CN116866394A - Security system operation method and device and computer equipment - Google Patents

Security system operation method and device and computer equipment Download PDF

Info

Publication number
CN116866394A
CN116866394A CN202310758873.8A CN202310758873A CN116866394A CN 116866394 A CN116866394 A CN 116866394A CN 202310758873 A CN202310758873 A CN 202310758873A CN 116866394 A CN116866394 A CN 116866394A
Authority
CN
China
Prior art keywords
security
equipment
monitoring
detection result
terminal layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310758873.8A
Other languages
Chinese (zh)
Inventor
夏舟
万晓天
汤翔
林侃
毛会琳
张大海
张赢
刘夫亮
陈锡勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Energy Engineering Group Guangdong Electric Power Design Institute Co Ltd
Original Assignee
China Energy Engineering Group Guangdong Electric Power Design Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Energy Engineering Group Guangdong Electric Power Design Institute Co Ltd filed Critical China Energy Engineering Group Guangdong Electric Power Design Institute Co Ltd
Priority to CN202310758873.8A priority Critical patent/CN116866394A/en
Publication of CN116866394A publication Critical patent/CN116866394A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/34Signalling channels for network management communication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Alarm Systems (AREA)

Abstract

The application relates to a security system operation method, a security system operation device and computer equipment. The method comprises the following steps: acquiring equipment operation data of the terminal layer security equipment; performing identification detection operation on the equipment operation data to obtain a security detection result; and generating a device control instruction according to the security detection result and a preset monitoring scene, transmitting the device control instruction to terminal layer security equipment, wherein the terminal layer security equipment is used for executing security operation according to the device control instruction. By adopting the method, the data transmission in the security system can be optimized, the delay of the data transmission is reduced, and the network bandwidth utilization of the security system is improved.

Description

Security system operation method and device and computer equipment
Technical Field
The present application relates to the field of intelligent security technologies, and in particular, to a security system operation method, apparatus, and computer device.
Background
The method conforms to the indexes of '3060', 'carbon reaching peak and carbon neutralization' and the development plan of intelligent power plants in the energy industry, and each operation and maintenance management link from production, operation and maintenance to safety supervision and the like of the power plants is intelligently updated and improved. The intelligent security system processes and analyzes the structured and unstructured data acquired by the security system by combining with an artificial intelligent algorithm raised in the current computer field, optimizes the network structure of the intelligent security system of the power plant by means of big data, cloud computing, edge computing and the like, improves the operation quality and control precision of the security system of the power plant, and reduces the labor cost and equipment cost of security operation and maintenance of the power plant.
However, currently, only security equipment capable of realizing security functions is arranged in a power plant security system, and artificial intelligence technology is deployed in the background of the power plant security system. The equipment operation data of all security equipment are uploaded to the system background, and are analyzed and processed through an artificial intelligence technology, so that the uplink and downlink data volume of data transmission is increased in the actual application process, the construction cost and operation and maintenance efficiency of the security system of the power plant are also increased, and the situation of data delay exists in the data transmission process.
Disclosure of Invention
Based on the above, it is necessary to provide a security system operation method, device and computer equipment capable of optimizing uplink and downlink data amount, improving network bandwidth utilization and reducing network transmission delay.
In a first aspect, the application provides a security system operation method. The method comprises the following steps:
acquiring equipment operation data of the terminal layer security equipment;
performing identification detection operation on the equipment operation data to obtain a security detection result;
and generating a device control instruction according to the security detection result and a preset monitoring scene, transmitting the device control instruction to terminal layer security equipment, wherein the terminal layer security equipment is used for executing security operation according to the device control instruction.
In one embodiment, the preset monitoring scene includes an in-situ monitoring scene, a centralized monitoring scene and a mixed monitoring scene; the mixed monitoring scene comprises an in-situ monitoring scene and a centralized monitoring scene; the in-situ monitoring scene is used for executing a monitoring function on in-situ monitoring events, wherein the in-situ monitoring events comprise same-device events and device group events; the centralized monitoring scenario is used to perform a monitoring function on a centralized monitoring event.
In one embodiment, generating a device control instruction according to a security detection result and a preset monitoring scene, transmitting the device control instruction to a terminal layer security device, including:
when the preset monitoring scene is a centralized monitoring scene, transmitting a security detection result to central layer security equipment; the central layer security equipment is used for carrying out visual operation on security detection results to obtain visual images;
and receiving an execution recognition result corresponding to the visual image, generating a device control instruction based on the execution recognition result, and transmitting the device control instruction to the terminal layer security equipment.
In one embodiment, generating a device control instruction according to a security detection result and a preset monitoring scene, and transmitting the device control instruction to a terminal layer security device, including:
When the preset monitoring scene is a mixed monitoring scene, classifying security detection results according to the preset monitoring scene to obtain an in-situ detection result and a centralized detection result;
generating a first control instruction according to the on-site detection result, and issuing the first control instruction to the terminal layer security equipment in the on-site monitoring scene;
transmitting the concentrated detection result to central layer security equipment; the central layer security equipment is used for carrying out visual operation on the centralized detection result to obtain a visual image;
and receiving an execution recognition result corresponding to the visual image, generating a second control instruction based on the execution recognition result, and issuing the second control instruction to the terminal layer security equipment in the centralized monitoring scene.
In one embodiment, the security detection device includes hardware having a core computing power, the hardware including a processor having a core computing power, the core computing power being greater than a computing power threshold of an algorithm deployment.
In one embodiment, before acquiring the device operation data of the terminal layer security device, the method further includes:
determining a security function requirement and a security management and control requirement according to the operation and maintenance security monitoring requirement;
determining a monitoring scheme to be constructed according to security function requirements and a preset monitoring scene;
And determining initial security equipment according to security control requirements and a monitoring scheme to be built, and obtaining a security system according to the security network framework, the monitoring scheme to be built and the initial security equipment.
In one embodiment, the initial security device includes a first security device and a second security device, and the second security device includes a terminal layer security device; determining initial security equipment according to security control requirements and a monitoring scheme to be built, and obtaining a security system according to a security network framework, the monitoring scheme to be built and the initial security equipment, wherein the security system comprises:
when the security system is obtained in a construction mode, determining Fu Gesuan initial security equipment required by force according to security control requirements and calculation force requirements of a preset algorithm;
constructing a pre-construction system according to the security network architecture, the monitoring scheme to be constructed and the initial security equipment;
carrying out algorithm deployment on the first security equipment according to a monitoring scheme to be constructed and a preset algorithm to obtain security detection equipment;
and obtaining a security system according to the security detection equipment and the second security equipment.
In one embodiment, the method includes determining an initial security device according to security management and control requirements and a monitoring scheme to be built, obtaining a security system according to a security network architecture, the monitoring scheme to be built and the initial security device, and further comprising:
When the security system is obtained in a reconstruction mode, determining Fu Gesuan edge computing equipment required by force according to security control requirements and calculation force requirements of a preset algorithm;
transforming according to the constructed security system and the edge computing equipment meeting the calculation force requirement to obtain a pre-constructed system;
carrying out algorithm deployment on the edge computing equipment according to a preset algorithm to obtain security detection equipment;
and obtaining a security system according to the security detection equipment and the pre-constructed system.
In a second aspect, the application further provides a security system operation device. The device comprises:
the data transmission module is used for acquiring equipment operation data of the terminal layer security equipment;
the detection processing module is used for carrying out identification detection operation on the equipment operation data to obtain a security detection result;
the instruction control module is used for generating equipment control instructions according to the security detection results and the preset monitoring scene, transmitting the equipment control instructions to the terminal layer security equipment, and the terminal layer security equipment is used for executing security operation according to the equipment control instructions.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the following steps when executing the computer program:
Acquiring equipment operation data of the terminal layer security equipment;
performing identification detection operation on the equipment operation data to obtain a security detection result;
and generating a device control instruction according to the security detection result and a preset monitoring scene, transmitting the device control instruction to terminal layer security equipment, wherein the terminal layer security equipment is used for executing security operation according to the device control instruction.
In a fourth aspect, the present application also provides a computer-readable storage medium. The computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
acquiring equipment operation data of the terminal layer security equipment;
performing identification detection operation on the equipment operation data to obtain a security detection result;
and generating a device control instruction according to the security detection result and a preset monitoring scene, transmitting the device control instruction to terminal layer security equipment, wherein the terminal layer security equipment is used for executing security operation according to the device control instruction.
In a fifth aspect, the present application also provides a computer program product. The computer program product comprising a computer program which, when executed by a processor, performs the steps of:
Acquiring equipment operation data of the terminal layer security equipment;
performing identification detection operation on the equipment operation data to obtain a security detection result;
and generating a device control instruction according to the security detection result and a preset monitoring scene, transmitting the device control instruction to terminal layer security equipment, wherein the terminal layer security equipment is used for executing security operation according to the device control instruction.
According to the security system operation method, the security system operation device and the computer equipment, the security detection equipment is used for identifying and detecting equipment operation data of the terminal layer security equipment, the operation corresponding to the security detection result of the identification detection is executed according to the function of the terminal layer security equipment and in combination with the preset monitoring scene of the security system, the function of the terminal layer security equipment is fully utilized for optimizing data transmission in the security system, the network bandwidth utilization of the security system is improved, the corresponding operation is executed on the security identification result according to different preset monitoring scenes, and the delay of data transmission is reduced.
Drawings
FIG. 1 is an application environment diagram of a security system operation method in one embodiment;
FIG. 2 is a flow chart of a method of operating a security system in one embodiment;
FIG. 3 is a flow chart of the device control steps in one embodiment;
FIG. 4 is a flow chart of a method of controlling a device according to another embodiment;
FIG. 5 is a schematic flow chart of a scheme for building a security system in one embodiment;
FIG. 6 is a schematic flow chart of a security system in one embodiment;
FIG. 7 is a schematic flow chart of a security system modification in one embodiment;
FIG. 8 is a schematic diagram of data transmission in one embodiment;
FIG. 9 is a block diagram of a security system operation device in one embodiment;
fig. 10 is an internal structural view of a computer device in one embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The security system operation method provided by the embodiment of the application can be applied to an application environment shown in fig. 1. The terminal layer security equipment, the edge layer security equipment and the central layer security equipment communicate through a network. The data storage system can be integrated on the central layer security equipment, and can also be placed on the cloud or other network servers. The equipment operation data of the terminal layer security equipment are identified and detected through the security detection equipment, and the operation corresponding to the security detection result of the identification and detection is executed according to the function of the terminal layer security equipment and in combination with the preset monitoring scene of the security system. The terminal layer security equipment can be but not limited to an intelligent camera, an intelligent access control device and an intelligent sensor, the edge layer security equipment can be but not limited to an outermost network switch and edge computing equipment, and the center layer security equipment can be but not limited to a core switch, a security system server, storage equipment and a security system upper computer. The security detection device may be a terminal layer security device, an edge layer security device or a center layer security device.
In one embodiment, as shown in fig. 2, a security system operation method is provided, and the security detection device in fig. 1 is taken as an example to illustrate the method, which includes the following steps:
s202, acquiring equipment operation data of the terminal layer security equipment.
The equipment operation data are scene data acquired by the terminal layer security equipment during monitoring.
Specifically, when the terminal layer security equipment is running, the scene data which are collected are transmitted to the security detection equipment.
S204, carrying out identification detection operation on the equipment operation data to obtain a security detection result.
The security detection result is a judgment result of whether the terminal layer security equipment detects an abnormal condition.
Specifically, after receiving the equipment operation data, the security detection equipment identifies the equipment operation data of each terminal layer security equipment, and judges whether an abnormal condition occurs in a monitored area of the terminal layer security equipment corresponding to the equipment operation data, so as to obtain a security detection result of each terminal layer security equipment.
S206, generating a device control instruction according to the security detection result and a preset monitoring scene, transmitting the device control instruction to the terminal layer security device, wherein the terminal layer security device is used for executing security operation according to the device control instruction.
The preset monitoring scenes comprise an in-situ monitoring scene, a centralized monitoring scene and a mixed monitoring scene; the mixed monitoring scene comprises an in-situ monitoring scene and a centralized monitoring scene; the in-situ monitoring scene is used for executing a monitoring function on in-situ monitoring events, wherein the in-situ monitoring events comprise same-device events and device group events; the centralized monitoring scenario is used to perform a monitoring function on a centralized monitoring event.
The in-situ monitoring event refers to processing the field data collected by the terminal layer security equipment through a preset algorithm, directly issuing a control instruction according to a processing result after the processing, and the centralized monitoring event refers to processing the field data collected by the terminal layer security equipment through the preset algorithm, uploading the processing result to the central layer security equipment after the processing, and making a decision and issuing the control instruction by monitoring personnel.
The same equipment event refers to that the same terminal layer security equipment processes the collected field data by using a preset algorithm and directly gives a control instruction, and the equipment group time refers to that after the field data is collected by different equipment, the equipment provided with the preset algorithm processes the collected field data and directly gives the control instruction.
Specifically, the security detection results are classified according to preset monitoring scenes, equipment control instructions are directly generated for the security detection results of the local monitoring scenes, intervention judgment is conducted for the security detection results of the centralized monitoring scenes, and the equipment control instructions are generated based on the judgment results. And then the generated equipment control instruction is issued to the terminal layer security equipment, and the terminal layer security equipment executes corresponding operation according to the equipment control instruction.
In the security system operation method, the security detection equipment is used for identifying and detecting the equipment operation data of the terminal layer security equipment, the operation corresponding to the security detection result of the identification detection is executed according to the function of the terminal layer security equipment and in combination with the preset monitoring scene of the security system, and the data transmission in the security system is optimized by executing different security operations according to different security monitoring forms, so that the delay of the data transmission is reduced, and the network bandwidth utilization of the security system is improved.
In one embodiment, as shown in fig. 3, generating a device control instruction according to a security detection result and a preset monitoring scene, and transmitting the device control instruction to a terminal layer security device, where the method includes:
s302, when the preset monitoring scene is a centralized monitoring scene, the security detection result is transmitted to the central layer security equipment.
The central layer security equipment is used for carrying out visual operation on security detection results to obtain visual images.
Specifically, after the security detection result is obtained, and when the equipment operation data corresponding to the security detection result is determined to be the data collected in the centralized monitoring scene, the security detection result is transmitted to the central layer security equipment, the central layer security equipment performs the visualization operation on the security detection result, and a visualized image is obtained and displayed on the central layer security equipment.
S304, receiving an execution recognition result corresponding to the visual image, generating a device control instruction based on the execution recognition result, and transmitting the device control instruction to the terminal layer security device.
Specifically, the central layer security device judges whether an abnormal event exists under the monitoring of the terminal layer security device according to the visual image to execute the identification result, such as personnel identification, fault early warning, target detection and the like, judges and decides according to the execution identification result corresponding to the visual image, and does not control the security device if no abnormal event exists; if an abnormal event exists, an early warning is sent out, and the site is blocked by security equipment such as an intelligent access control device. And generating a device control instruction according to the execution identification result, issuing the device control instruction to the security equipment of the terminal device layer, and executing corresponding operation by the security equipment of the terminal layer according to the device control instruction.
In this embodiment, by judging the source of the device operation data corresponding to the security detection result, based on the self-processing of the on-site monitoring event and the condition that the centralized monitoring event needs to perform an intervention decision, the security detection result corresponding to the device operation data in the centralized monitoring scene corresponding to the centralized monitoring event is transmitted to the central layer security device, then the security detection result is judged and decided to obtain the execution recognition result and based on the execution recognition to generate the device control instruction, the situation based on the monitoring event can be processed in a targeted manner, the uplink and downlink data amount of the security system is optimized, and the network bandwidth utilization rate is improved.
In one embodiment, as shown in fig. 4, generating a device control instruction according to a security detection result and a preset monitoring scene, and transmitting the device control instruction to a terminal layer security device, including:
s402, classifying security detection results according to the preset monitoring scene when the preset monitoring scene is a mixed monitoring scene, and obtaining an in-situ detection result and a concentrated detection result.
Specifically, after the security detection result is obtained, the equipment operation data corresponding to the security detection result is classified based on the security monitoring event, so that the in-situ detection result corresponding to the in-situ monitoring event and the centralized detection result corresponding to the centralized monitoring event are determined.
S402, generating a first control instruction according to an on-site detection result, and transmitting the first control instruction to the terminal layer security equipment in the on-site monitoring scene.
Specifically, for an in-situ detection result corresponding to an in-situ monitoring event, the security detection device automatically processes according to the in-situ detection result to generate a first control instruction, and issues the first control instruction to a terminal layer security device executing the in-situ monitoring event in an in-situ monitoring scene, and the terminal layer security device executes corresponding operation according to the device control instruction.
S402, transmitting the centralized detection result to central layer security equipment; the central layer security equipment is used for carrying out visual operation on the centralized detection result to obtain a visual image.
Specifically, aiming at a centralized detection result corresponding to a centralized monitoring event, transmitting the security detection result to central layer security equipment, and performing a visualization operation on the security detection result by the central layer security equipment to obtain a visualization image and displaying the visualization image on the central layer security equipment.
S402, receiving an execution recognition result corresponding to the visual image, generating a second control instruction based on the execution recognition result, and issuing the second control instruction to the terminal layer security equipment in the centralized monitoring scene.
Specifically, judging whether an abnormal event exists under the monitoring of the security equipment of the terminal layer according to the visual image, namely executing a recognition result, such as personnel recognition, fault early warning, target detection and the like, judging and deciding according to the execution recognition result corresponding to the visual image, and if no abnormal event exists, not controlling the security equipment; if an abnormal event exists, an early warning is sent out, and the site is blocked by security equipment such as an intelligent access control device. Generating a second control instruction according to the execution recognition result, and sending the second control instruction to the terminal equipment layer security equipment for executing the centralized monitoring event in the centralized monitoring scene, wherein the terminal equipment layer security equipment executes corresponding operation according to the equipment control instruction.
In this embodiment, by judging the source of the device operation data corresponding to the security detection result, based on the self-processing of the on-site monitoring event and the situation that the centralized monitoring event needs to perform an intervention decision, the device operation data of the terminal layer security device in the hybrid monitoring scene is processed and classified to obtain the on-site detection result and the centralized detection result, and different control processing schemes are respectively executed for the on-site detection result and the centralized detection result, so that the flexible processing of the monitoring event can be realized, the uplink and downlink data volume of the security system is optimized, and the network bandwidth utilization rate is improved.
In one embodiment, the security detection device includes hardware having a core computing force, the hardware including a processor having a core computing force that is greater than a computing force threshold of an algorithm deployment.
The core computing power refers to computing power capable of running the artificial intelligence algorithm, and the hardware with the core computing power can be, but is not limited to, CPU, GPU or IPU hardware supporting the deployment of the AI algorithm, and the computing power threshold refers to the lowest computing power for running the artificial intelligence algorithm.
In the embodiment, the hardware with core calculation force is arranged in the security protection detection equipment, so that the on-site detection result obtained based on-site monitoring event identification detection can be self-processed, the first control instruction corresponding to the on-site detection result is generated, the data transmitted to the security protection equipment of the platform layer is reduced, and the uplink and downlink data quantity of the security protection system is optimized.
In one embodiment, as shown in fig. 5, before acquiring the device operation data of the terminal layer security device, the method further includes:
s502, determining a security function requirement and a security management and control requirement according to the operation and maintenance security monitoring requirement.
The security control requirement comprises the cost of budget equipment, bandwidth cost and the like for constructing/modifying the security system. The security function requirement refers to security operations that need to be executed by a security monitoring area, such as real-time monitoring, blocking and conducting between areas, and the like.
Specifically, before a security system is built/constructed, the position of the power plant is determined in an operation and maintenance security monitoring scene, corresponding monitoring function requirements, namely security function requirements, are provided according to the determined operation and maintenance security monitoring scene requirements, and security control requirements are estimated based on the security function requirements.
S504, determining a monitoring scheme to be constructed according to security function requirements and a preset monitoring scene.
The monitoring scheme to be constructed comprises a reconstruction security system scheme and a scheme for reconstruction based on the existing security system, and the monitoring scheme to be constructed also comprises division and deployment of monitoring scenes for different areas.
Specifically, a security system is subjected to monitoring area division according to security function requirements corresponding to a preset monitoring scene, and then a monitoring scheme to be constructed is formulated according to the divided monitoring area and equipment corresponding to the budget equipment cost in the security function requirements.
S506, determining initial security equipment according to security control requirements and a monitoring scheme to be built, and obtaining a security system according to a security network framework, the monitoring scheme to be built and the initial security equipment.
The initial security equipment comprises central layer security equipment, transmission layer security equipment, edge layer security equipment and terminal layer security equipment; the security network architecture comprises a center layer, a transmission layer, an edge layer and a terminal layer, wherein the center layer, the transmission layer, the edge layer and the terminal layer are sequentially in communication connection.
Specifically, purchasing of initial security equipment is performed according to a monitoring scheme to be built and security control requirements, and preliminary installation and networking are performed after purchasing, so that a security system is obtained.
In the embodiment, the security system framework is constructed in advance, so that security detection equipment is conveniently deployed aiming at a non-monitoring scene, different application modes are provided for a monitoring scheme, and the monitoring scheme has higher flexibility.
In one embodiment, as shown in fig. 6, determining an initial security device according to a security management and control requirement and a monitoring scheme to be built, and obtaining a security system according to a security network architecture, the monitoring scheme to be built and the initial security device, including:
S602, when the security system is obtained in a construction mode, determining Fu Gesuan initial security equipment required by force according to security control requirements and calculation force requirements of a preset algorithm.
The initial security equipment comprises first security equipment and second security equipment, wherein the first security equipment is equipment needing to be deployed with a preset algorithm, and the second security equipment is equipment which does not need to be deployed with the preset algorithm in the initial security equipment. The second security device comprises terminal layer security device, edge layer security device and center layer security device.
Specifically, purchasing of initial security equipment is performed according to a construction scheme and security management and control requirements in a monitoring scheme to be constructed, and the calculation power of the purchased initial security equipment is required to meet the calculation power requirement of a preset algorithm.
S604, constructing a pre-construction system according to the security network architecture, the monitoring scheme to be constructed and the initial security equipment.
Specifically, after purchasing is completed, deployment of initial security equipment is performed according to a construction scheme in a monitoring scheme to be constructed, communication connection is performed between the initial security equipment of the same layer in the security network architecture and the initial security equipment of an adjacent layer, and a pre-construction system is obtained after deployment and communication connection are completed.
And S606, carrying out algorithm deployment on the first security equipment according to a monitoring scheme to be constructed and a preset algorithm to obtain security detection equipment.
The preset algorithm is an artificial intelligence algorithm, and comprises an image recognition (face recognition algorithm), a target detection (mask and helmet detection algorithm), an abnormality detection (equipment defect detection algorithm), a fault early warning (equipment health evaluation algorithm), a mobile monitoring algorithm, an intrusion monitoring algorithm, a personnel retention algorithm, a target tracking algorithm and the like.
Specifically, an algorithm to be deployed for the first security equipment in different scenes is determined according to a preset monitoring scene in a monitoring scheme to be constructed, and algorithm deployment is performed on the first security equipment in different scenes after the algorithm deployment is determined, so that all the first security equipment is changed into security detection equipment.
The algorithm deployment needs to consider the delay of data transmission, the data transmission and the transmission delay among all the layers of the security network architecture are shown in fig. 8, and the priority sequence of the algorithm deployment is formulated based on the transmission delay shown in fig. 8, and the specific diagram is shown in the following table 1:
TABLE 1
Meanwhile, the delay corresponding to the local monitoring scene, the centralized monitoring scene and the mixed monitoring scene is selected in consideration of the requirement of the preset monitoring scene, and the delay of the preset algorithm deployed at different layers of the security network architecture is also required to be considered in one scene, and the detailed arrangement sequence is shown in the following table 2:
TABLE 2
S608, a security system is obtained according to the security detection equipment and the second security equipment.
Specifically, the communication connection between the security detection equipment and the second security equipment is checked, and the deployment of the security system is completed after no condition is determined.
In this embodiment, after the security system needs to be built according to the security management and control requirement, the initial security equipment is purchased, the equipment is deployed after the purchase, and after the deployment is completed, the first security equipment pre-selected in the monitoring scheme to be built is subjected to algorithm deployment, so that the final deployment of the security system is completed, in the deployment process, the factors such as data flow direction, data volume, network bandwidth, transmission distance, transmission delay and the like in the monitoring network link are comprehensively considered, the algorithm deployment is performed by taking the data transmission delay as the priority order, the uplink and downlink data volume in the security system is optimized, the network bandwidth utilization rate is improved, and the network transmission delay is reduced.
In one embodiment, as shown in fig. 7, the method determines an initial security device according to a security management and control requirement and a monitoring scheme to be built, obtains a security system according to a security network architecture, the monitoring scheme to be built and the initial security device, and further includes:
S702, when the security system is obtained in a reconstruction mode, determining Fu Gesuan edge computing equipment required by force according to security control requirements and calculation force requirements of a preset algorithm.
The edge computing device refers to a removable data processing device with core computing power, storage function and data reading/writing function running a preset algorithm, and may include, but is not limited to, an edge computing box, an edge computing gateway, an edge server or a superbrain.
Specifically, purchasing of the edge computing equipment is performed according to a construction scheme and security management and control requirements in a monitoring scheme to be constructed, and the computing power of the purchased edge computing equipment is required to meet the computing power requirement of a preset algorithm.
S702, modifying according to the constructed security system and edge computing equipment meeting the calculation force requirement to obtain a pre-constructed system.
Wherein, the constructed security system refers to the existing security system.
Specifically, after purchasing is completed, the edge computing device is deployed, and the deployment position can be at a terminal layer or an edge layer, and the edge computing device is in communication connection with the security device at the same layer and the edge computing device is in communication connection with the security device at an adjacent layer.
S702, carrying out algorithm deployment on the edge computing equipment according to a preset algorithm to obtain security detection equipment.
Specifically, according to a preset monitoring scene in a monitoring scheme to be constructed, an algorithm to be deployed of the edge computing devices connected with the security devices in different scenes in a communication mode is determined, and after the algorithm is determined, the edge computing devices connected with the security devices in different scenes are deployed, so that all the edge computing devices are changed into security detection devices.
S702, obtaining a security system according to the security detection equipment and the pre-construction system.
And checking communication connection between the security detection equipment and the security equipment, and completing transformation and deployment of the security system after no condition is determined.
In the embodiment, after the security system is determined to be built according to security management and control requirements, purchasing of edge computing equipment is carried out, equipment deployment is carried out after purchasing, algorithm deployment is carried out on the edge computing equipment after equipment deployment is completed, and further improvement deployment of the security system is completed.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a security system operation device for realizing the security system operation method. The implementation scheme of the solution to the problem provided by the device is similar to the implementation scheme described in the above method, so the specific limitation in the embodiments of the operation device of one or more security systems provided below can be referred to the limitation of the operation method of the security system hereinabove, and will not be repeated here.
In one embodiment, as shown in fig. 9, there is provided a security system operation device, including: a data transmission module 902, a detection processing module 904, and an instruction control module 906, wherein:
and the data transmission module 902 is used for acquiring the equipment operation data of the terminal layer security equipment.
The detection processing module 904 is configured to perform identification detection operation on the device operation data, and obtain a security detection result.
The instruction control module 906 is configured to generate an equipment control instruction according to the security detection result and a preset monitoring scene, transmit the equipment control instruction to a terminal layer security device, and the terminal layer security device is configured to perform security operation according to the equipment control instruction.
In one embodiment, the instruction control module 906 is further configured to transmit the security detection result to the central layer security device when the preset monitoring scene is a centralized monitoring scene; the central layer security equipment is used for carrying out visual operation on security detection results to obtain visual images; and receiving an execution recognition result corresponding to the visual image, generating a device control instruction based on the execution recognition result, and transmitting the device control instruction to the terminal layer security equipment.
In one embodiment, the instruction control module 906 is further configured to classify the security detection result according to the preset monitoring scene when the preset monitoring scene is a mixed monitoring scene, to obtain an in-situ detection result and a centralized detection result; generating a first control instruction according to the on-site detection result, and issuing the first control instruction to the terminal layer security equipment in the on-site monitoring scene; transmitting the concentrated detection result to central layer security equipment; the central layer security equipment is used for carrying out visual operation on the centralized detection result to obtain a visual image; and receiving an execution recognition result corresponding to the visual image, generating a second control instruction based on the execution recognition result, and issuing the second control instruction to the terminal layer security equipment in the centralized monitoring scene.
In one embodiment, the apparatus further comprises:
the demand assessment module is used for determining the security function demand and the security management and control demand according to the operation and maintenance security monitoring demand.
The scheme construction module is used for determining a monitoring scheme to be constructed according to security function requirements and preset monitoring scenes.
The deployment and installation module is used for determining initial security equipment according to security control requirements and a monitoring scheme to be built, and obtaining a security system according to a security network framework, the monitoring scheme to be built and the initial security equipment.
In one embodiment, the deployment and installation module is further configured to determine Fu Gesuan force-required initial security equipment according to security control requirements and calculation force requirements of a preset algorithm when the security system is obtained by means of construction; constructing a pre-construction system according to the security network architecture, the monitoring scheme to be constructed and the initial security equipment; carrying out algorithm deployment on the first security equipment according to a monitoring scheme to be constructed and a preset algorithm to obtain security detection equipment; and obtaining a security system according to the security detection equipment and the second security equipment.
In one embodiment, the deployment and installation module is further configured to determine Fu Gesuan force-required edge computing devices according to security control requirements and calculation force requirements of a preset algorithm when the security system is obtained by means of modification; transforming according to the constructed security system and the edge computing equipment meeting the calculation force requirement to obtain a pre-constructed system; carrying out algorithm deployment on the edge computing equipment according to a preset algorithm to obtain security detection equipment; and obtaining a security system according to the security detection equipment and the pre-constructed system.
All or part of the modules in the security system operation device can be realized by software, hardware and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a terminal, and an internal structure diagram thereof may be as shown in fig. 10. The computer device includes a processor, a memory, an input/output interface, a communication interface, a display unit, and an input means. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface, the display unit and the input device are connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program, when executed by a processor, implements a security system operation method. The display unit of the computer device is used for forming a visual picture, and can be a display screen, a projection device or a virtual reality imaging device. The display screen can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be a key, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in FIG. 10 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In an embodiment, there is also provided a computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of the method embodiments described above when the computer program is executed.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when executed by a processor, carries out the steps of the method embodiments described above.
In an embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the steps of the method embodiments described above.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data need to comply with the related laws and regulations and standards of the related country and region.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.

Claims (10)

1. The operation method of the security system is characterized in that the security system comprises terminal layer security equipment and security detection equipment; the method is applied to the security detection equipment; the method comprises the following steps:
acquiring equipment operation data of the terminal layer security equipment;
performing identification detection operation on the equipment operation data to obtain a security detection result;
and generating a device control instruction according to the security detection result and a preset monitoring scene, transmitting the device control instruction to the terminal layer security device, wherein the terminal layer security device is used for executing security operation according to the device control instruction.
2. The method of claim 1, wherein the preset monitoring scenarios include a in-situ monitoring scenario, a centralized monitoring scenario, and a hybrid monitoring scenario; the mixed monitoring scene comprises an in-situ monitoring scene and a centralized monitoring scene; the in-situ monitoring scene is used for executing a monitoring function on in-situ monitoring events, and the in-situ monitoring events comprise equipment-same events and equipment-group events; the centralized monitoring scene is used for executing a monitoring function on the centralized monitoring event.
3. The method of claim 2, wherein generating a device control command according to the security detection result and a preset monitoring scene, transmitting the device control command to the terminal layer security device, comprises:
when the preset monitoring scene is a centralized monitoring scene, transmitting the security detection result to central layer security equipment; the central layer security equipment is used for performing visual operation on the security detection result to obtain a visual image;
and receiving an execution recognition result corresponding to the visual image, generating a device control instruction based on the execution recognition result, and transmitting the device control instruction to the terminal layer security device.
4. The method according to claim 2, wherein the generating a device control command according to the security detection result and a preset monitoring scene, and transmitting the device control command to the terminal layer security device, includes:
when the preset monitoring scene is a mixed monitoring scene, classifying the security detection result according to the preset monitoring scene to obtain an in-situ detection result and a centralized detection result;
generating a first control instruction according to the in-situ detection result, and issuing the first control instruction to the terminal layer security equipment in the in-situ monitoring scene;
transmitting the centralized detection result to central layer security equipment; the central layer security equipment is used for carrying out visual operation on the concentrated detection result to obtain a visual image;
and receiving an execution recognition result corresponding to the visual image, generating a second control instruction based on the execution recognition result, and issuing the second control instruction to the terminal layer security equipment in the centralized monitoring scene.
5. The method of claim 1, wherein the security detection device comprises hardware having a core computing force, the hardware comprising a processor having a core computing force that is greater than a computing force threshold of an algorithm deployment.
6. The method of claim 1, wherein prior to obtaining device operational data of the terminal layer security device, the method further comprises:
determining a security function requirement and a security management and control requirement according to the operation and maintenance security monitoring requirement;
determining a monitoring scheme to be constructed according to the security function requirement and a preset monitoring scene;
and determining initial security equipment according to the security control requirements and the monitoring scheme to be built, and obtaining a security system according to a security network framework, the monitoring scheme to be built and the initial security equipment.
7. The method of claim 6, wherein the initial security device comprises a first security device and a second security device, the second security device comprising a terminal layer security device; determining initial security equipment according to the security control requirement and the monitoring scheme to be constructed, and obtaining a security system according to a security network framework, the monitoring scheme to be constructed and the initial security equipment, wherein the security system comprises:
when the security system is obtained in a construction mode, determining Fu Gesuan initial security equipment required by force according to the security control requirement and the calculation force requirement of a preset algorithm;
Constructing a pre-constructed system according to the security network architecture, the monitoring scheme to be constructed and the initial security equipment;
performing algorithm deployment on the first security equipment according to the monitoring scheme to be constructed and the preset algorithm to obtain security detection equipment;
and obtaining a security system according to the security detection equipment and the second security equipment.
8. The method of claim 6, wherein the determining an initial security device according to the security control requirement and the monitoring scheme to be built, obtaining a security system according to a security network architecture, the monitoring scheme to be built, and the initial security device, further comprises:
when the security system is obtained in a reconstruction mode, determining Fu Gesuan edge computing equipment required by force according to the security control requirement and the calculation force requirement of a preset algorithm;
transforming according to the constructed security system and the edge computing equipment meeting the calculation force requirement to obtain a pre-constructed system;
performing algorithm deployment on the edge computing equipment according to the preset algorithm to obtain security detection equipment;
and obtaining a security system according to the security detection equipment and the pre-constructed system.
9. A security system operation device, the device comprising:
the data transmission module is used for acquiring equipment operation data of the terminal layer security equipment;
the detection processing module is used for carrying out identification detection operation on the equipment operation data to obtain a security detection result;
the instruction control module is used for generating equipment control instructions according to the security detection results and a preset monitoring scene, transmitting the equipment control instructions to the terminal layer security equipment, and the terminal layer security equipment is used for executing security operation according to the equipment control instructions.
10. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any one of claims 1 to 8 when the computer program is executed.
CN202310758873.8A 2023-06-26 2023-06-26 Security system operation method and device and computer equipment Pending CN116866394A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310758873.8A CN116866394A (en) 2023-06-26 2023-06-26 Security system operation method and device and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310758873.8A CN116866394A (en) 2023-06-26 2023-06-26 Security system operation method and device and computer equipment

Publications (1)

Publication Number Publication Date
CN116866394A true CN116866394A (en) 2023-10-10

Family

ID=88224354

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310758873.8A Pending CN116866394A (en) 2023-06-26 2023-06-26 Security system operation method and device and computer equipment

Country Status (1)

Country Link
CN (1) CN116866394A (en)

Similar Documents

Publication Publication Date Title
US20200160207A1 (en) Automated model update based on model deterioration
CN110262337B (en) Intelligent power monitoring system and method
CN112114533A (en) Internet of things data processing method and device, computer equipment and storage medium
CN113888514A (en) Method and device for detecting defects of ground wire, edge computing equipment and storage medium
CN113099242B (en) Power transmission line video monitoring data processing method and system
CN114584571A (en) Power grid station digital twin synchronous communication method based on spatial computing technology
CN111160701A (en) Engineering project risk monitoring method, system, computer equipment and storage medium
CN112449147B (en) Video cluster monitoring system of photovoltaic power station and image processing method thereof
CN110198347B (en) Block chain based early warning method and sub-control server
CN111860256A (en) Security detection method and device, computer equipment and storage medium
CN115168024A (en) Early warning method, device and equipment based on edge calculation
CN116319080B (en) Safe operation method and device for electric power nano relay
CN112528825A (en) Station passenger recruitment service method based on image recognition
CN116631168A (en) Geological safety monitoring method, device, computer equipment and storage medium
CN116866394A (en) Security system operation method and device and computer equipment
CN111414501A (en) Wood flammability risk prediction system based on block chain and CIM
CN114360064B (en) Office place personnel behavior lightweight target detection method based on deep learning
CN116052300A (en) Digital twinning-based power inspection system and method
CN113487041B (en) Transverse federal learning method, device and storage medium
CN111105582B (en) Forest fire prevention monitoring method and system, computer equipment and readable storage medium
CN113435802B (en) Power transmission network monitoring planning scheme construction method, device, equipment and storage medium
CN115527161B (en) Abnormal discharge monitoring method, device, computer equipment and storage medium
CN117390590B (en) CIM model-based data management method and system
CN116861290A (en) Unstructured data detection classification method, model training method and device
CN114005035A (en) Fire control thing networking systems based on artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination