CN116471129A - Security monitoring data secure storage system and method based on big data analysis - Google Patents

Security monitoring data secure storage system and method based on big data analysis Download PDF

Info

Publication number
CN116471129A
CN116471129A CN202310729569.0A CN202310729569A CN116471129A CN 116471129 A CN116471129 A CN 116471129A CN 202310729569 A CN202310729569 A CN 202310729569A CN 116471129 A CN116471129 A CN 116471129A
Authority
CN
China
Prior art keywords
module
data
security
information
starting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310729569.0A
Other languages
Chinese (zh)
Inventor
邓海滨
郑华开
刘开翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Meitrack Group Co ltd
Original Assignee
Shenzhen Meitrack Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Meitrack Group Co ltd filed Critical Shenzhen Meitrack Group Co ltd
Priority to CN202310729569.0A priority Critical patent/CN116471129A/en
Publication of CN116471129A publication Critical patent/CN116471129A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The invention discloses a security monitoring data security storage system based on big data analysis, which comprises a security monitoring data security storage system, wherein an information preprocessing module is arranged in the security monitoring data security storage system. The invention can optimize the collected audio and video information by the action of the information preprocessing module, is convenient for extracting the characteristics, can analyze the collected data based on the characteristics of the big data by the big data analysis module, has high working efficiency and can find and process the abnormality in time; the data storage module can be used for carrying out distributed storage of data, improving storage safety, encrypting in the data transmission process, dynamically verifying a user, monitoring and protecting the data in real time, and carrying out self-deleting and backup of the data under special conditions, thereby effectively improving data information storage safety.

Description

Security monitoring data secure storage system and method based on big data analysis
Technical Field
The invention relates to the technical field of security monitoring data storage, in particular to a security monitoring data security storage system and method based on big data analysis.
Background
The security monitoring system is an independent and complete system which is formed by transmitting video signals in a closed loop through optical fibers, coaxial cables or microwaves and from shooting to image display and recording. The system can reflect the monitored object in real time, image and reality, greatly prolongs the observation distance of human eyes, expands the functions of the human eyes, can replace manpower to monitor for a long time in a severe environment, and enables people to see all the situations actually happening on the monitored site and record the situations through a video recorder. And meanwhile, the alarm system equipment alarms illegal invasion, and the generated alarm signal is input into an alarm host, and the alarm host triggers the monitoring system to record video.
The data storage object includes temporary files generated during processing of the data stream or information to be searched during processing. Data is recorded in a certain format on a storage medium inside or outside a computer. The data store is named, which reflects the constitutive meaning of the information features. The data flow reflects the data flowing in the system and shows the characteristics of dynamic data; the data store reflects data that is stationary in the system and features static data.
And for the collected security monitoring data, the data information needs to be stored, so that the subsequent query of the data information is convenient. However, when the existing security monitoring data storage system is used, analysis of collected data information is inconvenient, abnormal data information is usually identified manually, efficiency is low, abnormal information cannot be found timely, storage safety is insufficient in the process of storing the data information, and the situations of theft, tampering and the like of data loss can occur. Therefore, we propose a security monitoring data security storage system and method based on big data analysis.
Disclosure of Invention
Aiming at the problems existing in the prior art, the invention aims to provide a security monitoring data security storage system and method based on big data analysis, which can realize the functions of preprocessing, identifying and analyzing the acquired data information and has the effect of high security in the data storage process.
In order to solve the problems, the invention adopts the following technical scheme:
the security monitoring data safety storage system based on big data analysis comprises a security monitoring data safety storage system, an information preprocessing module is arranged in the security monitoring data safety storage system, a big data analysis module is arranged in the security monitoring data safety storage system, a data storage module is arranged in the security monitoring data safety storage system, the security monitoring data safety storage system is electrically connected with the Internet through a communication network port, the security monitoring data safety storage system is electrically connected with a cloud server through the communication network port, the security monitoring data safety storage system is electrically connected with a data center through the communication network port, the security monitoring data safety storage system is electrically connected with an information transmission module through the communication network port, and the information transmission module is electrically connected with a data acquisition module through the communication network port.
As a preferred scheme of the invention, the information preprocessing module comprises a data optimizing module, an image extracting module, a voice extracting module and an intelligent detecting module, wherein the data optimizing module is used for optimizing collected video image data information and audio data information, pruning images and reducing noise of audios so as to improve the quality of data information, the image extracting module is used for extracting the characteristics of the image video information, the voice extracting module is used for extracting keywords of voice data information, the intelligent detecting module is used for intelligently analyzing collected data, detecting the integrity of the collected data information, preventing a camera from being blocked by foreign matters or noise from affecting the collection of audios, and prompting a user, the intelligent detecting module is electrically connected with the voice extracting module, the voice extracting module is electrically connected with the image extracting module, the image extracting module is electrically connected with the data optimizing module, and the data optimizing module, the image extracting module, the voice extracting module and the intelligent detecting module are electrically connected with the information preprocessing module, and the information preprocessing module is electrically connected with a security monitoring data security storage system.
As a preferred scheme of the invention, the big data analysis module comprises a feature recognition module, a feature comparison module and an information early warning module, wherein the feature recognition module is used for extracting and recognizing features, the feature comparison module is used for comparing and analyzing extracted feature information with important image feature information and audio keyword information acquired by big data, the information early warning module is used for carrying out early warning on the compared and analyzed abnormal data information and feeding the information back to a user side, the information early warning module is electrically connected with the feature comparison module, the feature comparison module is electrically connected with the feature recognition module, and the feature recognition module, the feature comparison module and the information early warning module are electrically connected with the big data analysis module which is electrically connected with the security monitoring data security storage system.
As a preferred scheme of the invention, the data storage module comprises a distributed storage module, a transmission encryption module, a dynamic verification module, a real-time monitoring module, a multi-terminal feedback module and a data backup module, wherein the distributed storage module is used for storing collected security monitoring data in a distributed storage mode so as to improve the security of data storage, the transmission encryption module is used for dynamically encrypting the transmission process of the system in working and guaranteeing the security of the transmission process, the dynamic verification module is used for verifying each operation of a user used at a user terminal, the dynamic verification mode is adopted, the dynamic key and the dynamic face recognition mode can be adopted to improve the use security of the system, the real-time monitoring module is used for carrying out real-time monitoring protection on the stored data and the operation process of the system, the multi-terminal feedback module is used for alarming and prompting abnormal information through a plurality of different user terminals so as to ensure that a user can timely acquire and know abnormal problems through the user terminals and is beneficial to improving the subsequent processing efficiency of the abnormal information, the data backup module is used for deleting local data and backing up the data into a preset backup space when the system detects the safety problems, the system is prevented from being invaded and influencing the safety of data storage, the data backup module is electrically connected with the multi-terminal feedback module, the multi-terminal feedback module is electrically connected with the real-time monitoring module, the real-time monitoring module is electrically connected with the dynamic verification module, the dynamic verification module is electrically connected with the transmission encryption module, the transmission encryption module is electrically connected with the distribution storage module, the distribution storage module and the transmission encryption module, the dynamic verification module, the real-time monitoring module, the multi-terminal feedback module and the data backup module are all electrically connected to the data storage module, and the data storage module is electrically connected to the security monitoring data security storage system.
As a preferred scheme of the invention, the data acquisition module comprises a camera module, an automatic acquisition module and a manual uploading module, wherein the camera module is used for carrying out security monitoring in a network camera monitoring mode, the automatic acquisition module is used for automatically acquiring shooting acquisition data of the camera, the manual uploading module is used for uploading monitoring data information in a manual uploading mode, the manual uploading module is electrically connected with the automatic acquisition module, the automatic acquisition module is electrically connected with the camera module, the automatic acquisition module and the manual uploading module are electrically connected with the data acquisition module, and the data acquisition module is electrically connected with the information transmission module.
A use method of a security monitoring data security storage system based on big data analysis comprises the following steps:
s1: starting a security monitoring data security storage system for networking operation of the system;
s2: the starting data acquisition module is used for acquiring video monitoring information and audio data information;
s3: the starting information transmission module is used for transmitting and reporting the acquired information;
s4: the start information preprocessing module is used for preprocessing the acquired video and audio data information, and aims to improve the data quality and realize more accurate data analysis;
s5: the initial big data analysis module is used for carrying out recognition comparison of characteristic information on the acquired data and carrying out early warning feedback on abnormal information;
s6: the starting data storage module is used for safely storing the monitoring data information;
s7: starting a cloud server for backing up data information;
s8: and starting a data center for storing various data information of the system.
As a preferred embodiment of the present invention, the start data acquisition module includes the steps of:
(1) Starting a camera module;
(2) Starting an automatic acquisition module;
(3) And starting a manual uploading module.
As a preferred embodiment of the present invention, the start information preprocessing module includes the steps of:
(1) Starting a data optimization module;
(2) Starting an image extraction module;
(3) Starting a voice extraction module;
(4) And starting the intelligent detection module.
As a preferred embodiment of the present invention, the start big data analysis module includes the steps of:
(1) A start feature recognition module;
(2) Starting a feature comparison module;
(3) And a start information early warning module.
As a preferred embodiment of the present invention, the start data storage module includes the steps of:
(1) Starting to distribute the storage modules;
(2) Starting to transmit the encryption module;
(3) Starting a dynamic verification module;
(4) Starting a real-time monitoring module;
(5) Starting the multi-terminal feedback module;
(6) And starting a data backup module.
The invention has the advantages that: the invention can optimize the collected audio and video information by the action of the information preprocessing module, is convenient for extracting the characteristics, can analyze the collected data based on the characteristics of the big data by the big data analysis module, has high working efficiency and can find and process the abnormality in time; the data storage module can be used for carrying out distributed storage of data, improving storage safety, encrypting in the data transmission process, dynamically verifying a user, monitoring and protecting the data in real time, and carrying out self-deleting and backup of the data under special conditions, thereby effectively improving data information storage safety.
Drawings
FIG. 1 is a schematic block diagram of a security monitoring data security storage system based on big data analysis of the present invention;
FIG. 2 is a workflow diagram of a security monitoring data security storage system based on big data analysis of the present invention;
FIG. 3 is a data acquisition module workflow diagram of a security monitoring data security storage system based on big data analysis of the present invention;
FIG. 4 is a workflow diagram of an information preprocessing module of a security monitoring data security storage system based on big data analysis;
FIG. 5 is a workflow diagram of a big data analysis module of a security monitoring data security storage system based on big data analysis of the present invention;
FIG. 6 is a data storage module workflow diagram of a security monitoring data security storage system based on big data analysis of the present invention.
The reference numerals in the figures illustrate:
1. the security monitoring data security storage system; 2. an information preprocessing module; 3. a big data analysis module; 4. a data storage module; 5. a data acquisition module; 6. an information transmission module; 7. the Internet; 8. a cloud server; 9. a data center; 21. a data optimization module; 22. an image extraction module; 23. a voice extraction module; 24. an intelligent detection module; 31. a feature recognition module; 32. a feature comparison module; 33. an information early warning module; 41. a distributed storage module; 42. a transmission encryption module; 43. a dynamic verification module; 44. a real-time monitoring module; 45. a multi-terminal feedback module; 46. a data backup module; 51. a camera module; 52. an automatic acquisition module; 53. and a manual uploading module.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. It is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments, and that all other embodiments obtained by persons of ordinary skill in the art without making creative efforts based on the embodiments in the present invention are within the protection scope of the present invention.
In the description of the present invention, it should be noted that the positional or positional relationship indicated by the terms such as "upper", "lower", "inner", "outer", "top/bottom", etc. are based on the positional or positional relationship shown in the drawings, are merely for convenience of describing the present invention and simplifying the description, and do not indicate or imply that the apparatus or elements referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless explicitly specified and limited otherwise, the terms "mounted," "configured to," "engaged with," "connected to," and the like are to be construed broadly, and may be either fixedly connected, detachably connected, or integrally connected, for example; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention will be understood in specific cases by those of ordinary skill in the art.
Examples: referring to fig. 1-6, a security monitoring data security storage system based on big data analysis includes a security monitoring data security storage system 1, an information preprocessing module 2 is disposed in the security monitoring data security storage system 1, a big data analysis module 3 is disposed in the security monitoring data security storage system 1, a data storage module 4 is disposed in the security monitoring data security storage system 1, the security monitoring data security storage system 1 is electrically connected with an internet 7 through a communication network port, the security monitoring data security storage system 1 is electrically connected with a cloud server 8 through the communication network port, the security monitoring data security storage system 1 is electrically connected with a data center 9 through the communication network port, the security monitoring data security storage system 1 is electrically connected with an information transmission module 6 through the communication network port, and the information transmission module 6 is electrically connected with a data acquisition module 5 through the communication network port.
In this embodiment, the information preprocessing module 2 includes a data optimizing module 21, an image extracting module 22, a voice extracting module 23 and an intelligent detecting module 24, where the data optimizing module 21 is configured to optimize collected video image data information and audio data information, clip images, reduce noise of audio, so as to improve the quality of data information, the image extracting module 22 is configured to extract features of the image video information, the voice extracting module 23 is configured to extract keywords of the voice data information, and the intelligent detecting module 24 is configured to perform intelligent analysis on collected data, detect the integrity of the collected data information, prevent foreign objects from blocking a camera or from affecting the collection of audio, and prompt a user; the big data analysis module 3 comprises a feature recognition module 31, a feature comparison module 32 and an information early warning module 33, wherein the feature recognition module 31 is used for extracting and recognizing features, the feature comparison module 32 is used for comparing and analyzing extracted feature information with important image feature information and audio keyword information acquired by big data, and the information early warning module 33 is used for carrying out early warning on the analyzed abnormal data information and feeding the abnormal data information back to a user side; the data storage module 4 includes a distributed storage module 41, a transmission encryption module 42, a dynamic verification module 43, a real-time monitoring module 44, a multi-terminal feedback module 45 and a data backup module 46, where the distributed storage module 41 is configured to store collected security monitoring data in a distributed storage manner so as to improve security of data storage, the transmission encryption module 42 is configured to dynamically encrypt a transmission process during system operation, ensure security of the transmission process, the dynamic verification module 43 is configured to verify each operation of a user used by a user terminal, and perform verification in a dynamic verification manner, by using a dynamic key and a dynamic face recognition manner, so as to improve security of system usage, the real-time monitoring module 44 is configured to perform real-time monitoring protection on stored data and system operation, and the multi-terminal feedback module 45 is configured to perform alarm prompt on abnormal information by using a plurality of different user terminals, so as to ensure that the user can timely acquire and understand an abnormal problem at the user terminal, and facilitate improving subsequent processing efficiency of the backup information, and the data backup module 46 is configured to delete the data stored in the preset space when the system detects the security problem, and prevent the system from being affected by the security; the data acquisition module 5 comprises a camera module 51, an automatic acquisition module 52 and a manual uploading module 53, wherein the camera module 51 is used for carrying out security monitoring in a network camera monitoring mode, the automatic acquisition module 52 is used for automatically acquiring shooting acquisition data of a camera, and the manual uploading module 53 is used for uploading monitoring data information in a manual uploading mode.
Specifically, the information preprocessing module 2 includes a data optimizing module 21, an image extracting module 22, a voice extracting module 23 and an intelligent detecting module 24, the data optimizing module 21 is configured to optimize collected video image data information and audio data information, and may trim images and reduce noise of audio to improve quality of data information, the image extracting module 22 is configured to extract features of the image video information, the voice extracting module 23 is configured to extract keywords of the voice data information, the intelligent detecting module 24 is configured to perform intelligent analysis on collected data, detect integrity of the collected data information, prevent a foreign object from blocking a camera or affecting collection of audio with noise, and prompt a user, the intelligent detecting module 24 is electrically connected to the voice extracting module 23, the voice extracting module 23 is electrically connected to the image extracting module 22, the image extracting module 22 is electrically connected to the data optimizing module 21, the image extracting module 22, the voice extracting module 23 and the intelligent detecting module 24 are electrically connected to the information preprocessing module 2, and the information preprocessing module 2 is electrically connected to the security and protection system 1.
In this embodiment, the information preprocessing module 2 includes a data optimizing module 21, an image extracting module 22, a voice extracting module 23 and an intelligent detecting module 24, where the data optimizing module 21 is configured to optimize collected video image data information and audio data information, clip images, reduce noise on audio, so as to improve the quality of data information, the image extracting module 22 is configured to extract features of the image video information, the voice extracting module 23 is configured to extract keywords of the voice data information, and the intelligent detecting module 24 is configured to perform intelligent analysis on collected data, detect the integrity of the collected data information, prevent foreign objects from blocking a camera or from affecting the collection of audio due to noise, and prompt a user.
Specifically, the big data analysis module 3 includes a feature recognition module 31, a feature comparison module 32, and an information pre-warning module 33, where the feature recognition module 31 is configured to extract and recognize features, the feature comparison module 32 is configured to compare and analyze extracted feature information with image important feature information and audio keyword information acquired by big data, the information pre-warning module 33 is configured to compare and analyze abnormal data information, and feed back the abnormal data information to the user, the information pre-warning module 33 is electrically connected to the feature comparison module 32, the feature comparison module 32 is electrically connected to the feature recognition module 31, and the feature recognition module 31, the feature comparison module 32, and the information pre-warning module 33 are all electrically connected to the big data analysis module 3, and the big data analysis module 3 is electrically connected to the security monitoring data security storage system 1.
In this embodiment, the big data analysis module 3 includes a feature recognition module 31, a feature comparison module 32 and an information early warning module 33, where the feature recognition module 31 is configured to extract and recognize features, the feature comparison module 32 is configured to compare and analyze extracted feature information with important image feature information and audio keyword information acquired by big data, and the information early warning module 33 is configured to early warn the analyzed abnormal data information and feed back the abnormal data information to the user side.
Specifically, the data storage module 4 includes a distributed storage module 41, a transmission encryption module 42, a dynamic verification module 43, a real-time monitoring module 44, a multi-terminal feedback module 45, and a data backup module 46, where the distributed storage module 41 is configured to store collected security monitoring data in a distributed storage manner so as to improve security of data storage, the transmission encryption module 42 is configured to dynamically encrypt a transmission process during system operation, ensure security of the transmission process, the dynamic verification module 43 is configured to verify each operation performed by a user at a user terminal, and in a dynamic verification manner, the dynamic verification module 44 is configured to perform real-time monitoring protection on stored data and a system operation process by using a dynamic key and a dynamic face identification manner, the multi-terminal feedback module 45 is configured to alert and prompt for abnormality information by using a plurality of different user terminals, so as to ensure timely acquisition and backup of abnormality problems at the user terminal, facilitate enhancement of post-processing efficiency of the abnormality information, the data backup module 46 is configured to electrically connect the data backup module 46 to the distributed storage module 41 when the system detects the security problems, the data backup module 45 is electrically connected to the multi-terminal feedback module 45, the multi-terminal feedback module 44 is electrically connected to the distributed storage module 41, and the data backup module 45 is electrically connected to the distributed storage module 41 by using the dynamic verification module 44, and the real-time monitoring module 44 is configured to electrically monitor the data backup module 46, and the data backup module 46 is configured to electrically monitor the data storage module 46, and to electrically monitor the data storage module, the transmission encryption module 42, the dynamic verification module 43, the real-time monitoring module 44, the multi-terminal feedback module 45 and the data backup module 46 are all electrically connected to the data storage module 4, and the data storage module 4 is electrically connected to the security monitoring data security storage system 1.
In this embodiment, the data storage module 4 includes a distributed storage module 41, a transmission encryption module 42, a dynamic verification module 43, a real-time monitoring module 44, a multi-terminal feedback module 45, and a data backup module 46, where the distributed storage module 41 is configured to store collected security monitoring data in a distributed storage manner so as to improve security of data storage, the transmission encryption module 42 is configured to dynamically encrypt a transmission process during system operation, ensure security of the transmission process, the dynamic verification module 43 is configured to verify each operation of a user used by a user terminal, and perform, by adopting a dynamic verification manner, real-time monitoring and protection can be performed by a dynamic key and a dynamic face recognition manner, so as to improve security of system usage, the multi-terminal feedback module 45 is configured to alert and prompt for abnormal information through a plurality of different user terminals, so as to ensure that the user can timely acquire and backup an abnormal problem at the user terminal, thereby facilitating improvement of subsequent processing efficiency of the abnormal information, and the data backup module 46 is configured to delete the data stored in the preset space when the system detects the security problem, and prevent the system from being affected by the security.
Specifically, the data acquisition module 5 includes a camera module 51, an automatic acquisition module 52 and a manual uploading module 53, the camera module 51 is used for performing security monitoring through a network camera monitoring mode, the automatic acquisition module 52 is used for automatically acquiring shooting acquisition data of the camera, the manual uploading module 53 is used for uploading monitoring data information in a manual uploading mode, the manual uploading module 53 is electrically connected with the automatic acquisition module 52, the automatic acquisition module 52 is electrically connected with the camera module 51, the automatic acquisition module 52 and the manual uploading module 53 are electrically connected with the data acquisition module 5, and the data acquisition module 5 is electrically connected with the information transmission module 6.
In this embodiment, the data acquisition module 5 includes a camera module 51, an automatic acquisition module 52 and a manual uploading module 53, where the camera module 51 is used for security monitoring in a mode of monitoring by using a network camera, the automatic acquisition module 52 is used for automatically acquiring shooting acquisition data of the camera, and the manual uploading module 53 is used for uploading monitoring data information in a manual uploading mode.
A use method of a security monitoring data security storage system based on big data analysis comprises the following steps:
s1: starting a security monitoring data security storage system for networking operation of the system;
s2: the starting data acquisition module is used for acquiring video monitoring information and audio data information;
s3: the starting information transmission module is used for transmitting and reporting the acquired information;
s4: the start information preprocessing module is used for preprocessing the acquired video and audio data information, and aims to improve the data quality and realize more accurate data analysis;
s5: the initial big data analysis module is used for carrying out recognition comparison of characteristic information on the acquired data and carrying out early warning feedback on abnormal information;
s6: the starting data storage module is used for safely storing the monitoring data information;
s7: starting a cloud server for backing up data information;
s8: and starting a data center for storing various data information of the system.
Specifically, the start data acquisition module includes the following steps:
(1) Starting a camera module;
(2) Starting an automatic acquisition module;
(3) And starting a manual uploading module.
Specifically, the start information preprocessing module includes the following steps:
(1) Starting a data optimization module;
(2) Starting an image extraction module;
(3) Starting a voice extraction module;
(4) And starting the intelligent detection module.
Specifically, the start big data analysis module includes the following steps:
(1) A start feature recognition module;
(2) Starting a feature comparison module;
(3) And a start information early warning module.
Specifically, the start data storage module includes the following steps:
(1) Starting to distribute the storage modules;
(2) Starting to transmit the encryption module;
(3) Starting a dynamic verification module;
(4) Starting a real-time monitoring module;
(5) Starting the multi-terminal feedback module;
(6) And starting a data backup module.
The present invention is not limited to the above-mentioned embodiments, and any person skilled in the art, based on the technical solution of the present invention and the improved concept thereof, can be equivalently replaced or changed within the scope of the present invention.

Claims (10)

1. The utility model provides a security protection control data safety storage system based on big data analysis, includes security protection control data safety storage system (1), its characterized in that, the inside of security protection control data safety storage system (1) is provided with information preprocessing module (2), the inside of security protection control data safety storage system (1) is provided with big data analysis module (3), the inside of security protection control data safety storage system (1) is provided with data storage module (4), security protection control data safety storage system (1) has internet (7) through communication network mouth electric connection, security protection control data safety storage system (1) has cloud server (8) through communication network mouth electric connection, security protection control data safety storage system (1) has data center (9) through communication network mouth electric connection, security protection control data safety storage system (1) has information transmission module (6) through communication network mouth electric connection, information transmission module (6) has data acquisition module (5) through communication network mouth electric connection.
2. The security monitoring data security storage system based on big data analysis according to claim 1, wherein the information preprocessing module (2) comprises a data optimizing module (21), an image extracting module (22), a voice extracting module (23) and an intelligent detecting module (24), the data optimizing module (21) is used for optimizing the collected video image data information and audio data information, the image can be trimmed and the audio can be noise reduced to improve the quality of the data information, the image extracting module (22) is used for extracting the characteristics of the image video information, the voice extracting module (23) is used for extracting the keywords of the voice data information, the intelligent detecting module (24) is used for intelligently analyzing the collected data, detecting the integrity of the collected data information, preventing a foreign object from shielding a camera or affecting the collection of the audio with noise, and prompting a user, the intelligent detecting module (24) is electrically connected with the voice extracting module (23), the voice extracting module (23) is electrically connected with the image extracting module (22), the image extracting module (22) is electrically connected with the optimizing module (21), the intelligent detecting module (24) is electrically connected with the voice extracting module (23), the information preprocessing module (2) is electrically connected with the security monitoring data security storage system (1).
3. The security monitoring data security storage system based on big data analysis according to claim 1, wherein the big data analysis module (3) comprises a feature recognition module (31), a feature comparison module (32) and an information early warning module (33), the feature recognition module (31) is used for extracting and recognizing features, the feature comparison module (32) is used for comparing and analyzing extracted feature information with image important feature information and audio keyword information acquired by big data, the information early warning module (33) is used for comparing and analyzing abnormal data information and feeding back the abnormal data information to a user side, the information early warning module (33) is electrically connected to the feature comparison module (32), the feature recognition module (31), the feature comparison module (32) and the information early warning module (33) are electrically connected to the big data analysis module (3), and the big data analysis module (3) is electrically connected to the security monitoring data security storage system (1).
4. The security monitoring data security storage system based on big data analysis according to claim 1, wherein the data storage module (4) comprises a distributed storage module (41), a transmission encryption module (42), a dynamic verification module (43), a real-time monitoring module (44), a multi-terminal feedback module (45) and a data backup module (46), the distributed storage module (41) is used for storing collected security monitoring data in a distributed storage manner so as to improve the security of data storage, the transmission encryption module (42) is used for dynamically encrypting the transmission process when the system works, guaranteeing the security of the transmission process, the dynamic verification module (43) is used for verifying various operations of a user used by the user terminal, the dynamic verification mode is adopted, the system use security can be improved by a dynamic key and a human face dynamic identification mode, the real-time monitoring module (44) is used for carrying out real-time monitoring protection on the stored data and the system operation process, the multi-terminal feedback module (45) is used for prompting information through a plurality of different user terminals so as to improve the security of data storage, the user terminal can be used for ensuring the security of the user terminal to acquire the data and the security of the user terminal, the user terminal is used for preventing the problem of the system from being affected by the security data from being deleted when the security is detected by the user terminal and the user terminal is in the security system, the security backup information is completely lost when the user terminal is used for detecting the security data is completely lost, the data backup module (46) is electrically connected to the multi-terminal feedback module (45), the multi-terminal feedback module (45) is electrically connected to the real-time monitoring module (44), the real-time monitoring module (44) is electrically connected to the dynamic verification module (43), the dynamic verification module (43) is electrically connected to the transmission encryption module (42), the transmission encryption module (42) is electrically connected to the distributed storage module (41), the transmission encryption module (42), the dynamic verification module (43), the real-time monitoring module (44), the multi-terminal feedback module (45) and the data backup module (46) are electrically connected to the data storage module (4), and the data storage module (4) is electrically connected to the security monitoring data security storage system (1).
5. The security monitoring data security storage system based on big data analysis according to claim 1, wherein the data acquisition module (5) comprises a camera module (51), an automatic acquisition module (52) and a manual uploading module (53), the camera module (51) is used for performing security monitoring through a network camera monitoring mode, the automatic acquisition module (52) is used for automatically acquiring shooting acquisition data of a camera, the manual uploading module (53) is used for uploading monitoring data information in a manual uploading mode, the manual uploading module (53) is electrically connected with the automatic acquisition module (52), the automatic acquisition module (52) is electrically connected with the camera module (51), the automatic acquisition module (52) and the manual uploading module (53) are electrically connected with the data acquisition module (5), and the data acquisition module (5) is electrically connected with the information transmission module (6).
6. The method for using the security monitoring data security storage system based on big data analysis according to any one of claims 1 to 5, comprising the following steps:
s1: starting a security monitoring data security storage system for networking operation of the system;
s2: the starting data acquisition module is used for acquiring video monitoring information and audio data information;
s3: the starting information transmission module is used for transmitting and reporting the acquired information;
s4: the start information preprocessing module is used for preprocessing the acquired video and audio data information, and aims to improve the data quality and realize more accurate data analysis;
s5: the initial big data analysis module is used for carrying out recognition comparison of characteristic information on the acquired data and carrying out early warning feedback on abnormal information;
s6: the starting data storage module is used for safely storing the monitoring data information;
s7: starting a cloud server for backing up data information;
s8: and starting a data center for storing various data information of the system.
7. The method for using a security monitoring data security storage system based on big data analysis according to claim 6, wherein the starting data acquisition module comprises the following steps:
(1) Starting a camera module;
(2) Starting an automatic acquisition module;
(3) And starting a manual uploading module.
8. The method for using a security monitoring data security storage system based on big data analysis according to claim 6, wherein the start information preprocessing module comprises the following steps:
(1) Starting a data optimization module;
(2) Starting an image extraction module;
(3) Starting a voice extraction module;
(4) And starting the intelligent detection module.
9. The method for using a security monitoring data security storage system based on big data analysis according to claim 6, wherein the starting big data analysis module comprises the following steps:
(1) A start feature recognition module;
(2) Starting a feature comparison module;
(3) And a start information early warning module.
10. The method for using a security monitoring data security storage system based on big data analysis according to claim 6, wherein the starting data storage module comprises the following steps:
(1) Starting to distribute the storage modules;
(2) Starting to transmit the encryption module;
(3) Starting a dynamic verification module;
(4) Starting a real-time monitoring module;
(5) Starting the multi-terminal feedback module;
(6) And starting a data backup module.
CN202310729569.0A 2023-06-20 2023-06-20 Security monitoring data secure storage system and method based on big data analysis Pending CN116471129A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310729569.0A CN116471129A (en) 2023-06-20 2023-06-20 Security monitoring data secure storage system and method based on big data analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310729569.0A CN116471129A (en) 2023-06-20 2023-06-20 Security monitoring data secure storage system and method based on big data analysis

Publications (1)

Publication Number Publication Date
CN116471129A true CN116471129A (en) 2023-07-21

Family

ID=87173971

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310729569.0A Pending CN116471129A (en) 2023-06-20 2023-06-20 Security monitoring data secure storage system and method based on big data analysis

Country Status (1)

Country Link
CN (1) CN116471129A (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102496235A (en) * 2011-12-27 2012-06-13 公安部沈阳消防研究所 Image fire detector possessing optical integrity and method thereof
CN104363414A (en) * 2014-10-31 2015-02-18 无锡悟莘科技有限公司 Intelligent video analyzing method
CN104540123A (en) * 2015-01-07 2015-04-22 福州北卡信息科技有限公司 Encryption backup and security deletion method and system for important data of mobile terminal
CN107194291A (en) * 2017-05-16 2017-09-22 努比亚技术有限公司 Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium
CN109447048A (en) * 2018-12-25 2019-03-08 苏州闪驰数控系统集成有限公司 A kind of artificial intelligence early warning system
CN109714572A (en) * 2018-12-28 2019-05-03 深圳市微纳感知计算技术有限公司 A kind of intelligent safety and defence system of sound view linkage
CN111754714A (en) * 2020-07-08 2020-10-09 南阳师范学院 Security monitoring system and monitoring method thereof
AU2020102193A4 (en) * 2020-09-09 2020-10-22 Tianjin University Structural health monitoring system based on blockchain and smart contract
CN212936009U (en) * 2020-08-31 2021-04-09 海南天赏安防科技有限公司 Monitoring camera capable of alarming
CN113194140A (en) * 2021-04-29 2021-07-30 中信重工开诚智能装备有限公司 Integrated remote monitoring system based on fire-fighting robot
CN113395694A (en) * 2021-06-23 2021-09-14 深圳市凯莱特科技股份有限公司 Intelligent security defense system and defense method based on 5G and local area base station
CN113573026A (en) * 2021-08-11 2021-10-29 江西志宏安防科技有限公司 Building security protection monitored control system of many monitoring points
CN114550082A (en) * 2022-01-21 2022-05-27 珠海德茵电气有限公司 Easy-to-use efficient AI (Artificial Intelligence) recognition algorithm
CN217222526U (en) * 2022-01-17 2022-08-19 深圳市云进工程建设有限公司 Monitoring security protection is with preventing sheltering from device
CN115620471A (en) * 2022-09-30 2023-01-17 浙江安防职业技术学院 Image identification security system based on big data screening
CN115952477A (en) * 2022-12-13 2023-04-11 福建省漳州第一职业中专学校 User data protection system of safety computer
CN116168348A (en) * 2023-04-21 2023-05-26 成都睿瞳科技有限责任公司 Security monitoring method, system and storage medium based on image processing

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102496235A (en) * 2011-12-27 2012-06-13 公安部沈阳消防研究所 Image fire detector possessing optical integrity and method thereof
CN104363414A (en) * 2014-10-31 2015-02-18 无锡悟莘科技有限公司 Intelligent video analyzing method
CN104540123A (en) * 2015-01-07 2015-04-22 福州北卡信息科技有限公司 Encryption backup and security deletion method and system for important data of mobile terminal
CN107194291A (en) * 2017-05-16 2017-09-22 努比亚技术有限公司 Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium
CN109447048A (en) * 2018-12-25 2019-03-08 苏州闪驰数控系统集成有限公司 A kind of artificial intelligence early warning system
CN109714572A (en) * 2018-12-28 2019-05-03 深圳市微纳感知计算技术有限公司 A kind of intelligent safety and defence system of sound view linkage
CN111754714A (en) * 2020-07-08 2020-10-09 南阳师范学院 Security monitoring system and monitoring method thereof
CN212936009U (en) * 2020-08-31 2021-04-09 海南天赏安防科技有限公司 Monitoring camera capable of alarming
AU2020102193A4 (en) * 2020-09-09 2020-10-22 Tianjin University Structural health monitoring system based on blockchain and smart contract
CN113194140A (en) * 2021-04-29 2021-07-30 中信重工开诚智能装备有限公司 Integrated remote monitoring system based on fire-fighting robot
CN113395694A (en) * 2021-06-23 2021-09-14 深圳市凯莱特科技股份有限公司 Intelligent security defense system and defense method based on 5G and local area base station
CN113573026A (en) * 2021-08-11 2021-10-29 江西志宏安防科技有限公司 Building security protection monitored control system of many monitoring points
CN217222526U (en) * 2022-01-17 2022-08-19 深圳市云进工程建设有限公司 Monitoring security protection is with preventing sheltering from device
CN114550082A (en) * 2022-01-21 2022-05-27 珠海德茵电气有限公司 Easy-to-use efficient AI (Artificial Intelligence) recognition algorithm
CN115620471A (en) * 2022-09-30 2023-01-17 浙江安防职业技术学院 Image identification security system based on big data screening
CN115952477A (en) * 2022-12-13 2023-04-11 福建省漳州第一职业中专学校 User data protection system of safety computer
CN116168348A (en) * 2023-04-21 2023-05-26 成都睿瞳科技有限责任公司 Security monitoring method, system and storage medium based on image processing

Similar Documents

Publication Publication Date Title
CN109300471B (en) Intelligent video monitoring method, device and system for field area integrating sound collection and identification
CN107403165B (en) Data management architecture of intelligent face recognition system and use method
CN111416960B (en) Video monitoring system based on cloud service
CN103714631A (en) ATM intelligent monitoring system based on human face recognition
CN212208379U (en) Automatic attendance temperature measuring system
CN111654665A (en) Intelligent tail money cabinet monitoring system
CN111064928A (en) Video monitoring system with face recognition function
CN111131765A (en) Multidimensional sensing regional management sensing system
CN117255193B (en) Remote terminal state detection method and system of 5G network monitor
CN112102574A (en) Intelligent alarm system for security room
CN117830053A (en) Perimeter security alarm system and method
CN116471129A (en) Security monitoring data secure storage system and method based on big data analysis
CN109740365B (en) Internet information security storage system with anti-theft mechanism
CN111462442A (en) Intelligent visual detection system and method for cable tunnel
CN109614916B (en) Real-time monitoring and early warning computer system for station passenger state based on face recognition
CN112905408B (en) Server for electric power operation and maintenance network safety monitoring and early warning system
CN212137832U (en) Intelligent interrogation supervising and monitoring system
CN114092999A (en) Monitoring system based on abnormal detection of monitoring video time sequence action
CN111899449A (en) Indoor security device and alarm control system based on image processing
CN112804492A (en) Communication prompting method and device for electronic cat eye
CN111292508A (en) Bank safety warning system and warning method thereof
CN118072375B (en) Face image acquisition system
CN220965168U (en) Construction safety monitoring system
CN117354469B (en) District monitoring video target tracking method and system based on security precaution
CN113570837B (en) Multi-region cascading security monitoring system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination