WO2018152670A1 - Procédé et dispositif de gestion de mégadonnées pour surveillance de sécurité - Google Patents
Procédé et dispositif de gestion de mégadonnées pour surveillance de sécurité Download PDFInfo
- Publication number
- WO2018152670A1 WO2018152670A1 PCT/CN2017/074209 CN2017074209W WO2018152670A1 WO 2018152670 A1 WO2018152670 A1 WO 2018152670A1 CN 2017074209 W CN2017074209 W CN 2017074209W WO 2018152670 A1 WO2018152670 A1 WO 2018152670A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- stored
- storage
- storage center
- monitoring system
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
Definitions
- the invention relates to the field of security, and in particular relates to a big data management method and device for security monitoring.
- the security monitoring system is a system that uses optical fibers, coaxial cables or microwaves to transmit video signals in its closed loop and from camera to image display and recording. It can reflect the monitored object in real time, image and reality. It can be used for long-term monitoring instead of manual in harsh environments and recorded by video recorder. At the same time, the alarm system equipment alarms for illegal intrusion.
- the existing security monitoring is not flexible in the storage of big data, and cannot meet the requirements of current security monitoring data storage.
- the invention provides a big data management method for security monitoring, which solves the defect that the prior art cannot meet the requirements of current security monitoring data storage.
- a method for managing big data for security monitoring comprising the following steps:
- the monitoring system receives the data to be stored
- the monitoring system sends the data to be stored to the storage center, where the stored data carries the time and data identifier of the data storage;
- the monitoring system instructs the storage center to identify whether to store the data based on the stored time and the data.
- the method further includes:
- the monitoring system sends a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives the data corresponding to the data identifier returned by the storage center.
- the method further includes:
- the monitoring system receives the response of the data storage returned by the storage center and deletes the data.
- a big data management device for security monitoring comprising:
- transceiver unit configured to receive data to be stored, and send the data to be stored to a storage center, where the stored data carries time and data identifiers of the data storage;
- a processing unit configured to instruct the storage center to store the data according to the stored time and the data identifier.
- the transceiver unit is further configured to send a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives the data corresponding to the data identifier returned by the storage center.
- the processing unit is configured to receive a response that the data center returned by the storage center is successful, and delete the data.
- a big data management device for security monitoring comprising: a processor, a transceiver, a memory, and a bus, wherein the processor, the transceiver, and the memory are connected by using a bus;
- the transceiver is configured to receive data to be stored, and send the data to be stored to a storage center, where the stored data carries time and data identifiers of the data storage.
- a processor configured to indicate, by the storage center, whether to store the data according to the stored time and the data identifier.
- the transceiver is further configured to send a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives data corresponding to the data identifier returned by the storage center.
- the processor is configured to receive a response of the data storage returned by the storage center, and delete the data.
- the technical solution provided by the specific embodiments of the present invention has the advantage of meeting the requirements of current security monitoring data storage.
- FIG. 1 is a schematic flowchart diagram of a big data management method for security monitoring provided by the present invention.
- FIG. 2 is a schematic structural diagram of a big data management device for security monitoring according to the present invention.
- FIG. 3 is a schematic structural diagram of a big data management apparatus for security monitoring according to the present invention.
- FIG. 1 is a big data management method for security monitoring according to a first preferred embodiment of the present invention.
- the method is implemented by a security system.
- the method is as shown in FIG. 1 and includes the following steps:
- Step S101 The monitoring system receives the data to be stored.
- Step S102 The monitoring system sends the data to be stored to the storage center, where the stored data carries the time of the data storage.
- Step S103 The monitoring system instructs the storage center to identify whether the data is stored according to the stored time and the data identifier.
- the technical solution provided by the present invention can manage big data according to the storage time of data and data identification, so it has the advantage of being able to realize security data storage.
- the foregoing method may further include:
- the monitoring system sends a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives the data corresponding to the data identifier returned by the storage center.
- the foregoing method may further include:
- the monitoring system receives the response of the data storage returned by the storage center and deletes the data.
- FIG. 2 is a big data management device for security monitoring according to a second preferred embodiment of the present invention. As shown in FIG. 2, the device includes:
- the transceiver unit 201 is configured to receive data to be stored, and send the data to be stored to a storage center, where the stored data carries time and data identifiers of the data storage;
- the processing unit 202 is configured to instruct the storage center to identify whether the data is stored according to the stored time and the data.
- the transceiver unit 201 is further configured to send a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives the data corresponding to the data identifier returned by the storage center.
- the processing unit 202 is configured to receive a response that the data center returned by the storage center is successful, and delete the data.
- the present invention also provides a security monitoring and monitoring big data management device 30, the device comprising: a processor 301, a transceiver 302, a memory 303 and a bus 304, wherein the processor, the transceiver, and the memory are connected by a bus;
- the transceiver 302 is configured to receive data to be stored, and send the data to be stored to a storage center, where the stored data carries time and data identifiers of the data storage.
- the processor 301 is configured to instruct the storage center to identify whether the data is stored according to the stored time and the data.
- the transceiver 302 is further configured to send a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives data corresponding to the data identifier returned by the storage center.
- the processor 301 is configured to receive a response that the data center returned by the storage center is successful, and delete the data.
- Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
- a storage medium may be any available media that can be accessed by a computer.
- the computer readable medium may include random access memory (Random) Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium.
- a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Alarm Systems (AREA)
Abstract
La présente invention concerne un procédé et un dispositif de gestion de mégadonnées pour une surveillance de sécurité, le procédé comprenant les étapes suivantes : un système de surveillance reçoit des données devant être stockées ; le système de surveillance envoie les données devant être stockées à un centre de stockage, les données stockées portent un identifiant de temps et de données correspondant au stockage de données ; et le système de surveillance demande au centre de stockage s'il faut stocker les données ou non en fonction de l'identifiant de temps et de données correspondant au stockage. La solution technique fournie par la présente invention est avantageuse en ce que les exigences de stockage de données de surveillance de sécurité existant sont satisfaites.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/074209 WO2018152670A1 (fr) | 2017-02-21 | 2017-02-21 | Procédé et dispositif de gestion de mégadonnées pour surveillance de sécurité |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/074209 WO2018152670A1 (fr) | 2017-02-21 | 2017-02-21 | Procédé et dispositif de gestion de mégadonnées pour surveillance de sécurité |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018152670A1 true WO2018152670A1 (fr) | 2018-08-30 |
Family
ID=63252441
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/074209 WO2018152670A1 (fr) | 2017-02-21 | 2017-02-21 | Procédé et dispositif de gestion de mégadonnées pour surveillance de sécurité |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2018152670A1 (fr) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101060624A (zh) * | 2007-05-08 | 2007-10-24 | 杭州华三通信技术有限公司 | 视频数据的处理方法及存储设备 |
CN105338027A (zh) * | 2014-07-30 | 2016-02-17 | 杭州海康威视系统技术有限公司 | 进行视频数据云存储的方法、系统及装置 |
US20160292189A1 (en) * | 2015-03-31 | 2016-10-06 | Advanced Digital Broadcast S.A. | System and method for managing content deletion |
-
2017
- 2017-02-21 WO PCT/CN2017/074209 patent/WO2018152670A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101060624A (zh) * | 2007-05-08 | 2007-10-24 | 杭州华三通信技术有限公司 | 视频数据的处理方法及存储设备 |
CN105338027A (zh) * | 2014-07-30 | 2016-02-17 | 杭州海康威视系统技术有限公司 | 进行视频数据云存储的方法、系统及装置 |
US20160292189A1 (en) * | 2015-03-31 | 2016-10-06 | Advanced Digital Broadcast S.A. | System and method for managing content deletion |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018218806A1 (fr) | Procédé et système de protection de la confidentialité d'un terminal | |
WO2017117715A1 (fr) | Procédé et système de vérification de présence de système de surveillance | |
WO2018152670A1 (fr) | Procédé et dispositif de gestion de mégadonnées pour surveillance de sécurité | |
WO2018161339A1 (fr) | Procédé et appareil d'application pour la recherche de mégadonnées dans une surveillance de sécurité | |
WO2018218808A1 (fr) | Procédé et système de lecture d'informations de message court | |
WO2018148958A1 (fr) | Procédé et dispositif de transmission de données destinés à la protection et la surveillance de sécurité | |
WO2018152669A1 (fr) | Procédé et dispositif de contrôle de sécurité permettant une surveillance de sécurité | |
WO2018027557A1 (fr) | Procédé et système d'enregistrement de présence wi-fi en matière de sécurité | |
WO2018161341A1 (fr) | Procédé et appareil pour mettre en oeuvre une surveillance de sécurité sur la base d'une technologie en nuage | |
WO2018148957A1 (fr) | Procédé et dispositif d'application de mégadonnées dans un système de protection de sécurité | |
WO2018148956A1 (fr) | Procédé et système de sauvegarde en nuage pour une protection et une surveillance de la sécurité | |
WO2018165863A1 (fr) | Procédé et appareil de classification de données en surveillance de sécurité et de protection | |
WO2018027560A1 (fr) | Procédé et système d'enregistrement de présence gprs destinés à être utilisés dans la sécurité | |
WO2018027702A1 (fr) | Procédé et système d'attribution de fichiers sur des canaux de réseau double à des fins de sécurité et de surveillance | |
WO2017107205A1 (fr) | Procédé et système de transmission de logiciel vidéo | |
WO2018209646A1 (fr) | Procédé et système de surveillance de domicile intelligent | |
WO2018205110A1 (fr) | Procédé et système de surveillance de l'état de fonctionnement d'une machine à bobiner | |
WO2018027561A1 (fr) | Procédé et système d'enregistrement de présence sur un étage pour la sécurité | |
WO2018023710A1 (fr) | Procédé et système de lecture sécurisée d'une vidéo | |
WO2018205141A1 (fr) | Procédé et système d'assemblage et d'agencement de clips vidéo | |
WO2018227364A1 (fr) | Procédé et système d'établissement de groupe de multidiffusion de terminal | |
WO2018205135A1 (fr) | Procédé et système de lecture rapide de vidéos multimédias en réseau | |
WO2018035666A1 (fr) | Procédé et système d'analyse du sommeil profond d'un dispositif de l'internet des objets | |
WO2018027703A1 (fr) | Procédé et système de mise en œuvre de la surveillance de sécurité du canal de réseau double | |
WO2018027568A1 (fr) | Procédé et système de transmission vidéo ultra haute définition pour une vidéoconférence dans un système de surveillance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17897988 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 171219) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17897988 Country of ref document: EP Kind code of ref document: A1 |