CN116362942A - Intelligent park information safety management system based on big data - Google Patents

Intelligent park information safety management system based on big data Download PDF

Info

Publication number
CN116362942A
CN116362942A CN202310341464.8A CN202310341464A CN116362942A CN 116362942 A CN116362942 A CN 116362942A CN 202310341464 A CN202310341464 A CN 202310341464A CN 116362942 A CN116362942 A CN 116362942A
Authority
CN
China
Prior art keywords
security
terminal
server
data
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310341464.8A
Other languages
Chinese (zh)
Inventor
孙伟杰
刘焕发
邵双贺
徐瑶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhongxin Zhicheng Technology Co ltd
Original Assignee
Shenzhen Zhongxin Zhicheng Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhongxin Zhicheng Technology Co ltd filed Critical Shenzhen Zhongxin Zhicheng Technology Co ltd
Priority to CN202310341464.8A priority Critical patent/CN116362942A/en
Publication of CN116362942A publication Critical patent/CN116362942A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T17/00Three dimensional [3D] modelling, e.g. data description of 3D objects
    • G06T17/10Constructive solid geometry [CSG] using solid primitives, e.g. cylinders, cubes

Abstract

The invention provides an intelligent park information safety management system based on big data, wherein a cloud server acquires three-dimensional point cloud data and image data of each entity in a park, a first BIM model of the park is built according to the three-dimensional point cloud data and the image data, a safety management strategy is configured, and a second BIM model is generated by configuring a safety server and a safety terminal according to the safety management strategy; the second BIM model is sent to an Internet of things server, a security server and a security terminal; the method comprises the steps that an Internet of things server obtains attribute information of a first terminal; configuring a security protection strategy and security behavior guidance for the first terminal according to the attribute information; transmitting the security protection strategy to a security server; and sending the security action guide to the first terminal. The method and the system can intelligently generate the safety management strategy according to the park construction characteristics, flexibly generate the safety protection strategy/safety behavior guide according to the characteristics of the visiting terminal so as to carry out information safety management, and improve the efficiency and accuracy of park information safety management.

Description

Intelligent park information safety management system based on big data
Technical Field
The invention relates to the technical field of intelligent parks, in particular to an intelligent park information safety management system based on big data.
Background
The intelligent park takes 'park plus Internet' as concept, integrates social, mobile, big data and cloud computing, organically combines different spaces of industry gathering development and urban living and living, and forms a functional composite urban space area with association of community values, circle layer resource sharing and full time land utilization. The development of intelligent park has been promoted in the rapid development of science and technology in recent years, and intelligent park can promote park management efficiency and service level, improves infrastructure operation maintenance ability, promotes intelligent park economy and the coordinated development of environment and is favorable to constructing harmonious safe park environment, and along with intelligent park's increase and each enterprise's protection consciousness to internal data reinforcing, intelligent park's information security protection just is very important, and is comparatively important region in intelligent park, consequently carries out information security analysis very important to LAN. However, the existing information security management system applied to the smart park does not provide effective information security protection.
Disclosure of Invention
Based on the above problems, the invention provides an intelligent park information security management system based on big data, by the scheme, the corresponding security management policy can be intelligently generated according to the construction characteristics of the intelligent park, the corresponding first security protection policy and the first security behavior guide are flexibly generated according to the characteristics of the visiting terminal to conduct information security management, and the efficiency and the accuracy of intelligent park information security management are improved.
In view of this, an aspect of the present invention proposes a smart campus information security management system based on big data, including: the system comprises a cloud server, an Internet of things server, a security terminal, an Internet of things communication gateway and a monitoring terminal; wherein, the liquid crystal display device comprises a liquid crystal display device,
the cloud server is configured to:
acquiring three-dimensional point cloud data and image data of each entity in a first intelligent park;
constructing a first BIM model of the first intelligent park according to the three-dimensional point cloud data and the image data;
configuring a first-level security management policy for the first BIM model, configuring the security server and the security terminal for the first intelligent park according to the first-level security management policy, and generating a second BIM model;
The second BIM model is sent to the Internet of things server, the security server and the security terminal;
the internet of things server is configured to:
acquiring first attribute information of a visiting first terminal;
according to the first attribute information, configuring a first security protection policy and a first security behavior guide in the first intelligent park for the first terminal;
transmitting the first security protection policy to the security server;
and sending the first security action guide to the first terminal.
Optionally, in the operation of acquiring three-dimensional point cloud data and image data of each entity in the first smart campus, the cloud server is specifically configured to:
three-dimensional point cloud data and image data of all buildings, building accessories, specific equipment in the buildings, roads and various supporting facilities in the first intelligent park are obtained.
Optionally, in the operation of constructing the first BIM model of the first smart campus according to the three-dimensional point cloud data and the image data, the cloud server is specifically configured to:
constructing a first three-dimensional model of the first intelligent park according to the three-dimensional point cloud data;
Generating corresponding description information in the first three-dimensional model according to the image data, and identifying corresponding specific equipment and specific areas in the first three-dimensional model;
the descriptive information is loaded into the first three-dimensional model and the specific device and the specific region are labeled to generate the first BIM model.
Optionally, the configuring a first level security management policy for the first BIM model, configuring the security server and the security terminal for the first smart park according to the first level security management policy, and generating a second BIM model, where the cloud server is specifically configured to:
determining security levels/policies of the specific equipment and the specific area according to a preset security level/policy determining model and characteristic data of the specific equipment and the specific area;
generating the first-level security management policy according to the security level/policy;
determining the types, the quantity and the positions of the security servers and the security terminals which are required to be configured in the first intelligent park and the communication connection relationship between the security servers and the security terminals according to the first-level security management policy;
Generating three-dimensional images of the security server and the security terminal;
loading the three-dimensional images of the security server and the security terminal to the first BIM model, and loading the corresponding type, number, location and communication connection relationship as additional information of the three-dimensional images to the first BIM model to generate the second BIM model.
Optionally, the internet of things server, the security server and the security terminal are all multiple; in the operation of sending the second BIM model to the internet of things server, the security server and the security terminal, the cloud server is specifically configured to:
allocating corresponding management areas for each of the Internet of things server, the security server and the security terminal, and respectively establishing corresponding relations among the Internet of things server, the security terminal and the management areas by using identifiers;
and extracting sub BIM models corresponding to the management areas in the second BIM model according to the management areas and the corresponding relation, and respectively sending the sub BIM models to the corresponding Internet of things server, the security server and the security terminal.
Optionally, in the operation of obtaining the first attribute information of the visiting first terminal, the internet of things server is specifically configured to:
establishing a first communication connection with the first terminal through the Internet of things communication gateway;
transmitting authentication data to the first terminal through the first communication connection;
receiving feedback data for the verification data sent by the first terminal;
judging whether the first terminal is a controllable/defendable terminal according to the feedback data;
and when the first terminal is a controllable/defendable terminal, acquiring data acquisition function information, data transmission function information, communication connection function information and data storage function information of the first terminal, and taking the data as the first attribute information.
Optionally, in the operation of configuring the first terminal with the first security protection policy and the first security action guidance in the first smart campus according to the first attribute information, the internet of things server is specifically configured to:
and generating the first security protection strategy comprising the abnormal working model of the first terminal and the first security behavior guidance by utilizing a preset security control model according to the received sub BIM model, the received data acquisition function information, the received data transmission function information, the received communication connection function information and the received data storage function information.
Optionally, the security server is specifically configured to:
receiving the first security protection policy, and resolving a first sub security protection policy which belongs to the first sub security protection policy which needs to be executed by the first terminal from the first security protection policy;
determining a corresponding first safety terminal from the safety terminals according to the first sub-safety protection strategy, and sending the first sub-safety protection strategy to the first safety terminal;
the first secure terminal is specifically configured to:
receiving the first sub-security protection policy, and resolving specific security protection measures which belong to the first sub-security protection policy and need to be executed for the first terminal;
when the first terminal is monitored to reach the self-managed area, executing the specific safety protection measures;
and feeding back an execution result to the security server.
Optionally, in the operation of sending the first security action guide to the first terminal, the internet of things server is specifically configured to:
receiving first monitoring data sent by the monitoring terminal configured in the first intelligent park and aiming at the first terminal;
Judging whether the first terminal has abnormal working behaviors according to the first monitoring data and the abnormal working model;
and when the abnormal working behavior of the first terminal is identified, the first safety behavior guide is sent to the first terminal.
Optionally, after the operation of sending the first security action guide to the first terminal, the internet of things server is further configured to:
continuously acquiring second monitoring data of the first terminal from the monitoring terminal;
judging whether the first terminal is continuously in an abnormal working state within a preset time according to the second monitoring data and the abnormal working model;
when the first terminal is identified to be in an abnormal working state continuously within a preset time, generating a safety alarm instruction and sending the safety alarm instruction to the safety server in a corresponding area;
the security server is configured to:
receiving the safety alarm instruction and generating a safety protection instruction according to the safety alarm instruction;
sending the safety protection instruction to the first safety terminal;
the first secure terminal is configured to:
and correcting the specific safety protection measures according to the safety protection instructions, and executing the corrected specific safety protection measures for the first terminal.
By adopting the technical scheme of the invention, the intelligent park information safety management system based on big data comprises: the system comprises a cloud server, an Internet of things server, a security terminal, an Internet of things communication gateway and a monitoring terminal; wherein the cloud server is configured to: acquiring three-dimensional point cloud data and image data of each entity in a first intelligent park; constructing a first BIM model of the first intelligent park according to the three-dimensional point cloud data and the image data; configuring a first-level security management policy for the first BIM model, configuring the security server and the security terminal for the first intelligent park according to the first-level security management policy, and generating a second BIM model; the second BIM model is sent to the Internet of things server, the security server and the security terminal; the internet of things server is configured to: acquiring first attribute information of a visiting first terminal; according to the first attribute information, configuring a first security protection policy and a first security behavior guide in the first intelligent park for the first terminal; transmitting the first security protection policy to the security server; and sending the first security action guide to the first terminal. By the scheme, the corresponding security management strategy can be intelligently generated according to the construction characteristics of the intelligent park, and the corresponding first security protection strategy and the first security behavior guide are flexibly generated according to the characteristics of the visiting terminal so as to carry out information security management, so that the efficiency and the accuracy of the information security management of the intelligent park are improved.
Drawings
FIG. 1 is a schematic block diagram of a big data based intelligent campus information security management system provided by an embodiment of the present invention;
Detailed Description
In order that the above-recited objects, features and advantages of the present invention will be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings and appended detailed description. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced otherwise than as described herein, and therefore the scope of the present invention is not limited to the specific embodiments disclosed below.
The terms first, second and the like in the description and in the claims of the present application and in the above-described figures, are used for distinguishing between different objects and not for describing a particular sequential order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
A smart campus information security management system based on big data according to some embodiments of the present invention is described below with reference to fig. 1.
As shown in fig. 1, one embodiment of the present invention provides a smart campus information security management system based on big data, including: the system comprises a cloud server, an Internet of things server, a security terminal, an Internet of things communication gateway and a monitoring terminal; wherein, the liquid crystal display device comprises a liquid crystal display device,
the cloud server is configured to:
acquiring three-dimensional point cloud data and image data of each entity in a first intelligent park;
in this embodiment, each entity in the first smart park includes various tangible objects such as houses, bridges, factories, towers, sports grounds, and the like, generalized buildings and accessories of the buildings, and facilities such as sports equipment, air conditioners, power generation equipment, production equipment, street lamps, signal lamps, roads, and the like. The three-dimensional point cloud data can be collected through the laser radar scanning equipment and uploaded to the cloud server, and the three-dimensional point cloud data comprises coordinate data, depth data and color data, so that the precision of three-dimensional modeling can be ensured. The image data includes a design drawing, a construction drawing, an acceptance drawing, a live photo, and the like of each entity. As in some embodiments, the cloud server is configured to: three-dimensional point cloud data and image data of all buildings, building accessories, specific equipment in the buildings, roads and various supporting facilities in the first intelligent park are obtained.
Constructing a first BIM model of the first intelligent park according to the three-dimensional point cloud data and the image data;
configuring a first-level security management policy for the first BIM model, configuring the security server and the security terminal for the first intelligent park according to the first-level security management policy, and generating a second BIM model;
it can be understood that the first BIM model shows the form of the whole first smart park (such as the three-dimensional structure of all buildings and auxiliary facilities and the descriptive description of functions, performances and the like), the attribute of each entity can be determined from the first BIM model, so that the corresponding security management requirement can be determined (such as the security management requirement of a research laboratory is higher than that of other entities/areas, the security management requirement of a central machine room is higher, for example, some areas need to be forbidden to photograph, other areas need to forbidden to record sound, some devices need to be forbidden to connect through bluetooth or WIFI and the like), the types, the number, the placement positions and the like of security servers and security terminals needing to be configured can be further determined, and the three-dimensional models of the security servers and the security terminals and the descriptive contents of the corresponding attribute/function can be loaded to the first BIM model to generate the second BIM model.
The security server is configured to: and generating corresponding specific security protection strategies/measures according to the attributes of all entities in the management area, such as encryption transmission strategies (such as encryption algorithm, encryption transmission route and the like) during data transmission, and generating security protection data generation instructions/monitoring instructions/protection instructions of the security terminal by executing the security protection data.
The secure terminal is configured to: the method is used for assisting in safety communication, and carrying out safety monitoring and safety protection on corresponding entities/areas/terminals, such as adding the entities/areas/terminals into a communication line to generate communication protection data (such as anti-cracking interference data), interfering a camera sensor in an area where photographing is forbidden (such as emitting high-brightness white light), emitting interference sound in an area where recording is forbidden, and the like.
The second BIM model is sent to the Internet of things server, the security server and the security terminal;
the internet of things server is configured to:
acquiring first attribute information of a visiting first terminal;
it will be appreciated that the first terminal may be a mobile communication device (e.g. a cell phone, a computer, etc.), a camera device, a vehicle (e.g. a smart car), etc. carried by a user entering the campus. The first attribute information includes, but is not limited to, data acquisition function information (e.g., photographing, recording, scanning, etc.), data transmission function information, communication connection function information, data storage function information, etc.
According to the first attribute information, configuring a first security protection policy and a first security behavior guide in the first intelligent park for the first terminal;
transmitting the first security protection policy to the security server;
and sending the first security action guide to the first terminal.
By adopting the technical scheme of the embodiment, the intelligent park information safety management system based on big data comprises: the system comprises a cloud server, an Internet of things server, a security terminal, an Internet of things communication gateway and a monitoring terminal; wherein the cloud server is configured to: acquiring three-dimensional point cloud data and image data of each entity in a first intelligent park; constructing a first BIM model of the first intelligent park according to the three-dimensional point cloud data and the image data; configuring a first-level security management policy for the first BIM model, configuring the security server and the security terminal for the first intelligent park according to the first-level security management policy, and generating a second BIM model; the second BIM model is sent to the Internet of things server, the security server and the security terminal; the internet of things server is configured to: acquiring first attribute information of a visiting first terminal; according to the first attribute information, configuring a first security protection policy and a first security behavior guide in the first intelligent park for the first terminal; transmitting the first security protection policy to the security server; and sending the first security action guide to the first terminal. By the scheme, the corresponding security management strategy can be intelligently generated according to the construction characteristics of the intelligent park, and the corresponding first security protection strategy and the first security behavior guide are flexibly generated according to the characteristics of the visiting terminal so as to carry out information security management, so that the efficiency and the accuracy of the information security management of the intelligent park are improved.
It should be noted that the block diagram of the intelligent campus information security management system based on big data shown in fig. 1 is only illustrative, and the number of the illustrated modules does not limit the scope of the present invention.
In some possible embodiments of the present invention, in the operation of constructing the first BIM model of the first smart campus from the three-dimensional point cloud data and the image data, the cloud server is specifically configured to:
constructing a first three-dimensional model of the first intelligent park according to the three-dimensional point cloud data;
generating corresponding description information in the first three-dimensional model according to the image data, and identifying corresponding specific equipment and specific areas in the first three-dimensional model;
the descriptive information is loaded into the first three-dimensional model and the specific device and the specific region are labeled to generate the first BIM model.
In order to clearly determine the information of each entity in the smart park and the specific equipment and the specific area which need to be protected with emphasis so as to improve accuracy and efficiency, in the embodiment, a first three-dimensional model of the first smart park is constructed according to the three-dimensional point cloud data; generating corresponding description information (such as identifying labeling information/annotation information in image data and generating corresponding description information) in the first three-dimensional model according to the image data, and identifying corresponding specific equipment and specific areas (such as equipment in a machine room, a secret area and the like) in the first three-dimensional model; the descriptive information is loaded into the first three-dimensional model and the specific device and the specific region are labeled to generate the first BIM model.
In some possible embodiments of the present invention, in order to perform security management setting for a smart campus more flexibly and accurately, the configuring a first level security management policy for the first BIM model, configuring the security server and the security terminal for the first smart campus according to the first level security management policy, and generating a second BIM model, where the cloud server is specifically configured to:
determining security levels/policies of the specific device and the specific region according to a preset security level/policy determination model (the security level/policy determination model can be obtained by training a cloud server in combination with big data and a neural network) and characteristic data (such as attribute data, purpose/function, generated data type, data confidentiality degree and the like of the specific device, purpose, confidential content, confidentiality degree and the like of the specific region) of the specific device and the specific region;
generating the first-level security management policy (for example, including types/performances/functions, number, configured positions, and the like of the security server and the security terminal required, and encryption policies required to be configured, corresponding security requirement levels, and the like) according to the security level/policy;
Determining the type, performance, function, quantity and position (and responsibility range) of the security server and the security terminal to be configured in the first intelligent park and the communication connection relationship between the security server and the security terminal according to the first-level security management policy;
generating three-dimensional images of the security server and the security terminal;
loading the three-dimensional images of the security server and the security terminal to the first BIM model, and loading the corresponding type/performance/function, the number, the location, and the communication connection relationship as additional information of the three-dimensional images to the first BIM model to generate the second BIM model.
It will be appreciated that the secure terminal may further include a secure communication terminal for joining a transmission line and generating secure communication data to secure communication, a secure monitoring terminal for monitoring a specific device or a specific area, and a secure protection terminal for performing a secure protection.
In some possible embodiments of the present invention, the internet of things server, the security server and the security terminal are all plural; in the operation of sending the second BIM model to the internet of things server, the security server and the security terminal, the cloud server is specifically configured to:
Allocating corresponding management areas for each of the Internet of things server, the security server and the security terminal, and respectively establishing corresponding relations among the Internet of things server, the security terminal and the management areas by using identifiers;
and extracting sub BIM models corresponding to the management areas in the second BIM model according to the management areas and the corresponding relation, and respectively sending the sub BIM models to the corresponding Internet of things server, the security server and the security terminal.
It may be understood that, in order to ensure timeliness of response, in the embodiment of the present invention, a plurality of internet of things servers, the security servers and the security terminals are set, and corresponding management areas are allocated for each of the internet of things servers, the security servers and the security terminals to refine a management range and ensure high-speed response, where the management areas may be divided in combination with equipment and area features (for example, the area size or the number of equipment, especially, the size or the number of specific areas/specific equipment may be considered, or of course, the factors such as the association relationship between entities such as topography, campus area functions, buildings and equipment, energy consumption, etc. may be comprehensively considered), and the correspondence between the internet of things servers, the security servers and the security terminals and the management areas may be respectively established by using identifiers; and extracting sub BIM models corresponding to the management areas in the second BIM model according to the corresponding relation between the management areas and the safety terminals, and respectively sending the sub BIM models to the corresponding Internet of things server, the safety server and the safety terminals, so that the data searching and comparison time is reduced, and the response speed is further improved.
In some possible embodiments of the present invention, in the operation of obtaining the first attribute information of the visiting first terminal, the internet of things server is specifically configured to:
establishing a first communication connection with the first terminal through the Internet of things communication gateway;
transmitting authentication data to the first terminal through the first communication connection;
receiving feedback data for the verification data sent by the first terminal;
judging whether the first terminal is a controllable/defendable terminal according to the feedback data;
and when the first terminal is a controllable/defendable terminal, acquiring data acquisition function information, data transmission function information, communication connection function information and data storage function information of the first terminal, and taking the data as the first attribute information.
It can be understood that, in order to ensure that information security control is performed on the visiting first terminal intelligently and accurately, in this embodiment, a first defense line is established by using an internet of things server, specifically, the internet of things server may establish a signal by broadcasting a communication connection, and establish a first communication connection (which may be a temporary communication connection or a specially established visiting communication connection) with the first terminal through the internet of things communication gateway; transmitting authentication data (authentication data may include related data for acquiring identity information/operating parameter information/function information of the first terminal) to the first terminal through the first communication connection; receiving feedback data for the verification data sent by the first terminal; judging whether the first terminal is a controllable/defendable terminal or not (namely, can be controlled or defended by the first security management strategy) according to the feedback data; and when the first terminal is a controllable/defendable terminal, acquiring data acquisition function information, data transmission function information, communication connection function information and data storage function information of the first terminal, and taking the data as the first attribute information.
It may be appreciated that, for more refined and efficient information security management, in some possible embodiments of the present invention, the operation of configuring, for the first terminal, a first security protection policy and a first security action guideline in the first smart campus according to the first attribute information, the internet of things server is specifically configured to:
according to the received sub-BIM model, the data acquisition function information, the data transmission function information, the communication connection function information and the data storage function information, a preset safety control model (the safety control model can be obtained through big data and neural network training and at least comprises a sub-model for identifying an abnormal working state of a target object according to the functional characteristics and the behavior characteristics of the target object and generating an abnormal working model of the target object, a sub-model for generating safety action guidance and a safety protection strategy for the abnormal working state of the target object, and the like, so that safety control can be rapidly and accurately implemented on a visiting terminal/target object with information safety hazards, and the first safety protection strategy (the first safety protection strategy at least comprises how a safety protection main body (such as a safety terminal and a safety server) operates for the abnormal working state, particularly a corresponding/countering operation for the operation behavior of the first terminal, such as a high-light starting and a forbidden zone directional emission interference sound recording and the like) of the first safety action (such as an indication of a specific audio terminal, a specific access device, a specific network access device, a specific access device, etc.) is generated.
In some possible embodiments of the present invention, the security server is specifically configured to:
receiving the first security protection policy, and resolving a first sub security protection policy which belongs to the first sub security protection policy which needs to be executed by the first terminal from the first security protection policy; it should be noted that, in a better scheme, the security server combines the characteristic data of the self management area (the characteristic data can manage the attribute data of the building, the attribute data of the equipment, the topography data, the traffic condition data and the like in the area) in the process of analyzing the first security protection policy, and the data can assist in determining the corresponding encryption algorithm, the communication line and the corresponding functions/performances and the like which need to be configured in the processes of data acquisition, data transmission and the like, so as to generate a more accurate first sub security protection policy which needs to be executed for the first terminal, so that the security server is flexible and mobile, and can obtain better effects.
Determining a corresponding first safety terminal from the safety terminals according to the first sub-safety protection strategy, and sending the first sub-safety protection strategy to the first safety terminal;
The first secure terminal is specifically configured to:
receiving the first sub-security protection policy, and resolving specific security protection measures which belong to the first sub-security protection policy and need to be executed for the first terminal;
when the first terminal is monitored to reach the self-managed area, executing the specific safety protection measures;
and feeding back an execution result to the security server.
It can be understood that in this embodiment, by analyzing the first security protection policy by the security server, a specific security protection measure that needs to be executed by the corresponding first security terminal is generated, and then by matching the first security terminal, when it is monitored that the first terminal arrives in the area managed by itself, the specific security protection measure is executed, and the execution result is fed back to the security server, so that the security management of the first terminal can be performed quickly and accurately.
In some possible embodiments of the present invention, in the operation of sending the first security action guide to the first terminal, the internet of things server is specifically configured to:
receiving first monitoring data sent by the monitoring terminal configured in the first intelligent park and aiming at the first terminal;
Judging whether the first terminal has abnormal working behaviors according to the first monitoring data and the abnormal working model;
and when the abnormal working behavior of the first terminal is identified, the first safety behavior guide is sent to the first terminal.
It can be understood that a monitoring terminal (for example, a smart street lamp integrated with a monitoring sensor may be set) may be set at a position of an entrance or a road side of a first smart park to monitor the first terminal in real time so as to ensure that abnormal behavior of the first terminal can be handled in time, and in this embodiment, an internet of things server receives first monitoring data sent by the monitoring terminal configured in the first smart park and directed at the first terminal; judging whether the first terminal has abnormal working behaviors according to the first monitoring data and the abnormal working model; and when the abnormal working behavior of the first terminal is identified, the first safety behavior guide is sent to the first terminal. The high speed and high quality of the Internet of things communication connection established between the Internet of things server and the monitoring terminal are utilized, so that the response speed is further improved.
In some possible embodiments of the present invention, after the operation of sending the first security action guide to the first terminal, the internet of things server is further configured to:
continuously acquiring second monitoring data of the first terminal from the monitoring terminal;
judging whether the first terminal is continuously in an abnormal working state within a preset time according to the second monitoring data and the abnormal working model;
when the first terminal is identified to be in an abnormal working state continuously within a preset time, generating a safety alarm instruction and sending the safety alarm instruction to the safety server in a corresponding area;
the security server is configured to:
receiving the safety alarm instruction and generating a safety protection instruction according to the safety alarm instruction;
sending the safety protection instruction to the first safety terminal;
the first secure terminal is configured to:
and correcting the specific safety protection measures according to the safety protection instructions, and executing the corrected specific safety protection measures for the first terminal.
It can be understood that, in order to effectively correct the abnormal behavior of the first terminal and timely protect the first terminal with the uncorrected behavior, the internet of things server continuously acquires the second monitoring data of the first terminal from the monitoring terminal; judging whether the first terminal is continuously in an abnormal working state within a preset time (such as within 1 minute) according to the second monitoring data and the abnormal working model; when the first terminal is identified to be in an abnormal working state continuously within a preset time, generating a safety alarm instruction and sending the safety alarm instruction to the safety server in a corresponding area; the safety server receives the safety alarm instruction (including identity information, characteristic information, specific behavior information, movement track information, danger level, processing advice and the like of the first terminal) and generates a safety protection instruction according to the safety alarm instruction; sending the safety protection instruction to the first safety terminal; the first security terminal corrects the specific security measures (such as increasing the strength of the security measures, increasing the number of the security measures, changing the specific content of the security measures, etc.) according to the security protection instruction, and executes the corrected specific security measures for the first terminal.
It should be noted that, for simplicity of description, the foregoing method embodiments are all expressed as a series of action combinations, but it should be understood by those skilled in the art that the present application is not limited by the order of actions described, as some steps may be performed in other order or simultaneously in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required in the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, such as the above-described division of units, merely a division of logic functions, and there may be additional manners of dividing in actual implementation, such as multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, or may be in electrical or other forms.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units described above, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a memory, including several instructions for causing a computer device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of the above-mentioned method of the various embodiments of the present application. And the aforementioned memory includes: a U-disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Those of ordinary skill in the art will appreciate that all or a portion of the steps in the various methods of the above embodiments may be implemented by a program that instructs associated hardware, and the program may be stored in a computer readable memory, which may include: flash disk, read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), magnetic disk or optical disk.
The foregoing has outlined rather broadly the more detailed description of embodiments of the present application, wherein specific examples are provided herein to illustrate the principles and embodiments of the present application, the above examples being provided solely to assist in the understanding of the methods of the present application and the core ideas thereof; meanwhile, as those skilled in the art will have modifications in the specific embodiments and application scope in accordance with the ideas of the present application, the present description should not be construed as limiting the present application in view of the above.
Although the present invention is disclosed above, the present invention is not limited thereto. Variations and modifications, including combinations of the different functions and implementation steps, as well as embodiments of the software and hardware, may be readily apparent to those skilled in the art without departing from the spirit and scope of the invention.

Claims (10)

1. An intelligent campus information security management system based on big data, which is characterized by comprising: the system comprises a cloud server, an Internet of things server, a security terminal, an Internet of things communication gateway and a monitoring terminal; wherein, the liquid crystal display device comprises a liquid crystal display device,
the cloud server is configured to:
acquiring three-dimensional point cloud data and image data of each entity in a first intelligent park;
constructing a first BIM model of the first intelligent park according to the three-dimensional point cloud data and the image data;
configuring a first-level security management policy for the first BIM model, configuring the security server and the security terminal for the first intelligent park according to the first-level security management policy, and generating a second BIM model;
the second BIM model is sent to the Internet of things server, the security server and the security terminal;
the internet of things server is configured to:
acquiring first attribute information of a visiting first terminal;
according to the first attribute information, configuring a first security protection policy and a first security behavior guide in the first intelligent park for the first terminal;
transmitting the first security protection policy to the security server;
And sending the first security action guide to the first terminal.
2. The big data based intelligent campus information security management system of claim 1, wherein in the operation of obtaining three-dimensional point cloud data and image data of each entity in the first intelligent campus, the cloud server is specifically configured to:
three-dimensional point cloud data and image data of all buildings, building accessories, specific equipment in the buildings, roads and various supporting facilities in the first intelligent park are obtained.
3. The big data based intelligent campus information security management system of claim 2, wherein in the operation of constructing the first BIM model of the first intelligent campus from the three-dimensional point cloud data and the image data, the cloud server is specifically configured to:
constructing a first three-dimensional model of the first intelligent park according to the three-dimensional point cloud data;
generating corresponding description information in the first three-dimensional model according to the image data, and identifying corresponding specific equipment and specific areas in the first three-dimensional model;
the descriptive information is loaded into the first three-dimensional model and the specific device and the specific region are labeled to generate the first BIM model.
4. The big data based intelligent campus information security management system of claim 3, wherein in the operation of configuring a first level security management policy for the first BIM model, configuring the security server and the security terminal for the first intelligent campus according to the first level security management policy, and generating a second BIM model, the cloud server is specifically configured to:
determining security levels/policies of the specific equipment and the specific area according to a preset security level/policy determining model and characteristic data of the specific equipment and the specific area;
generating the first-level security management policy according to the security level/policy;
determining the types, the quantity and the positions of the security servers and the security terminals which are required to be configured in the first intelligent park and the communication connection relationship between the security servers and the security terminals according to the first-level security management policy;
generating three-dimensional images of the security server and the security terminal;
loading the three-dimensional images of the security server and the security terminal to the first BIM model, and loading the corresponding type, number, location and communication connection relationship as additional information of the three-dimensional images to the first BIM model to generate the second BIM model.
5. The big data based intelligent campus information security management system of claim 4, wherein the internet of things server, the security server and the security terminal are all plural; in the operation of sending the second BIM model to the internet of things server, the security server and the security terminal, the cloud server is specifically configured to:
allocating corresponding management areas for each of the Internet of things server, the security server and the security terminal, and respectively establishing corresponding relations among the Internet of things server, the security terminal and the management areas by using identifiers;
and extracting sub BIM models corresponding to the management areas in the second BIM model according to the management areas and the corresponding relation, and respectively sending the sub BIM models to the corresponding Internet of things server, the security server and the security terminal.
6. The big data based intelligent campus information security management system of claim 5, wherein in the operation of obtaining the first attribute information of the visiting first terminal, the internet of things server is specifically configured to:
Establishing a first communication connection with the first terminal through the Internet of things communication gateway;
transmitting authentication data to the first terminal through the first communication connection;
receiving feedback data for the verification data sent by the first terminal;
judging whether the first terminal is a controllable/defendable terminal according to the feedback data;
and when the first terminal is a controllable/defendable terminal, acquiring data acquisition function information, data transmission function information, communication connection function information and data storage function information of the first terminal, and taking the data as the first attribute information.
7. The big data based intelligent campus information security management system of claim 6, wherein in the operation of configuring the first security policy and the first security action guideline for the first terminal in the first intelligent campus according to the first attribute information, the internet of things server is specifically configured to:
and generating the first security protection strategy comprising the abnormal working model of the first terminal and the first security behavior guidance by utilizing a preset security control model according to the received sub BIM model, the received data acquisition function information, the received data transmission function information, the received communication connection function information and the received data storage function information.
8. The big data based intelligent campus information security management system of claim 7, wherein the security server is specifically configured to:
receiving the first security protection policy, and resolving a first sub security protection policy which belongs to the first sub security protection policy which needs to be executed by the first terminal from the first security protection policy;
determining a corresponding first safety terminal from the safety terminals according to the first sub-safety protection strategy, and sending the first sub-safety protection strategy to the first safety terminal;
the first secure terminal is specifically configured to:
receiving the first sub-security protection policy, and resolving specific security protection measures which belong to the first sub-security protection policy and need to be executed for the first terminal;
when the first terminal is monitored to reach the self-managed area, executing the specific safety protection measures;
and feeding back an execution result to the security server.
9. The big data based intelligent campus information security management system of claim 8, wherein in the operation of sending the first security action guideline to the first terminal, the internet of things server is specifically configured to:
Receiving first monitoring data sent by the monitoring terminal configured in the first intelligent park and aiming at the first terminal;
judging whether the first terminal has abnormal working behaviors according to the first monitoring data and the abnormal working model;
and when the abnormal working behavior of the first terminal is identified, the first safety behavior guide is sent to the first terminal.
10. The big data based intelligent campus information security management system of claim 9, wherein after the operation of sending the first security action guideline to the first terminal, the internet of things server is further configured to:
continuously acquiring second monitoring data of the first terminal from the monitoring terminal;
judging whether the first terminal is continuously in an abnormal working state within a preset time according to the second monitoring data and the abnormal working model;
when the first terminal is identified to be in an abnormal working state continuously within a preset time, generating a safety alarm instruction and sending the safety alarm instruction to the safety server in a corresponding area;
the security server is configured to:
Receiving the safety alarm instruction and generating a safety protection instruction according to the safety alarm instruction;
sending the safety protection instruction to the first safety terminal;
the first secure terminal is configured to:
and correcting the specific safety protection measures according to the safety protection instructions, and executing the corrected specific safety protection measures for the first terminal.
CN202310341464.8A 2023-03-27 2023-03-27 Intelligent park information safety management system based on big data Pending CN116362942A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310341464.8A CN116362942A (en) 2023-03-27 2023-03-27 Intelligent park information safety management system based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310341464.8A CN116362942A (en) 2023-03-27 2023-03-27 Intelligent park information safety management system based on big data

Publications (1)

Publication Number Publication Date
CN116362942A true CN116362942A (en) 2023-06-30

Family

ID=86930835

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310341464.8A Pending CN116362942A (en) 2023-03-27 2023-03-27 Intelligent park information safety management system based on big data

Country Status (1)

Country Link
CN (1) CN116362942A (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101854581A (en) * 2009-03-31 2010-10-06 联想(北京)有限公司 Method for setting security level of mobile terminal on basis of position information and mobile terminal
US20110154442A1 (en) * 2009-12-18 2011-06-23 Electronics And Telecommunications Research Institute Security control system and method for personal communication terminals
CN105554264A (en) * 2015-12-11 2016-05-04 北京元心科技有限公司 function limiting method and system of mobile terminal
CN105554248A (en) * 2015-12-08 2016-05-04 北京元心科技有限公司 Method and device for ensuring safety of secret region
KR20160080702A (en) * 2014-12-30 2016-07-08 주식회사 더보안 System and method of controlling user device being able to applying security policy based on position which is automatically recognized
CN106652399A (en) * 2016-11-03 2017-05-10 上海庆科信息技术有限公司 Security protection alarm system based on Internet of things, communication module and cloud server
KR20170078316A (en) * 2015-12-29 2017-07-07 주식회사 마크애니 Security management system using user mobile terminal and method thereof
KR102131596B1 (en) * 2019-04-04 2020-07-08 주식회사 수산아이앤티 Location based user terminal control method and system therefor
CN113673959A (en) * 2021-08-23 2021-11-19 珠海优特电力科技股份有限公司 Comprehensive control method and device for field operation safety and storage medium
CN113706355A (en) * 2021-09-05 2021-11-26 上海远韵实业有限公司 Method for building intelligent emergency system of chemical industry park
CN114066230A (en) * 2021-11-15 2022-02-18 苏州联健元和产业园管理有限公司 Intelligent park management method and system
WO2022120872A1 (en) * 2020-12-11 2022-06-16 南京大衍数字科技有限公司 Edge computing-based smart community security monitoring system
CN114783132A (en) * 2022-03-03 2022-07-22 国网安徽省电力有限公司 Transformer substation safety protection system based on multistage intelligence
CN114971290A (en) * 2022-05-26 2022-08-30 深圳市银河通信科技有限公司 Park management system and method based on intelligent street lamp
CN114970899A (en) * 2022-06-08 2022-08-30 浙江慧储科技有限公司 Intelligent park operation and maintenance system, method, medium and electronic equipment
CN115460259A (en) * 2022-07-29 2022-12-09 南京启盛智慧科技有限公司 Intelligent park management system and management method thereof
CN115643039A (en) * 2022-08-16 2023-01-24 国网安徽省电力有限公司信息通信分公司 Security protection method and device for internet of things terminal and computer readable storage medium

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101854581A (en) * 2009-03-31 2010-10-06 联想(北京)有限公司 Method for setting security level of mobile terminal on basis of position information and mobile terminal
US20110154442A1 (en) * 2009-12-18 2011-06-23 Electronics And Telecommunications Research Institute Security control system and method for personal communication terminals
KR20160080702A (en) * 2014-12-30 2016-07-08 주식회사 더보안 System and method of controlling user device being able to applying security policy based on position which is automatically recognized
CN105554248A (en) * 2015-12-08 2016-05-04 北京元心科技有限公司 Method and device for ensuring safety of secret region
CN105554264A (en) * 2015-12-11 2016-05-04 北京元心科技有限公司 function limiting method and system of mobile terminal
KR20170078316A (en) * 2015-12-29 2017-07-07 주식회사 마크애니 Security management system using user mobile terminal and method thereof
CN106652399A (en) * 2016-11-03 2017-05-10 上海庆科信息技术有限公司 Security protection alarm system based on Internet of things, communication module and cloud server
KR102131596B1 (en) * 2019-04-04 2020-07-08 주식회사 수산아이앤티 Location based user terminal control method and system therefor
WO2022120872A1 (en) * 2020-12-11 2022-06-16 南京大衍数字科技有限公司 Edge computing-based smart community security monitoring system
CN113673959A (en) * 2021-08-23 2021-11-19 珠海优特电力科技股份有限公司 Comprehensive control method and device for field operation safety and storage medium
CN113706355A (en) * 2021-09-05 2021-11-26 上海远韵实业有限公司 Method for building intelligent emergency system of chemical industry park
CN114066230A (en) * 2021-11-15 2022-02-18 苏州联健元和产业园管理有限公司 Intelligent park management method and system
CN114783132A (en) * 2022-03-03 2022-07-22 国网安徽省电力有限公司 Transformer substation safety protection system based on multistage intelligence
CN114971290A (en) * 2022-05-26 2022-08-30 深圳市银河通信科技有限公司 Park management system and method based on intelligent street lamp
CN114970899A (en) * 2022-06-08 2022-08-30 浙江慧储科技有限公司 Intelligent park operation and maintenance system, method, medium and electronic equipment
CN115460259A (en) * 2022-07-29 2022-12-09 南京启盛智慧科技有限公司 Intelligent park management system and management method thereof
CN115643039A (en) * 2022-08-16 2023-01-24 国网安徽省电力有限公司信息通信分公司 Security protection method and device for internet of things terminal and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN109714421B (en) Intelligent networking automobile operation system based on vehicle-road cooperation
Ning et al. Blockchain-enabled intelligent transportation systems: a distributed crowdsensing framework
US20220294690A1 (en) Service Provision To IoT Devices
CN112667717B (en) Transformer substation inspection information processing method and device, computer equipment and storage medium
CN103491056A (en) Control method and device for permission of application
CN107105199B (en) Smart home based on technology of Internet of things nurses method and system
DE102021209282A1 (en) METHODS, FACILITIES AND SYSTEMS FOR SHARING COMPUTE RESOURCES BETWEEN EDGE COMPUTE NODES USING AN OVERLAY MANAGER
CN113409485B (en) Inspection data acquisition method and device, computer equipment and storage medium
CN111064800A (en) Block chain technology-based safe vehicle contact social network construction method
CN104079437B (en) Realize the method and terminal of rights management control
Feng et al. Vulnerability-aware task scheduling for edge intelligence empowered trajectory analysis in intelligent transportation systems
CN114500952A (en) Control method, device and equipment for dynamic monitoring of park and computer storage medium
CN111371737A (en) Internet of things security access system based on NB-IoT
CN116362942A (en) Intelligent park information safety management system based on big data
CN113835378A (en) Wisdom garden information security transmission system based on thing networking
CN107333264A (en) A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization
CN102572216B (en) Image processing apparatus and image processing method thereof
CN109146473B (en) DAPP evaluation data processing method and device and electronic equipment
Feng et al. Autonomous Vehicles' Forensics in Smart Cities
CN114124436B (en) APN access trusted computing management system based on electric power Internet of things universal terminal
KR102191539B1 (en) Urban Regeneration Based on Maintenance System, and Method Thereof
CN114338753A (en) Vehicle cloud cooperative computing system, equipment and storage medium
Rathee et al. Trusted orchestration for smart decision-making in internet of vehicles
CN109040195B (en) DAPP service data processing method and device and electronic equipment
Almagrabi An Efficient Security Solution for Industrial Internet of Things Applications.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination