CN116880262A - Security control method and system based on intelligent equipment - Google Patents
Security control method and system based on intelligent equipment Download PDFInfo
- Publication number
- CN116880262A CN116880262A CN202310780883.1A CN202310780883A CN116880262A CN 116880262 A CN116880262 A CN 116880262A CN 202310780883 A CN202310780883 A CN 202310780883A CN 116880262 A CN116880262 A CN 116880262A
- Authority
- CN
- China
- Prior art keywords
- data
- monitoring data
- intelligent
- intelligent equipment
- monitoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 75
- 238000012544 monitoring process Methods 0.000 claims abstract description 184
- 238000003860 storage Methods 0.000 claims abstract description 65
- 238000007726 management method Methods 0.000 claims description 65
- 238000004458 analytical method Methods 0.000 claims description 22
- 238000004590 computer program Methods 0.000 claims description 22
- 230000005540 biological transmission Effects 0.000 claims description 15
- 238000012545 processing Methods 0.000 claims description 14
- 230000003139 buffering effect Effects 0.000 claims description 13
- 238000004422 calculation algorithm Methods 0.000 claims description 11
- 238000001914 filtration Methods 0.000 claims description 6
- 230000006870 function Effects 0.000 abstract description 32
- 238000004519 manufacturing process Methods 0.000 abstract description 27
- 230000010354 integration Effects 0.000 abstract description 14
- 230000004044 response Effects 0.000 abstract description 4
- 239000007789 gas Substances 0.000 description 38
- 238000012549 training Methods 0.000 description 28
- 230000008569 process Effects 0.000 description 27
- 238000007689 inspection Methods 0.000 description 26
- 230000006399 behavior Effects 0.000 description 21
- 230000002159 abnormal effect Effects 0.000 description 19
- 238000010586 diagram Methods 0.000 description 18
- 230000000007 visual effect Effects 0.000 description 16
- 238000005516 engineering process Methods 0.000 description 12
- 238000011835 investigation Methods 0.000 description 9
- 239000000126 substance Substances 0.000 description 9
- 238000004364 calculation method Methods 0.000 description 5
- 238000001514 detection method Methods 0.000 description 5
- 238000002955 isolation Methods 0.000 description 5
- 238000010276 construction Methods 0.000 description 4
- 238000005259 measurement Methods 0.000 description 4
- 238000009529 body temperature measurement Methods 0.000 description 3
- 239000003795 chemical substances by application Substances 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 238000009826 distribution Methods 0.000 description 3
- 238000004880 explosion Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000012502 risk assessment Methods 0.000 description 3
- 238000004088 simulation Methods 0.000 description 3
- 238000012384 transportation and delivery Methods 0.000 description 3
- 206010000117 Abnormal behaviour Diseases 0.000 description 2
- 238000013475 authorization Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000003745 diagnosis Methods 0.000 description 2
- 238000009792 diffusion process Methods 0.000 description 2
- 238000011156 evaluation Methods 0.000 description 2
- 230000004927 fusion Effects 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000000872 buffer Substances 0.000 description 1
- 238000000701 chemical imaging Methods 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000007797 corrosion Effects 0.000 description 1
- 238000005260 corrosion Methods 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000007654 immersion Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000013439 planning Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 239000000047 product Substances 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 239000000779 smoke Substances 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012800 visualization Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
- G05B19/042—Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
- G05B19/0428—Safety, monitoring
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/20—Pc systems
- G05B2219/24—Pc safety
- G05B2219/24024—Safety, surveillance
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Alarm Systems (AREA)
Abstract
The invention provides a safety control method and system based on intelligent equipment, and belongs to the technical field of safety management. The method comprises the following steps: collecting monitoring data uploaded by a front-end processor collected at a factory side based on a preset intelligent equipment data uploading protocol; classifying the monitoring data according to a preset data classification standard to obtain a classification result, and transmitting the monitoring data to a corresponding storage library for classification storage based on the classification result; matching corresponding display rules according to the data characteristics of the monitoring data; and sending the monitoring data stored in each storage library to at least one display terminal for display according to the corresponding display rules. The intelligent equipment management system realizes integration of various intelligent equipment so as to realize the purpose of unified integrated management of the intelligent equipment. The intelligent equipment intelligent integration, intelligent management and intelligent monitoring are realized, and a safety management and control platform with centralized deployment, hierarchical management and control, multistage linkage and comprehensive functions is constructed. The safety production and emergency response capability are ensured in all directions.
Description
Technical Field
The invention relates to the technical field of safety management, in particular to a safety control method based on intelligent equipment and a safety control system based on the intelligent equipment.
Background
At present, most production enterprises have the defects of small scale, low concentration degree, low equipment level, high energy consumption, serious pollution, low automatic control level, weak internal safety and high accident risk in the production process.
Aiming at the defects, the related departments propose that the fusion application of the industrial Internet in the safety production of dangerous chemicals can energize the field of dangerous chemicals in the aspects of perception, monitoring, early warning, disposal, evaluation and the like of the safety production. And provides a new generation of information technology represented by the industrial Internet and deep fusion of manufacturing industry, provides a brand new view for safe production of dangerous chemical enterprises, and provides an efficient means for enhancing safe production supervision. In the prior art, the supervision of safety production is generally realized by adopting intelligent equipment, however, as the intelligent equipment has the conditions of multiple types, large quantity and non-uniform quality and standard, the intelligent equipment of different areas, different types and different manufacturer models cannot be effectively integrated in one system, and unified integrated management of the intelligent equipment cannot be realized, so that the realization of unified intelligent integration, intelligent management and intelligent monitoring of the intelligent equipment to provide intelligent service is a problem which needs to be solved at present.
Disclosure of Invention
The embodiment of the invention aims to provide a safety control method and system based on intelligent equipment, which at least solve the problems that intelligent equipment in different areas, different types and different manufacturer models cannot be integrated in one system effectively and unified integrated management of the intelligent equipment cannot be realized due to the fact that the intelligent equipment has various types, large quantity and non-uniform quality and standard.
To achieve the above object, a first aspect of the present invention provides a security management and control method based on intelligent equipment, including:
collecting monitoring data uploaded by a factory side collecting front-end processor based on a preset intelligent equipment data uploading protocol, wherein the monitoring data are collected by each intelligent equipment of the filtered equipment layer completed by the factory side collecting front-end processor;
classifying the monitoring data according to a preset data classification standard to obtain a classification result, and transmitting the monitoring data to a corresponding storage library for classification storage based on the classification result;
matching corresponding display rules according to the data characteristics of the monitoring data;
and sending the monitoring data stored in each storage library to at least one display terminal for display according to the corresponding display rules.
Optionally, the rule that the factory side acquisition front-end processor filters the monitoring data acquired by each intelligent device of the equipment layer includes:
determining all first data types meeting an uploading protocol according to a preset intelligent equipment data uploading protocol;
receiving monitoring data acquired by each intelligent device through a factory side acquisition front-end processor, and determining a second data type of each monitoring data;
comparing the second data type with the first data type to obtain a comparison result;
based on the comparison result, monitoring data which does not meet the uploading protocol is determined and filtered.
Optionally, the storage library includes a network video monitoring platform, and the method further includes:
and configuring a unidirectional gatekeeper for the network video monitoring platform.
Optionally, after the monitoring data uploaded by the factory side acquisition front-end processor is acquired based on the preset intelligent equipment data uploading protocol, the method further includes:
carrying out data buffering on the monitoring data by using Kafaka, and transmitting the monitoring data after data buffering to a Storm;
and carrying out real-time processing analysis on the monitoring data after data buffering is completed through Storm, determining alarm data, and storing the alarm data into a Redis real-time database.
Optionally, the repository includes a document server;
Based on the classification result, the monitoring data is sent to a corresponding storage library for classification storage, which comprises the following steps:
and uploading alarm data in the Redis real-time database to a document server.
Optionally, the sending the monitoring data stored in each storage library to at least one display terminal for display according to the corresponding display rule includes:
when the monitoring data are alarm data, directly calling the alarm data in the document server according to the corresponding display rule;
and sending the alarm data to at least one display terminal for display.
Optionally, the real-time processing analysis is performed on the monitoring data after the data buffering is completed through the Storm, and the determining of the alarm data includes:
matching corresponding alarm recognition algorithm models according to the data types of the monitoring data;
and identifying the corresponding monitoring data by utilizing an alarm identification algorithm model, and determining alarm data.
Optionally, the sending the monitoring data stored in each storage library to at least one display terminal for display according to the corresponding display rule includes:
when the monitoring data are not alarm data, based on the captured consulting request instruction, extracting the corresponding category monitoring data in the storage library and pushing the monitoring data to the corresponding display terminal, wherein the category of the monitoring data at least comprises one or more of video data, picture data and intelligent equipment working state data.
Optionally, the plant side acquisition front-end processor transmits the monitoring data to the service side through a VPN private network.
A second aspect of the present invention provides a security management and control system based on intelligent equipment, including:
the monitoring data transmission module is used for acquiring monitoring data uploaded by the factory side acquisition front-end processor based on a preset intelligent equipment data uploading protocol, wherein the monitoring data are acquired by each intelligent equipment of the equipment layer after the factory side acquisition front-end processor finishes filtering;
the classification storage module is used for classifying the monitoring data according to a preset data classification standard to obtain a classification result, and sending the monitoring data to a corresponding storage library for classification storage based on the classification result;
the display rule matching module is used for matching corresponding display rules according to the data characteristics of the monitoring data;
and the display module is used for sending the monitoring data stored in each storage library to at least one display terminal for display according to the corresponding display rule.
In a third aspect the invention provides a machine-readable storage medium having stored thereon instructions which, when executed by a processor, cause the processor to be configured to perform the smart device-based security management method described above.
In a fourth aspect of the present invention, an electronic device is provided, the electronic device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the intelligent device-based security management method when executing the computer program.
Through the technical scheme, after the monitoring data collected by the front-end processor is collected at the factory side according to the preset intelligent equipment data uploading protocol, the monitoring data is transmitted, so that the safety of the monitoring data is effectively ensured. And classifying the monitoring data according to preset data classification standards, and then respectively and correspondingly placing the monitoring data of different categories in different storage libraries for classified storage, so that the purpose of acquiring the data acquired by the intelligent equipment in real time and integrating the data into the corresponding storage libraries is realized. According to the corresponding display rules, each monitoring data is sent to the display terminal for display so as to provide intelligent service for users, thereby realizing the purpose of effectively integrating intelligent equipment with different areas, different types and different manufacturer models in one system and realizing unified integrated management of the intelligent equipment.
The method and the system start from actual safety control business of a production enterprise, construct an intelligent equipment data uploading protocol and a data acquisition service, and are integrated with safety control depth of a service side, so that intelligent integration, intelligent management and intelligent monitoring of the intelligent equipment and the service side are realized, a centralized deployment, hierarchical control, multistage linkage and comprehensive-function safety control platform is constructed, intelligent detection is implemented from a basic environment, the safety production business is developed in a full-flow and intelligent manner, an active safety precaution mechanism is constructed, and the safety production and emergency response capability of the enterprise is comprehensively and three-dimensionally ensured.
Additional features and advantages of embodiments of the invention will be set forth in the detailed description which follows.
Drawings
The accompanying drawings are included to provide a further understanding of embodiments of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain, without limitation, the embodiments of the invention. In the drawings:
FIG. 1 is a flow chart of a security management and control method based on intelligent equipment according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an overall integration scheme provided by one embodiment of the present invention;
FIG. 3 is a block diagram of an overall framework provided by one embodiment of the present invention;
FIG. 4 is a functional block diagram of a security management and control platform based on intelligent equipment according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of an application of a security management method based on intelligent equipment according to an embodiment of the present invention;
FIG. 6 is a block diagram of a smart equipment-based security management and control system provided in accordance with one embodiment of the present invention;
fig. 7 is a schematic structural diagram of an electronic device according to a preferred embodiment of the present invention.
Description of the reference numerals
10-electronic device, 100-processor, 101-memory, 102-computer program.
Detailed Description
The following describes specific embodiments of the present invention in detail with reference to the drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the invention, are not intended to limit the invention.
Fig. 1 is a flowchart of a security management and control method based on intelligent equipment according to an embodiment of the present invention. As shown in fig. 1, an embodiment of the present invention provides a security management and control method based on intelligent equipment, including:
s110: collecting monitoring data uploaded by a factory side collecting front-end processor based on a preset intelligent equipment data uploading protocol, wherein the monitoring data are collected by each intelligent equipment of the filtered equipment layer completed by the factory side collecting front-end processor;
specifically, the whole integration scheme of the method is divided into a factory side and a service side, a factory side acquisition front-end processor is arranged on the factory side, the factory side acquisition front-end processor is connected with each intelligent device of the equipment layer and used for acquiring monitoring data acquired by each intelligent device, filtering the monitoring data according to a preset intelligent device data uploading protocol and then transmitting the monitoring data to the service side.
In the implementation process, the factory side acquisition front end processor encapsulates and sequences the monitoring data according to a specified protocol buffers protocol, and the monitoring data of the intelligent equipment is acquired by utilizing the data acquisition cluster Netty.
In some implementations of this embodiment, the plant-side acquisition front-end processor transmits the monitoring data to the service side through a VPN private network. Specifically, the data transmission is performed according to the preset intelligent equipment data uploading protocol in a mode of combining the data with the VPN private network, so that the safety of the data can be effectively ensured.
In some implementations of this embodiment, the rules for filtering the monitoring data collected by the intelligent devices of the equipment layer by the factory-side collection front-end processor include: determining all first data types meeting an uploading protocol according to a preset intelligent equipment data uploading protocol; receiving monitoring data acquired by each intelligent device through a factory side acquisition front-end processor, and determining a second data type of each monitoring data; comparing the second data type with the first data type to obtain a comparison result; based on the comparison result, monitoring data which does not meet the uploading protocol is determined and filtered.
Specifically, according to a preset intelligent equipment data uploading protocol, a first data type capable of uploading data is determined, and then the first data type is compared with a second data type of monitoring data acquired by each intelligent equipment, so that monitoring data of which the second data type does not meet the preset intelligent equipment data uploading protocol is obtained, and monitoring data which does not meet the uploading protocol is filtered. The relationship between the preset intelligent equipment data uploading protocol and the data type is shown in table 1:
Table 1 presets the relationship between the data uploading protocol and the data type of the intelligent equipment
As can be seen from table 1, the method provides Http, RESTful, SFTP and other diverse data access interfaces, and satisfies the requirement of multiple types of data access.
S120: classifying the monitoring data according to a preset data classification standard to obtain a classification result, and transmitting the monitoring data to a corresponding storage library for classification storage based on the classification result;
the storage library comprises a network video monitoring platform, a data lake and a document server.
FIG. 2 is a schematic diagram of an overall integration scheme provided by one embodiment of the present invention. As shown in fig. 2, the service side divides data into video data, structured data and unstructured data, and the data corresponding to the numbers D1, D2, D3, D4, D5, D6, D7, D8 and D9 in table 1 are respectively and correspondingly placed in a network video monitoring platform, a data lake and a document server, so that the purpose of acquiring the data acquired by intelligent equipment in real time and integrating the data into a corresponding storage library is achieved. According to the method, through deep investigation and analysis of intelligent equipment of different types and models, a unified preset intelligent equipment data uploading protocol is established in combination with actual service requirements of safety control, barriers between intelligent equipment integration are opened, intelligent equipment in multiple areas is integrated and integrated by means of micro-service and edge computing technology, and intelligent, centralized and integrated control is realized by matching with complementary advantages among multiple types of intelligent equipment.
In some implementations of this embodiment, the repository includes a network video monitoring platform, and the method further includes: and configuring a unidirectional gatekeeper for the network video monitoring platform.
The unidirectional gatekeeper can ensure that data in the high-security-level network cannot flow to the low-security-level network, but data in the low-security-level network can flow to the high-security-level network (data confidentiality requirement), and absolute unidirectional flow of data is ensured from a physical link layer and a transmission layer.
Specifically, in order to ensure that all audio and video type information access network video monitoring platforms can meet the intensive construction of enterprises using the method, the network video monitoring platforms are established and are provided with unidirectional network gates, so that the network access of equipment is known, the network access is reliable and the boundary is controllable, and the problem that audio and video type media streams back and forth in the enterprise network waste enterprise network resources is avoided.
In some implementations of the present embodiment, after the collecting the monitoring data uploaded by the factory-side collecting front-end processor based on the preset intelligent equipment data uploading protocol, the method further includes:
carrying out data buffering on the monitoring data by using Kafaka, and transmitting the monitoring data after data buffering to a Storm;
and carrying out real-time processing analysis on the monitoring data after data buffering is completed through Storm, determining alarm data, and storing the alarm data into a Redis real-time database.
Specifically, the service side is configured with a data transmission server, the data transmission server receives the monitoring data transmitted through the VPN private network, data buffering is performed by using Kafaka, real-time processing analysis of the monitoring data is performed through Storm, alarm data is determined, and the alarm data is stored in a Redis real-time database.
In some implementations of this embodiment, the real-time processing analysis of the monitoring data after the data buffering is completed by the Storm, to determine the alarm data includes: matching corresponding alarm recognition algorithm models according to the data types of the monitoring data; and identifying the corresponding monitoring data by utilizing an alarm identification algorithm model, and determining alarm data.
For example, if the data type of the monitoring data is video data, the matched alarm recognition algorithm model is a video behavior recognition model (the video behavior includes the "behavior" of "person itself", "person and person", "person and thing" and the course of operation of "object itself"). And analyzing the video data through the video behavior recognition model, and judging whether the video has abnormal behaviors or not, thereby determining whether the video data is abnormal data, namely alarm data.
For another example, if the data type of the monitoring data is picture data, the matched alarm recognition algorithm model is a picture recognition model. And if the monitoring data show that the constructor does not wear the safety helmet, the monitoring data are recognized as alarm data through the picture recognition model.
In some implementations of this embodiment, the repository includes a document server; based on the classification result, the monitoring data is sent to a corresponding storage library for classification storage, which comprises the following steps: and uploading alarm data in the Redis real-time database to a document server. Specifically, as shown in fig. 2, the data stored in the document server is consistent with the data types corresponding to the numbers D3 and D4, that is, the data stored in the document server is alarm data (the alarm data includes video and pictures in an alarm or abnormal situation).
S130: matching corresponding display rules according to the data characteristics of the monitoring data;
the data characteristics of the monitoring data may represent the data type (pictures, video, equipment audio intercom, equipment working state, etc.) and whether the data is alarm data.
S140: and sending the monitoring data stored in each storage library to at least one display terminal for display according to the corresponding display rules.
The display terminal comprises a PC end, a mobile end and a large screen.
Referring to fig. 3, fig. 3 is a block diagram of an overall frame according to an embodiment of the present invention. The whole framework related to the method is mainly divided into an equipment layer, an edge layer and a cloud platform layer. The equipment layer is deployed at the factory side and is a main body for state sensing and execution control in the intelligent equipment architecture, and basic data is monitored, collected and sensed for the safe operation environment and the business flow of the site. The edge side is a computation center of the factory side, raw data collected by the equipment layer are preprocessed, and the safety and convenience of data transmission are guaranteed. The cloud platform layer displays the processed data to the PC end, the mobile end and the large screen in real time through the WEB end, so that the user can intelligently develop related tasks in the safety field. Therefore, three-dimensional and cross intelligent operation safety management is created by means of monitoring data acquired by various intelligent equipment, the whole operation process is dynamically monitored, and the safety of operators is guaranteed to be monitored, the process is trackable and the history is traceable.
In some implementations of this embodiment, the sending, according to the corresponding display rule, the monitoring data stored in each repository to at least one display terminal for display includes: when the monitoring data are alarm data, directly calling the alarm data in the document server according to the corresponding display rule; and sending the alarm data to at least one display terminal for display. Therefore, the purpose of displaying the alarm data in real time is achieved, and a user can conveniently develop related tasks according to the alarm data.
In some implementations of this embodiment, the sending, according to the corresponding display rule, the monitoring data stored in each repository to at least one display terminal for display includes: when the monitoring data are not alarm data, based on the captured consulting request instruction, extracting the corresponding category monitoring data in the storage library and pushing the monitoring data to the corresponding display terminal, wherein the category of the monitoring data at least comprises one or more of video data, picture data and intelligent equipment working state data.
In the implementation process, the method filters the monitoring data acquired by the front-end processor at the factory side according to the preset intelligent equipment data uploading protocol, and then transmits the monitoring data so as to effectively ensure the safety of the monitoring data. And classifying the monitoring data according to preset data classification standards, and then respectively and correspondingly placing the monitoring data of different categories in different storage libraries for classified storage, so that the purpose of acquiring the data acquired by the intelligent equipment in real time and integrating the data into the corresponding storage libraries is realized. And finally, according to the corresponding display rules, sending each monitoring data to a display terminal for display so as to provide intelligent service for the user. Therefore, the intelligent equipment with different areas, different types and different manufacturer models can be effectively integrated in one system, and the purpose of unified integrated management of the intelligent equipment is achieved. The method starts from the actual safety control business of the production enterprises, constructs an intelligent equipment data uploading protocol and a data acquisition service, and is integrated with the safety control depth of the service side, so that intelligent integration, intelligent management and intelligent monitoring of the intelligent equipment and the service side are realized, and a safety control platform with centralized deployment, hierarchical control, multistage linkage and comprehensive functions is constructed. From the intelligent detection of the basic environment, to the full-process and intelligent expansion of the safety production business, the construction of an active safety precaution mechanism and the omnibearing three-dimensional guarantee of the safety production and emergency response capability of enterprises.
The kinds of intelligent equipment adopted by the method can be 14 kinds (the 14 kinds of intelligent equipment comprise an intelligent explosion-proof terminal, an intelligent weather analysis system, a direct operation ring control visual terminal, an energy isolation electronic lock, a video fire intelligent alarm, an intelligent point inspection instrument, video training equipment, AI video equipment (mobile and fixed), an infrared thermal imager, an intelligent safety inspection instrument, an intelligent gas visual detector, emergency intelligent acquisition, sensing, decision making equipment, a personnel positioning system and intelligent wearing equipment). By researching the actual safety management requirements, the intelligent construction conditions and the intelligent equipment allocation conditions of enterprises and combining market analysis, 14 kinds of intelligent equipment are adopted, so that the requirements of the current enterprise safety intelligent management and control can be covered and met. The application scenario analysis for the 14 intelligent devices is as follows: (1) intelligent explosion-proof terminal: the intelligent explosion-proof terminal is utilized to realize the working requirements of daily inspection, operation and the like. The hidden danger problems eliminated by the field safety inspection are input through the intelligent explosion-proof terminal, and the confirmation functions of links such as issuing, rectifying, modifying, closing loop pin items and the like of hidden danger are carried out through the system; photographing unsafe behaviors of personnel to obtain evidence, and recording and managing the unsafe behaviors in real time; by means of the integrated system, full-flow management of special jobs is performed. (2) intelligent weather analysis system: the intelligent weather analysis system is used for collecting, controlling and controlling the values of weather, temperature, humidity, air pressure, customs, wind direction, noise and the like in real time, and strictly limiting the approval of fire movement, hoisting and operation beyond the limit of the integrated system; and weather data support is provided for an intelligent safety control model, so that real-time risk assessment of a major hazard source is ensured to be accurate and reasonable. (3) direct operation ring control visual terminal: according to the special operation safety specification requirements of dangerous chemical enterprises, the whole-flow influence collection is carried out on the operation process through the direct operation ring control visual terminal, the problem of signal shielding of the operation site is solved, the effective transmission of video data is ensured, the standardization of the operation flow is realized, and the operation process is traceable. (4) energy-isolated electronic lock: in the management and control areas such as a limited space and a temporary distribution box, and the like, the electronic lock is matched with the energy isolation electronic lock, and the unlocking authorization code can be issued for unlocking only after the precondition of the operation approval permission is finished through the integrated system, so that the illegal situation of 'first operation and then approval' is avoided. (5) a video fire intelligent alarm: the equipment is deployed in key areas and key positions of enterprises, an initial fire disaster is timely found by utilizing a video recognition technology, alarm information is fed back to the system, risks are timely and effectively controlled in the initial stage, the accident occurrence range is reduced, and property loss is reduced. (6) intelligent point inspection instrument: the intelligent point inspection function is realized by matching with the intelligent anti-explosion terminal, an inspection route, an inspection standard and an inspection operation standard are formulated for inspection personnel, an inspection task is completed according to the established route and the standard through the intelligent anti-explosion terminal, and information such as inspection time, position, links, event records and the like is transmitted to a management background in real time, so that data sharing of internal and external operators is realized. (7) video training equipment: and (3) manufacturing and displaying training scenes by utilizing a VR panoramic shooting technology, so as to realize virtual reality operation training. According to the security education training function in the system, the full staff training on duty is realized according to different roles and levels, the boring theoretical training mode is improved, and the correct and compliant simulation operation of the environment is performed. (8) AI video equipment (mobile and stationary): the AI video equipment is light-weight edge equipment oriented to a wide-range edge application scene, and can be deployed in important monitoring places of enterprises. Based on video and image technology, the functions of people/logistics statistics, warning, identification, track positioning and the like are realized through an artificial intelligent algorithm, and technical supports such as remote visualization, data acquisition, people logistics management and the like are provided for an intelligent chemical business system; the method and the system assist enterprises to accurately identify unsafe behaviors of field operation and unsafe states of objects, and realize accurate analysis of abnormal behaviors by utilizing an embedded video analysis platform, so that advanced risk early warning is realized. Can be mutually beneficial supplement with AI functions of other intelligent chemical industry systems. And (9) a thermal infrared imager: and the pipeline thinning points and corrosion points can be identified and risk early warning can be carried out in the pipeline concentration area or the production main pipeline layout. And through the integrated centralized management and control platform, the alarm is monitored in real time. (10) intelligent safety investigation appearance: the operation or inspection personnel cooperate with the equipment to operate, so that leakage monitoring is carried out on specific equipment and pipelines, the inspection result is visual and accurate, targeted maintenance diagnosis information is timely provided, and risk hidden danger of subjectiveness or incapability of passing subjective recognition is reduced. (11) intelligent gas visual detector: the infrared hyperspectral imaging technology and the detection algorithm are utilized to monitor the gas leakage condition in a full-automatic, all-weather and visual mode in a large range. Can quickly find tiny and sporadic leakage in early stage, locate leakage sources, measure the concentration of leakage gas and display the leakage gas plume track in real time. (12) emergency intelligent acquisition, sensing and decision making equipment: the emergency intelligent acquisition, sensing and decision-making equipment has the functions of simulating, predicting and monitoring, positioning leakage sources, advanced back calculation, calculating the consumption of fire extinguishing agents, assisting decision making, consultation drawing, inquiring a common dangerous chemical information system, inquiring fire-fighting facility management, inquiring fire-fighting emergency material equipment resource information management, and the like, and when an emergency happens, the system acquires site meteorological information, video information and harmful gas concentration monitoring information, performs data real-time wireless transmission and receiving, combines the dangerous chemical information built-in software, grasps the gas diffusion influence range in real time through the calculation result of accident simulation software, and realizes the functions of inquiring emergency resources, allocating, calculating the consumption of fire extinguishing agents, simulating the accident state, and the like based on a GIS geographic information system, thereby having the function of providing dangerous chemical emergency rescue site assisting decision-making information for a commander. (13) personnel positioning system: based on the intelligent terminal, intelligent wearing equipment, positioning labels and other equipment, enterprises can recognize and record personnel and mobile equipment according to actual conditions, identify and monitor personnel distribution in factories in real time, define active areas, monitor abnormal states of personnel, record and analyze moving tracks of the personnel in real time, locate abnormal conditions such as overspeed movement, rapid falling or long-time static, realize personnel quantity statistics in any area and GIS visual display in cooperation with a system, and can link peripheral video monitoring cameras to view the personnel states in detail; the system has the function of regional control, and supports real-time alarm for violations such as overguard, aggregation, guard-crossing and the like; the system has the function of analyzing the activity track of the personnel, supports the inquiry of the history track of the personnel, and can also realize the alarm function of abnormal working conditions such as changing the route, staying for a long time and the like of the patrol personnel. The remote alarm can be realized by actively alarming or actively triggering the positioning label alarming button by personnel. (14) intelligent wearing equipment: the intelligent wearing equipment comprises equipment such as a bracelet, a watch and an intelligent safety helmet, and is provided with a wireless communication module to realize remote data transmission capabilities such as communication, video, voice intercom, personnel positioning, human body physical sign monitoring and the like. The operation safety and personnel safety are ensured.
It should be noted that, the method is based on Java Web technology series to construct integrated service framework structure integration, provides Http, RESTful, SFTP and other diverse data access interfaces, satisfies multiple types of data access, and provides real-time reliable message service for connecting remote devices by adopting a 'lightweight' communication protocol Mqtt based on a publish/subscribe mode. The intelligent equipment data are collected, analyzed, screened and judged in real time by utilizing the technologies of edge calculation, spring Cloud rapid integration framework, data lake, token authentication, RESTful stateless interaction, HTTP hypertext transfer protocol, JSON lightweight data exchange format and the like. The method and the device realize automatic monitoring, intelligent analysis and timely early warning of the working environment and abnormal state of enterprises, and automatic identification of abnormal conditions such as site fire, smoke, leakage and the like, and realize intelligent monitoring.
In this embodiment, the integration parameters of the 14 kinds of intelligent devices are designed as follows:
1. intelligent explosion-proof terminal and intelligent point inspection instrument: the intelligent point inspection instrument is built-in with an intelligent explosion-proof terminal, parameter integration is not involved, and system software is installed for use. 2. An intelligent weather analysis system: (1) device base information: longitude, latitude, location description, device number. (2) weather data related information: time, temperature, humidity, barometric pressure, wind speed, wind direction, noise, PM2.5 are detected. 3. Direct operation ring control visual terminal: (1) device base information: longitude, latitude, location description, device number. (2) device status information: acquisition time. (3) device alarm information: acquisition time, equipment state, gas type, gas name, gas concentration, upper alarm limit, lower alarm limit, alarm time, alarm description and abnormal range. (4) harmful gas monitoring information: acquisition time, gas type, gas name, gas concentration, upper alarm limit, and lower alarm limit. (5) harmful gas monitoring alarm information: acquisition time, equipment state, gas type, gas name, gas concentration, upper alarm limit, lower alarm limit, alarm time, alarm description and abnormal range. (6) audio-video and alarm real-time audio-video information: the audio and video type information is integrated from the audio and video platform in a unified way. 4. Energy isolation electronic lock: (1) device base information: longitude, latitude, location description, device number. (2) energy-isolated electronic lock status information: acquisition time, equipment state and inspection record. (3) energy isolation electronic lock alarm information: acquisition time, equipment state, alarm time, alarm type and alarm instruction. (4) information delivery data: equipment number, issuing time, state and unlocking instruction. 5. Video fire intelligent alarm: (1) device base information: longitude, latitude, location description, device number. (2) device monitoring information: acquisition time. (3) device alarm information: acquisition time and alarm type. (4) audio-video and alarm real-time audio-video information: the audio and video type information is integrated from the audio and video platform in a unified way. 6. Video training equipment: (1) device base information: device number. (2) training record information: acquisition time, training name, training category, training mode, employee number, training personnel name, training start time, training end time, learning duration, whether training is qualified or not, examination state, examination score and illegal operation alarm record. (3) issuing data information: equipment number, time of delivery, training name, training category, training mode, employee number, training person name. (4) training audio and video information: the audio and video type information is integrated from the audio and video platform in a unified way. Ai video equipment (mobile and stationary): (1) device base information: location description, device number. (2) unsafe behavior data information: acquisition time, unsafe behavior description, unsafe behavior category, occurrence time, occurrence place, recorded picture and recorded video. (3) unsafe behavior alert information: acquisition time, equipment state, alarm time, alarm type, alarm description, unsafe behavior category, occurrence time and occurrence place. (4) unsafe behavior audio-video information: the audio and video type information is integrated from the audio and video platform in a unified way. 8. Thermal infrared imager: (1) device base information: longitude, latitude, location description, device number. (2) device status information: acquisition time, equipment status, maximum temperature, minimum temperature. (3) device alarm information: collecting time, equipment state, highest temperature, lowest temperature, alarm time, alarm type and equipment fault information. (4) device audio/video information: the audio and video type information is integrated from the audio and video platform in a unified way. 9. Intelligent safety investigation instrument: (1) device base information: longitude, latitude, location description, device number. (2) device status information: acquisition time, abnormal alarm and system diagnosis. (3) device alarm information: acquisition time, abnormal alarms, system diagnostics, and alarm type. (4) equipment audio-video and alarm real-time audio-video information: the audio and video type information is integrated from the audio and video platform in a unified way. 10. Intelligent gas visual detector: (1) device base information: longitude, latitude, location description, device number. (2) device status information: acquisition time, equipment status, gas type, gas concentration. (3) device alarm information: acquisition time, equipment status, gas type, gas concentration, leakage means, gas leakage location, and gas leakage amount. (4) equipment audio-video and alarm real-time audio-video information: the audio and video type information is integrated from the audio and video platform in a unified way. 11. Emergent intelligent acquisition, sensing and decision-making equipment: (1) device base information: longitude, latitude, location description, device number. (2) harmful gas monitoring equipment status information: acquisition time, gas name, gas concentration, upper alarm limit and lower alarm limit. (3) infrared detection equipment state information: the method comprises the steps of collecting time, an alarm picture path, an alarm video path, hidden danger types, temperature measurement, a temperature measurement alarm upper limit, a temperature measurement alarm lower limit, vibration measurement alarm upper limit, vibration measurement alarm lower limit, speed measurement alarm upper limit and speed measurement alarm lower limit. (4) equipment audio-video and alarm real-time audio-video information: the audio and video type information is integrated from the audio and video platform in a unified way. 12. Personnel positioning system: (1) device base information: employee number, identification card identification number, team/department name, post name, defined job duration, identification card number, gender, head portrait file name full name, contact phone, home address. (2) area base information: area number, area name, area approval, area description, area type. (3) electronic fence base data: electronic fence number, electronic fence name, electronic fence approval number, electronic fence description, and electronic fence type. (4) personnel locate current trajectory data: employee number, identification card identification number, location type, planar x-axis coordinates, planar y-axis coordinates, elevation coordinates, data time. (5) personnel positioning history track data: employee number, identification card identification number, location type, planar x-axis coordinates, planar y-axis coordinates, elevation coordinates, data time. (6) regional overtime alarm data: area number, area name, area approval number, area type, alarm start time, alarm end time, employee number, identification card identification number, and location type. And (7) electronic fence overtime alarm data: electronic fence number, electronic fence name, electronic fence authorized number, electronic fence type, alarm starting time, alarm ending time, employee number, identification card identification number and positioning type. (8) SOS alarm data: employee number, identification card identification number, location type, planar x-axis coordinates, planar y-axis coordinates, elevation coordinates, data time, SOS signal type, SOS signal description. (9) device operating status data: device number, device name, device type, planar x-axis coordinates, planar y-axis coordinates, elevation coordinates, data time, anomaly type, anomaly description. 13. Intelligent wearing equipment: (1) device base information: longitude, latitude, location description, device number. (2) device status information: acquisition time, device status, talk time. (3) device alarm information: acquisition time, equipment state, talk time, alarm type, alarm description and abnormal range. (4) information delivery data: acquisition time, equipment status, dialing number, voice call, talk time. (5) equipment audio-video and alarm real-time audio-video information: the audio and video type information is integrated from the audio and video platform in a unified way.
Referring to fig. 4, fig. 4 is a functional block diagram of a security management and control platform based on intelligent equipment according to an embodiment of the present invention. Function one, the mobile terminal: the mobile terminal comprises an intelligent explosion-proof terminal and an intelligent point inspection instrument. Through a unified platform of the mobile terminal application and unified user login and unified data management, the mobile application for safety management is provided, and the whole process intelligent management of the operation process is realized by matching with an intelligent point inspection instrument. Timely information is provided for the leading layer, the supervision layer and the operation layer. Function two, major hazard source management: the intelligent weather analysis equipment is arranged in a key place in a factory, monitors weather information such as noise, temperature, humidity, air pressure, wind speed, wind direction, pollution source gas, PM2.5\PM10 particulate matters and the like, and uploads the weather information to the integrated system for display. The method comprises the steps of providing key monitoring data, establishing safety information data, surrounding geography and safety images of meteorological environment conditions, providing meteorological data support for a heavy hazard safety risk assessment and early warning model, ensuring the accuracy of calculating real-time risk values of the heavy hazard by the model, and continuously protecting and navigating the heavy hazard of an enterprise. Function three, job safety management: in order to ensure the management requirements of links such as establishment, implementation and maintenance of a production unit, risk identification and control, process monitoring and the like, intelligent whole-flow management is adopted, operation contents are issued and approved through an intelligent anti-explosion terminal, an operator applies for energy electronic lock permission in an area through the operation contents, in the operation process, a direct operation ring control visual terminal carries out whole-process recording on the operation process and uploads the operation process to a system for safety supervision, a personnel positioning system positions the actual operation geographic position of the operator in real time, an intelligent gas visual detector and intelligent wearing equipment monitor the operation field links in real time, the system automatically sends an alarm aiming at environment change or abnormal conditions, the operation terminal effectively prevents accident occurrence, and the safety of the operator is ensured. Function IV, production facility and process safety: the intelligent fire alarm, the infrared thermal imager, the intelligent gas visual detector and the intelligent safety investigation instrument are used for monitoring the safe operation conditions of processes and equipment facilities, realizing intelligent alarm, implementing the operation state and the on-site condition of monitoring equipment by integrating data with a system, deploying equipment in important places for real-time monitoring, finding out gas leakage, uploading alarm information in time, and pushing hidden danger information to an early warning module in double prevention for task issuing. Function five, safety education training: an application system for carrying out production process operation training on different working posts, operation environments and operation standards is built by utilizing a VR technology, and teaching and training are carried out in a VR virtual scene built by adopting three-dimensional modeling, including example demonstration and detailed learning. And modules such as autonomous learning, online assessment and the like. The staff combines the high-precision 3D scene to practice, and the sense of reality and the sense of immersion are enhanced. Not only eases teaching pressure, but also improves teaching quality. The equipment can simulate various training environments in a panoramic and immersive mode, including daily production environments, abnormal production environments, dangerous emergency environments and the like, provides services such as basic learning, simulated training, examination and the like for staff, helps staff in each section of each post to complete improvement of self post capability skills, cooperates with full-flow management of safety education and training in a system, and improves safety capability of staff in the whole industry comprehensively after strict supervision and training. Function six, safety behavior management: based on advanced technology of intelligent video identification of AI video equipment, authentication and supervision on the aspects of the number of operators, personnel identity qualification, behavior specification and the like are realized; the method comprises the steps of establishing a personnel abnormal intelligent analysis model, identifying, monitoring and controlling unsafe behaviors of various personnel, comprehensively and intelligently analyzing illegal operations, misoperation, unauthorized operations and the like, pushing safety management personnel based on feedback results of an on-site video analysis platform artificial intelligent analysis terminal and combining information such as observation places, observation time, on-site photographing, video recording certificates and the like, inputting unsafe behaviors into an unsafe behavior file of personnel after the safety management personnel confirms the unsafe behaviors, associating artificial intelligent observation records as storage certificates, and effectively controlling the unsafe behaviors. Function seven, hidden danger investigation: in the hidden danger investigation process of enterprises, patrol personnel carry out hidden danger investigation on all aspects of enterprises through intelligent explosion-proof terminals, matching with infrared thermal imagers and intelligent wearing equipment, carrying out hidden danger evaluation grading, treatment planning, treatment measures or schemes, checking and closing, filing after treatment and other processes through intelligent equipment, carrying out hidden danger investigation treatment work by utilizing the infrared thermal imagers and the intelligent wearing equipment, solving the problem that hidden danger investigation treatment is not in place in the area, and realizing standardized, convenient and efficient management. Function eight, security check: after the safety inspection task is issued, an inspector confirms the safety inspection task through the intelligent explosion-proof terminal, the inspection is performed according to the inspection task specified by the task through the intelligent point inspection instrument, the intelligent safety inspection instrument and intelligent wearing equipment are arranged in the inspection process, and the problems are accurately identified and recorded in the whole process. The problem to be checked is related to the hidden danger treatment module, so that the closed-loop management of the correction and acceptance of the problem to be checked is realized. Function nine, emergency management: when an emergency occurs, the emergency intelligent acquisition, sensing and decision-making equipment acquires on-site meteorological information, video information and harmful gas monitoring information, performs real-time wireless transmission and reception, provides an accident simulation calculation result for a risk assessment model in the system, grasps the gas diffusion influence range in real time, and realizes the functions of emergency resource inquiry, allocation, fire extinguishing agent consumption calculation, accident state simulation and the like by taking a GIS geographic information system as a basis, thereby having the function of providing emergency rescue on-site auxiliary decision-making information for a director. Based on the cloud computing platform, the 14 kinds of intelligent equipment are integrated and controlled by means of big data and an artificial intelligent algorithm by combining with the intelligent equipment at the factory side of an enterprise, the abnormal dangerous situation is intelligently analyzed, automatically identified, intelligently associated, one-place alarming and multi-party linkage are carried out, factors such as personnel positions, dangerous source videos, surrounding environments, gases and the like are comprehensively covered, comprehensive monitoring and accurate alarming of safety risks are achieved, and all-weather driving protection and navigation are provided for safety production and operation of the enterprise.
Fig. 5 is a schematic diagram of an action management application of a security management method based on intelligent equipment according to an embodiment of the present invention. As shown in fig. 5, taking an example of operation management application, a safety management and control platform based on intelligent equipment is divided into a monitoring end and an operation end, an operator is equipped with the intelligent equipment to perform operation, the monitoring end intelligently monitors on-site operation conditions through a cloud platform, and when abnormal conditions occur, an alarm is given. The specific job management implementation process is as follows: (1) After issuing the work task of the special work ticket, an approver carries out the examination and confirmation work of the work ticket through the PC end and the mobile end, and after the approval is passed, the worker obtains the work task through the intelligent explosion-proof terminal and synchronizes the work task to the PC end and the large screen end of the monitoring end to carry out full-flow supervision. (2) Before operation starts, operators are equipped with intelligent equipment such as an intelligent explosion-proof terminal, intelligent wearing equipment, a handheld gas visual detector and the like according to operation needs and management requirements, apply for dynamic electronic authorization codes to the energy isolation electronic lock which belongs to the management and control area to be sent to the operator through the intelligent explosion-proof terminal, and enter the operation area after approval. (3) After the operator enters the operation, intelligent equipment in the area enters a monitoring and early warning state. The intelligent gas visual detector detects and monitors the gas in the area; the personnel positioning system calculates the position of each personnel in the factory in real time, uploads coordinate data to the system, performs linkage display by matching with the three-dimensional model, sets key points and electronic fence rules, and dynamically monitors the working environment of the personnel; the direct operation ring control visual terminal performs video recording on the whole flow of special operation, performs AI analysis on the operation specification and alarms unsafe behavior; the intelligent wearing equipment is used for assisting in improving the standardization of operation and the operation safety of personnel, and monitoring the health state of the personnel in real time, if the personnel are in abnormal states, the alarm is immediately given. (4) The data of the intelligent equipment are synchronized to a monitoring end through the cloud platform, and monitoring personnel monitor the operation through a PC end and a large screen end. (5) The monitoring alarm is used for monitoring the abnormal environment condition and the personnel operation condition in the operation process in real time by polling the input items uploaded by the intelligent equipment in the cloud platform, and the system can alarm when the early warning index exceeds the threshold value. (6) When dangerous alarms are monitored, the system adds alarm information into an alarm queue and pops up the alarm information immediately. (7) The guardian and the monitoring center personnel preprocess the alarm information, the system automatically highlights the alarm source in the three-dimensional model, automatically associates the monitoring camera near the equipment source, and informs the responsible person to immediately take effective control measure through the intelligent explosion-proof terminal. If the operation cannot be processed, the operation is immediately synchronized to the operator to stop the operation, so that the danger is avoided. (8) After the operation is completed, the data such as video of the whole flow of the operation is stored, the reliability and the safety of the data are improved, and the traceability of the operation are ensured.
FIG. 6 is a block diagram of a security management and control system based on intelligent equipment according to one embodiment of the present invention. As shown in fig. 6, an embodiment of the present invention provides a security management and control system based on intelligent equipment, including:
the monitoring data transmission module is used for acquiring monitoring data uploaded by the factory side acquisition front-end processor based on a preset intelligent equipment data uploading protocol, wherein the monitoring data are acquired by each intelligent equipment of the equipment layer after the factory side acquisition front-end processor finishes filtering;
the classification storage module is used for classifying the monitoring data according to a preset data classification standard to obtain a classification result, and sending the monitoring data to a corresponding storage library for classification storage based on the classification result;
the display rule matching module is used for matching corresponding display rules according to the data characteristics of the monitoring data;
and the display module is used for sending the monitoring data stored in each storage library to at least one display terminal for display according to the corresponding display rule.
In the implementation process, the system filters the monitoring data collected by the front-end processor at the factory side according to the preset intelligent equipment data uploading protocol, and then transmits the monitoring data so as to effectively ensure the safety of the monitoring data. And classifying the monitoring data according to preset data classification standards, and then respectively and correspondingly placing the monitoring data of different categories in different storage libraries for classified storage, so that the purpose of acquiring the data acquired by the intelligent equipment in real time and integrating the data into the corresponding storage libraries is realized. And finally, according to the corresponding display rules, sending each monitoring data to a display terminal for display so as to provide intelligent service for the user. Therefore, the intelligent equipment with different areas, different types and different manufacturer models can be effectively integrated in one system, and the purpose of unified integrated management of the intelligent equipment is achieved. The system starts from the actual safety control business of the production enterprises, constructs an intelligent equipment data uploading protocol and a data acquisition service, is deeply fused with the safety control of the service side, realizes intelligent integration, intelligent management and intelligent monitoring of the intelligent equipment and the service side, and constructs a safety control platform with centralized deployment, hierarchical control, multistage linkage and comprehensive functions. From the intelligent detection of the basic environment, to the full-process and intelligent expansion of the safety production business, the construction of an active safety precaution mechanism and the omnibearing three-dimensional guarantee of the safety production and emergency response capability of enterprises.
Embodiments of the present invention also provide a machine-readable storage medium having instructions stored thereon that, when executed by the processor 100, cause the processor 100 to be configured to perform the smart device-based security management method described above.
Machine-readable storage media include both permanent and non-permanent, removable and non-removable media, and information storage may be implemented by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
The embodiment of the present invention further provides an electronic device 10, where the electronic device 10 includes a memory 101, a processor 100, and a computer program 102 stored in the memory 101 and executable on the processor 100, and the processor 100 implements the intelligent equipment-based security management method when executing the computer program 102.
Fig. 7 is a schematic diagram of an electronic device according to an embodiment of the present invention. As shown in fig. 7, the electronic device 10 of this embodiment includes: a processor 100, a memory 101, and a computer program 102 stored in the memory 101 and executable on the processor 100. The steps of the method embodiments described above are implemented by the processor 100 when executing the computer program 102. Alternatively, the processor 100, when executing the computer program 102, performs the functions of the modules/units of the apparatus embodiments described above.
By way of example, computer program 102 may be partitioned into one or more modules/units that are stored in memory 101 and executed by processor 100 to accomplish the present invention. One or more of the modules/units may be a series of computer program instruction segments capable of performing particular functions to describe the execution of the computer program 102 in the electronic device 10. For example, the computer program 102 may be partitioned into a monitoring data transmission module, a classification storage module, a display rule matching module, and a display module.
The electronic device 10 may be a desktop computer, a notebook computer, a palm computer, a cloud server, or the like. The electronic device 10 may include, but is not limited to, a processor 100, a memory 101. It will be appreciated by those skilled in the art that fig. 7 is merely an example of the electronic device 10 and is not intended to limit the electronic device 10, and may include more or fewer components than shown, or may combine certain components, or different components, e.g., the electronic device may further include an input-output device, a network access device, a bus, etc.
The processor 100 may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 101 may be an internal storage unit of the electronic device 10, such as a hard disk or a memory of the electronic device 10. The memory 101 may also be an external storage device of the electronic device 10, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the electronic device 10. Further, the memory 101 may also include both internal storage units and external storage devices of the electronic device 10. The memory 101 is used to store computer programs and other programs and data required by the electronic device 10. The memory 101 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, the specific names of the functional units and modules are only for distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program 102 products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program 102 instructions. These computer program 102 instructions may be provided to a processor 100 of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor 100 of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program 102 instructions may also be stored in a computer-readable memory 101 that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory 101 produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program 102 instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.
Claims (12)
1. The safety control method based on intelligent equipment is characterized by comprising the following steps of:
collecting monitoring data uploaded by a factory-side collecting front-end processor based on a preset intelligent equipment data uploading protocol, wherein the monitoring data are collected by each intelligent equipment of a filtered equipment layer completed by the factory-side collecting front-end processor;
classifying the monitoring data according to a preset data classification standard to obtain a classification result, and transmitting the monitoring data to a corresponding storage library for classification storage based on the classification result;
according to the data characteristics of the monitoring data, matching corresponding display rules;
and sending the monitoring data stored in each storage library to at least one display terminal for display according to the corresponding display rules.
2. The intelligent equipment-based security management method according to claim 1, wherein the rules for filtering the monitoring data collected by each intelligent equipment of the equipment layer by the factory-side collection front-end processor include:
determining all first data types meeting an uploading protocol according to a preset intelligent equipment data uploading protocol;
receiving monitoring data acquired by each intelligent device through a factory side acquisition front-end processor, and determining a second data type of each monitoring data;
Comparing the second data type with the first data type to obtain a comparison result;
and determining and filtering monitoring data which do not meet the uploading protocol based on the comparison result.
3. The intelligent equipment-based security management method of claim 1, wherein the repository comprises a network video monitoring platform, the method further comprising:
and configuring a unidirectional gatekeeper for the network video monitoring platform.
4. The intelligent equipment-based security management and control method according to claim 1, wherein after the monitoring data uploaded by the factory-side acquisition front-end processor is acquired based on a preset intelligent equipment data uploading protocol, the method further comprises:
carrying out data buffering on the monitoring data by using Kafaka, and transmitting the monitoring data after data buffering to a Storm;
and carrying out real-time processing analysis on the monitoring data after data buffering is completed through Storm, determining alarm data, and storing the alarm data into a Redis real-time database.
5. The intelligent equipment-based security management method of claim 4, wherein the repository comprises a document server;
the step of sending the monitoring data to a corresponding storage library for classified storage based on the classification result comprises the following steps:
And uploading alarm data in the Redis real-time database to a document server.
6. The intelligent equipment-based security management and control method according to claim 5, wherein the sending the monitoring data stored in each repository to at least one display terminal for display according to the corresponding display rule includes:
when the monitoring data are alarm data, directly calling the alarm data in the document server according to the corresponding display rule;
and sending the alarm data to at least one display terminal for display.
7. The intelligent equipment-based security management and control method according to claim 4, wherein the real-time processing analysis is performed on the monitored data after the data buffering is completed by the Storm, and the determining of the alarm data comprises:
matching corresponding alarm recognition algorithm models according to the data types of the monitoring data;
and identifying the corresponding monitoring data by utilizing an alarm identification algorithm model, and determining alarm data.
8. The intelligent equipment-based security management and control method according to claim 4, wherein the sending the monitoring data stored in each repository to at least one display terminal for display according to the corresponding display rule includes:
And when the monitoring data are not alarm data, based on the captured consulting request instruction, extracting the corresponding category monitoring data in the storage library, and pushing the monitoring data to the corresponding display terminal, wherein the category of the monitoring data at least comprises one or more of video data, picture data and intelligent equipment working state data.
9. The intelligent equipment-based security management and control method according to claim 1, wherein the plant side acquisition front-end processor transmits the monitoring data to a service side through a VPN private network.
10. Safety control system based on intelligent equipment, characterized by comprising:
the monitoring data transmission module is used for acquiring monitoring data uploaded by the factory side acquisition front-end processor based on a preset intelligent equipment data uploading protocol, wherein the monitoring data are acquired by each intelligent equipment of the filtered equipment layer completed by the factory side acquisition front-end processor;
the classification storage module is used for classifying the monitoring data according to a preset data classification standard to obtain a classification result, and sending the monitoring data to a corresponding storage library for classification storage based on the classification result;
The display rule matching module is used for matching corresponding display rules according to the data characteristics of the monitoring data;
and the display module is used for sending the monitoring data stored in each storage library to at least one display terminal for display according to the corresponding display rule.
11. A machine-readable storage medium having instructions stored thereon, which when executed by a processor cause the processor to be configured to perform the smart device-based security management method of any of claims 1 to 9.
12. An electronic device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the smart device-based security management method of any one of claims 1 to 9 when the computer program is executed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310780883.1A CN116880262A (en) | 2023-06-28 | 2023-06-28 | Security control method and system based on intelligent equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310780883.1A CN116880262A (en) | 2023-06-28 | 2023-06-28 | Security control method and system based on intelligent equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116880262A true CN116880262A (en) | 2023-10-13 |
Family
ID=88265407
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310780883.1A Pending CN116880262A (en) | 2023-06-28 | 2023-06-28 | Security control method and system based on intelligent equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116880262A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117596120A (en) * | 2023-11-21 | 2024-02-23 | 沧州信安保销毁设备有限公司 | Safe operation and maintenance method based on unidirectional transmission |
-
2023
- 2023-06-28 CN CN202310780883.1A patent/CN116880262A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117596120A (en) * | 2023-11-21 | 2024-02-23 | 沧州信安保销毁设备有限公司 | Safe operation and maintenance method based on unidirectional transmission |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108319234B (en) | Security management system, method, device, storage medium and information processing cloud platform | |
CN111683126B (en) | City safety wisdom management and control system | |
WO2020211428A1 (en) | Park area safety supervisory system and method | |
CN111242574A (en) | Intelligent site inspection management system and method based on GPS technology | |
US20180278892A1 (en) | Complex hardware-based system for video surveillance tracking | |
CN106408173A (en) | Quality random inspection execution process supervision system | |
US20100305806A1 (en) | Portable Multi-Modal Emergency Situation Anomaly Detection and Response System | |
US20170280107A1 (en) | Site sentinel systems and methods | |
US9846981B2 (en) | Access monitoring system for remote locations | |
CN113538825A (en) | Campus wall-turning event alarm method and system | |
CN113935645A (en) | High-risk operation management and control system and method based on identification analysis technology | |
CN106597966A (en) | Security and protection system based on chemical industrial park | |
CN116880262A (en) | Security control method and system based on intelligent equipment | |
CN114399265A (en) | Electric power engineering construction project overall process management and control system | |
US9912422B2 (en) | Radio information system and method for remote locations | |
CN117977813B (en) | Remote intelligent inspection system for transformer substation | |
WO2021224728A1 (en) | Systems and methods for personal protective equipment compliance | |
CN114257607B (en) | Intelligent dangerous chemical full life cycle management system | |
US20200296163A1 (en) | System and method for dynamically generating a site survey | |
CN117351643A (en) | Safety production early warning prevention and control method | |
CN116523492A (en) | Hydropower station supervision method and system, electronic equipment and storage medium | |
KR20200067654A (en) | Missing accident first response system and method for operating thereof | |
KR20150140485A (en) | Integrated control system using cctv camera | |
CN112581098A (en) | Building site wisdom management system | |
Hu et al. | Intelligent Engineering Construction Management: On-Site Construction Management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |