CN115840399A - Intelligent building monitoring system based on Internet of things and monitoring method thereof - Google Patents

Intelligent building monitoring system based on Internet of things and monitoring method thereof Download PDF

Info

Publication number
CN115840399A
CN115840399A CN202211544834.XA CN202211544834A CN115840399A CN 115840399 A CN115840399 A CN 115840399A CN 202211544834 A CN202211544834 A CN 202211544834A CN 115840399 A CN115840399 A CN 115840399A
Authority
CN
China
Prior art keywords
monitoring
authentication
terminal
message
monitoring device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211544834.XA
Other languages
Chinese (zh)
Inventor
汪坚
汪宝忠
金晓丹
鹿守娇
王胜利
张曙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yibang Intelligent Technology Co ltd
Original Assignee
Shanghai Yibang Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yibang Intelligent Technology Co ltd filed Critical Shanghai Yibang Intelligent Technology Co ltd
Priority to CN202211544834.XA priority Critical patent/CN115840399A/en
Publication of CN115840399A publication Critical patent/CN115840399A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The utility model relates to an intelligent building monitored control system and monitoring method based on thing networking, this intelligent building monitored control system includes at least one monitor terminal, control management platform, at least one supervisory equipment and supervisory equipment network gateway, and monitor terminal is used for: sending an authentication request to a monitoring management platform; receiving an authentication file returned by the monitoring management platform; sending a monitoring device link request to a monitoring device network gateway of the intelligent building monitoring system; in response to successful creation of the monitoring device link, sending a monitoring picture acquisition message to the monitoring device network gateway based on the monitoring device link, so that the monitoring device network gateway forwards the monitoring picture acquisition message to the monitoring device in the intelligent building monitoring system; and acquiring and displaying a monitoring picture of the monitoring equipment forwarded by the network gateway of the monitoring equipment. The safety of the intelligent building monitoring system can be greatly improved.

Description

Intelligent building monitoring system based on Internet of things and monitoring method thereof
Technical Field
The present disclosure relates to intelligent monitoring, and in particular, to an intelligent building monitoring system and a monitoring method thereof based on the internet of things.
Background
In order to ensure the safety of residents, it is common to monitor a cell all day long through a monitoring camera, however, a monitoring picture of a building is generally only displayed on a display screen of a monitoring room, and the monitoring picture cannot be checked anytime and anywhere, so that a user can acquire the monitoring picture anytime and anywhere, an intelligent building monitoring system based on the internet of things is produced at will, however, since monitoring equipment is to be connected to an external network, how to ensure the safety of the monitoring picture, so as to avoid safety problems caused by lawless persons obtaining the monitoring picture of the building, and the problem to be solved urgently is solved.
Disclosure of Invention
In order to solve the problems in the related art, the present disclosure provides an intelligent building monitoring system and a monitoring method thereof.
According to a first aspect of the present disclosure, an intelligent building monitoring system based on the internet of things is provided, the intelligent building monitoring system includes at least one monitoring terminal, a monitoring management platform, at least one monitoring device and a monitoring device network gateway, an authentication verification program is deployed in the monitoring management platform, and the monitoring terminal is configured to:
responding to a monitoring picture to be displayed, and sending an authentication request to a monitoring management platform;
receiving an authentication file returned by the monitoring management platform, wherein the authentication file is acquired from an authentication verification program by the monitoring management platform based on the authentication request;
sending a monitoring device link request to a monitoring device network gateway of the intelligent building monitoring system, wherein the monitoring device link request bears the authentication file;
in response to successful creation of a monitoring device link, sending a monitoring picture acquisition message to the monitoring device network gateway based on the monitoring device link, so that the monitoring device network gateway forwards the monitoring picture acquisition message to monitoring devices in the intelligent building monitoring system;
and acquiring and displaying the monitoring picture of the monitoring equipment forwarded by the network gateway of the monitoring equipment.
According to a second aspect of the present disclosure, an intelligent building monitoring method based on the internet of things is provided, which is applied to a monitoring terminal in an intelligent building monitoring system, the intelligent building monitoring system includes at least one monitoring terminal, a monitoring management platform, at least one monitoring device and a monitoring device network gateway, an authentication verification program is deployed in the monitoring management platform, and the method includes:
responding to a monitoring picture to be displayed, and sending an authentication request to a monitoring management platform;
receiving an authentication file returned by the monitoring management platform, wherein the authentication file is acquired from an authentication verification program by the monitoring management platform based on the authentication request;
sending a monitoring device link request to a monitoring device network gateway of the intelligent building monitoring system, wherein the monitoring device link request bears the authentication file;
in response to successful creation of a monitoring device link, sending a monitoring picture acquisition message to the monitoring device network gateway based on the monitoring device link, so that the monitoring device network gateway forwards the monitoring picture acquisition message to monitoring devices in the intelligent building monitoring system;
and acquiring and displaying the monitoring picture of the monitoring equipment forwarded by the network gateway of the monitoring equipment.
According to a third aspect of the present disclosure, an intelligent building monitoring method based on the internet of things is provided, which is applied to a monitoring management platform in an intelligent building monitoring system, the intelligent building monitoring system includes at least one monitoring terminal, a monitoring management platform, at least one monitoring device and a monitoring device network gateway, an authentication verification program is deployed in the monitoring management platform, and the method includes:
receiving a monitoring equipment link request sent by a monitoring terminal, wherein the monitoring equipment link request bears the authentication file;
sending a verification request message carrying the authentication file to an authentication verification program to enable the authentication verification program to verify the authentication file;
when the authentication file is verified successfully, establishing a monitoring device link with the monitoring terminal based on the monitoring device link request;
and receiving a monitoring picture acquisition message sent by the monitoring terminal based on the established monitoring equipment link, and forwarding the monitoring picture acquisition message to the monitoring equipment.
According to a fourth aspect of the present disclosure, an intelligent building monitoring method based on the internet of things is provided, which is applied to an authentication verification program in an intelligent building monitoring system, the intelligent building monitoring system includes at least one monitoring terminal, a monitoring management platform, at least one monitoring device and a monitoring device network gateway, the monitoring management platform is deployed with the authentication verification program, and the method includes:
receiving an authentication file generation message sent by the monitoring terminal;
generating a message based on the authentication file to acquire a message confidence parameter;
determining whether the current authentication file generation message is credible based on the message confidence parameter;
responding to the credibility, and sending an authentication file to the monitoring terminal;
receiving a check request message sent by a network gateway of a monitoring device, wherein the check request message bears the authentication file;
and checking the authentication file, and sending authentication file checking information to the monitoring equipment network gateway.
By using the technical scheme, the authentication request is sent to the monitoring management platform when the monitoring terminal displays the monitoring screen; receiving an authentication file returned by the monitoring management platform; sending a monitoring device link request to a monitoring device network gateway of the intelligent building monitoring system; in response to successful creation of the monitoring device link, sending a monitoring picture acquisition message to the monitoring device network gateway based on the monitoring device link, so that the monitoring device network gateway forwards the monitoring picture acquisition message to the monitoring device in the intelligent building monitoring system; acquiring and displaying a monitoring picture of the monitoring equipment forwarded by the network gateway of the monitoring equipment; by adopting the scheme, all monitoring pictures can be replaced by the monitoring equipment network gateway to acquire messages, and the legal monitoring terminals are controlled to be accessed into the intelligent building monitoring system by sending the authentication files, so that the general terminals cannot directly access resources in the intelligent building monitoring system, only the monitoring terminals which acquire the authentication files can acquire the monitoring pictures in the intelligent building monitoring system, and the safety of the intelligent building monitoring system is greatly improved.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and features are not necessarily drawn to scale. In the drawings:
fig. 1 is a flowchart illustrating a method for providing intelligent building monitoring based on internet of things according to an exemplary embodiment.
Fig. 2 is a flowchart illustrating a method for providing intelligent building monitoring based on internet of things according to an exemplary embodiment.
Fig. 3 is a flowchart illustrating a method for providing intelligent building monitoring based on the internet of things according to an exemplary embodiment.
Fig. 4 is a schematic diagram illustrating the provision of an internet of things based intelligent building monitoring system according to an exemplary embodiment.
Fig. 5 is a schematic structural diagram of an electronic device for implementing an embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and the embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present invention, it is to be understood that the terms "upper", "lower", "inside", "outside", "left", "right", and the like, indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, or the orientations or positional relationships that the products of this application usually place when in use, or the orientations or positional relationships that are usually understood by those skilled in the art, and are used only for convenience of describing the present invention and simplifying the description, but do not indicate or imply that the equipment or elements that are referred to must have a specific orientation, be constructed in a specific orientation, and be operated, and thus, should not be construed as limiting the present invention.
Furthermore, the terms "first," "second," and the like are used merely to distinguish one description from another, and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be further noted that, unless otherwise explicitly stated or limited, the terms "disposed" and "connected" and the like are to be broadly construed, for example, "connected" may be a fixed connection, a detachable connection, or an integral connection; can be mechanically or electrically connected; the connection may be direct or indirect via an intermediate medium, and may be a communication between the two elements. The specific meanings of the above terms in the present invention can be understood according to specific situations by those of ordinary skill in the art.
The following detailed description of embodiments of the invention refers to the accompanying drawings.
Fig. 1 is a flowchart illustrating a method for monitoring an intelligent building based on the internet of things according to an exemplary embodiment, where the method is applied to a monitoring terminal in an intelligent building monitoring system, the intelligent building monitoring system includes at least one monitoring terminal, a monitoring management platform, at least one monitoring device, and a monitoring device network gateway, and an authentication verification program is deployed in the monitoring management platform, where the monitoring terminal may be any electronic device with a display function, such as a mobile phone, a tablet computer, and the like, as shown in fig. 1, the monitoring method includes:
s101, sending an authentication request to a monitoring management platform when responding to a monitoring picture to be displayed.
In one embodiment, an authentication request may be sent to the monitoring management platform in response to receiving the monitoring screen acquisition message.
The monitoring picture acquiring message may be triggered by an application on the monitoring terminal, for example, when the user determines to display the monitoring picture, the corresponding monitoring picture acquiring message may be sent by using an operation trigger.
In an embodiment, before sending the authentication request to the monitoring management platform, the monitoring terminal may further authenticate the authentication verification program, so that the current monitoring terminal is bound to the terminal user identifier, and the security of monitoring screen access can be further improved. For example, before sending the authentication request to the monitoring management platform, the method provided by the embodiment of the present invention may further include:
sending a terminal authentication message to the authentication verification program, wherein the terminal authentication message carries a terminal user identifier and a monitoring terminal identifier of the monitoring terminal;
and when the terminal authentication is completed, performing network initialization operation on the monitoring terminal by using the monitoring management platform.
Wherein, the end user identifier may include: account identification information, such as a login account of the monitoring management platform.
The network initialization operation may include initialization processing of a terminal application and various interfaces. In particular, the network initialization operation may be set based on actual requirements.
For example, the monitoring terminal may first authenticate with the authentication verification program, and after the authentication is completed, a network initialization operation may be performed by using the monitoring management platform, and then, the monitoring screen access may be implemented by using the monitoring device network gateway. For example, when receiving the terminal authentication message, the authentication and verification program may parse the terminal authentication message to obtain the terminal user identifier and the terminal related information of the monitoring terminal, and then, the authentication and verification program may verify the terminal user identifier, and when the verification is successful, perform the association storage on the terminal user identifier and the monitoring terminal identifier to complete the authentication. In practical application, the monitoring terminal identification can be realized in the process of logging in the monitoring management platform by a user, the terminal authentication message is a login request, for example, for a new user, when a monitoring screen needs to be displayed, a user account and a password can be input through the monitoring terminal to log in the monitoring management platform, that is, the monitoring terminal can send the login request to an authentication verification program, the authentication verification program verifies the user account and the password which are requested to be carried, and in response to successful verification, login success information is returned, so that the monitoring terminal can access the monitoring management platform. When the authentication and verification program is successfully verified, the monitoring terminal identifier (such as a terminal ID) of the current monitoring terminal and the terminal user identifier (such as a user ID) may be bound and stored.
In an embodiment, the monitoring terminal may also automatically trigger operation and log in the monitoring management platform, for example, in response to the monitoring terminal being powered on and started, automatically log in the monitoring management platform based on the stored terminal user identifier; specifically, sending a terminal authentication message to the authentication verification program includes:
responding to the power-on starting of the monitoring terminal, and initializing to access the monitoring management platform;
detecting whether the historical terminal user identification in an authentication database corresponding to the monitoring management platform is overdue or not;
in response to expiration of authentication, extracting a historical end user identification from the authentication database;
and automatically sending a terminal authentication message to the authentication verification program based on the historical terminal user identification.
For example, when a user starts the monitoring terminal, the monitoring terminal automatically operates the monitoring management client at the background, detects whether the terminal user identifier (which may be the terminal user identifier used by the monitoring management client logged in before) stored in the cache unit of the monitoring management client is authenticated and expired, and sends a terminal authentication message to the authentication verification program in response to the authentication and expiration, where the terminal authentication message carries the monitoring terminal identifier of the monitoring terminal and the stored terminal user identifier; and the authentication verification program verifies the terminal user identifier, and if the verification is successful, login is allowed and the terminal related information is bound with the terminal user identifier.
In an embodiment, when the historical terminal user identifier authentication expires, the terminal user identifier input by the user may be further obtained, and then, a terminal authentication message is sent to the authentication verification program based on the terminal user identifier input by the user, where the terminal authentication message carries the current monitoring terminal identifier of the monitoring terminal and the terminal user identifier input by the user.
For example, when a user starts a monitoring terminal, the monitoring terminal automatically operates a monitoring management client at the background, detects whether a terminal user identifier (the terminal user identifier can be a terminal user identifier used by a previous login monitoring management client) stored in a cache unit of the monitoring management client is authenticated to be expired, displays a login interface of the monitoring management client in response to the authentication expiration, acquires the terminal user identifier input by the user based on information input operation of the user aiming at the login interface, and then can send a terminal authentication message to an authentication verification program, wherein the terminal authentication message carries terminal related information of the monitoring terminal and the terminal user identifier input by the user; and the authentication verification program verifies the terminal user identifier, and if the verification is successful, login is allowed and the monitoring terminal identifier and the terminal user identifier are bound.
S102, receiving an authentication file returned by the monitoring management platform, wherein the authentication file is acquired from an authentication verification program by the monitoring management platform based on an authentication request.
The authentication file may include authentication information that needs to be used to obtain the monitoring picture, for example, the authentication information may be information such as an encryption code.
And when the monitoring management platform receives the authentication request, the monitoring management platform can apply an authentication file for monitoring the picture access to the authentication verification program. For example, the monitoring management platform may send an authentication file application request to the authentication verification program, and the authentication verification program may issue or send a corresponding authentication file to the monitoring management platform based on the authentication file application request.
And after responding to the monitoring management platform receiving the authentication file issued by the authentication verification program, returning the authentication file to the monitoring equipment network gateway.
For example, in response to the monitoring management platform, such as the monitoring management client, receiving the authentication request, the monitoring screen authentication file may be applied to the authentication verification program. For example, a monitoring management platform such as a monitoring management client may apply for a request to an authentication verification program authentication file; the authentication verification program can issue or send a corresponding authentication file to the monitoring management platform based on the authentication file application request.
In an embodiment, the authentication verification program may acquire a message confidence parameter based on the authentication file application request, then determine whether the current monitoring screen acquisition message is trusted based on the message confidence parameter, and send or issue an authentication file to the monitoring terminal, such as the monitoring management platform, in response to the trust.
The message confidence parameter is information used to evaluate or determine whether the authentication file generates a message that is authentic, and may include, for example: the terminal user identification, terminal related information of the monitoring terminal, network link information, monitoring picture information to be displayed, and the like.
Wherein, the end user identifier may include: the user logs in the account number, the password, the employee number, the position where the user is located, the department and the like. The terminal-related information may include a type of the terminal, binding information of the terminal and the user identifier, and the like.
The network link information may include: network link information of the current operation of the monitoring terminal, network link information of a monitoring picture to be displayed and the like.
The monitoring picture information to be displayed may include attribute information of the monitoring picture to be displayed currently, such as a name of the monitoring picture, a region corresponding to the monitoring picture, an address of the monitoring picture, a size of the monitoring picture, and the like.
In the embodiment of the present invention, the message confidence parameter may be obtained in various manners, for example, the authentication file application request may carry the message confidence parameter, and at this time, the authentication verification program may analyze the authentication file application request to obtain the message confidence parameter.
In one embodiment, the authentication verification program also requests message confidence parameters from the monitoring terminal, e.g., in response to receiving the authentication file by the authentication verification program
S103, sending a monitoring device link request to a monitoring device network gateway of the intelligent building monitoring system, wherein the monitoring device link request bears an authentication file.
The intelligent building monitoring system can be a network system based on the Internet of things, and each monitoring device is connected to the network through the Internet of things technology and realizes information interaction with the monitoring device and the monitoring management platform.
The monitoring device network gateway can be a computer system or a device which provides data conversion service in the intelligent building monitoring system. The monitoring device network gateway is a linker between different devices. The monitoring device network gateway can be an intelligent gateway, such as a borderless intelligent gateway.
In the embodiment of the disclosure, before the monitoring device link is created after the monitoring picture acquisition message is received, the monitoring management platform may be used to apply for the authentication file, and then the monitoring device link is created with the monitoring device network gateway based on the applied authentication file, for example, the monitoring device link is created with the monitoring device network gateway.
In an embodiment, in order to improve security of monitoring screen acquisition, an encrypted monitoring device link may also be created.
After the monitoring device network gateway receives the monitoring device link request sent by the monitoring device network gateway, the monitoring device network gateway may check or verify the authentication file requested to be carried, for example, send the authentication file to an authentication verification program for verification, and in response to a successful verification, the monitoring device network gateway establishes a monitoring device link with the monitoring terminal.
And S104, when the monitoring device link is successfully established, sending a monitoring picture acquisition message to the monitoring device network gateway based on the monitoring device link, so that the monitoring device network gateway forwards the monitoring picture acquisition message to the monitoring device in the intelligent building monitoring system.
And S105, acquiring and displaying the monitoring picture of the monitoring equipment forwarded by the network gateway of the monitoring equipment.
In the embodiment of the disclosure, when the monitoring screen is displayed through the monitoring terminal, an authentication request is sent to the monitoring management platform; receiving an authentication file returned by the monitoring management platform; sending a monitoring equipment link request to a monitoring equipment network gateway of the intelligent building monitoring system; in response to successful creation of the monitoring device link, sending a monitoring picture acquisition message to the monitoring device network gateway based on the monitoring device link, so that the monitoring device network gateway forwards the monitoring picture acquisition message to the monitoring device in the intelligent building monitoring system; acquiring and displaying a monitoring picture of the monitoring equipment forwarded by the network gateway of the monitoring equipment; by adopting the scheme, all monitoring pictures can be proxied to acquire messages through the network gateway of the monitoring equipment, and the legal monitoring terminal is controlled to access the intelligent building monitoring system by sending the authentication file, so that the general terminal cannot directly access the resources in the intelligent building monitoring system, and only the monitoring terminal which acquires the authentication file can acquire the monitoring pictures in the intelligent building monitoring system, thereby greatly improving the safety of the intelligent building monitoring system.
For example, the monitoring screen acquisition message of the application process may be forwarded to the monitoring device network gateway based on the monitoring device link. For example, when the monitoring terminal receives the monitoring picture acquiring message, an authentication request may be sent to the monitoring management client, and the monitoring management client may acquire an authentication file from the authentication verification program based on the authentication request and return the authentication file; the monitoring terminal can establish a monitoring device link with the monitoring device network gateway based on the authentication file, and when the monitoring device link is successfully established, the monitoring terminal can utilize the monitoring device link to acquire a message from a monitoring picture of the monitoring device network gateway.
For example, when the encrypted monitoring device link is created, the monitoring terminal may send a monitoring picture acquisition message to the monitoring device network gateway based on the encrypted monitoring device link, and after receiving the monitoring picture acquisition message, the monitoring device network gateway may forward the monitoring picture acquisition message to a corresponding monitoring device (e.g., a monitoring device corresponding to ten buildings) in the intelligent building monitoring system, so as to acquire the monitoring picture.
In an embodiment, for a monitoring device network gateway, the monitoring device network gateway may receive a monitoring device link request sent by a monitoring terminal, where the monitoring device link request carries an authentication file; sending a verification request message carrying an authentication file to an authentication verification program to ensure that the authentication verification program verifies the authentication file; when the authentication file is verified successfully, establishing a monitoring device link with the monitoring terminal based on the monitoring device link request; and receiving a monitoring picture acquisition message sent by the monitoring terminal based on the established monitoring equipment link, and forwarding the monitoring picture acquisition message to the monitoring equipment.
In one embodiment, in order to improve the security of acquiring the monitoring picture, the monitoring picture acquires a message bearing authentication file; at this time, forwarding the monitoring picture acquiring message to the monitoring device may include:
sending a verification request message carrying the authentication file to the authentication verification program so that the authentication verification program verifies the authentication file;
and when the authentication file is successfully verified, forwarding a monitoring picture acquisition message to the monitoring equipment.
In one embodiment, in order to improve the security of obtaining the monitoring picture, a validity period may be set for the created monitoring device link; the monitoring screen acquisition message may be sent using the monitoring device link in response to the validity period of the monitoring device link not reaching, and the monitoring screen acquisition message may not be sent using the monitoring device link in response to the validity period of the monitoring device link reaching. For example, sending a monitoring picture acquisition message to the monitoring device network gateway based on the monitoring device link may include:
determining whether a validity period of the monitoring device link has arrived;
and responding to the expired authentication, and sending the monitoring picture acquisition message to the monitoring equipment network gateway based on the monitoring equipment link.
In one embodiment, when the validity period of the monitoring device link is reached, a new authentication file may be requested from the authentication verification program again, then a new monitoring device link is created again with the monitoring device network gateway based on the new authentication file, and the monitoring picture acquisition message is forwarded to the monitoring device network gateway based on the new monitoring device link.
In an embodiment, in order to improve the security of the monitoring picture, after the monitoring device link is created, an authentication file needs to be sent for verification each time the monitoring picture is acquired, and when the verification is successful, the monitoring device network gateway forwards a monitoring picture acquisition message to the corresponding monitoring device.
For example, the monitoring picture acquiring message may also carry an authentication file and monitoring picture requirement information; the monitoring equipment network gateway can send the authentication file to an authentication verification program for verification after receiving the monitoring picture acquisition message, and in response to successful verification, the monitoring equipment network gateway can forward the monitoring picture acquisition message to corresponding monitoring equipment based on the monitoring picture requirement information.
In an embodiment, in order to improve the security of the monitoring screen, the monitoring management platform may further monitor the terminal network security data of the monitoring terminal in real time, and send a reliability index to the authentication verification program, so that the authentication verification program determines whether the terminal network security data of the monitoring terminal is abnormal based on the reliability index. For example, the method provided by the embodiment of the present invention may further include:
periodically checking terminal network security data of a monitoring terminal by using a monitoring management platform to obtain a reliability index;
and sending the reliability index to the authentication verification program by using the monitoring management platform, so that the authentication verification program determines whether the terminal network security data of the monitoring terminal is abnormal or not based on the reliability index.
For example, the monitoring management platform, such as the monitoring management client, may be used to periodically check the reliability index of the monitoring terminal, and then report the reliability index to the authentication verification program in real time or periodically.
For example, the reliability indicators may include: heartbeat data, network link information (such as process identification, security level, and the like), terminal related information (such as terminal binding information and the like), interface information (such as security information of an API interface, interface call information, and the like), monitoring screen acquisition log information, and the like.
The authentication verification program can determine the terminal network security data of the monitoring terminal in real time based on the received reliability index, and when the terminal network security data of the monitoring terminal is found to be abnormal, the authentication verification program can inform the monitoring equipment network gateway to interrupt all monitoring equipment links between the monitoring equipment network gateway and the monitoring terminal so as to improve the security of monitoring picture acquisition.
For example, in an embodiment, when the authentication verification program determines that the terminal network security data of the monitoring terminal is abnormal based on the terminal network security data, the monitoring device network gateway may send a monitoring device link interruption instruction to the monitoring device network gateway, and at this time, the monitoring device network gateway may further receive the monitoring device link interruption instruction sent by the authentication verification program; and interrupting the link with all the monitoring devices of the monitoring terminal based on the monitoring device link interruption instruction. As can be seen from the above, in the embodiment of the present invention, when responding to a monitoring screen to be displayed, an authentication request is sent to the monitoring management platform; receiving an authentication file returned by the monitoring management platform, wherein the authentication file is acquired from an authentication verification program by the monitoring management platform based on an authentication request; sending a monitoring equipment link request to a monitoring equipment network gateway of the intelligent building monitoring system, wherein the monitoring equipment link request bears an authentication file; and when the monitoring equipment link is successfully established, sending a monitoring picture acquisition message to the monitoring equipment network gateway based on the monitoring equipment link, so that the monitoring equipment network gateway forwards the monitoring picture acquisition message to the monitoring equipment in the intelligent building monitoring system. The scheme can utilize the monitoring equipment network gateway to proxy all monitoring picture acquisition messages, and control the access of the trusted monitoring terminal to the intelligent building monitoring system by using the issued authentication file, so that the monitoring terminal cannot directly acquire the monitoring picture of the intelligent building monitoring system; therefore, even if the monitoring terminal is invaded by a hacker, the hacker tool on the monitoring terminal cannot invade the monitoring picture, and the safety of the monitoring picture is greatly improved.
In addition, the embodiment of the invention can also report the reliability index to the authentication verification program in real time, the authentication verification program determines the terminal network security data of the monitoring terminal in real time, and in response to the abnormal condition, the monitoring device network gateway is informed to interrupt the link with all monitoring devices of the monitoring terminal, so that the security of the monitoring picture is further improved.
In one embodiment, an internet of things-based intelligent building monitoring method is provided, which can be executed by an authentication verification program in the internet of things-based intelligent building monitoring, and the internet of things-based intelligent building monitoring method can include:
1) And receiving an authentication file generation message sent by the monitoring terminal.
2) And generating a message based on the authentication file to acquire a message confidence parameter.
The message confidence parameter is information used to evaluate or determine whether the monitoring picture acquisition message is authentic, and may include: the terminal user identification, terminal related information of the monitoring terminal, network link information, monitoring picture information to be displayed, and the like.
The monitoring terminal may actively send the authentication verification program, for example, the authentication file generation message may carry the message confidence parameter, and at this time, the authentication verification program may analyze the message confidence parameter from the authentication file generation message.
In an embodiment, the authentication verification program may further obtain the message confidence parameter from the monitoring terminal when receiving the authentication file generation message.
3) And determining whether the current monitoring picture acquisition message is credible or not based on the message confidence parameter, and executing the step 4) in response to the message confidence parameter, and refusing to send the authentication file and the like in response to the message confidence parameter.
For example, the confidence parameter in response to the message includes: the step of "determining whether the current authentication file generation message is authentic based on the message confidence parameter" may include:
determining whether the monitoring terminal is reliable or not based on the message confidence parameter;
in response to the reliability, determining whether the network link of the current acquired monitoring picture is credible based on the network link information;
responding to the credibility, and performing user verification on the current terminal user based on the terminal user identification;
in response to the successful user verification, verifying the authentication information of the current terminal user;
and responding to the successful verification of the authentication information, and determining that the current authentication file generation message is credible.
In an embodiment, the security level of the monitoring terminal may be obtained based on the message confidence parameter, and the security of the monitoring terminal is determined in response to the security level being greater than a preset level.
In an embodiment, in order to improve the security of obtaining the monitoring picture, whether the request is trusted or not may be determined by combining the heartbeat condition of the monitoring terminal and the monitoring picture obtaining behavior of the user, so as to improve the accuracy of the trusted judgment of the request.
In one embodiment, in order to improve the security of acquiring the monitoring picture, the authentication file may be sent only to the authenticated monitoring terminal; since the authenticated monitoring terminal may be stored in the terminal list, it is determined whether the current monitoring screen acquisition is reliable based on whether a terminal bound to the user exists in the terminal list.
4) And sending the authentication file to the monitoring terminal.
It will be appreciated that the authentication verification program may determine whether the current authentication file generation message is authentic. When the authentication is determined to be authentic, the authentication verification program may obtain the authentication file and send the authentication file to a monitoring terminal, such as a monitoring management client.
5) And receiving a verification request message sent by the network gateway of the monitoring equipment, wherein the verification request message bears the authentication file.
When the monitoring management platform of the monitoring terminal receives the authentication file, the authentication file can be returned; the monitoring terminal may create a monitoring device link with the monitoring device network gateway based on the authentication file, for example, the monitoring terminal may send a monitoring device link request to the monitoring device network gateway. When the monitoring device link is successfully created, the monitoring terminal may send a monitoring picture acquisition message to the monitoring device network gateway based on the monitoring device link.
6) And checking the authentication file and sending authentication file checking information to the network gateway of the monitoring equipment.
When the monitoring equipment network gateway receives the monitoring equipment link request, the monitoring equipment network gateway can analyze the authentication file carried by the monitoring equipment link request and send a check request message carrying the authentication file to the authentication verification program. When the authentication verification program receives the check request message, it may check the authentication file, for example, detect whether the authentication file is authentic (for example, whether the validity period is reached, whether the authentication file is an authentication file sent by itself, etc.).
In an embodiment, the intelligent building monitoring method based on the internet of things may further include:
receiving a terminal authentication message sent by a monitoring terminal, wherein the terminal authentication message carries a terminal user identifier and a monitoring terminal identifier of the monitoring terminal;
checking the terminal user identification;
and in response to successful verification, binding the monitoring terminal identification with the terminal user identification, and updating the terminal list.
In one embodiment, in order to further improve the security of the monitoring image acquisition, the reliability index sent by the monitoring terminal can be received in real time, and whether the terminal network security data of the monitoring terminal is abnormal or not is determined based on the reliability index; and responding to the exception, and sending a monitoring equipment link interruption instruction to the monitoring equipment network gateway.
The authentication verification program can determine the terminal network security data of the monitoring terminal in real time based on the received reliability index, and can inform the monitoring equipment network gateway to interrupt all monitoring equipment links between the monitoring terminal in response to the finding that the terminal network security data of the monitoring terminal is abnormal, so that the security of acquiring the monitoring picture is improved.
As can be seen from the above, the embodiment of the present invention receives an authentication file generation message sent by a monitoring terminal; generating a message based on the authentication file to acquire a message confidence parameter; determining whether the current authentication file generation message is credible or not based on the message confidence parameter; responding to the credibility, and sending an authentication file to the monitoring terminal; receiving a verification request message sent by a network gateway of the monitoring equipment, wherein the verification request message bears an authentication file; and checking the authentication file and sending authentication file checking information to the network gateway of the monitoring equipment. The scheme can utilize the monitoring equipment network gateway to proxy all monitoring picture acquisition messages, and control the access of the trusted monitoring terminal to the intelligent building monitoring system by using the issued authentication file, so that the monitoring terminal cannot directly acquire the monitoring picture of the intelligent building monitoring system; therefore, even if the user monitoring terminal is invaded by a hacker, the hacker tool on the monitoring terminal cannot invade the sensitive monitoring picture, and the security of the monitoring picture is greatly improved.
Based on the methods described in the above examples, further details will be given below by way of example.
In one particular embodiment, an intelligent building monitoring system may include: the system comprises a monitoring terminal, a monitoring management platform, a monitoring device network gateway and a monitoring device. The monitoring management platform is deployed with an authentication verification program, and the intelligent building monitoring method based on the Internet of things can comprise the following steps:
1) And when receiving the monitoring picture acquisition message, the monitoring terminal sends an authentication request to the monitoring management platform.
For example, in an embodiment, when the monitoring terminal receives the monitoring picture acquiring message (it may be determined that the monitoring terminal needs to display the monitoring picture at this time), the monitoring terminal sends an authentication file application request to the monitoring management platform.
The authentication request may carry current monitoring screen requirement information and the like.
For example, in response to the monitoring terminal receiving a monitoring picture acquisition message triggered by a user operation, the gateway proxy process may request an authentication file from the monitoring management platform, and specifically, may send an authentication request to the monitoring management platform.
In an embodiment, before accessing the monitoring screen, the monitoring terminal may further authenticate the authentication verification program, so that the monitoring terminal identifier of the current monitoring terminal is bound with the terminal user identifier, and the security of monitoring screen access can be further improved. For example, before it is determined that the monitoring terminal needs to display the monitoring picture, a terminal authentication message may be sent to the authentication verification program, where the terminal authentication message carries the terminal user identifier and the monitoring terminal identifier of the monitoring terminal; and when the equipment terminal authentication is completed, the monitoring terminal can utilize the monitoring management platform to perform network initialization operation.
For example, the monitoring terminal firstly authenticates to the authentication verification program, and after the authentication is passed, the monitoring picture access can be realized. For example, when receiving the terminal authentication message, the authentication and verification program may parse the terminal authentication message to obtain the terminal user identifier and the terminal related information of the monitoring terminal, and then, the authentication and verification program may verify the terminal user identifier, and when the verification is successful, bind the terminal user identifier and the monitoring terminal identifier to complete the authentication. For example, the authentication verification program may verify the user account using an account verification system.
In an embodiment, in order to improve the security of the monitoring screen, the monitoring management platform may further monitor the terminal network security data of the monitoring terminal in real time, and send a reliability index to the authentication verification program, so that the authentication verification program determines whether the terminal network security data of the monitoring terminal is abnormal based on the reliability index.
The authentication verification program can determine the terminal network security data of the monitoring terminal in real time based on the received reliability index, and can inform the monitoring equipment network gateway to interrupt all monitoring equipment links between the monitoring terminal in response to the discovery that the terminal network security data of the monitoring terminal is abnormal, so that the access security of the monitoring picture is improved. For example, a monitoring device link interruption instruction may be sent to the monitoring device network gateway, and the monitoring device network gateway interrupts links with all monitoring devices of the monitoring terminal based on the monitoring device link interruption instruction, so as to ensure the security of the monitoring screen.
2) And the monitoring management platform sends an authentication file generation message to the authentication verification program based on the authentication request.
For example, the monitoring management platform may obtain a message confidence parameter based on the authentication request, then generate a corresponding authentication file generation message based on the message confidence parameter, and send the authentication file generation message to the authentication verification program.
3) The authentication verification program may generate a message acquisition message confidence parameter based on the authentication file.
In an embodiment, the message confidence parameter is generated in response to the authentication file, and the message confidence parameter may be obtained by parsing the authentication file generation message.
The message confidence parameter is information used to evaluate or determine whether the authentication file generates a message that is authentic, and may include, for example: the terminal user identification, terminal related information of the monitoring terminal, network link information, monitoring picture information to be displayed, and the like.
4) The authentication verification program determines whether the current authentication file generation message is authentic based on the message confidence parameter, and in response to being authentic, executes 5).
And responding to the authentication verification program to determine that the current authentication file generation message is credible, sending the authentication file, and responding to the non-credibility, refusing to send the authentication file.
For example, when the message confidence parameter includes: when the network link information, the monitoring picture information to be displayed, the terminal related information and the terminal user identification are detected, the authentication verification program determines whether the monitoring terminal is reliable or not based on the message confidence parameter; in response to the reliability, determining whether the network link of the current acquired monitoring picture is credible based on the network link information; responding to the credibility, and performing user verification on the current terminal user based on the terminal user identification; in response to the successful user verification, verifying the authentication information of the current terminal user; and responding to the successful verification of the authentication information, and determining that the current authentication file generation message is credible.
5) And the authentication verification program sends an authentication file to the monitoring management platform.
By the way described above, the authentication verification program can determine whether the current authentication file generation message is authentic. In response to determining the authenticity, the authentication verification program may obtain the authentication file and send the authentication file to a monitoring management platform of the monitoring terminal, such as a monitoring management client.
6) And the monitoring management platform returns the authentication file to the monitoring terminal.
7) And the monitoring terminal sends a request for establishing a monitoring device link bearing authentication file to a monitoring device network gateway of the intelligent building monitoring system.
In the embodiment of the invention, before the monitoring device link is established after the gateway agent process receives the monitoring picture acquisition message, the monitoring management platform can be used for applying the authentication file, and then the monitoring device link is established with the monitoring device network gateway based on the applied authentication file, for example, the monitoring device link is established with the monitoring device network gateway.
8) The monitoring equipment network gateway sends a check request message carrying the authentication file to the authentication verification program.
After the monitoring device network gateway receives the monitoring device link request sent by the monitoring device network gateway, the monitoring device network gateway may check or verify the authentication file requested to be carried, for example, send the authentication file to an authentication verification program for verification, and in response to a successful verification, the monitoring device network gateway establishes a monitoring device link with the monitoring terminal.
9) And the authentication verification program verifies the authentication file and sends verification information of the authentication file to the network gateway of the monitoring equipment.
The authentication file verification information may include successful verification or unsuccessful verification.
10 When the verification is successful, the monitoring device network gateway and the monitoring terminal create a monitoring device link.
11 The monitoring terminal sends a monitoring picture acquisition message to the monitoring device network gateway by using the created monitoring device link.
12 The monitoring device network gateway forwards the monitoring picture acquisition message to the monitoring device.
13 The monitoring terminal acquires and displays a monitoring picture of the monitoring device forwarded by the network gateway of the monitoring device.
In an embodiment, in order to improve the security of the monitoring screen, after the monitoring device link is created, an authentication file needs to be sent for verification each time the monitoring screen is accessed, and only when the verification is successful, the monitoring device network gateway forwards the monitoring screen acquisition message to the corresponding monitoring device.
Based on the same inventive concept, the present disclosure also provides an intelligent building monitoring method based on the internet of things according to an exemplary illustration as shown in fig. 2 and fig. 3, respectively.
Referring to a flowchart of an intelligent building monitoring method based on the internet of things shown in fig. 2, the method is applied to a monitoring management platform in an intelligent building monitoring system, the intelligent building monitoring system comprises at least one monitoring terminal, a monitoring management platform, at least one monitoring device and a monitoring device network gateway, an authentication verification program is deployed in the monitoring management platform, and the method comprises the following steps:
s201, receiving a monitoring device link request sent by a monitoring terminal, wherein the monitoring device link request bears an authentication file.
S202, sending a verification request message carrying the authentication file to the authentication verification program so that the authentication verification program verifies the authentication file.
S203, when the authentication file is verified successfully, a monitoring device link is established with the monitoring terminal based on the monitoring device link request.
And S204, receiving a monitoring picture acquisition message sent by the monitoring terminal based on the established monitoring equipment link, and forwarding the monitoring picture acquisition message to the monitoring equipment.
It can be understood that, in the intelligent building monitoring system, the monitoring terminal, the monitoring management platform, the authentication verification program in the monitoring management platform, the monitoring device, and the monitoring device network gateway interact together, thereby implementing the overall intelligent building monitoring method based on the internet of things.
Referring to a flowchart of an intelligent building monitoring method based on the internet of things shown in fig. 3, the method is applied to an authentication verification program in an intelligent building monitoring system, the intelligent building monitoring system comprises at least one monitoring terminal, a monitoring management platform, at least one monitoring device and a monitoring device network gateway, the monitoring management platform is deployed with the authentication verification program, and the method comprises the following steps:
s301, receiving an authentication file generation message sent by the monitoring terminal.
S302, generating a message based on the authentication file to acquire a message confidence parameter.
S303, determining whether the current authentication file generation message is credible or not based on the message confidence parameter.
S304, responding to the credibility, and sending the authentication file to the monitoring terminal.
S305, receiving a verification request message sent by the network gateway of the monitoring equipment, wherein the verification request message bears an authentication file.
S306, the authentication file is verified, and authentication file verification information is sent to the monitoring equipment network gateway.
Similarly, in the intelligent building monitoring system, the monitoring terminal, the monitoring management platform, the authentication verification program in the monitoring management platform, the monitoring device, and the monitoring device network gateway interact together, so as to implement the overall intelligent building monitoring method based on the internet of things.
Fig. 4 shows an intelligent building monitoring system based on the internet of things according to an exemplary embodiment, where the intelligent building monitoring system 400 includes at least one monitoring terminal 401, a monitoring management platform 402, at least one monitoring device 403, and a monitoring device network gateway 404, and an authentication verification program 4021 is deployed in the monitoring management platform 402.
It is understood that only one monitoring terminal 401 and one monitoring device 403 are shown in fig. 4, and a plurality of monitoring terminals 401 and a plurality of monitoring devices 403 may be further included in the intelligent building monitoring system 400, and the number thereof is not limited by the present disclosure.
The monitoring terminal 401, the monitoring management platform 402, the monitoring device 403, the monitoring device network gateway 404, and the authentication verification program 4021 deployed in the monitoring management platform 402 are respectively used for executing the steps related to the devices in the above embodiments, and through information interaction, the overall intelligent building monitoring method based on the internet of things is further implemented, so that the security performance of the monitoring picture can be effectively ensured.
Referring now to fig. 5, a schematic structural diagram of an electronic device (e.g., a monitoring terminal or a monitoring management platform in the above embodiments) 500 suitable for implementing an embodiment of the present disclosure is shown. The terminal device in the embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle terminal (e.g., a car navigation terminal), and the like, and a fixed terminal such as a digital TV, a desktop computer, and the like. The electronic device shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 5, electronic device 500 may include a processing means (e.g., central processing unit, graphics processor, etc.) 501 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage means 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data necessary for the operation of the electronic apparatus 500 are also stored. The processing device 501, the ROM 502, and the RAM 503 are connected to each other through a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
Generally, the following devices may be connected to the I/O interface 505: input devices 506 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 507 including, for example, a Liquid Crystal Display (LCD), speakers, vibrators, and the like; storage devices 508 including, for example, magnetic tape, hard disk, etc.; and a communication device 509. The communication means 509 may allow the electronic device 500 to communicate with other devices wirelessly or by wire to exchange data. While fig. 5 illustrates an electronic device 500 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may be alternatively implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 509, or installed from the storage means 508, or installed from the ROM 502. The computer program performs the above-described functions defined in the methods of the embodiments of the present disclosure when executed by the processing device 501.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to implement the functions defined in the methods of the embodiments of the present disclosure.
Computer program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including but not limited to an object oriented programming language such as Java, smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems on a chip (SOCs), complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the disclosure to the precise forms disclosed. Many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the disclosure and its practical applications, to thereby enable others skilled in the art to best utilize the disclosure and various embodiments with various modifications as are suited to the particular use contemplated. The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the disclosure to the precise forms disclosed. Many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the disclosure and its practical applications, to thereby enable others skilled in the art to best utilize the disclosure and various embodiments with various modifications as are suited to the particular use contemplated.

Claims (10)

1. The utility model provides an intelligent building monitored control system based on thing networking which characterized in that, intelligent building monitored control system includes at least one monitor terminal, control management platform, at least one supervisory equipment and supervisory equipment network gateway, it verifies the procedure to dispose authentication in the control management platform, monitor terminal is used for:
responding to a monitoring picture to be displayed, and sending an authentication request to a monitoring management platform;
receiving an authentication file returned by the monitoring management platform, wherein the authentication file is acquired from an authentication verification program by the monitoring management platform based on the authentication request;
sending a monitoring device link request to a monitoring device network gateway of the intelligent building monitoring system, wherein the monitoring device link request bears the authentication file;
in response to successful creation of a monitoring device link, sending a monitoring picture acquisition message to the monitoring device network gateway based on the monitoring device link, so that the monitoring device network gateway forwards the monitoring picture acquisition message to monitoring devices in the intelligent building monitoring system;
and acquiring and displaying the monitoring picture of the monitoring equipment forwarded by the network gateway of the monitoring equipment.
2. The intelligent building monitoring system of claim 1, wherein the monitoring terminal is further configured to:
periodically checking the terminal network security data of the monitoring terminal by using the monitoring management platform to obtain a reliability index;
and sending a reliability index to the authentication verification program by using the monitoring management platform, so that the authentication verification program determines whether the terminal network security data of the monitoring terminal is abnormal or not based on the reliability index.
3. The monitoring screen access method according to claim 1, wherein the monitoring terminal is further configured to:
sending a terminal authentication message to the authentication verification program, wherein the terminal authentication message carries a terminal user identifier and a monitoring terminal identifier of a monitoring terminal;
and responding to the completion of the terminal authentication, and performing network initialization operation on the monitoring terminal by using the monitoring management platform.
4. The intelligent building monitoring system of claim 3, wherein sending a terminal authentication message to the authentication verification program comprises:
responding to the power-on starting of the monitoring terminal, and initializing to access the monitoring management platform;
detecting whether the historical terminal user identification in an authentication database corresponding to the monitoring management platform is overdue or not;
in response to expiration of authentication, extracting a historical end user identification from the authentication database;
and automatically sending a terminal authentication message to the authentication verification program based on the historical terminal user identification.
5. The intelligent building monitoring system of claim 1, wherein the monitoring device network gateway is configured to:
receiving a monitoring equipment link request sent by a monitoring terminal, wherein the monitoring equipment link request bears the authentication file;
sending a verification request message carrying the authentication file to an authentication verification program so that the authentication verification program verifies the authentication file;
when the authentication file is verified successfully, establishing a monitoring device link with the monitoring terminal based on the monitoring device link request;
and receiving a monitoring picture acquisition message sent by the monitoring terminal based on the established monitoring equipment link, and forwarding the monitoring picture acquisition message to the monitoring equipment.
6. The intelligent building monitoring system of claim 1, wherein the authentication verification program is configured to:
receiving an authentication file generation message sent by the monitoring terminal;
generating a message based on the authentication file to acquire a message confidence parameter;
determining whether the current authentication file generation message is credible based on the message confidence parameter;
responding to the credibility, and sending an authentication file to the monitoring terminal;
receiving a check request message sent by a network gateway of a monitoring device, wherein the check request message bears the authentication file;
and checking the authentication file, and sending authentication file checking information to the monitoring equipment network gateway.
7. The intelligent building monitoring system of claim 6, wherein the message confidence parameters include: network link information, monitoring picture information to be displayed, terminal related information and terminal user identification;
determining whether the current authentication file generation message is authentic based on the message confidence parameter, including:
determining whether the monitoring terminal is reliable based on the message confidence parameter;
in response to the reliability, determining whether the network link of the current acquired monitoring picture is credible based on the network link information;
responding to the credibility, and performing user verification on the current terminal user based on the terminal user identification;
in response to the successful user verification, verifying the authentication information of the current terminal user;
and responding to the successful verification of the authentication information, and determining that the current authentication file generation message is credible.
8. The intelligent building monitoring method based on the Internet of things is characterized by being applied to a monitoring terminal in an intelligent building monitoring system, wherein the intelligent building monitoring system comprises at least one monitoring terminal, a monitoring management platform, at least one monitoring device and a monitoring device network gateway, an authentication verification program is deployed in the monitoring management platform, and the monitoring method comprises the following steps:
responding to a monitoring picture to be displayed, and sending an authentication request to a monitoring management platform;
receiving an authentication file returned by the monitoring management platform, wherein the authentication file is acquired from an authentication verification program by the monitoring management platform based on the authentication request;
sending a monitoring device link request to a monitoring device network gateway of the intelligent building monitoring system, wherein the monitoring device link request bears the authentication file;
in response to successful creation of a monitoring device link, sending a monitoring picture acquisition message to the monitoring device network gateway based on the monitoring device link, so that the monitoring device network gateway forwards the monitoring picture acquisition message to a monitoring device in the intelligent building monitoring system;
and acquiring and displaying the monitoring picture of the monitoring equipment forwarded by the network gateway of the monitoring equipment.
9. The intelligent building monitoring method based on the Internet of things is characterized by being applied to a monitoring management platform in an intelligent building monitoring system, wherein the intelligent building monitoring system comprises at least one monitoring terminal, the monitoring management platform, at least one monitoring device and a monitoring device network gateway, an authentication verification program is deployed in the monitoring management platform, and the monitoring method comprises the following steps:
receiving a monitoring equipment link request sent by a monitoring terminal, wherein the monitoring equipment link request bears the authentication file;
sending a verification request message carrying the authentication file to an authentication verification program so that the authentication verification program verifies the authentication file;
when the authentication file is verified successfully, establishing a monitoring device link with the monitoring terminal based on the monitoring device link request;
and receiving a monitoring picture acquisition message sent by the monitoring terminal based on the established monitoring equipment link, and forwarding the monitoring picture acquisition message to the monitoring equipment.
10. An intelligent building monitoring method based on the Internet of things is characterized by being applied to an authentication verification program in an intelligent building monitoring system, wherein the intelligent building monitoring system comprises at least one monitoring terminal, a monitoring management platform, at least one monitoring device and a monitoring device network gateway, the monitoring management platform is provided with the authentication verification program in a deployed mode, and the monitoring method comprises the following steps:
receiving an authentication file generation message sent by the monitoring terminal;
generating a message based on the authentication file to acquire a message confidence parameter;
determining whether the current authentication file generation message is credible based on the message confidence parameter;
responding to the credibility, and sending an authentication file to the monitoring terminal;
receiving a check request message sent by a network gateway of a monitoring device, wherein the check request message bears the authentication file;
and checking the authentication file, and sending authentication file checking information to the monitoring equipment network gateway.
CN202211544834.XA 2022-12-02 2022-12-02 Intelligent building monitoring system based on Internet of things and monitoring method thereof Pending CN115840399A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211544834.XA CN115840399A (en) 2022-12-02 2022-12-02 Intelligent building monitoring system based on Internet of things and monitoring method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211544834.XA CN115840399A (en) 2022-12-02 2022-12-02 Intelligent building monitoring system based on Internet of things and monitoring method thereof

Publications (1)

Publication Number Publication Date
CN115840399A true CN115840399A (en) 2023-03-24

Family

ID=85577972

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211544834.XA Pending CN115840399A (en) 2022-12-02 2022-12-02 Intelligent building monitoring system based on Internet of things and monitoring method thereof

Country Status (1)

Country Link
CN (1) CN115840399A (en)

Similar Documents

Publication Publication Date Title
CN112055024B (en) Authority verification method and device, storage medium and electronic equipment
JP5429912B2 (en) Authentication system, authentication server, service providing server, authentication method, and program
CN109905312B (en) Message pushing method, device and system
CN111991813B (en) Method and device for logging in game, electronic equipment and storage medium
US20090031405A1 (en) Authentication system and authentication method
CN112866385B (en) Interface calling method and device, electronic equipment and storage medium
CN113271296B (en) Login authority management method and device
CN110099129B (en) Data transmission method and equipment
CN113742676B (en) Login management method, login management device, login management server, login management system and storage medium
CN109714298B (en) Verification method, verification device and storage medium
CN112838951B (en) Operation and maintenance method, device and system of terminal equipment and storage medium
WO2014152076A1 (en) Retry and snapshot enabled cross-platform synchronized communication queue
CN115801299B (en) Meta universe identity authentication method, device, equipment and storage medium
CN111930709A (en) Data storage method and device, electronic equipment and computer readable medium
CN115102744B (en) Data access method and device
CN112087475A (en) Message pushing method and device for cloud platform component application and message server
CN112261651A (en) Terminal control method and device, terminal and storage medium
CN112153032A (en) Information processing method, device, computer readable storage medium and system
CN115840399A (en) Intelligent building monitoring system based on Internet of things and monitoring method thereof
CN111897620A (en) Interaction method and device and electronic equipment
CN112272211A (en) Service request processing method, device and system
CN115333748B (en) Anti-counterfeiting communication method, system, electronic equipment and computer readable storage medium
CN117294745B (en) Network connection state information sending method, device, electronic equipment and medium
CN112688943B (en) Dynamic password generation method, server, terminal device and storage medium
CN112261659B (en) Control method and device for terminal and server, terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination