CN115188148A - Security monitoring system and method based on 5G, electronic device and storage medium - Google Patents

Security monitoring system and method based on 5G, electronic device and storage medium Download PDF

Info

Publication number
CN115188148A
CN115188148A CN202210810701.6A CN202210810701A CN115188148A CN 115188148 A CN115188148 A CN 115188148A CN 202210810701 A CN202210810701 A CN 202210810701A CN 115188148 A CN115188148 A CN 115188148A
Authority
CN
China
Prior art keywords
edge cloud
video stream
module
stream data
security monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210810701.6A
Other languages
Chinese (zh)
Inventor
展波
刘鹏英
赵士超
杜召娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haier Digital Technology Qingdao Co Ltd
Haier Caos IoT Ecological Technology Co Ltd
Cosmoplat Industrial Intelligent Research Institute Qingdao Co Ltd
Original Assignee
Haier Digital Technology Qingdao Co Ltd
Haier Caos IoT Ecological Technology Co Ltd
Cosmoplat Industrial Intelligent Research Institute Qingdao Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Haier Digital Technology Qingdao Co Ltd, Haier Caos IoT Ecological Technology Co Ltd, Cosmoplat Industrial Intelligent Research Institute Qingdao Co Ltd filed Critical Haier Digital Technology Qingdao Co Ltd
Priority to CN202210810701.6A priority Critical patent/CN115188148A/en
Publication of CN115188148A publication Critical patent/CN115188148A/en
Priority to PCT/CN2023/080249 priority patent/WO2024011926A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

The application provides a security monitoring system based on 5G, a method, an electronic device and a storage medium, the security monitoring system comprises a collection terminal, a 5G base station and an edge cloud system, the collection terminal is in communication connection with the 5G base station, the collection terminal is used for collecting video stream data in a target area, the 5G base station is in communication connection with the edge cloud system, the edge cloud system is configured in the target area and used for obtaining a detection result according to the video stream data, the detection result is used for representing whether security abnormal behaviors exist in the target area, therefore, the security monitoring system based on 5G is formed in a mode that a 5G virtual private network is constructed through 5G and edge computing technology, whether security abnormal behaviors exist in the target area can be detected under the condition that the video stream data are not delivered from a factory is guaranteed, the transmission path of the video stream data is shortened, time delay is reduced, the defect that video analysis function in the prior art has hysteresis is overcome, and data protection is facilitated without being connected with a public network.

Description

Security monitoring system and method based on 5G, electronic device and storage medium
Technical Field
The application relates to the technical field of security, in particular to a 5G-based security monitoring system and method, electronic equipment and a storage medium.
Background
Along with the continuous improvement of the safety protection consciousness of the industrial production, the importance of the video safety protection system of the industrial park is more and more prominent. For a video safety protection system of an industrial park, the commonly used traditional video monitoring only has a recording function on an occurred event, and depends on judgment of people to a great extent, and the people are limited in energy and attention, so that the phenomenon of missing report can be caused by adopting the traditional video monitoring, and further potential safety hazards can be brought. In addition, the conventional video monitoring is easily limited by a plurality of physical conditions such as monitoring regions and the like in the wiring process, and the maintenance cost of the post-monitoring system is high due to the complexity of the network wiring architecture.
Aiming at the defects of traditional video monitoring, the current common solution is to transfer an intelligent analysis module to a cloud end for processing, so that a video monitoring system is converted from traditional civil air defense to intellectualization. Specifically, a video stream acquired by a camera is connected with a public network through wire/wireless, the video stream is transmitted to a cloud server for calculation, storage and analysis, and finally an obtained feedback result is displayed through terminal equipment such as a large screen.
However, in the currently adopted intelligent monitoring solution, on one hand, the transmission path of the video stream is long, so that the time delay is long, so that some real-time video analysis functions have hysteresis and are meaningless, and on the other hand, special application environments such as factories and the like have high requirements on the confidentiality of the video stream data, and the implementation of the solution needs to be connected with a public network, so that the data protection is not facilitated. Therefore, the existing intelligent monitoring solution has the defects of lag analysis function and insufficient data confidentiality.
Disclosure of Invention
The application provides a security monitoring system and method based on 5G, electronic equipment and a storage medium, which are used for solving the technical problems of lag in analysis function and insufficient data confidentiality existing in the existing industrial park intelligent monitoring scheme.
In a first aspect, the present application provides a security monitoring system based on 5G, including: the method comprises the steps of collecting a terminal, a 5G base station and an edge cloud system;
the acquisition terminal is in communication connection with the 5G base station and is used for acquiring video stream data in a target area;
the 5G base station is in communication connection with the edge cloud system, the edge cloud system is used for obtaining a detection result according to the video stream data, and the detection result is used for representing whether the target area has a safety abnormal behavior or not.
In one possible design, the edge cloud system includes a UPF module, an edge cloud control server, and an edge cloud management server;
the UPF module is used for forwarding the video stream data from the acquisition terminal to the edge cloud control server through a 5G network;
the edge cloud control server is used for storing the received video stream data and carrying out scene detection on the video stream data to obtain a detection result;
the edge cloud management server is used for configuring a target application program for the edge cloud control server, and the target application program is used for realizing the scene detection.
In one possible design, the security monitoring system further includes: the SMF module and the encrypted virtual network module;
the SMF module is connected with the UPF module through an N3 interface and an N4 interface, the SMF module is connected with the encrypted virtual network module through an N2 interface, and the encrypted virtual network module is further connected to a core network end.
In one possible design, the security monitoring system further comprises a display module connected with the edge cloud system;
and the display module is used for displaying the detection result forwarded by the UPF module.
In a possible design, the acquisition terminal is in communication connection with the 5G base station through a 5G module;
the 5G module comprises a 5G module arranged in the acquisition terminal or a 5G gateway additionally arranged between the acquisition terminal and the 5G base station.
In one possible design, the security monitoring system further comprises an alarm module connected with the display module;
when the target area has a safety abnormal behavior, the alarm module is used for triggering an alarm device and generating alarm information, and the display module is also used for displaying the alarm information.
In one possible design, the scenized detection includes: the method comprises any one or more of man-vehicle shunting scene detection, personnel identification scene detection, post identification scene detection and safety equipment scene detection.
In a second aspect, the present application provides a security monitoring method based on 5G, which is applied to any one of the possible security monitoring systems provided in the first aspect, where the security monitoring system includes a collecting terminal, a 5G base station, and an edge cloud system, which are in communication connection; the method comprises the following steps:
the acquisition terminal acquires video stream data of a target area;
the edge cloud system receives the video stream data based on a 5G network provided by a 5G base station, and obtains a detection result according to the video stream data, wherein the detection result is used for representing whether a security abnormal behavior exists in the target area.
In a third aspect, the present application provides an electronic device, comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored by the memory to implement a possible security monitoring method as provided by the second aspect.
In a fourth aspect, the present application provides a computer-readable storage medium having stored thereon computer-executable instructions, which, when executed by a processor, implement the possible security monitoring method provided in the second aspect.
The application provides a security monitoring system based on 5G, a method, an electronic device and a storage medium, the security monitoring system comprises a collection terminal, a 5G base station and an edge cloud system, the collection terminal is in communication connection with the 5G base station, the collection terminal is used for collecting video stream data in a target area, the 5G base station is in communication connection with the edge cloud system, the edge cloud system is configured in the target area and used for obtaining a detection result according to the video stream data, the detection result is used for representing whether security abnormal behaviors exist in the target area, therefore, the security monitoring system based on 5G is formed in a mode that a 5G virtual private network is constructed through 5G and edge computing technology, whether security abnormal behaviors exist in the target area can be detected under the condition that the video stream data are not delivered from a factory is guaranteed, the transmission path of the video stream data is shortened, time delay is reduced, the defect that video analysis function in the prior art has hysteresis is overcome, and data protection is facilitated without being connected with a public network.
Drawings
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present application;
fig. 2 is a schematic structural diagram of a security monitoring system provided in an embodiment of the present application;
fig. 3 is a schematic flow chart of a security monitoring method provided in an embodiment of the present application;
fig. 4 is a schematic flowchart of another security monitoring method provided in the embodiment of the present application;
fig. 5 is a schematic diagram illustrating implementation of scene detection according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
First, it should be understood by those skilled in the art that these embodiments are merely for explaining the technical principles of the present application, and are not intended to limit the scope of the present application. And can be modified as needed by those skilled in the art to suit particular applications.
Second, it should be noted that in the description of the present application, the terms of direction or positional relationship indicated by the terms "inside", "outside", and the like are based on the direction or positional relationship shown in the drawings, which are merely for convenience of description, and do not indicate or imply that a device or member must have a specific orientation, be constructed in a specific orientation, and be operated, and thus, should not be construed as limiting the present application.
Furthermore, it should be noted that, in the description of the present application, unless otherwise explicitly specified or limited, the terms "connected" and "connected" should be interpreted broadly, e.g., as being fixed or detachable or integrally connected; can be mechanically or electrically connected; the two components can be directly connected or indirectly connected through an intermediate medium, and the two components can be communicated with each other. The specific meaning of the above terms in the present application can be understood by those skilled in the art as the case may be.
Along with the continuous improvement of the safety protection consciousness of the industrial production, the importance of the video safety protection system of the industrial park is more and more prominent. For the video safety protection system of the industrial park, the traditional video monitoring can cause the phenomenon of missing report, the wiring process is easily limited by a plurality of physical conditions such as monitoring regions, and in addition, the maintenance cost of the later monitoring system is high due to the complexity of the network wiring architecture. Aiming at the defects of traditional video monitoring, the current common solution is to transfer an intelligent analysis module to a cloud end for processing, so that a video monitoring system is converted from traditional civil air defense to intellectualization. However, the intelligent monitoring solution has a long time delay due to a long transmission path of the video stream, so that some real-time video analysis functions have hysteresis and lose significance.
Aiming at the problems in the prior art, the application provides a security monitoring system and method based on 5G, electronic equipment and a storage medium. The inventive concept of the present application resides in: the method comprises the steps of constructing a security monitoring system comprising a collection terminal, a 5G base station and an edge cloud system, wherein the collection terminal is in communication connection with the 5G base station, and the 5G base station is in communication connection with the edge cloud system. The edge cloud system is configured in a target area, and the target area comprises any area with video security monitoring requirements, such as an industrial park, a factory building area and the like. The edge cloud system can receive video stream data through a 5G network provided by a 5G base station and obtain a detection result capable of representing whether a safety abnormal behavior exists in a target area according to the video stream data, so that a 5G virtual private network is constructed based on 5G and an edge technology to form a 5G-based security monitoring system, the detection of whether the safety abnormal behavior exists in the target area is realized through the security monitoring system, the configured edge cloud system can ensure that the video stream data does not leave a factory and the detection result can be obtained according to the video stream data, compared with the prior art, the transmission path of the video stream data is shortened, the time delay can be reduced, and the defect that the video analysis function in the prior art has hysteresis can be overcome. In addition, the security monitoring system does not need to be connected with a public network, so that the security of video stream data is ensured, and data protection is facilitated.
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present application. As shown in fig. 1, in order to improve safety protection awareness in a target area, such as an industrial park or a factory building, a moving target in the target area needs to be monitored in real time to detect whether a safety abnormal behavior exists in the target area. The security monitoring system 100 based on 5G provided by the embodiment of the application is deployed in a target area, the target area in fig. 1 is illustrated by taking an industrial park as an example, and the security monitoring system 100 includes an acquisition terminal 101, a 5G base station 102 and an edge cloud system 103. The capture terminal 101 may be, for example, a camera for capturing video stream data in a target area. The 5G base station 102 is used to provide a 5G network. The edge cloud system 103 obtains video stream data through a 5G network, further performs scene detection on the video stream data to obtain a detection result capable of representing whether a target area has a safety abnormal behavior, and realizes detection on whether the target area has the safety abnormal behavior under the condition of ensuring that the video stream data does not leave a factory based on 5G and edge technology.
It should be noted that the security monitoring system based on 5G provided in the embodiment of the present application includes, but is not limited to, the above-mentioned exemplary application scenario.
Fig. 2 is a schematic structural diagram of a security monitoring system provided in an embodiment of the present application. As shown in fig. 2, the security monitoring system 200 based on 5G provided in the embodiment of the present application includes: the system comprises an acquisition terminal 201, a 5G base station 202 and an edge cloud system 203.
The collecting terminals 201 may be, for example, cameras, and are communicatively connected to the 5G base station 202, and are configured to collect video stream data in a target area, where the number of the collecting terminals 201 may be multiple, and the positions in the target area may be set according to actual conditions, and the setting principle is convenient for capturing moving targets in the target area, so as to collect the video stream data. When it is necessary to explain, the moving target in the target area may be a person, a vehicle, or the like. The collected video stream data refers to a video picture containing a moving object.
The 5G base station 202 is configured to provide a 5G network, and is in communication connection with the edge cloud system 203, so that the edge cloud system 203 may obtain video stream data through the 5G network, and further may obtain a detection result according to the video stream data, and represent whether a security abnormal behavior exists in a target area through the detection result.
In addition, the edge cloud system 203 is configured in the target area, so that the security monitoring system 200 based on 5G provided in the embodiment of the present application can detect whether there is a security abnormality in the target area according to the video stream data without shipping the video stream data. Compared with the prior art, the method has the advantages that the transmission path of the video stream data is shortened, the time delay is reduced, and the defect of hysteresis of a video analysis function in the prior art can be overcome. In addition, the security monitoring system 200 based on 5G does not need to be connected with a public network, so that the confidentiality of video stream data is ensured, and data protection is facilitated.
The security protection monitored control system based on 5G that this application embodiment provided, including acquisition terminal, 5G basic station and marginal cloud system. The acquisition terminal is in communication connection with the 5G base station, the 5G base station is in communication connection with the edge cloud system, the edge cloud system is configured in the target area and used for obtaining a detection result according to the video stream data, and the detection result is used for representing whether safety abnormal behaviors exist in the target area, so that a 5G-based security monitoring system is formed in a mode that a 5G virtual private network is constructed through the 5G and an edge computing technology, whether safety abnormal behaviors exist in the target area can be detected under the condition that the video stream data is not delivered from a factory, the transmission path of the video stream data is shortened, time delay is reduced, the defect that a video analysis function in the prior art has hysteresis is overcome, and connection with a public network is not needed, and data protection is facilitated.
In one possible design, the edge cloud system 203 may include a UPF module 2031, an edge cloud control server 2032, and an edge cloud management server 2033.
The UPF module 2031 is configured to forward the video stream data from the acquisition terminal 201 to the edge cloud control server 2032 through a 5G network provided by the 5G base station 202, so as to perform a shunting function on the video stream data, thereby ensuring that the video stream data in the factory does not leave the factory and effectively reducing the time delay.
The edge cloud control server 2032 may store the received video stream data, and further perform scene detection on the video stream data to obtain a corresponding detection result. Wherein the scene detection is determined according to a scene in which the video stream data is located, for example, the scene detection may include: the method comprises any one or more of man-vehicle shunting scene detection, personnel identification scene detection, post identification scene detection and safety equipment scene detection.
For example, the video stream data may be collected in a pedestrian-vehicle diversion scene, the scene detection performed on the video stream data in this scene is pedestrian-vehicle diversion scene detection, and the pedestrian-vehicle diversion scene may occur on a road in a plant area.
For another example, the video stream data may be collected in a scene that needs face recognition, and the scene detection performed on the video stream data collected in the scene is person recognition scene detection, and the scene of face recognition may occur in an entrance guard.
For another example, the video stream data may be collected in a scene that needs to be subjected to post identification, and the scene detection performed on the video stream data collected in the scene is post identification scene detection, for example, post matching on a pipeline station, and the like.
Optionally, the safety equipment scene detection may further include one or more of a safety helmet scene detection, a safety suit scene detection, a reflective suit scene detection, a zone delineation scene detection, a location scene detection, and the like. The above-mentioned safety equipment scenario detection may be understood as any scenario detection related to a safety production scenario. The embodiment of the present application does not limit the specific content of the safety production scenario.
It should be noted that the Edge cloud control server (MEC) 2032 has Computing power and storage capacity, and can perform AI analysis, that is, perform scene detection on video stream data, and obtain a corresponding analysis result, that is, a detection result.
The edge cloud management server 2033 is a management platform of the edge cloud control server 2032, and may be responsible for allocating resources such as computing power, GPU, storage space, and network of the SAAS application deployed in the edge cloud control server 2032. In other words, the edge cloud management server 2033 is configured to configure the edge cloud control server 2032 with a deployed target application therein, and the target application is an SAAS application that can be used to implement scene detection.
For example, an AI algorithm integration library may be formed in the edge cloud control server 2032 by means of a plug-in, and a plurality of SAAS applications, which are collectively referred to as target applications, are deployed in the AI algorithm integration library. The edge cloud management server 2033 implements scheduling and policy distribution of a plurality of AI algorithms by configuring a target application program for the edge cloud control server 2032, in other words, by scheduling a plurality of SAAS-enabled applications.
Optionally, the security monitoring system 200 may further include a display module 204 connected to the edge cloud system 203. After the edge cloud system 203 obtains the detection result according to the video stream data, the display module 204 may perform visual display on the detection result, for example, the UPF module 2031 in the edge cloud system 203 may forward the detection result to the display module 204 for visual display, so as to realize visualization of scene detection, which is beneficial to timely discovery and processing of security abnormal behaviors.
In one possible design, the security monitoring system 200 may further include an SMF (Session Management Function) module 205 and an encrypted virtual Network (SPN) module 206.
As shown in fig. 2, the SMF module 205 is connected to the UPF module 2031 via an N3 interface and an N4 interface, and in addition, the SMF module 205 is also connected to the encrypted virtual network module 206 via an N2 interface, and the encrypted virtual network module 206 is also connected to the core network 300.
The IP address of the acquisition terminal 201 may be allocated by the SMF module 205, so that the 5G network traffic may be forwarded to the UPF module 2031 via the 5G base station 202, and then the UPF module 2031 is forwarded to the edge cloud control server 2032, so as to distribute and guide the network traffic to the edge cloud system 203.
In addition, the encrypted virtual network module 206 is used to establish physical or logical service area isolation, establish a security system conforming to the service process in the factory, and improve the security of the security monitoring system 200.
In addition, the encryption virtual module 206 is connected to the core network 300 through the transmission network 400, so that the core network 300 may distribute the detection result and/or the video stream data according to the requirement of the actual working condition of the plant area, for example, the detection result and/or the video stream data may be distributed to other network systems according to the requirement, the other network systems may be any network systems in the plant area except the security monitoring system 200, and the functions of the other network systems are determined by the actual working condition, which is not limited in this embodiment of the present application. Obviously, the transmission network 400 is used for information transmission between the security monitoring system 200 and the core network 300.
Optionally, the edge cloud system 203 may also be connected to the internet through an N6 interface.
As described in the foregoing embodiments, the acquisition terminal 201 may be, for example, a camera, and is communicatively connected to the 5G base station 202. Specifically, the acquisition terminal 201 and the 5G base station 202 may be communicatively connected through a 5G module.
In one possible design, the 5G module may be a 5G module built in the acquisition terminal 201 or a 5G gateway added between the acquisition terminal 201 and the 5G base station 202. For example, some cameras have a 5G module, and a 5G network can be accessed through the 5G module. For some conventional cameras, the conventional camera may not have a 5G module capable of accessing the 5G network, and thus the 5G module may enable the acquisition terminal 201, which does not have the 5G module, to access the 5G network through the 5G gateway by adding the 5G gateway between the acquisition terminal 201 and the 5G base station 202.
It can be understood that the additional 5G gateway and the acquisition terminal 201 may be connected through a wired or wireless connection.
In one possible design, the security monitoring system 200 may further include an alarm module 207 connected to the display module 204. When the edge cloud system 203 determines that a security abnormal behavior exists in a target area according to video stream data, the alarm module 207 may trigger an alarm device and generate alarm information, so that the alarm device alarms on a site where the security abnormal behavior occurs, and further, the alarm information may be visually displayed through the display module 204, thereby actively early warning the security abnormal behavior occurring in a factory.
In addition, it should be noted that video stream data may be collected from different scenes in the target area to perform scene detection corresponding to the scenes, so that the security monitoring system based on 5G provided in the embodiment of the present application may perform blind-spot-free monitoring in the target area.
Fig. 3 is a schematic flow diagram of a security monitoring method according to an embodiment of the present application, where the security monitoring method based on 5G according to the embodiment of the present application is applied to the security monitoring system based on 5G according to the above embodiments, and the security monitoring system includes an acquisition terminal, a 5G base station, and an edge cloud system, which are in communication connection with each other. As shown in fig. 3, the security monitoring method based on 5G provided in the embodiment of the present application includes:
s101: the acquisition terminal acquires video stream data of a target area.
The acquisition terminal is in communication connection with the 5G base station, and the acquisition terminal is arranged in an area needing security monitoring, namely a target area, and is used for acquiring video stream data of the target area.
Optionally, the acquisition terminal may be, for example, a camera, and may be in communication connection with the 5G base station through the 5G module. The 5G module may be a 5G module built in the acquisition terminal, or for an acquisition terminal not provided with a 5G module, the 5G module may be a 5G gateway added between the acquisition terminal and the 5G base station. The 5G network group and the 5G gateway are used for enabling the acquisition terminal to be accessed to a 5G network provided by the 5G base station and to be in communication connection with the 5G base station.
S102: the edge cloud system receives video stream data based on a 5G network provided by a 5G base station, and obtains a detection result according to the video stream data.
And the detection result is used for representing whether the target area has the safety abnormal behavior or not.
The edge cloud system is configured in the target area, is in communication connection with the 5G base station, and has an edge cloud computing function. Therefore, the edge cloud system can obtain video stream data acquired by the acquisition terminal based on a 5G network provided by the 5G base station, can perform AI analysis on the video stream data to obtain a corresponding analysis result, namely a detection result, and can detect whether a security abnormal behavior exists in a target area. In other words, the edge cloud system may obtain a detection result according to the video stream data, where the detection result is used to represent whether a security abnormal behavior exists in the target area.
By the edge cloud system, whether the target area has safety abnormal behaviors or not can be known according to the video stream data under the condition that the video stream data is not delivered from a factory, and intelligent monitoring on the target area is realized. Compared with the prior art, the method has the advantages of shortening the transmission path of the video stream data, reducing time delay and overcoming the defect of hysteresis of a video analysis function in the prior art. The security monitoring system provided by the embodiment of the application does not need to be connected with a public network, so that the security of video stream data can be ensured, and the data protection is facilitated.
The security monitoring method based on 5G is applied to a security monitoring system based on 5G, and the security monitoring system comprises a collecting terminal, a 5G base station and an edge cloud system which are in communication connection. The method comprises the steps that firstly, a collection terminal collects video stream data of a target area, then an edge cloud system obtains the video stream data from the collection terminal based on a 5G network provided by a 5G base station, and obtains a detection result according to the video stream data, the detection result is used for representing whether safety abnormal behaviors exist in the target area, the safety monitoring system based on the 5G detects whether safety abnormal behaviors exist in the target area according to the video stream data under the condition that the video stream data does not leave a factory through executing a safety monitoring method, the target area is monitored, the transmission path of the video stream data is shortened, time delay is reduced, the defect that a video analysis function in the prior art has hysteresis can be overcome, the confidentiality of the video stream data is further guaranteed, and data protection is facilitated.
Fig. 4 is a schematic flow chart of another security monitoring method provided in the embodiment of the present application. The security monitoring method based on 5G provided by the embodiment of the application is applied to the security monitoring system based on 5G provided by each embodiment, and the security monitoring system comprises a collecting terminal, a 5G base station and an edge cloud system which are in communication connection. As shown in fig. 4, the security monitoring method provided in the embodiment of the present application includes:
s201: the acquisition terminal acquires video stream data of a target area.
Step S201 is similar to step S101 in implementation manner, principle and technical effect, and the details can be described with reference to the foregoing embodiments and are not repeated herein.
S202a: and the UPF module forwards the video stream data from the acquisition terminal to the edge cloud control server through the 5G network.
S202b: and the edge cloud control server stores the received video stream data.
S202c: the edge cloud management server configures a target application program for the edge cloud control server, and the edge cloud control server operates the target application program to perform scene detection on video stream data to obtain a detection result.
The edge cloud system comprises a UPF module, an edge cloud control server and an edge cloud management server, and the target application program is used for realizing scene detection.
The UPF module in the edge cloud system forwards video stream data from the acquisition terminal to the edge cloud control server through a 5G network provided by the 5G base station, and the video stream data is shunted. The edge cloud control server receives the video stream data, stores the video stream data, performs scene detection on the video stream data by using the computing power of the edge cloud control server to obtain a corresponding detection result, and realizes the computing power of the edge cloud control server by operating a target application program.
Optionally, the scene detection includes any one or more of a people and vehicle shunting scene detection, a personnel identification scene detection, a personnel post identification scene detection and a safety equipment scene detection.
For the detailed description of the scene detection, reference may be made to the foregoing embodiments, which are not repeated herein. In addition, the scene detection includes, but is not limited to, the listed scene detections.
The scenized detection performed by the edge cloud control server is realized by a target application program configured for the edge cloud control server by the edge cloud management server. The edge cloud management server is a management platform of the edge cloud control server and is responsible for distributing computing power, GPU, storage space, network and other resources of SAAS application deployed in the edge cloud control server.
Fig. 5 is a schematic diagram illustrating implementation of scene detection according to an embodiment of the present application. As shown in fig. 5, after the acquisition terminal acquires video stream data of a target area, a UPF module in the edge cloud system forwards the video stream data to an edge cloud control server in the edge cloud system through a 5G network provided by a 5G base station, wherein the edge cloud control server forms an AI algorithm integration library in a plug-in manner, and a plurality of SAAS applications, such as an algorithm a and an algorithm B in fig. 5, are deployed in the AI algorithm integration library, for example, the algorithm a is used for face recognition, man-machine recognition, personnel recognition, etc., the algorithm B is used for safety clothing recognition, safety helmet recognition, reflective clothing recognition, etc., the algorithm C is used for personnel tracking algorithm, and the algorithm D is used for position detection, etc. (the algorithm C and the algorithm D are not shown in fig. 5). The respective applications of the algorithms are SAAS applications, and are collectively referred to as target applications. As shown in fig. 5, the a algorithm is an application a in the target application, and the B algorithm is an application B in the target application, and so on. And the algorithms are connected with the corresponding applications through service interfaces. Wherein the target application is used for realizing scene detection. For example, the edge cloud management server may schedule the video stream data for the edge cloud control server according to a video picture of the video stream data to perform a corresponding algorithm required for performing scene detection, perform AI analysis on the video stream data through the scheduled corresponding algorithm, that is, a corresponding application in a target application program, that is, perform scene detection on the video stream data in a current scene in which the video stream data is acquired, where an analysis result is a detection result. In addition, the scheduled algorithms may be overlaid. The edge cloud management server configures each application in the target application program for the edge cloud control server to realize intelligent scheduling and strategy distribution of the AI algorithm.
For example, when the pedestrian and vehicle diversion scene detection is performed in the pedestrian and vehicle diversion scene, the edge cloud management server schedules a face recognition algorithm, a man-machine recognition algorithm, an electronic region planning algorithm, a position detection algorithm, a personnel tracking algorithm and the like for the edge cloud control server from the AI algorithm integration library according to video pictures of video stream data collected in the pedestrian and vehicle diversion scene, and superimposes the face recognition algorithm, the man-machine recognition algorithm, the electronic region planning algorithm, the position detection algorithm, the personnel tracking algorithm and the like to form the pedestrian and vehicle diversion scene detection in the pedestrian and vehicle diversion scene, which is used for judging whether pedestrians are in sidewalks and vehicles are in motor vehicle lanes. And judging that the target area in the scene of people and vehicle shunting has safety abnormal behaviors if the obtained detection result indicates that the pedestrians are not in the sidewalks and/or the vehicles are not in the motor vehicle lanes. The edge cloud management server schedules respective corresponding applications of a face recognition algorithm, a man-machine recognition algorithm, an electronic region delineation algorithm, a position detection algorithm and a personnel tracking algorithm, namely a target application program is configured for the edge cloud control server, so that the configured target application program is utilized to realize the man-vehicle shunting scene detection under the current man-vehicle shunting scene, and a corresponding detection result is obtained.
S203a: and the UPF module forwards the detection result to the display module, and the display module displays the detection result.
The security monitoring system based on 5G can further comprise a display module connected with the edge cloud system, after the detection result is obtained, the UPF module in the edge cloud system forwards the detection result to the display module for visual display, visualization of scene detection is achieved, and timely discovery and processing of safety abnormal behaviors are facilitated.
Alternatively, S203b: when the detection result shows that the target area has safe abnormal behavior, the alarm module triggers the alarm device and generates alarm information, and the display module displays the alarm information.
The security monitoring system based on 5G can further comprise an alarm module connected with the display module, when the detection result shows that the target area has the safety abnormal behavior, the alarm module can trigger an alarm device and generate alarm information, the display module can visually display the generated alarm information, the alarm device can be an alarm lamp, a broadcast and other devices, the alarm information can be notified in the mode of lighting and voice broadcasting, and active early warning can be realized on the safety abnormal behavior occurring in a factory.
The security monitoring method based on 5G is applied to a security monitoring system based on 5G, and the security monitoring system comprises a collecting terminal, a 5G base station and an edge cloud system which are in communication connection. After the acquisition terminal acquires video stream data of a target area, a UPF module in the edge cloud system forwards the video stream data to an edge cloud control server in the edge cloud system through a 5G network provided by a 5G base station, the edge cloud control server stores the video stream data, an edge cloud management server in the edge cloud system configures a target application program for the edge cloud control server, and the edge cloud control server operates the target application program to perform scene detection on the video stream data to obtain a detection result. And then, the UPF module in the edge cloud system forwards the detection result to the display module, and the display module performs visual display on the detection result. And when the detection result shows that the target area has a safety abnormal behavior, the alarm module connected with the display module triggers the alarm device to generate alarm information, and the display module displays the alarm information in a visual mode. The method has the advantages that whether the target area has safety abnormity is detected according to the video stream data under the condition that the video stream data is not delivered from a factory, the target area is monitored, the transmission path of the video stream data is shortened, time delay is reduced, the defect that the video analysis function in the prior art has hysteresis can be overcome, the confidentiality of the video stream data is ensured, and data protection is facilitated. Meanwhile, active early warning of safety abnormal behaviors existing in a target area can be achieved through the display module and the alarm module, automatic monitoring without blind spots is achieved, and the digital transformation capability of the security monitoring system is improved.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 6, the electronic device 500 may include: a processor 501, and a memory 502 communicatively coupled to the processor 501.
The memory 502 is used for storing programs. In particular, the program may include program code comprising computer-executable instructions.
Memory 502 may comprise high-speed RAM memory, and may also include non-volatile memory (MoM-volatile memory), such as at least one disk memory.
The processor 501 is used for executing computer execution instructions stored in the memory 502 to implement the 5G-based security monitoring method.
The processor 501 may be a central processing unit (cemtran processing mg UMit, abbreviated as CPU), an Application Specific Integrated Circuit (ASIC), or one or more integrated circuits configured to implement the embodiments of the present application.
Alternatively, the memory 502 may be separate or integrated with the processor 501. When the memory 502 is a device separate from the processor 501, the electronic device 500 may further include:
a bus 503 for connecting the processor 501 and the memory 502. The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. Buses may be classified as address buses, data buses, control buses, etc., but do not represent only one bus or type of bus.
Alternatively, in a specific implementation, if the memory 502 and the processor 501 are integrated on a chip, the memory 502 and the processor 501 may communicate through an internal interface.
The present application also provides a computer-readable storage medium, which may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, are specifically stored in the computer-readable storage medium, where the computer-readable storage medium stores computer execution instructions, and the computer execution instructions are used in the security monitoring method based on 5G in the foregoing embodiment.
The application also provides a computer program product, which includes computer execution instructions, and the computer instructions, when executed by a processor, implement the security monitoring method based on 5G in the above embodiments.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. The utility model provides a security protection monitored control system based on 5G which characterized in that includes: the method comprises the steps of collecting a terminal, a 5G base station and an edge cloud system;
the acquisition terminal is in communication connection with the 5G base station and is used for acquiring video stream data in a target area;
the 5G base station is in communication connection with the edge cloud system, the edge cloud system is used for obtaining a detection result according to the video stream data, and the detection result is used for representing whether the target area has a safety abnormal behavior or not.
2. The security monitoring system of claim 1, wherein the edge cloud system comprises a UPF module, an edge cloud control server, and an edge cloud management server;
the UPF module is used for forwarding the video stream data from the acquisition terminal to the edge cloud control server through a 5G network;
the edge cloud control server is used for storing the received video stream data and carrying out scene detection on the video stream data to obtain a detection result;
the edge cloud management server is used for configuring a target application program for the edge cloud control server, and the target application program is used for realizing the scene detection.
3. The security monitoring system of claim 2, further comprising: the SMF module and the encrypted virtual network module;
the SMF module is connected with the UPF module through an N3 interface and an N4 interface, the SMF module is connected with the encrypted virtual network module through an N2 interface, and the encrypted virtual network module is further connected to a core network end.
4. The security monitoring system of claim 3, further comprising a display module connected to the edge cloud system;
and the display module is used for displaying the detection result forwarded by the UPF module.
5. The security monitoring system according to any one of claims 2 to 4, wherein the acquisition terminal is in communication connection with the 5G base station through a 5G module;
the 5G module comprises a 5G module arranged in the acquisition terminal or a 5G gateway additionally arranged between the acquisition terminal and the 5G base station.
6. The security monitoring system of claim 5, further comprising an alarm module connected to the display module;
when the target area has a safety abnormal behavior, the alarm module is used for triggering an alarm device and generating alarm information, and the display module is also used for displaying the alarm information.
7. The security monitoring system of claim 6, wherein the scenarized detection comprises: the method comprises any one or more of man-vehicle shunting scene detection, personnel identification scene detection, post identification scene detection and safety equipment scene detection.
8. A security monitoring method based on 5G is characterized in that the security monitoring method is applied to the security monitoring system according to any one of claims 1 to 7, and the security monitoring system comprises an acquisition terminal, a 5G base station and an edge cloud system which are in communication connection; the method comprises the following steps:
the acquisition terminal acquires video stream data of a target area;
the edge cloud system receives the video stream data based on a 5G network provided by a 5G base station, and obtains a detection result according to the video stream data, wherein the detection result is used for representing whether a security abnormal behavior exists in the target area.
9. An electronic device, comprising: a processor, and a memory communicatively coupled to the processor;
the memory stores computer execution instructions;
the processor executes the computer-executable instructions stored by the memory to implement the security monitoring method of claim 8.
10. A computer readable storage medium having computer executable instructions stored thereon, wherein the computer executable instructions when executed by a processor implement the security monitoring method of claim 8.
CN202210810701.6A 2022-07-11 2022-07-11 Security monitoring system and method based on 5G, electronic device and storage medium Pending CN115188148A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210810701.6A CN115188148A (en) 2022-07-11 2022-07-11 Security monitoring system and method based on 5G, electronic device and storage medium
PCT/CN2023/080249 WO2024011926A1 (en) 2022-07-11 2023-03-08 5g-based security monitoring system and method, electronic device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210810701.6A CN115188148A (en) 2022-07-11 2022-07-11 Security monitoring system and method based on 5G, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN115188148A true CN115188148A (en) 2022-10-14

Family

ID=83517373

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210810701.6A Pending CN115188148A (en) 2022-07-11 2022-07-11 Security monitoring system and method based on 5G, electronic device and storage medium

Country Status (2)

Country Link
CN (1) CN115188148A (en)
WO (1) WO2024011926A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115866717A (en) * 2023-02-28 2023-03-28 广州市高科通信技术股份有限公司 Mobile terminal transaction program management method and system based on 5G private network
CN115883789A (en) * 2022-11-30 2023-03-31 中国铁道科学研究院集团有限公司 Railway infrastructure monitoring and information safety protection system based on 5G
WO2024011926A1 (en) * 2022-07-11 2024-01-18 卡奥斯工业智能研究院(青岛)有限公司 5g-based security monitoring system and method, electronic device, and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111698470A (en) * 2020-06-03 2020-09-22 河南省民盛安防服务有限公司 Security video monitoring system based on cloud edge cooperative computing and implementation method thereof
CN112040189A (en) * 2020-09-01 2020-12-04 浙江大华技术股份有限公司 Monitoring method and system of front-end equipment and storage medium
CN112422701A (en) * 2019-08-20 2021-02-26 华为技术有限公司 Domain name system query method and communication device
CN112806041A (en) * 2018-10-30 2021-05-14 华为技术有限公司 Key generation method, device and system
CN112907867A (en) * 2021-01-22 2021-06-04 深圳英飞拓科技股份有限公司 Early warning method and device based on image recognition and server
CN113169937A (en) * 2018-12-21 2021-07-23 瑞典爱立信有限公司 User data traffic handling
CN113541989A (en) * 2020-04-17 2021-10-22 中国移动通信有限公司研究院 Network slice detection method, device and storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110956061B (en) * 2018-09-27 2024-04-16 北京市商汤科技开发有限公司 Action recognition method and device, and driver state analysis method and device
CN111131794A (en) * 2020-01-17 2020-05-08 软通动力信息技术有限公司 Edge intelligent terminal equipment with video AI analysis and 5G communication
WO2021258195A1 (en) * 2020-06-22 2021-12-30 Canscan Softwares And Technologies Inc. Image-based system and method for shipping container management with edge computing
CN214338041U (en) * 2021-02-22 2021-10-01 郭义华 Intelligent city monitoring system based on 5G Internet of things
CN112969057A (en) * 2021-03-23 2021-06-15 中国大唐集团科学技术研究院有限公司华东电力试验研究院 5G MEC shunted electric power system personnel action automatic identification system
CN113497832A (en) * 2021-07-14 2021-10-12 中国联合网络通信集团有限公司 Remote maintenance system, method and server
CN113989625A (en) * 2021-12-13 2022-01-28 上海华谊信息技术有限公司 Image identification method, device and equipment based on edge calculation and storage medium
CN115188148A (en) * 2022-07-11 2022-10-14 卡奥斯工业智能研究院(青岛)有限公司 Security monitoring system and method based on 5G, electronic device and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112806041A (en) * 2018-10-30 2021-05-14 华为技术有限公司 Key generation method, device and system
CN113169937A (en) * 2018-12-21 2021-07-23 瑞典爱立信有限公司 User data traffic handling
CN112422701A (en) * 2019-08-20 2021-02-26 华为技术有限公司 Domain name system query method and communication device
CN113541989A (en) * 2020-04-17 2021-10-22 中国移动通信有限公司研究院 Network slice detection method, device and storage medium
CN111698470A (en) * 2020-06-03 2020-09-22 河南省民盛安防服务有限公司 Security video monitoring system based on cloud edge cooperative computing and implementation method thereof
CN112040189A (en) * 2020-09-01 2020-12-04 浙江大华技术股份有限公司 Monitoring method and system of front-end equipment and storage medium
CN112907867A (en) * 2021-01-22 2021-06-04 深圳英飞拓科技股份有限公司 Early warning method and device based on image recognition and server

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024011926A1 (en) * 2022-07-11 2024-01-18 卡奥斯工业智能研究院(青岛)有限公司 5g-based security monitoring system and method, electronic device, and storage medium
CN115883789A (en) * 2022-11-30 2023-03-31 中国铁道科学研究院集团有限公司 Railway infrastructure monitoring and information safety protection system based on 5G
CN115883789B (en) * 2022-11-30 2023-12-01 中国铁道科学研究院集团有限公司 System for monitoring railway infrastructure and protecting information safety based on 5G
CN115866717A (en) * 2023-02-28 2023-03-28 广州市高科通信技术股份有限公司 Mobile terminal transaction program management method and system based on 5G private network
CN115866717B (en) * 2023-02-28 2023-08-11 广州市高科通信技术股份有限公司 Mobile terminal transaction program management method and system based on 5G private network

Also Published As

Publication number Publication date
WO2024011926A1 (en) 2024-01-18

Similar Documents

Publication Publication Date Title
CN115188148A (en) Security monitoring system and method based on 5G, electronic device and storage medium
CN103065459B (en) The intelligent transportation integration control platform system of sing on web geographic information system technology
CN104469305B (en) The fault detection method and device of power network video monitoring device
CN107807593B (en) Power distribution room master control device, master control system and detection control method
CN110288837B (en) Multi-camera collaborative illegal parking board identification method and device
CN103391432A (en) Intelligent video monitoring system for safety early warning of scenic spots and monitoring method
EP3867841A1 (en) System for controlling and managing a process within an environment using artificial intelligence techniques and relative method
CN202652420U (en) Panorama monitoring system
CN100527178C (en) Automatic tracking display system for warn
CN103985230A (en) Notification method, device and system based on image
KR101016530B1 (en) CCTV system using street lamp
CN203260195U (en) Traffic violation public-supervision system based on intelligent terminal
CN105072425A (en) Video monitoring method and video monitoring device
CN114566056B (en) Highway tunnel driving safety risk identification, prevention and control method and system
CN105828459A (en) Place vehicle management system, vehicle terminal and vehicle
CN108230669B (en) Road vehicle violation detection method and system based on big data and cloud analysis
CN113903141A (en) Scene abnormal event identification, analysis and alarm system for transformer substation and distribution room and outdoor transformer
CN108288025A (en) A kind of car video monitoring method, device and equipment
CN113762766A (en) Rail transit station transport pipe system, method and device
CN106506589A (en) A kind of robot cluster method and system
CN103634576B (en) A kind of highway mobile terminal monitoring system and method
CN108234937B (en) Video monitoring system and monitoring video display method
Kim et al. The improvement plan for fire response time using big data
CN113313075A (en) Target object position relation analysis method and device, storage medium and electronic equipment
CN114339168B (en) Regional security monitoring method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination