind of wisdom fire-fighting management system and its control method |
CN111369018A (en) * | 2020-03-02 | 2020-07-03 | 广州晟能电子科技有限公司 | Alarm correlation method of comprehensive operation and maintenance management platform |
CN112862153A (en) * | 2020-12-30 | 2021-05-28 | 深圳市微筑科技有限公司 | BIM-based fire rescue method, device, storage medium and device |
CN114445997A (en) * | 2022-02-18 | 2022-05-06 | 中建科工集团有限公司 | Intelligent fire fighting monitoring method and system based on BIM and Internet of things technology |
-
2022
- 2022-07-05 CN CN202210792930.XA patent/CN115100812A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106975191A (en) * | 2017-04-18 | 2017-07-25 | 江苏省冶金设计院有限公司 | A kind of fire-fighting system and its rescue mode |
CN107274003A (en) * | 2017-05-05 | 2017-10-20 | 宁波城市职业技术学院 | A kind of wisdom fire-fighting management system and its control method |
CN111369018A (en) * | 2020-03-02 | 2020-07-03 | 广州晟能电子科技有限公司 | Alarm correlation method of comprehensive operation and maintenance management platform |
CN112862153A (en) * | 2020-12-30 | 2021-05-28 | 深圳市微筑科技有限公司 | BIM-based fire rescue method, device, storage medium and device |
CN114445997A (en) * | 2022-02-18 | 2022-05-06 | 中建科工集团有限公司 | Intelligent fire fighting monitoring method and system based on BIM and Internet of things technology |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116341084A (en) * | 2023-04-25 | 2023-06-27 | 盐城市建设工程质量检测中心有限公司 | Visualization system and method for building engineering detection |
CN116341084B (en) * | 2023-04-25 | 2023-11-10 | 盐城市建设工程质量检测中心有限公司 | Visualization system and method for building engineering detection |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102554662B1 (en) | Safety management system using unmanned detector | |
CN112288984A (en) | Three-dimensional visual unattended substation intelligent linkage system based on video fusion | |
CN108928700B (en) | Hospital elevator safety three-dimensional monitoring cloud platform, system and method thereof, and elevator system | |
CN109447480A (en) | A kind of road and bridge engineering equipment safety monitoring system and method based on BIM+GIS modeling | |
CN113532621B (en) | Power cable monitoring and analyzing system and method based on edge calculation | |
CN106200526A (en) | Pipe gallery online monitoring system and monitoring method thereof | |
CN106532951A (en) | Transformer substation monitoring system | |
CN104052151A (en) | Intelligent auxiliary comprehensive monitoring and D5000 comprehensive linkage platform of transformer substation | |
CN108750854B (en) | Hospital elevator safety three-dimensional monitoring cloud platform, system and method thereof, and elevator system | |
CN102497573A (en) | Intelligent automatic fault alarm system based on internet of things technology | |
CN213518557U (en) | Urban fire control thing networking monitoring management system | |
KR20210051376A (en) | Bigdata based building fire prevention response system and method | |
CN103326462A (en) | Double-vision online monitoring intelligent pre-warning system of transformer substation | |
CN107947362A (en) | Electric railway traction supply intelligent auxiliary system | |
CN207397051U (en) | A kind of intelligent distribution network integrates auxiliary system | |
CN111753780B (en) | Transformer substation violation detection system and violation detection method | |
CN112447033A (en) | Security data processing method and system, computer equipment and storage medium | |
CN114153167A (en) | A safety protection management monitoring system and management platform for wisdom garden | |
CN115100812A (en) | Intelligent security monitoring method, system and device and electronic equipment | |
CN112671104A (en) | Transformer substation multidimensional scene control platform facing complex scene | |
KR20220071880A (en) | Digital twin disaster management system customized for underground public areas | |
CN110825047A (en) | Intelligent linkage customization method of railway comprehensive auxiliary monitoring system | |
CN115880631A (en) | Power distribution station fault identification system, method and medium | |
CN110753210A (en) | Panoramic data display method of railway comprehensive auxiliary monitoring system | |
CN202916936U (en) | Video monitoring optical fiber fence system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |