CN116471129A - Security monitoring data secure storage system and method based on big data analysis - Google Patents
Security monitoring data secure storage system and method based on big data analysis Download PDFInfo
- Publication number
- CN116471129A CN116471129A CN202310729569.0A CN202310729569A CN116471129A CN 116471129 A CN116471129 A CN 116471129A CN 202310729569 A CN202310729569 A CN 202310729569A CN 116471129 A CN116471129 A CN 116471129A
- Authority
- CN
- China
- Prior art keywords
- module
- data
- security
- information
- starting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 113
- 238000007405 data analysis Methods 0.000 title claims abstract description 52
- 238000000034 method Methods 0.000 title claims abstract description 19
- 230000005540 biological transmission Effects 0.000 claims abstract description 43
- 238000013500 data storage Methods 0.000 claims abstract description 37
- 238000007781 pre-processing Methods 0.000 claims abstract description 28
- 230000008569 process Effects 0.000 claims abstract description 7
- 238000012795 verification Methods 0.000 claims description 29
- 230000002159 abnormal effect Effects 0.000 claims description 22
- 238000004891 communication Methods 0.000 claims description 16
- 238000000605 extraction Methods 0.000 claims description 8
- 238000001514 detection method Methods 0.000 claims description 4
- 238000005457 optimization Methods 0.000 claims description 4
- 230000006855 networking Effects 0.000 claims description 3
- 230000005856 abnormality Effects 0.000 abstract description 5
- 230000009471 action Effects 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 6
- 238000012545 processing Methods 0.000 description 5
- 238000004458 analytical method Methods 0.000 description 4
- 230000000903 blocking effect Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000012805 post-processing Methods 0.000 description 1
- 238000013138 pruning Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Closed-Circuit Television Systems (AREA)
Abstract
The invention discloses a security monitoring data security storage system based on big data analysis, which comprises a security monitoring data security storage system, wherein an information preprocessing module is arranged in the security monitoring data security storage system. The invention can optimize the collected audio and video information by the action of the information preprocessing module, is convenient for extracting the characteristics, can analyze the collected data based on the characteristics of the big data by the big data analysis module, has high working efficiency and can find and process the abnormality in time; the data storage module can be used for carrying out distributed storage of data, improving storage safety, encrypting in the data transmission process, dynamically verifying a user, monitoring and protecting the data in real time, and carrying out self-deleting and backup of the data under special conditions, thereby effectively improving data information storage safety.
Description
Technical Field
The invention relates to the technical field of security monitoring data storage, in particular to a security monitoring data security storage system and method based on big data analysis.
Background
The security monitoring system is an independent and complete system which is formed by transmitting video signals in a closed loop through optical fibers, coaxial cables or microwaves and from shooting to image display and recording. The system can reflect the monitored object in real time, image and reality, greatly prolongs the observation distance of human eyes, expands the functions of the human eyes, can replace manpower to monitor for a long time in a severe environment, and enables people to see all the situations actually happening on the monitored site and record the situations through a video recorder. And meanwhile, the alarm system equipment alarms illegal invasion, and the generated alarm signal is input into an alarm host, and the alarm host triggers the monitoring system to record video.
The data storage object includes temporary files generated during processing of the data stream or information to be searched during processing. Data is recorded in a certain format on a storage medium inside or outside a computer. The data store is named, which reflects the constitutive meaning of the information features. The data flow reflects the data flowing in the system and shows the characteristics of dynamic data; the data store reflects data that is stationary in the system and features static data.
And for the collected security monitoring data, the data information needs to be stored, so that the subsequent query of the data information is convenient. However, when the existing security monitoring data storage system is used, analysis of collected data information is inconvenient, abnormal data information is usually identified manually, efficiency is low, abnormal information cannot be found timely, storage safety is insufficient in the process of storing the data information, and the situations of theft, tampering and the like of data loss can occur. Therefore, we propose a security monitoring data security storage system and method based on big data analysis.
Disclosure of Invention
Aiming at the problems existing in the prior art, the invention aims to provide a security monitoring data security storage system and method based on big data analysis, which can realize the functions of preprocessing, identifying and analyzing the acquired data information and has the effect of high security in the data storage process.
In order to solve the problems, the invention adopts the following technical scheme:
the security monitoring data safety storage system based on big data analysis comprises a security monitoring data safety storage system, an information preprocessing module is arranged in the security monitoring data safety storage system, a big data analysis module is arranged in the security monitoring data safety storage system, a data storage module is arranged in the security monitoring data safety storage system, the security monitoring data safety storage system is electrically connected with the Internet through a communication network port, the security monitoring data safety storage system is electrically connected with a cloud server through the communication network port, the security monitoring data safety storage system is electrically connected with a data center through the communication network port, the security monitoring data safety storage system is electrically connected with an information transmission module through the communication network port, and the information transmission module is electrically connected with a data acquisition module through the communication network port.
As a preferred scheme of the invention, the information preprocessing module comprises a data optimizing module, an image extracting module, a voice extracting module and an intelligent detecting module, wherein the data optimizing module is used for optimizing collected video image data information and audio data information, pruning images and reducing noise of audios so as to improve the quality of data information, the image extracting module is used for extracting the characteristics of the image video information, the voice extracting module is used for extracting keywords of voice data information, the intelligent detecting module is used for intelligently analyzing collected data, detecting the integrity of the collected data information, preventing a camera from being blocked by foreign matters or noise from affecting the collection of audios, and prompting a user, the intelligent detecting module is electrically connected with the voice extracting module, the voice extracting module is electrically connected with the image extracting module, the image extracting module is electrically connected with the data optimizing module, and the data optimizing module, the image extracting module, the voice extracting module and the intelligent detecting module are electrically connected with the information preprocessing module, and the information preprocessing module is electrically connected with a security monitoring data security storage system.
As a preferred scheme of the invention, the big data analysis module comprises a feature recognition module, a feature comparison module and an information early warning module, wherein the feature recognition module is used for extracting and recognizing features, the feature comparison module is used for comparing and analyzing extracted feature information with important image feature information and audio keyword information acquired by big data, the information early warning module is used for carrying out early warning on the compared and analyzed abnormal data information and feeding the information back to a user side, the information early warning module is electrically connected with the feature comparison module, the feature comparison module is electrically connected with the feature recognition module, and the feature recognition module, the feature comparison module and the information early warning module are electrically connected with the big data analysis module which is electrically connected with the security monitoring data security storage system.
As a preferred scheme of the invention, the data storage module comprises a distributed storage module, a transmission encryption module, a dynamic verification module, a real-time monitoring module, a multi-terminal feedback module and a data backup module, wherein the distributed storage module is used for storing collected security monitoring data in a distributed storage mode so as to improve the security of data storage, the transmission encryption module is used for dynamically encrypting the transmission process of the system in working and guaranteeing the security of the transmission process, the dynamic verification module is used for verifying each operation of a user used at a user terminal, the dynamic verification mode is adopted, the dynamic key and the dynamic face recognition mode can be adopted to improve the use security of the system, the real-time monitoring module is used for carrying out real-time monitoring protection on the stored data and the operation process of the system, the multi-terminal feedback module is used for alarming and prompting abnormal information through a plurality of different user terminals so as to ensure that a user can timely acquire and know abnormal problems through the user terminals and is beneficial to improving the subsequent processing efficiency of the abnormal information, the data backup module is used for deleting local data and backing up the data into a preset backup space when the system detects the safety problems, the system is prevented from being invaded and influencing the safety of data storage, the data backup module is electrically connected with the multi-terminal feedback module, the multi-terminal feedback module is electrically connected with the real-time monitoring module, the real-time monitoring module is electrically connected with the dynamic verification module, the dynamic verification module is electrically connected with the transmission encryption module, the transmission encryption module is electrically connected with the distribution storage module, the distribution storage module and the transmission encryption module, the dynamic verification module, the real-time monitoring module, the multi-terminal feedback module and the data backup module are all electrically connected to the data storage module, and the data storage module is electrically connected to the security monitoring data security storage system.
As a preferred scheme of the invention, the data acquisition module comprises a camera module, an automatic acquisition module and a manual uploading module, wherein the camera module is used for carrying out security monitoring in a network camera monitoring mode, the automatic acquisition module is used for automatically acquiring shooting acquisition data of the camera, the manual uploading module is used for uploading monitoring data information in a manual uploading mode, the manual uploading module is electrically connected with the automatic acquisition module, the automatic acquisition module is electrically connected with the camera module, the automatic acquisition module and the manual uploading module are electrically connected with the data acquisition module, and the data acquisition module is electrically connected with the information transmission module.
A use method of a security monitoring data security storage system based on big data analysis comprises the following steps:
s1: starting a security monitoring data security storage system for networking operation of the system;
s2: the starting data acquisition module is used for acquiring video monitoring information and audio data information;
s3: the starting information transmission module is used for transmitting and reporting the acquired information;
s4: the start information preprocessing module is used for preprocessing the acquired video and audio data information, and aims to improve the data quality and realize more accurate data analysis;
s5: the initial big data analysis module is used for carrying out recognition comparison of characteristic information on the acquired data and carrying out early warning feedback on abnormal information;
s6: the starting data storage module is used for safely storing the monitoring data information;
s7: starting a cloud server for backing up data information;
s8: and starting a data center for storing various data information of the system.
As a preferred embodiment of the present invention, the start data acquisition module includes the steps of:
(1) Starting a camera module;
(2) Starting an automatic acquisition module;
(3) And starting a manual uploading module.
As a preferred embodiment of the present invention, the start information preprocessing module includes the steps of:
(1) Starting a data optimization module;
(2) Starting an image extraction module;
(3) Starting a voice extraction module;
(4) And starting the intelligent detection module.
As a preferred embodiment of the present invention, the start big data analysis module includes the steps of:
(1) A start feature recognition module;
(2) Starting a feature comparison module;
(3) And a start information early warning module.
As a preferred embodiment of the present invention, the start data storage module includes the steps of:
(1) Starting to distribute the storage modules;
(2) Starting to transmit the encryption module;
(3) Starting a dynamic verification module;
(4) Starting a real-time monitoring module;
(5) Starting the multi-terminal feedback module;
(6) And starting a data backup module.
The invention has the advantages that: the invention can optimize the collected audio and video information by the action of the information preprocessing module, is convenient for extracting the characteristics, can analyze the collected data based on the characteristics of the big data by the big data analysis module, has high working efficiency and can find and process the abnormality in time; the data storage module can be used for carrying out distributed storage of data, improving storage safety, encrypting in the data transmission process, dynamically verifying a user, monitoring and protecting the data in real time, and carrying out self-deleting and backup of the data under special conditions, thereby effectively improving data information storage safety.
Drawings
FIG. 1 is a schematic block diagram of a security monitoring data security storage system based on big data analysis of the present invention;
FIG. 2 is a workflow diagram of a security monitoring data security storage system based on big data analysis of the present invention;
FIG. 3 is a data acquisition module workflow diagram of a security monitoring data security storage system based on big data analysis of the present invention;
FIG. 4 is a workflow diagram of an information preprocessing module of a security monitoring data security storage system based on big data analysis;
FIG. 5 is a workflow diagram of a big data analysis module of a security monitoring data security storage system based on big data analysis of the present invention;
FIG. 6 is a data storage module workflow diagram of a security monitoring data security storage system based on big data analysis of the present invention.
The reference numerals in the figures illustrate:
1. the security monitoring data security storage system; 2. an information preprocessing module; 3. a big data analysis module; 4. a data storage module; 5. a data acquisition module; 6. an information transmission module; 7. the Internet; 8. a cloud server; 9. a data center; 21. a data optimization module; 22. an image extraction module; 23. a voice extraction module; 24. an intelligent detection module; 31. a feature recognition module; 32. a feature comparison module; 33. an information early warning module; 41. a distributed storage module; 42. a transmission encryption module; 43. a dynamic verification module; 44. a real-time monitoring module; 45. a multi-terminal feedback module; 46. a data backup module; 51. a camera module; 52. an automatic acquisition module; 53. and a manual uploading module.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. It is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments, and that all other embodiments obtained by persons of ordinary skill in the art without making creative efforts based on the embodiments in the present invention are within the protection scope of the present invention.
In the description of the present invention, it should be noted that the positional or positional relationship indicated by the terms such as "upper", "lower", "inner", "outer", "top/bottom", etc. are based on the positional or positional relationship shown in the drawings, are merely for convenience of describing the present invention and simplifying the description, and do not indicate or imply that the apparatus or elements referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless explicitly specified and limited otherwise, the terms "mounted," "configured to," "engaged with," "connected to," and the like are to be construed broadly, and may be either fixedly connected, detachably connected, or integrally connected, for example; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention will be understood in specific cases by those of ordinary skill in the art.
Examples: referring to fig. 1-6, a security monitoring data security storage system based on big data analysis includes a security monitoring data security storage system 1, an information preprocessing module 2 is disposed in the security monitoring data security storage system 1, a big data analysis module 3 is disposed in the security monitoring data security storage system 1, a data storage module 4 is disposed in the security monitoring data security storage system 1, the security monitoring data security storage system 1 is electrically connected with an internet 7 through a communication network port, the security monitoring data security storage system 1 is electrically connected with a cloud server 8 through the communication network port, the security monitoring data security storage system 1 is electrically connected with a data center 9 through the communication network port, the security monitoring data security storage system 1 is electrically connected with an information transmission module 6 through the communication network port, and the information transmission module 6 is electrically connected with a data acquisition module 5 through the communication network port.
In this embodiment, the information preprocessing module 2 includes a data optimizing module 21, an image extracting module 22, a voice extracting module 23 and an intelligent detecting module 24, where the data optimizing module 21 is configured to optimize collected video image data information and audio data information, clip images, reduce noise of audio, so as to improve the quality of data information, the image extracting module 22 is configured to extract features of the image video information, the voice extracting module 23 is configured to extract keywords of the voice data information, and the intelligent detecting module 24 is configured to perform intelligent analysis on collected data, detect the integrity of the collected data information, prevent foreign objects from blocking a camera or from affecting the collection of audio, and prompt a user; the big data analysis module 3 comprises a feature recognition module 31, a feature comparison module 32 and an information early warning module 33, wherein the feature recognition module 31 is used for extracting and recognizing features, the feature comparison module 32 is used for comparing and analyzing extracted feature information with important image feature information and audio keyword information acquired by big data, and the information early warning module 33 is used for carrying out early warning on the analyzed abnormal data information and feeding the abnormal data information back to a user side; the data storage module 4 includes a distributed storage module 41, a transmission encryption module 42, a dynamic verification module 43, a real-time monitoring module 44, a multi-terminal feedback module 45 and a data backup module 46, where the distributed storage module 41 is configured to store collected security monitoring data in a distributed storage manner so as to improve security of data storage, the transmission encryption module 42 is configured to dynamically encrypt a transmission process during system operation, ensure security of the transmission process, the dynamic verification module 43 is configured to verify each operation of a user used by a user terminal, and perform verification in a dynamic verification manner, by using a dynamic key and a dynamic face recognition manner, so as to improve security of system usage, the real-time monitoring module 44 is configured to perform real-time monitoring protection on stored data and system operation, and the multi-terminal feedback module 45 is configured to perform alarm prompt on abnormal information by using a plurality of different user terminals, so as to ensure that the user can timely acquire and understand an abnormal problem at the user terminal, and facilitate improving subsequent processing efficiency of the backup information, and the data backup module 46 is configured to delete the data stored in the preset space when the system detects the security problem, and prevent the system from being affected by the security; the data acquisition module 5 comprises a camera module 51, an automatic acquisition module 52 and a manual uploading module 53, wherein the camera module 51 is used for carrying out security monitoring in a network camera monitoring mode, the automatic acquisition module 52 is used for automatically acquiring shooting acquisition data of a camera, and the manual uploading module 53 is used for uploading monitoring data information in a manual uploading mode.
Specifically, the information preprocessing module 2 includes a data optimizing module 21, an image extracting module 22, a voice extracting module 23 and an intelligent detecting module 24, the data optimizing module 21 is configured to optimize collected video image data information and audio data information, and may trim images and reduce noise of audio to improve quality of data information, the image extracting module 22 is configured to extract features of the image video information, the voice extracting module 23 is configured to extract keywords of the voice data information, the intelligent detecting module 24 is configured to perform intelligent analysis on collected data, detect integrity of the collected data information, prevent a foreign object from blocking a camera or affecting collection of audio with noise, and prompt a user, the intelligent detecting module 24 is electrically connected to the voice extracting module 23, the voice extracting module 23 is electrically connected to the image extracting module 22, the image extracting module 22 is electrically connected to the data optimizing module 21, the image extracting module 22, the voice extracting module 23 and the intelligent detecting module 24 are electrically connected to the information preprocessing module 2, and the information preprocessing module 2 is electrically connected to the security and protection system 1.
In this embodiment, the information preprocessing module 2 includes a data optimizing module 21, an image extracting module 22, a voice extracting module 23 and an intelligent detecting module 24, where the data optimizing module 21 is configured to optimize collected video image data information and audio data information, clip images, reduce noise on audio, so as to improve the quality of data information, the image extracting module 22 is configured to extract features of the image video information, the voice extracting module 23 is configured to extract keywords of the voice data information, and the intelligent detecting module 24 is configured to perform intelligent analysis on collected data, detect the integrity of the collected data information, prevent foreign objects from blocking a camera or from affecting the collection of audio due to noise, and prompt a user.
Specifically, the big data analysis module 3 includes a feature recognition module 31, a feature comparison module 32, and an information pre-warning module 33, where the feature recognition module 31 is configured to extract and recognize features, the feature comparison module 32 is configured to compare and analyze extracted feature information with image important feature information and audio keyword information acquired by big data, the information pre-warning module 33 is configured to compare and analyze abnormal data information, and feed back the abnormal data information to the user, the information pre-warning module 33 is electrically connected to the feature comparison module 32, the feature comparison module 32 is electrically connected to the feature recognition module 31, and the feature recognition module 31, the feature comparison module 32, and the information pre-warning module 33 are all electrically connected to the big data analysis module 3, and the big data analysis module 3 is electrically connected to the security monitoring data security storage system 1.
In this embodiment, the big data analysis module 3 includes a feature recognition module 31, a feature comparison module 32 and an information early warning module 33, where the feature recognition module 31 is configured to extract and recognize features, the feature comparison module 32 is configured to compare and analyze extracted feature information with important image feature information and audio keyword information acquired by big data, and the information early warning module 33 is configured to early warn the analyzed abnormal data information and feed back the abnormal data information to the user side.
Specifically, the data storage module 4 includes a distributed storage module 41, a transmission encryption module 42, a dynamic verification module 43, a real-time monitoring module 44, a multi-terminal feedback module 45, and a data backup module 46, where the distributed storage module 41 is configured to store collected security monitoring data in a distributed storage manner so as to improve security of data storage, the transmission encryption module 42 is configured to dynamically encrypt a transmission process during system operation, ensure security of the transmission process, the dynamic verification module 43 is configured to verify each operation performed by a user at a user terminal, and in a dynamic verification manner, the dynamic verification module 44 is configured to perform real-time monitoring protection on stored data and a system operation process by using a dynamic key and a dynamic face identification manner, the multi-terminal feedback module 45 is configured to alert and prompt for abnormality information by using a plurality of different user terminals, so as to ensure timely acquisition and backup of abnormality problems at the user terminal, facilitate enhancement of post-processing efficiency of the abnormality information, the data backup module 46 is configured to electrically connect the data backup module 46 to the distributed storage module 41 when the system detects the security problems, the data backup module 45 is electrically connected to the multi-terminal feedback module 45, the multi-terminal feedback module 44 is electrically connected to the distributed storage module 41, and the data backup module 45 is electrically connected to the distributed storage module 41 by using the dynamic verification module 44, and the real-time monitoring module 44 is configured to electrically monitor the data backup module 46, and the data backup module 46 is configured to electrically monitor the data storage module 46, and to electrically monitor the data storage module, the transmission encryption module 42, the dynamic verification module 43, the real-time monitoring module 44, the multi-terminal feedback module 45 and the data backup module 46 are all electrically connected to the data storage module 4, and the data storage module 4 is electrically connected to the security monitoring data security storage system 1.
In this embodiment, the data storage module 4 includes a distributed storage module 41, a transmission encryption module 42, a dynamic verification module 43, a real-time monitoring module 44, a multi-terminal feedback module 45, and a data backup module 46, where the distributed storage module 41 is configured to store collected security monitoring data in a distributed storage manner so as to improve security of data storage, the transmission encryption module 42 is configured to dynamically encrypt a transmission process during system operation, ensure security of the transmission process, the dynamic verification module 43 is configured to verify each operation of a user used by a user terminal, and perform, by adopting a dynamic verification manner, real-time monitoring and protection can be performed by a dynamic key and a dynamic face recognition manner, so as to improve security of system usage, the multi-terminal feedback module 45 is configured to alert and prompt for abnormal information through a plurality of different user terminals, so as to ensure that the user can timely acquire and backup an abnormal problem at the user terminal, thereby facilitating improvement of subsequent processing efficiency of the abnormal information, and the data backup module 46 is configured to delete the data stored in the preset space when the system detects the security problem, and prevent the system from being affected by the security.
Specifically, the data acquisition module 5 includes a camera module 51, an automatic acquisition module 52 and a manual uploading module 53, the camera module 51 is used for performing security monitoring through a network camera monitoring mode, the automatic acquisition module 52 is used for automatically acquiring shooting acquisition data of the camera, the manual uploading module 53 is used for uploading monitoring data information in a manual uploading mode, the manual uploading module 53 is electrically connected with the automatic acquisition module 52, the automatic acquisition module 52 is electrically connected with the camera module 51, the automatic acquisition module 52 and the manual uploading module 53 are electrically connected with the data acquisition module 5, and the data acquisition module 5 is electrically connected with the information transmission module 6.
In this embodiment, the data acquisition module 5 includes a camera module 51, an automatic acquisition module 52 and a manual uploading module 53, where the camera module 51 is used for security monitoring in a mode of monitoring by using a network camera, the automatic acquisition module 52 is used for automatically acquiring shooting acquisition data of the camera, and the manual uploading module 53 is used for uploading monitoring data information in a manual uploading mode.
A use method of a security monitoring data security storage system based on big data analysis comprises the following steps:
s1: starting a security monitoring data security storage system for networking operation of the system;
s2: the starting data acquisition module is used for acquiring video monitoring information and audio data information;
s3: the starting information transmission module is used for transmitting and reporting the acquired information;
s4: the start information preprocessing module is used for preprocessing the acquired video and audio data information, and aims to improve the data quality and realize more accurate data analysis;
s5: the initial big data analysis module is used for carrying out recognition comparison of characteristic information on the acquired data and carrying out early warning feedback on abnormal information;
s6: the starting data storage module is used for safely storing the monitoring data information;
s7: starting a cloud server for backing up data information;
s8: and starting a data center for storing various data information of the system.
Specifically, the start data acquisition module includes the following steps:
(1) Starting a camera module;
(2) Starting an automatic acquisition module;
(3) And starting a manual uploading module.
Specifically, the start information preprocessing module includes the following steps:
(1) Starting a data optimization module;
(2) Starting an image extraction module;
(3) Starting a voice extraction module;
(4) And starting the intelligent detection module.
Specifically, the start big data analysis module includes the following steps:
(1) A start feature recognition module;
(2) Starting a feature comparison module;
(3) And a start information early warning module.
Specifically, the start data storage module includes the following steps:
(1) Starting to distribute the storage modules;
(2) Starting to transmit the encryption module;
(3) Starting a dynamic verification module;
(4) Starting a real-time monitoring module;
(5) Starting the multi-terminal feedback module;
(6) And starting a data backup module.
The present invention is not limited to the above-mentioned embodiments, and any person skilled in the art, based on the technical solution of the present invention and the improved concept thereof, can be equivalently replaced or changed within the scope of the present invention.
Claims (10)
1. The utility model provides a security protection control data safety storage system based on big data analysis, includes security protection control data safety storage system (1), its characterized in that, the inside of security protection control data safety storage system (1) is provided with information preprocessing module (2), the inside of security protection control data safety storage system (1) is provided with big data analysis module (3), the inside of security protection control data safety storage system (1) is provided with data storage module (4), security protection control data safety storage system (1) has internet (7) through communication network mouth electric connection, security protection control data safety storage system (1) has cloud server (8) through communication network mouth electric connection, security protection control data safety storage system (1) has data center (9) through communication network mouth electric connection, security protection control data safety storage system (1) has information transmission module (6) through communication network mouth electric connection, information transmission module (6) has data acquisition module (5) through communication network mouth electric connection.
2. The security monitoring data security storage system based on big data analysis according to claim 1, wherein the information preprocessing module (2) comprises a data optimizing module (21), an image extracting module (22), a voice extracting module (23) and an intelligent detecting module (24), the data optimizing module (21) is used for optimizing the collected video image data information and audio data information, the image can be trimmed and the audio can be noise reduced to improve the quality of the data information, the image extracting module (22) is used for extracting the characteristics of the image video information, the voice extracting module (23) is used for extracting the keywords of the voice data information, the intelligent detecting module (24) is used for intelligently analyzing the collected data, detecting the integrity of the collected data information, preventing a foreign object from shielding a camera or affecting the collection of the audio with noise, and prompting a user, the intelligent detecting module (24) is electrically connected with the voice extracting module (23), the voice extracting module (23) is electrically connected with the image extracting module (22), the image extracting module (22) is electrically connected with the optimizing module (21), the intelligent detecting module (24) is electrically connected with the voice extracting module (23), the information preprocessing module (2) is electrically connected with the security monitoring data security storage system (1).
3. The security monitoring data security storage system based on big data analysis according to claim 1, wherein the big data analysis module (3) comprises a feature recognition module (31), a feature comparison module (32) and an information early warning module (33), the feature recognition module (31) is used for extracting and recognizing features, the feature comparison module (32) is used for comparing and analyzing extracted feature information with image important feature information and audio keyword information acquired by big data, the information early warning module (33) is used for comparing and analyzing abnormal data information and feeding back the abnormal data information to a user side, the information early warning module (33) is electrically connected to the feature comparison module (32), the feature recognition module (31), the feature comparison module (32) and the information early warning module (33) are electrically connected to the big data analysis module (3), and the big data analysis module (3) is electrically connected to the security monitoring data security storage system (1).
4. The security monitoring data security storage system based on big data analysis according to claim 1, wherein the data storage module (4) comprises a distributed storage module (41), a transmission encryption module (42), a dynamic verification module (43), a real-time monitoring module (44), a multi-terminal feedback module (45) and a data backup module (46), the distributed storage module (41) is used for storing collected security monitoring data in a distributed storage manner so as to improve the security of data storage, the transmission encryption module (42) is used for dynamically encrypting the transmission process when the system works, guaranteeing the security of the transmission process, the dynamic verification module (43) is used for verifying various operations of a user used by the user terminal, the dynamic verification mode is adopted, the system use security can be improved by a dynamic key and a human face dynamic identification mode, the real-time monitoring module (44) is used for carrying out real-time monitoring protection on the stored data and the system operation process, the multi-terminal feedback module (45) is used for prompting information through a plurality of different user terminals so as to improve the security of data storage, the user terminal can be used for ensuring the security of the user terminal to acquire the data and the security of the user terminal, the user terminal is used for preventing the problem of the system from being affected by the security data from being deleted when the security is detected by the user terminal and the user terminal is in the security system, the security backup information is completely lost when the user terminal is used for detecting the security data is completely lost, the data backup module (46) is electrically connected to the multi-terminal feedback module (45), the multi-terminal feedback module (45) is electrically connected to the real-time monitoring module (44), the real-time monitoring module (44) is electrically connected to the dynamic verification module (43), the dynamic verification module (43) is electrically connected to the transmission encryption module (42), the transmission encryption module (42) is electrically connected to the distributed storage module (41), the transmission encryption module (42), the dynamic verification module (43), the real-time monitoring module (44), the multi-terminal feedback module (45) and the data backup module (46) are electrically connected to the data storage module (4), and the data storage module (4) is electrically connected to the security monitoring data security storage system (1).
5. The security monitoring data security storage system based on big data analysis according to claim 1, wherein the data acquisition module (5) comprises a camera module (51), an automatic acquisition module (52) and a manual uploading module (53), the camera module (51) is used for performing security monitoring through a network camera monitoring mode, the automatic acquisition module (52) is used for automatically acquiring shooting acquisition data of a camera, the manual uploading module (53) is used for uploading monitoring data information in a manual uploading mode, the manual uploading module (53) is electrically connected with the automatic acquisition module (52), the automatic acquisition module (52) is electrically connected with the camera module (51), the automatic acquisition module (52) and the manual uploading module (53) are electrically connected with the data acquisition module (5), and the data acquisition module (5) is electrically connected with the information transmission module (6).
6. The method for using the security monitoring data security storage system based on big data analysis according to any one of claims 1 to 5, comprising the following steps:
s1: starting a security monitoring data security storage system for networking operation of the system;
s2: the starting data acquisition module is used for acquiring video monitoring information and audio data information;
s3: the starting information transmission module is used for transmitting and reporting the acquired information;
s4: the start information preprocessing module is used for preprocessing the acquired video and audio data information, and aims to improve the data quality and realize more accurate data analysis;
s5: the initial big data analysis module is used for carrying out recognition comparison of characteristic information on the acquired data and carrying out early warning feedback on abnormal information;
s6: the starting data storage module is used for safely storing the monitoring data information;
s7: starting a cloud server for backing up data information;
s8: and starting a data center for storing various data information of the system.
7. The method for using a security monitoring data security storage system based on big data analysis according to claim 6, wherein the starting data acquisition module comprises the following steps:
(1) Starting a camera module;
(2) Starting an automatic acquisition module;
(3) And starting a manual uploading module.
8. The method for using a security monitoring data security storage system based on big data analysis according to claim 6, wherein the start information preprocessing module comprises the following steps:
(1) Starting a data optimization module;
(2) Starting an image extraction module;
(3) Starting a voice extraction module;
(4) And starting the intelligent detection module.
9. The method for using a security monitoring data security storage system based on big data analysis according to claim 6, wherein the starting big data analysis module comprises the following steps:
(1) A start feature recognition module;
(2) Starting a feature comparison module;
(3) And a start information early warning module.
10. The method for using a security monitoring data security storage system based on big data analysis according to claim 6, wherein the starting data storage module comprises the following steps:
(1) Starting to distribute the storage modules;
(2) Starting to transmit the encryption module;
(3) Starting a dynamic verification module;
(4) Starting a real-time monitoring module;
(5) Starting the multi-terminal feedback module;
(6) And starting a data backup module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310729569.0A CN116471129A (en) | 2023-06-20 | 2023-06-20 | Security monitoring data secure storage system and method based on big data analysis |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310729569.0A CN116471129A (en) | 2023-06-20 | 2023-06-20 | Security monitoring data secure storage system and method based on big data analysis |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116471129A true CN116471129A (en) | 2023-07-21 |
Family
ID=87173971
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310729569.0A Pending CN116471129A (en) | 2023-06-20 | 2023-06-20 | Security monitoring data secure storage system and method based on big data analysis |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116471129A (en) |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102496235A (en) * | 2011-12-27 | 2012-06-13 | 公安部沈阳消防研究所 | Image fire detector possessing optical integrity and method thereof |
CN104363414A (en) * | 2014-10-31 | 2015-02-18 | 无锡悟莘科技有限公司 | Intelligent video analyzing method |
CN104540123A (en) * | 2015-01-07 | 2015-04-22 | 福州北卡信息科技有限公司 | Encryption backup and security deletion method and system for important data of mobile terminal |
CN107194291A (en) * | 2017-05-16 | 2017-09-22 | 努比亚技术有限公司 | Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium |
CN109447048A (en) * | 2018-12-25 | 2019-03-08 | 苏州闪驰数控系统集成有限公司 | A kind of artificial intelligence early warning system |
CN109714572A (en) * | 2018-12-28 | 2019-05-03 | 深圳市微纳感知计算技术有限公司 | A kind of intelligent safety and defence system of sound view linkage |
CN111754714A (en) * | 2020-07-08 | 2020-10-09 | 南阳师范学院 | Security monitoring system and monitoring method thereof |
AU2020102193A4 (en) * | 2020-09-09 | 2020-10-22 | Tianjin University | Structural health monitoring system based on blockchain and smart contract |
CN212936009U (en) * | 2020-08-31 | 2021-04-09 | 海南天赏安防科技有限公司 | Monitoring camera capable of alarming |
CN113194140A (en) * | 2021-04-29 | 2021-07-30 | 中信重工开诚智能装备有限公司 | Integrated remote monitoring system based on fire-fighting robot |
CN113395694A (en) * | 2021-06-23 | 2021-09-14 | 深圳市凯莱特科技股份有限公司 | Intelligent security defense system and defense method based on 5G and local area base station |
CN113573026A (en) * | 2021-08-11 | 2021-10-29 | 江西志宏安防科技有限公司 | Building security protection monitored control system of many monitoring points |
CN114550082A (en) * | 2022-01-21 | 2022-05-27 | 珠海德茵电气有限公司 | Easy-to-use efficient AI (Artificial Intelligence) recognition algorithm |
CN217222526U (en) * | 2022-01-17 | 2022-08-19 | 深圳市云进工程建设有限公司 | Monitoring security protection is with preventing sheltering from device |
CN115620471A (en) * | 2022-09-30 | 2023-01-17 | 浙江安防职业技术学院 | Image identification security system based on big data screening |
CN115952477A (en) * | 2022-12-13 | 2023-04-11 | 福建省漳州第一职业中专学校 | User data protection system of safety computer |
CN116168348A (en) * | 2023-04-21 | 2023-05-26 | 成都睿瞳科技有限责任公司 | Security monitoring method, system and storage medium based on image processing |
-
2023
- 2023-06-20 CN CN202310729569.0A patent/CN116471129A/en active Pending
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102496235A (en) * | 2011-12-27 | 2012-06-13 | 公安部沈阳消防研究所 | Image fire detector possessing optical integrity and method thereof |
CN104363414A (en) * | 2014-10-31 | 2015-02-18 | 无锡悟莘科技有限公司 | Intelligent video analyzing method |
CN104540123A (en) * | 2015-01-07 | 2015-04-22 | 福州北卡信息科技有限公司 | Encryption backup and security deletion method and system for important data of mobile terminal |
CN107194291A (en) * | 2017-05-16 | 2017-09-22 | 努比亚技术有限公司 | Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium |
CN109447048A (en) * | 2018-12-25 | 2019-03-08 | 苏州闪驰数控系统集成有限公司 | A kind of artificial intelligence early warning system |
CN109714572A (en) * | 2018-12-28 | 2019-05-03 | 深圳市微纳感知计算技术有限公司 | A kind of intelligent safety and defence system of sound view linkage |
CN111754714A (en) * | 2020-07-08 | 2020-10-09 | 南阳师范学院 | Security monitoring system and monitoring method thereof |
CN212936009U (en) * | 2020-08-31 | 2021-04-09 | 海南天赏安防科技有限公司 | Monitoring camera capable of alarming |
AU2020102193A4 (en) * | 2020-09-09 | 2020-10-22 | Tianjin University | Structural health monitoring system based on blockchain and smart contract |
CN113194140A (en) * | 2021-04-29 | 2021-07-30 | 中信重工开诚智能装备有限公司 | Integrated remote monitoring system based on fire-fighting robot |
CN113395694A (en) * | 2021-06-23 | 2021-09-14 | 深圳市凯莱特科技股份有限公司 | Intelligent security defense system and defense method based on 5G and local area base station |
CN113573026A (en) * | 2021-08-11 | 2021-10-29 | 江西志宏安防科技有限公司 | Building security protection monitored control system of many monitoring points |
CN217222526U (en) * | 2022-01-17 | 2022-08-19 | 深圳市云进工程建设有限公司 | Monitoring security protection is with preventing sheltering from device |
CN114550082A (en) * | 2022-01-21 | 2022-05-27 | 珠海德茵电气有限公司 | Easy-to-use efficient AI (Artificial Intelligence) recognition algorithm |
CN115620471A (en) * | 2022-09-30 | 2023-01-17 | 浙江安防职业技术学院 | Image identification security system based on big data screening |
CN115952477A (en) * | 2022-12-13 | 2023-04-11 | 福建省漳州第一职业中专学校 | User data protection system of safety computer |
CN116168348A (en) * | 2023-04-21 | 2023-05-26 | 成都睿瞳科技有限责任公司 | Security monitoring method, system and storage medium based on image processing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109300471B (en) | Intelligent video monitoring method, device and system for field area integrating sound collection and identification | |
CN107403165B (en) | Data management architecture of intelligent face recognition system and use method | |
CN111416960B (en) | Video monitoring system based on cloud service | |
CN103714631A (en) | ATM intelligent monitoring system based on human face recognition | |
CN212208379U (en) | Automatic attendance temperature measuring system | |
CN111654665A (en) | Intelligent tail money cabinet monitoring system | |
CN111064928A (en) | Video monitoring system with face recognition function | |
CN111131765A (en) | Multidimensional sensing regional management sensing system | |
CN117255193B (en) | Remote terminal state detection method and system of 5G network monitor | |
CN112102574A (en) | Intelligent alarm system for security room | |
CN117830053A (en) | Perimeter security alarm system and method | |
CN116471129A (en) | Security monitoring data secure storage system and method based on big data analysis | |
CN109740365B (en) | Internet information security storage system with anti-theft mechanism | |
CN111462442A (en) | Intelligent visual detection system and method for cable tunnel | |
CN109614916B (en) | Real-time monitoring and early warning computer system for station passenger state based on face recognition | |
CN112905408B (en) | Server for electric power operation and maintenance network safety monitoring and early warning system | |
CN212137832U (en) | Intelligent interrogation supervising and monitoring system | |
CN114092999A (en) | Monitoring system based on abnormal detection of monitoring video time sequence action | |
CN111899449A (en) | Indoor security device and alarm control system based on image processing | |
CN112804492A (en) | Communication prompting method and device for electronic cat eye | |
CN111292508A (en) | Bank safety warning system and warning method thereof | |
CN118072375B (en) | Face image acquisition system | |
CN220965168U (en) | Construction safety monitoring system | |
CN117354469B (en) | District monitoring video target tracking method and system based on security precaution | |
CN113570837B (en) | Multi-region cascading security monitoring system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |