WO2022267803A1 - 一种安防监控系统及安防监控方法、设备 - Google Patents

一种安防监控系统及安防监控方法、设备 Download PDF

Info

Publication number
WO2022267803A1
WO2022267803A1 PCT/CN2022/094993 CN2022094993W WO2022267803A1 WO 2022267803 A1 WO2022267803 A1 WO 2022267803A1 CN 2022094993 W CN2022094993 W CN 2022094993W WO 2022267803 A1 WO2022267803 A1 WO 2022267803A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
portable device
cloud server
security monitoring
request message
Prior art date
Application number
PCT/CN2022/094993
Other languages
English (en)
French (fr)
Inventor
单志胜
蒋海青
金静阳
陈晓锋
邵峰
Original Assignee
杭州萤石软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州萤石软件有限公司 filed Critical 杭州萤石软件有限公司
Publication of WO2022267803A1 publication Critical patent/WO2022267803A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Definitions

  • the present application relates to the field of security technology, in particular to a security monitoring system, a security monitoring method, and equipment.
  • security safety precautions
  • measures such as installing monitoring equipment in certain specific areas, or wearing location tracking equipment for certain specific groups of people, and so on.
  • the embodiment of the present application provides a security monitoring system, including: a portable device, a security monitoring device, and a cloud server;
  • the portable device is configured to send a wireless detection request message; wherein, the wireless detection request message carries device-related information of the portable device;
  • the security monitoring device is configured to monitor the wireless detection request message, and when the wireless detection request message is monitored, report the message content of the wireless detection request message detected to the cloud server information; and, receiving a security instruction issued by the cloud server, and performing a corresponding security operation according to the instruction of the security instruction;
  • the cloud server is configured to receive the message content information, and issue a security instruction for the user corresponding to the portable device to the security monitoring device.
  • the embodiment of the present application also provides a security monitoring method, which is applied to security monitoring equipment, and the method includes:
  • the wireless detection request message carries device-related information of the portable device
  • the embodiment of the present application also provides a security monitoring device, the device includes:
  • a monitoring module configured to monitor a wireless detection request message sent by a portable device; wherein, the wireless detection request message carries device-related information of the portable device;
  • the communication module is configured to, when the wireless detection request message is monitored, report the message content information of the wireless detection request message detected to the cloud server; The security instruction of the user corresponding to the portable device mentioned above;
  • a processor configured to execute corresponding security operations according to the instructions of the security instructions.
  • the embodiment of the present application also provides a computer device, including a processor, a communication interface, a memory, and a communication bus; wherein, the processor, the communication interface, and the memory complete mutual communication through the bus ; the memory is used to store computer programs; the processor is used to execute the programs stored in the memory to implement the method steps described in any one of the above second aspects.
  • the embodiment of the present application also provides a computer-readable storage medium, where a computer program is stored in the storage medium, and when the computer program is executed by a processor, the method steps described in any one of the above-mentioned second aspects are implemented. .
  • the embodiment of the present application further provides a computer program product containing instructions, which, when run on a computer, cause the computer to execute the method steps described in any one of the above-mentioned second aspects.
  • the security monitoring system includes a portable device, a security monitoring device and a cloud server.
  • the portable device can send a wireless detection request message to the outside.
  • the security monitoring device monitors the wireless detection request message sent by the portable device, Report the monitored message content information to the cloud server.
  • the cloud server issues a security instruction for the user corresponding to the portable device to the security monitoring device, so that the security monitoring device
  • the monitoring device performs security operations for the user corresponding to the portable device; that is, in the embodiment of the application, through the cooperation of the portable device, the security monitoring device, and the cloud server, it is possible to execute the security operation for the user in time when the user needs security protection. Advanced security operations enhance the timeliness and effectiveness of user security protection.
  • FIG. 1 is a schematic diagram of a system structure of a security monitoring system provided in an embodiment of the present application
  • FIG. 2 is a first schematic flow diagram of the security monitoring method provided in the embodiment of the present application.
  • Fig. 3 is a second schematic flow diagram of the security monitoring method provided by the embodiment of the present application.
  • FIG. 4 is a schematic diagram of the module composition of the security monitoring equipment provided by the embodiment of the present application.
  • FIG. 5 is a schematic diagram of a module composition of a network device provided by an embodiment of the present application.
  • the embodiment of the present application provides a security monitoring system, as shown in Figure 1, the security monitoring system includes a portable device 110, a security monitoring device 120 and a cloud server 130;
  • the above-mentioned security monitoring device 120 may also have The wireless module, that is, the security monitoring device 120 can be an IPC with wireless capability; in addition, in order to realize the linkage between the portable device 110 and the security monitoring device 120 and the cloud server 130, the portable device 110 has a wireless module; of course, the above-mentioned portable The device 110 may or may not have other functional modules, which may be specifically set according to actual requirements, which is not limited in this embodiment of the present application.
  • the above-mentioned portable device 110 may be a wearable smart necklace, a smart ring, a smart bracelet, a smart watch or a card or the like.
  • the security monitoring device 120 needs to access the cloud server 130;
  • the security monitoring device 120 is connected to the cloud server 130 , and the security monitoring device 120 needs to be registered with the cloud server 130 in advance.
  • the above-mentioned portable device 110 is configured to send a wireless detection request message; wherein, the wireless detection request message carries device-related information of the portable device;
  • the security monitoring device 120 is configured to monitor the wireless detection request message, and when the wireless detection request message is detected, report the message content information of the wireless detection request message detected to the cloud service; and, receive the message sent by the cloud server According to the security instructions, perform corresponding security operations according to the instructions of the security instructions;
  • the cloud server 130 is configured to receive message content information, and issue a security instruction for a user corresponding to the portable device to the security monitoring device.
  • the wireless probe request message sent by the portable device 110 may be a Probe Request message, a Beacon message, and the like.
  • the above device-related information may be any one or multiple items of the portable device 110's local model, device serial number, Media Access Control (Media Access Control, MAC) address and other information.
  • device serial number Media Access Control (Media Access Control, MAC) address
  • MAC Media Access Control
  • the cloud server can determine the security monitoring device corresponding to the portable device, thereby establishing a mapping relationship between the portable device and its corresponding security monitoring device.
  • the cloud server can collect information such as image data corresponding to portable devices.
  • it can also issue corresponding security instructions to corresponding security monitoring devices according to the needs of users corresponding to different portable devices.
  • the cloud server 130 After receiving the message content information reported by the security monitoring device 120, the cloud server 130 sends a corresponding security instruction to the security monitoring device according to the message content information.
  • the above security instructions may be to instruct the security monitoring equipment to send a rescue request to the linkage platform, wherein the linkage platform may include an alarm platform, a rescue platform, etc., or collect image data in the area to be monitored corresponding to the security monitoring equipment, or instruct the security monitoring equipment to control Buzzer etc. for alarm etc.
  • the specific content corresponding to the security instruction can be set according to the actual application scenario, which is not limited in this embodiment of the present application.
  • the above-mentioned security command carries the message content information corresponding to the portable device 110, so that the security monitoring device 120 can specify which portable device 110 to perform corresponding security operations on.
  • the specific content of the security operation performed above may be to collect image data in the area to be monitored corresponding to the security monitoring device 120, and then the cloud server 130 performs corresponding analysis based on the image data or filing, etc.
  • the above-mentioned security instruction is used to instruct the security monitoring device 120 to collect image data
  • the aforementioned security monitoring device 120 is specifically used for:
  • the above cloud server is used for:
  • the image data is analyzed, and if the analysis result indicates that there is an emergency event for the user corresponding to the portable device, a security strategy for the emergency event is executed.
  • the above image data may be a static picture or a dynamic video.
  • the above-mentioned emergency event may be a property loss event, a fall event, etc.
  • different security strategies are set for different emergency events, for example, for the type of property loss emergency Event, the set security strategy can be to start a buzzer or an alarm, etc.
  • the set security strategy can be to seek help from a designated platform, such as a medical assistance platform, etc.
  • a designated platform such as a medical assistance platform
  • the security monitoring device 120 corresponding to the portable device 110 may be one or multiple; Select a security monitoring device 120 to execute the corresponding security command, or execute the security command for each corresponding security monitoring device 120, such as when the security command is an image collection command, in order to ensure the comprehensiveness of the collected image data, you can At the same time, the above-mentioned security instruction is sent to each security monitoring device corresponding to the portable device 110, and then each security monitoring device can collect image data in the area to be monitored corresponding to itself.
  • the above-mentioned security monitoring device 120 can also be a network monitoring camera with a pan-tilt, so that when the security monitoring device 120 receives the security command issued by the cloud server, it will follow the preset working mode Collect image data.
  • the above-mentioned preset working mode can be to rotate and collect image data according to a specified frequency, or to collect image data in an area corresponding to a certain fixed direction; it can be set according to actual needs, and this embodiment of the application does not To limit.
  • the above-mentioned adding device-related information to the image data may be associating the device-related information with the image data, for example, correspondingly recording the device-related information and image data, so as to facilitate the cloud server to perform subsequent image data query or During the analysis work, the image data corresponding to the portable device 110 can be accurately found.
  • the above-mentioned cloud server executes the security policy for the current emergency of the user corresponding to the portable device, it may be:
  • An emergency event alarm command is issued to the security monitoring device, so that the security monitoring device performs a corresponding security operation according to the above emergency event alarm command.
  • the cloud server determines that the user corresponding to the portable device has a risk of being stolen, it can issue a theft event alarm command to the security monitoring device.
  • the security monitoring device receives the theft event issued by the cloud server After the alarm command, the buzzer in the corresponding area can be controlled to issue a buzzer alarm.
  • the corresponding area may be the area where the user is located.
  • the portable device since the portable device may be a card or necklace with only a Wi-Fi module, it does not have a positioning function.
  • the position information corresponding to the portable device can also be determined by means of RSSI (Received Signal Strength Indication, received signal strength indication) value for positioning.
  • RSSI Receiveived Signal Strength Indication, received signal strength indication
  • the above device-related information also carries RSSI data corresponding to the portable device
  • the above cloud server is also used for:
  • the security monitoring device is configured to receive the orientation information, and adjust its corresponding monitoring area according to the orientation information.
  • the strength of the received signal sent by the portable device is then It is related to the location of the portable device, so through the collected RSSI data corresponding to the portable device, an area corresponding to the portable device can be determined, and the overlapping area of multiple areas determined based on multiple security monitoring devices , it is determined as the orientation information corresponding to the portable device.
  • the portable device 1 corresponds to three security monitoring devices, which are respectively recorded as the security monitoring device 1, the security monitoring device 2 and the security monitoring device 3, and the data of the portable device 1 collected by the security monitoring device 1
  • the RSSI data is recorded as RSSI1
  • the RSSI data of the portable device 2 collected by the security monitoring device 2 is recorded as RSSI2
  • the RSSI data of the portable device 3 collected by the security monitoring device 3 is recorded as RSSI3;
  • the security monitoring device can be 1 as the center and a radius of R1 is determined as the possible area 1 corresponding to the portable device 1;
  • the circular area centered on the security monitoring device 2 and the radius of R2 can be determined as the corresponding area of the portable device 1 Possible area 2; based on RSSI3, the circular area with the security monitoring device 3 as the center and radius R3 can be determined as the possible area 3 corresponding to the portable device 1; the overlapping area of possible area 1, possible area 2 and possible area 3 It is determined as the area where the portable device
  • the above-mentioned security monitoring equipment is specifically used for:
  • the message content information is encrypted according to a preset encryption algorithm, and the ciphertext data corresponding to the message content information is uploaded to the cloud server.
  • the first device-related information carried in the wireless detection request message may also be encrypted, so as to ensure data security.
  • the above-mentioned preset encryption algorithm may be the AES-128-CFB encryption algorithm, and of course other encryption algorithms may also be used.
  • the specific encryption algorithm used to encrypt the above-mentioned message content information may be The selection is made according to actual requirements, which is not limited in this embodiment of the present application.
  • the security monitoring device can monitor the wireless request message sent by the portable device, thereby triggering the security monitoring device to send the monitored
  • the message content information of the received portable device is reported to the cloud server, thereby triggering the cloud server to instruct the security monitoring device to perform security operations for the user corresponding to the portable device; such as instructing the security monitoring device to collect image data corresponding to the area to be prevented and controlled, etc. Wait.
  • the user can trigger the portable device to send a security request to the corresponding security monitoring device through the portable device. Therefore, in a specific implementation, the above-mentioned portable device 110 is also used to send the security request to the security monitoring device 120 ;
  • the aforementioned security monitoring device 120 is also configured to receive the security request sent by the portable device 110, and execute security operations for the user corresponding to the portable device according to the aforementioned security request and according to a preset security policy.
  • the above-mentioned preset security strategy may be to activate an alarm device, such as a buzzer, or it may also be to send a help signal to an associated platform, such as a medical assistance platform, etc.;
  • the aforementioned security strategy may also be to collect image data corresponding to the area to be monitored, and add device-related information corresponding to the portable device to the image data and so on.
  • the specific trigger form of the above-mentioned security request may be that the user corresponding to the portable device 110, that is, the user carrying the portable device, performs a specific operation on the portable device 110, such as pressing a specific button, or touching a certain area of the screen, or Perform specific gesture operations on the portable device 110, such as shaking the portable device up and down, and so on.
  • the portable device 110 is triggered to send a security request to the cloud server 130 .
  • the user when the user corresponding to the portable device 110 falls, the user can press a help button provided on the portable device 110, thereby triggering the portable device 110 to send a help request to the cloud server.
  • one of the preconditions for realizing the embodiments described above in this application is that the security monitoring device is online, that is, the security monitoring device 120 is connected to the cloud server 130 .
  • the offline monitoring device 120 can be set in advance. security strategy.
  • the so-called offline security policies can be understood as some policies that are pre-stored in the security monitoring device 120 and can be executed when the security monitoring device 120 is in an offline state.
  • the security monitoring device 120 can detect whether it is in the online state, and if it is in the online state, after receiving the security command sent by the cloud server, it will perform corresponding security operations according to the instructions of the security command; if the security monitoring device 120 is in the offline state, so the security instruction sent by the cloud server cannot be received, and the corresponding security strategy can be executed according to the preset offline security strategy after receiving the security request sent by the portable device.
  • the above-mentioned security monitoring device 120 executes the security operation for the user corresponding to the portable device 110 according to the security request and according to the preset offline security strategy, which can be specifically implemented through the following process:
  • the wireless detection request message may be sent out at different frequencies. Therefore, in the embodiment of the present application, the above-mentioned portable device , specifically for:
  • the portable device When in the emergency working mode, it means that the user of the portable device may encounter an emergency that endangers safety, so in order to enable the security monitoring device to listen to the wireless detection request message as soon as possible, the wireless detection request message can be sent out more frequently.
  • the portable device When the portable device is in the emergency working mode, it means that the user of the portable device may not have encountered an emergency that endangers safety, so the frequency of sending wireless detection request messages is reduced, that is to say, the above-mentioned first preset frequency can be greater than Second preset frequency.
  • the message content information also carries working mode information corresponding to the portable device;
  • the working mode includes emergency working mode and non-emergency working mode;
  • the cloud server is specifically used for:
  • the above-mentioned emergency security operation may be an emergency alarm operation or an emergency rescue operation.
  • these operations may be performed by the cloud server, or the cloud server may instruct the security monitoring device to perform the operation.
  • the security monitoring equipment may also be instructed to collect image data for the portable device, so that the cloud server may perform an emergency check based on the image data to determine whether the user corresponding to the portable device is in state of emergency.
  • the cloud server after the cloud server receives the image data collected by the security monitoring equipment for the portable device, it can determine whether the user included in the image data is in an emergency state through image detection or other methods, so as to perform emergency verification on the image data .
  • the cloud server can determine whether the user included in the image data is in a falling state through image detection, and if so, it can be determined that the user is in a falling state. state of emergency.
  • the security monitoring system includes a portable device, a security monitoring device and a cloud server.
  • the portable device can send a wireless detection request message to the outside.
  • the security monitoring device monitors the wireless detection request message sent by the portable device, Report the monitored message content information to the cloud server.
  • the cloud server issues a security instruction for the user corresponding to the portable device to the security monitoring device, so that the security monitoring device
  • the monitoring device performs security operations for the user corresponding to the portable device; that is, in the embodiment of the application, through the cooperation of the portable device, the security monitoring device, and the cloud server, it is possible to execute the security operation for the user in time when the user needs security protection. Advanced security operations enhance the timeliness and effectiveness of user security protection.
  • the embodiment of the present application also provides a security monitoring method, which is applied to security monitoring equipment, and Figure 2 is provided by the embodiment of the present application
  • Step 202 listening to the wireless detection request message sent by the portable device; wherein, the wireless detection request message carries device-related information of the portable device;
  • Step 204 when the wireless detection request message is monitored, report the message content information of the wireless detection request message detected to the cloud server;
  • Step 206 Receive a security instruction issued by the cloud server for the user corresponding to the portable device, and perform corresponding security operations according to the instruction of the security instruction.
  • performing corresponding security operations according to the instructions of the security instructions includes:
  • the method provided in the embodiment of the present application further includes:
  • the method provided in the embodiment of the present application further includes:
  • FIG. 3 is the embodiment of the present application
  • the second schematic flow chart of the security monitoring method provided by the example, as shown in Figure 3, the method at least includes the following steps:
  • Step 302 the smart card detects whether it is in emergency working mode; if so, execute step 304, otherwise, execute step 306;
  • Step 304 the smart card sends a wireless detection request message to the surrounding through Wi-Fi according to the second frequency
  • the above-mentioned wireless detection request frame carries the identification information of the smart card
  • Step 306 the smart card sends a wireless detection request message to the surrounding through Wi-Fi according to the first frequency
  • Step 308 after the security monitoring device monitors the wireless detection request message sent by the smart card, it reports the message content information of the wireless detection request message detected to the cloud server;
  • the above message content information carries the identification information of the smart card and the working mode information of the smart card;
  • Step 310 the cloud server judges whether the smart card is in the emergency working mode according to the message content information; if so, execute step 312; otherwise, execute step 314;
  • Step 312 the cloud server executes the security strategy for the emergency
  • Step 314 the cloud server sends an image acquisition instruction to the above-mentioned security monitoring equipment
  • the above-mentioned image acquisition instruction carries relevant information of the device corresponding to the smart card
  • Step 316 the security monitoring device detects that it is online; if so, execute step 318; otherwise, execute step 320;
  • Step 318 the security monitoring device performs image collection according to the image collection instruction issued by the cloud server, and adds the above-mentioned device-related information to the above-mentioned image data and reports to the cloud server;
  • Step 320 the security monitoring device performs image collection, and adds the above-mentioned device-related information to the image data, and reports the image data to the cloud server when it is online;
  • Step 322 the cloud server analyzes or stores the image data.
  • the portable device can send a wireless detection request message to the outside, and when the security monitoring device monitors the wireless detection request message sent by the portable device, it reports the detected message content to the cloud server After receiving the message content information reported by the security monitoring device, the cloud server issues a security instruction for the user corresponding to the portable device to the security monitoring device, so that the security monitoring device performs security protection for the user corresponding to the portable device. Operation; that is, in the embodiment of the present application, through the mutual cooperation of the portable device, the security monitoring device and the cloud server, the security operation for the user can be performed in time when the user needs security protection, which enhances the timely security of the user. sex and effectiveness.
  • the embodiment of the present application also provides a security monitoring device for performing the method provided in the embodiment shown in Figure 2, and Figure 4 is the embodiment of the present application
  • a schematic diagram of the module composition of the security monitoring equipment provided, as shown in Figure 4, the equipment includes:
  • a monitoring module 402 configured to monitor a wireless detection request message sent by a portable device; wherein, the wireless detection request message carries device-related information of the portable device;
  • the communication module 404 is configured to, when the wireless detection request message is monitored, report the message content information of the wireless detection request message detected to the cloud server; A security instruction of the user corresponding to the portable device;
  • the processor 406 is configured to perform corresponding security operations according to the instructions of the security instructions.
  • the security monitoring device provided in the embodiment of the present application can implement all the method steps in the embodiment shown in FIG. 2 , which will not be repeated here.
  • the security monitoring device provided by the embodiment of the present application can perform security operations for users in time when the user needs security protection, which enhances the timeliness and effectiveness of user security protection.
  • the embodiment of the present application provides a network device, as shown in FIG. 5 , the network device includes a processor 510, a transceiver 530, a memory 520 and a bus interface. in:
  • the network device 500 further includes: a computer program stored in the memory 520 and operable on the processor 510, when the computer program is executed by the processor 510, the above security monitoring method is realized. All the steps of the method can achieve the same technical effect, so in order to avoid repetition, they will not be repeated here.
  • the bus architecture may include any number of interconnected buses and bridges, specifically one or more processors represented by processor 510 and various circuits of memory represented by memory 520 are linked together.
  • the bus architecture can also link together various other circuits such as peripherals, voltage regulators, and power management circuits, etc., which are well known in the art and therefore will not be further described herein.
  • the bus interface provides the interface.
  • Transceiver 530 may be a plurality of elements, including a transmitter and a receiver, providing a means for communicating with various other devices over transmission media.
  • the processor 510 is responsible for managing the bus architecture and general processing, and the memory 520 may store data used by the processor 510 when performing operations.
  • the embodiment of the present invention also provides a computer-readable storage medium, on which a computer program is stored.
  • a computer program is stored.
  • the computer program is executed by a processor, each process of the above-mentioned method embodiment can be realized, and the same technical effect can be achieved. To avoid repetition, details are not repeated here.
  • the computer-readable storage medium is, for example, a read-only memory (Read-Only Memory, ROM), a random access memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.
  • a computer program product including instructions is also provided, which, when run on a computer, causes the computer to execute the method steps described in any of the above embodiments.

Abstract

本申请实施例提供了一种安防监控系统及安防监控方法、设备,包括便携式设备、安防监控设备和云服务器;便携式设备,用于向外发送无线探测请求报文;安防监控设备,用于监听无线探测请求报文,在监听到无线探测请求报文时,向云服务器上报所监听到的无线探测请求报文的报文内容信息;以及,接收云服务器下发的安防指令,根据安防指令的指示执行相应的安防操作;云服务器,用于接收报文内容信息,并向安防监控设备下发针对便携式设备所对应用户的安防指令。本申请实施例中通过便携式设备、安防监控设备以及云服务器三者相互配合,能够在用户需要进行安防保障时及时执行针对用户的安防操作,增强了用户安防保障的及时性和有效性。

Description

一种安防监控系统及安防监控方法、设备
本申请要求于2021年6月23日提交中国专利局、申请号为202110699892.9发明名称为“一种安防监控系统及安防监控方法、设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及安防技术领域,尤其涉及一种安防监控系统及安防监控方法、设备。
背景技术
随着社会的发展,安全防范(简称安防)越来越引起人们的重视,如老人、儿童走失防范、老人摔倒防范、特定区域内的人员、物品的安全防范等等。目前,为了实现各种场景下的安全防范,也制定了相应的措施,如在某些特定区域内安装监控设备、或者给某些特定人群佩戴定位追踪设备等等。虽然目前针对某些场景已经制定了一些安防措施,但是由于不同类型设备之间缺乏联动合作,仍然存在安防保障不到位的问题。
发明内容
本申请实施例采用下述技术方案:
第一方面,本申请实施例提供一种安防监控系统,包括:便携式设备、安防监控设备和云服务器;
所述便携式设备,用于向外发送无线探测请求报文;其中,所述无线探测请求报文中携带有所述便携式设备的设备相关信息;
所述安防监控设备,用于监听所述无线探测请求报文,在监听到所述无线探测请求报文时,向所述云服务器上报所监听到的所述无线探测请求报文的报文内容信息;以及,接收所述云服务器下发的安防指令,根据所述安防指令的指示执行相应的安防操作;
所述云服务器,用于接收所述报文内容信息,并向所述安防监控设备下发针对所述便携式设备所对应用户的安防指令。
第二方面,本申请实施例还提供了一种安防监控方法,应用于安防监控设备,该方法包括:
监听便携式设备发送的无线探测请求报文;其中,所述无线探测请求报文中携带有所述便携式设备的设备相关信息;
在监听到所述无线探测请求报文时,向云服务器上报所监听到的所述无线探测请求报文的报文内容信息;
接收所述云服务器下发的针对所述便携式设备所对应用户的安防指令,根据所述安防指令的指示执行相应的安防操作。
第三方面,本申请实施例还提供了一种安防监控设备,所述设备包括:
监听模块,用于监听便携式设备发送的无线探测请求报文;其中,所述无线探测请求报文中携带有所述便携式设备的设备相关信息;
通信模块,用于在监听到所述无线探测请求报文时,向云服务器上报所监听到的所述无线探测请求报文的报文内容信息;以及,接收所述云服务器下发的针对所述便携式设备所对应用户的安防指令;
处理器,用于根据所述安防指令的指示执行相应的安防操作。
第四方面,本申请实施例还提供了一种计算机设备,包括处理器、通信接口、存储器和通信总线;其中,所述处理器、所述通信接口以及所述存储器通过总线完成相互间的通信;所述存储器,用于存放计算机程序;所述处理器,用于执行所述存储器上所存放的程序,实现上述第二方面任一所述的方法步骤。
第五方面,本申请实施例还提供了一种计算机可读存储介质,所述存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现上述第二方面任一所述的方法步骤。
第六方面,本申请实施例还提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得所述计算机执行上述第二方面任一所述的方法步骤。
本申请实施例采用的上述至少一个技术方案能够达到以下有益效果:
本申请实施例提供的安防监控系统,包括便携式设备、安防监控设备和云服务器,便携式设备可以向外发送无线探测请求报文,当安防监控设备监听到便携式设备发送的无线探测请求报文后,向云服务器上报所监听到的报文内容信息,云服务器在接收到安防监控设备上报的报文内容信息后,向安 防监控设备下发针对该便携式设备所对应用户的安防指令,从而使得该安防监控设备执行针对便携式设备所对应用户的安防操作;也即,在本申请实施例中,通过便携式设备、安防监控设备以及云服务器三者相互配合,能够在用户需要进行安防保障时及时执行针对用户的安防操作,增强了用户安防保障的及时性和有效性。
附图说明
为了更清楚地说明本发明实施例和现有技术的技术方案,下面对实施例和现有技术中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,本领域普通技术人员来讲还可以根据这些附图获得其他的附图。
图1为本申请实施例提供的安防监控系统的一种系统结构示意图;
图2为本申请实施例提供的安防监控方法的第一种流程示意图;
图3为本申请实施例提供的安防监控方法的第二种流程示意图;
图4为本申请实施例提供的安防监控设备的模块组成示意图;
图5为本申请实施例提供的网络设备的模块组成示意图。
具体实施方式
为使本发明的目的、技术方案、及优点更加清楚明白,以下参照附图并举实施例,对本发明进一步详细说明。显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。本领域普通技术人员基于本发明中的实施例所获得的所有其他实施例,都属于本发明保护的范围。
以下结合附图,详细说明本申请各实施例提供的技术方案。
首先,本申请实施例提供了一种安防监控系统,如图1所示,该安防监控系统包括便携式设备110、安防监控设备120和云服务器130;其中,上述安防监控设备120可以为具备联网能力的摄像机,也即网络监控摄像机(IP Camera,IPC),在一种具体实施方式中,为便于安防监控设备120与便携式设备110之间进行数据通信或者建立连接,上述安防监控设备120还可以具备无线模块,也即该安防监控设备120可以为具备无线能力的IPC;此外,为了实现便携式设备110与安防监控设备120、云服务器130之间的联动,便携式设备110具有无线模块;当然,上述便携式设备110还可以具备其他功能 模块,也可以不具备其他功能模块,具体的可以根据实际需求进行设定,本申请实施例并不对此进行限定。
其中,上述便携式设备110可以为可佩戴式智能项链、智能戒指、智能手环、智能手表或者卡片等等。
在一种具体实施方式中,为了实现针对便携式设备所对应用户的防护,安防监控设备120需要接入云服务器130;
安防监控设备120接入云服务器130,也可以理解为,安防监控设备120需要预先在云服务器130进行注册。
其中,上述便携式设备110,用于向外发送无线探测请求报文;其中,该无线探测请求报文中携带有所述便携式设备的设备相关信息;
安防监控设备120,用于监听无线探测请求报文,在监听到无线探测请求报文时,向云服务上报所监听到的无线探测请求报文的报文内容信息;以及,接收云服务器下发的安防指令,根据安防指令的指示执行相应的安防操作;
所述云服务器130,用于接收报文内容信息,并向安防监控设备下发针对该便携式设备所对应用户的安防指令。
可选的,在一种具体实施方式中,便携式设备110向外发送的无线探测请求报文可以为Probe Request报文、Beacon报文等等。
其中,上述设备相关信息可以为便携式设备110的本机型号、设备序列号、媒体访问控制(Media Access Control,MAC)地址等信息中的任意一项或者多项。
在本申请实施例中,通过将报文内容信息上报给云服务器可以使得云服务器确定便携式设备所对应的安防监控设备,从而建立便携式设备与其对应的安防监控设备的映射关系,这样,一方面可以便于云服务器收集便携式设备所对应的图像数据等信息,另外,还可以针对不同的便携式设备所对应用户的需求,向相应的安防监控设备下发相应的安防指令。
当云服务器130接收到安防监控设备120上报的报文内容信息后,根据该报文内容信息,向该安防监控设备发送相应的安防指令。
上述安防指令可以为指示安防监控设备向联动平台发送救助请求,其中,联动平台可以包括警报平台、救助平台等,或者采集安防监控设备所对应待 监控区域内的图像数据,或者指示安防监控设备控制蜂鸣器等进行警报等。其中,该安防指令所对应的具体内容可以根据实际应用场景进行设置,本申请实施例并不对此进行限定。
另外,需要说明的是,在本申请实施例中,上述安防指令中携带有便携式设备110所对应的报文内容信息,从而便于安防监控设备120明确针对哪个便携式设备110执行相应的安防操作。
可选的,在一种具体实施方式中,上述执行的安防操作的具体内容可以为采集安防监控设备120所对应待监控区域内的图像数据,然后云服务器130基于该图像数据进行相应的分析或者备案等。
因此,在一种具体实施方式中,上述安防指令用于指示安防监控设备120采集图像数据;
相应的,在该种情况下,上述安防监控设备120,具体用于:
采集自身所对应的待监控区域内的图像数据,将上述设备相关信息添加至该图像数据中,并将添加有设备相关信息的图像数据上传至云服务器;
上述云服务器,用于:
对上述图像数据进行分析,若分析结果指示上述便携式设备所对应用户存在紧急事件,则执行针对该紧急事件的安防策略。
其中,需要说明的是,在本申请实施例中,上述图像数据可以为静态的图片,也可以为动态的视频。
例如,在一种具体实施方式中,上述紧急事件可以为财物丢失事件、摔倒事件等等,在具体实施时,针对不同的紧急事件设置有不同的安防策略,例如,针对财物丢失类型的紧急事件,所设置的安防策略可以为启动蜂鸣器或者警报等等,针对摔倒类型的可能伤害身体健康的紧急事件,所设置的安防策略可以为向指定平台进行求助,如医疗救助平台等等;当然,此处只是示例性列举紧急事件的具体形式以及所对应的具体的安防策略,并不构成对本申请实施例的限定。
其中,需要说明的是,便携式设备110所对应的安防监控设备120可以为一个,也可以为多个;当便携式设备110所对应的安防监控设备120的数量为多个时,可以按照预设规则选择一个安防监控设备120执行相应的安防 指令,也可以为相对应的各个安防监控设备120均执行该安防指令,如安防指令为图像采集指令时,为了保证所采集的图像数据的全面性,可以同时将上述安防指令发送给该便携式设备110所对应的各个安防监控设备,进而,各个安防监控设备可以采集自身所对应的待监控区域内的图像数据。
对于不同的安防监控设备120而言,其设置位置有所区别,因此,其所对应的待监控区域也不同,因此,对于各个安防监控设备120而言,其采集自身所对应待监控区域内的图像数据即可。
当然,在一种具体实施方式中,上述安防监控设备120还可以为带云台的网络监控摄像机,这样,当安防监控设备120接收到云服务器下发的安防指令后,按照预设的工作模式进行图像数据的采集。
其中,上述预设的工作模式可以为按照指定频率旋转采集图像数据,也可以为采集某个固定方向所对应区域内的图像数据;其具体可以根据实际需求进行设置,本申请实施例并不对此进行限定。
其中,上述将设备相关信息添加至图像数据可以为将该设备相关信息与该图像数据进行关联,例如,可以将设备相关信息与图像数据对应记录,从而便于云服务器在后续进行图像数据的查询或者分析工作时,可以准确的查找到便携式设备110所对应的图像数据。
在一种具体实施方式中,上述云服务器执行针对便携式设备所对应用户当前所存在的紧急事件的安防策略时,可以是:
向安防监控设备下发紧急事件警报指令,以使安防监控设备根据上述紧急事件警报指令执行相应的安防操作。
例如,在一种具体实施方式中,若是云服务器确定便携式设备所对应用户存在被偷窃风险,则可以向安防监控设备下发偷窃事件警报指令,当安防监控设备接收到云服务器下发的偷窃事件警报指令后,可以控制相应区域内的蜂鸣器发出蜂鸣警报。其中,相应区域可以为该用户所在区域。
在本申请实施例中,由于便携式设备可能为仅具有Wi-Fi模块的卡片或者项链等,其并不具备定位功能,在该种情况下,为了便于安防监控设备可以准确的采集便携式设备所在区域内的图像数据,在本申请实施例中,还可以通过RSSI(Received Signal Strength Indication,接收的信号强度指示)值进行 定位的方式确定便携式设备所对应的方位信息。
因此,在一种具体实施方式中,上述设备相关信息中还携带有便携式设备所对应的RSSI数据;
相应的,上述云服务器,还用于:
当接收到多个所述安防监控设备上报的所述便携式设备所对应的报文内容信息时,根据多个所述安防监控设备所上报的所述便携式设备所对应的RSSI值,确定所述便携式设备所对应的方位信息,并将所述方位信息发送给所述安防监控设备;
所述安防监控设备,用于接收所述方位信息,根据所述方位信息调整自身所对应的监控区域。
在具体实施时,对于各个安防监控设备而言,由于接收到的便携式设备所对应的RSSI数据可以表示接收到的便携式设备所发出的信号的强度,接收到的便携式设备所发出的信号的强度则与便携式设备的位置有关,所以通过其所采集到的便携式设备所对应的RSSI数据,可以确定出便携式设备所对应的一个区域,将基于多个安防监控设备所确定出的多个区域的重叠区域,则确定为该便携式设备所对应的方位信息。
为便于理解,下述将举例进行说明。
例如,在一种具体实施方式中,便携式设备1对应三个安防监控设备,分别记为安防监控设备1、安防监控设备2和安防监控设备3,安防监控设备1所采集到的便携式设备1的RSSI数据记为RSSI1,安防监控设备2所采集到的便携式设备2的RSSI数据记为RSSI2,安防监控设备3所采集到的便携式设备3的RSSI数据记为RSSI3;基于RSSI1可以将以安防监控设备1为中心、半径为R1的圆形区域确定为便携式设备1所对应的可能区域1;基于RSSI2可以将以安防监控设备2为中心、半径为R2的圆形区域确定为便携式设备1所对应的可能区域2;基于RSSI3可以将以安防监控设备3为中心、半径为R3的圆形区域确定为便携式设备1所对应的可能区域3;将可能区域1、可能区域2和可能区域3的重叠区域确定为便携式设备1所在的区域;因此,通过上述方式可以确定出便携式设备1针对安防监控设备的方位信息。
可选的,在本申请实施例中,为了保证报文内容信息的安全性,防止该 数据被泄露,上述安防监控设备,具体用于:
按照预设加密算法对报文内容信息进行加密,将该报文内容信息所对应的密文数据上传至云服务器。
当然,在一种具体实施方式中,还可以对无线探测请求报文中所携带的第设备相关信息进行加密处理,从而保证数据安全。
可选的,在一种具体实施方式中,上述预设加密算法可以是AES-128-CFB加密算法,当然也可以为其他加密算法,具体采用何种加密算法对上述报文内容信息进行加密可以根据实际需求进行选择,本申请实施例并不对此进行限定。
另外,需要说明的是,在本申请实施例中,在对报文内容信息进行加密时,可以只对报文内容信息中的关键字段进行加密,例如,对MAC地址:XXX;这一字段进行加密时,可以只对XXX进行加密,而字符“MAC地址”则依然采用明文的形式。
可选的,在一种具体实施方式中,当携带有便携式设备的用户进入安防区域内时,安防监控设备可以监听到便携式设备向外发送的无线请求报文,从而触发安防监控设备将所监听到的便携式设备的报文内容信息上报至云服务器,从而触发云服务器指示安防监控设备执行针对该便携式设备所对应用户的安防操作;如指示安防监控设备采集待防控区域所对应的图像数据等等。
当然,在某些具体实施方式中,用户可以通过便携式设备触发便携式设备向相应的安防监控设备发送安防请求,因此,在具体实施时,上述便携式设备110还用于向安防监控设备120发送安防请求;
相应的,上述安防监控设备120,还用于接收便携式设备110发送的安防请求,根据上述安防请求、按照预先设定的安防策略执行针对便携式设备所对应用户的安防操作。
例如,在一种具体实施方式中,上述预先设定的安防策略可以为启动警报装置,如蜂鸣器等,或者,还可以为向相关联的平台发送求助信号,如医疗救助平台等等;或者,上述安防策略还可以为采集其所对应待监控区域内的图像数据,并将便携式设备所对应的设备相关信息添加至该图像数据等等。
在具体实施时,上述安防请求的具体触发形式可以为便携式设备110所 对应用户即携带便携式设备的用户在便携式设备110上执行特定操作,如按下特定按键,或者触摸屏幕的某个区域,或者对便携式设备110执行特定手势操作,如上下晃动便携式设备,等等。当用户在便携式设备110上执行特定操作后,触发便携式设备110向云服务器130发送安防请求。
例如,在一种具体实施方式中,当便携式设备110所对应用户摔倒后,该用户可以按下设置于便携式设备110上的求助按键,从而触发便携式设备110向云服务器发送求助请求。
其中,本申请前述所描述实施例的一个实现前提条件,则是安防监控设备处于在线状态,也即安防监控设备120处于接入云服务器130的状态。但是,对于安防监控设备而言,其在某些突发情况下可能会存在离线或者掉线的情况,因此,为了实现在该种情况下的安防保障,可以预先在安防监控设备120内设置离线安防策略。所谓离线安防策略可以理解为在安防监控设备120中预先存储的、针对安防监控设备120处于离线状态下的一些可以执行的策略。
在具体实施时,安防监控设备120可以检测自身是否处于在线状态,若处于在线状态,则在接收到云服务器发送的安防指令后,根据该安防指令的指示执行相应的安防操作;若安防监控设备120处于离线状态,那么无法接收到云服务器发送的安防指令,则可以在接收到便携式设备发送的安防请求后,根据预先设定的离线安防策略执行对应的安防策略。
因此,在一种具体实施方式中,上述安防监控设备120,根据安防请求、按照预先设定的离线安防策略执行针对便携式设备110所对应用户的安防操作,具体可以通过如下过程实现:
在处于离线状态时,采集自身所对应待监控区域内的图像数据,将上述设备相关信息添加至该图像数据中,在自身处于在线状态时,将添加有上述设备相关信息的图像数据上传至云服务器。
可选的,在一种具体实施方式中,对于便携式设备而言,对于不同的工作模式,可能按照不同的频率向外发送无线探测请求报文,因此,在本申请实施例中,上述便携式设备,具体用于:
在处于紧急工作模式时,按照第一预设频率向外发送无线探测请求报文, 在处于非紧急工作模式时,按照第二预设频率向外发送无线探测请求报文;其中,所述第一预设频率大于所述第二预设频率。
由于处于紧急工作模式时,说明便携式设备的用户可能遭遇危及安全的紧急事件,所以为了使得安防监控设备能够尽快监听到无线探测请求报文,可以更频繁地向外发送无线探测请求报文。而便携式设备处于紧急工作模式时,说明便携式设备的用户可能并未遭遇危及安全的紧急事件,所以降低向外发送无线探测请求报文的频繁程度,也就是说,上述第一预设频率可以大于第二预设频率。
可选的,在一种具体实施方式中,所述报文内容信息中还携带有所述便携式设备所对应的工作模式信息;所述工作模式包括紧急工作模式和非紧急工作模式;
所述云服务器,具体用于:
根据所述报文内容信息判断所述便携式设备是否处于紧急工作模式,若是,则执行针对所述便携式设备所对应用户的紧急安防操作。
例如,上述紧急安防操作可以为紧急警报操作或者紧急救助操作,当然这些操作可以由云服务器执行,也可以由云服务器指示安防监控设备执行。除此之外,在执行上述紧急安防操作之前,也可以指示安防监控设备采集针对便携式设备的图像数据,以使云服务器基于该图像数据进行紧急校验,以确定该便携式设备所对应用户是否处于紧急状态。
作为一种实施方式,云服务器接收到安防监控设备采集针对便携式设备的图像数据后,可以通过图像检测等方式,确定图像数据中所包括的用户是否处于紧急状态,以对图像数据进行紧急校验。
例如,云服务器接收到安防监控设备采集针对便携式设备的图像数据后,可以通过图像检测等方式,确定图像数据中所包括的用户是否处于摔倒状态,如果是,则可以确定该用户处于摔倒紧急状态。
本申请实施例提供的安防监控系统,包括便携式设备、安防监控设备和云服务器,便携式设备可以向外发送无线探测请求报文,当安防监控设备监听到便携式设备发送的无线探测请求报文后,向云服务器上报所监听到的报文内容信息,云服务器在接收到安防监控设备上报的报文内容信息后,向安 防监控设备下发针对该便携式设备所对应用户的安防指令,从而使得该安防监控设备执行针对便携式设备所对应用户的安防操作;也即,在本申请实施例中,通过便携式设备、安防监控设备以及云服务器三者相互配合,能够在用户需要进行安防保障时及时执行针对用户的安防操作,增强了用户安防保障的及时性和有效性。
对应于本申请图1所示实施例提供的安防监控系统,基于相同的思路,本申请实施例还提供了一种安防监控方法,该方法应用于安防监控设备,图2为本申请实施例提供的安防监控方法的第一种方法流程图,如图2所示,该方法至少包括如下步骤:
步骤202,监听便携式设备发送的无线探测请求报文;其中,所述无线探测请求报文中携带有所述便携式设备的设备相关信息;
步骤204,在监听到所述无线探测请求报文时,向云服务器上报所监听到的所述无线探测请求报文的报文内容信息;
步骤206,接收所述云服务器下发的针对所述便携式设备所对应用户的安防指令,根据所述安防指令的指示执行相应的安防操作。
可选的,所述根据所述安防指令的指示执行相应的安防操作,包括:
采集自身所对应的待监控区域内的图像数据;
将所述设备相关信息添加至所述图像数据中,并将添加有所述设备相关信息的图像数据上传至所述云服务器;
可选的,本申请实施例提供的方法,还包括:
在自身处于离线状态时,采集自身所对应待监控区域内的图像数据;
将所述设备相关信息添加至所述图像数据中,并在自身处于在线状态时,将添加有所述设备相关信息的图像数据上传至云服务器。
可选的,本申请实施例提供的方法,还包括:
接收所述便携式设备发送的所述安防请求;
根据所述安防请求、按照预先设定的安防策略执行针对所述便携式设备所对应用户的安防操作。
为便于理解本申请实施例提供的方法,下述将以上述便携式设备为智能卡为例,以智能卡、安防监控设备和云服务器交互的方式介绍本申请实施例 提供的方法,图3为本申请实施例提供的安防监控方法的第二种流程示意图,如图3所示,该方法至少包括如下步骤:
步骤302,智能卡检测自身是否处于紧急工作模式;若是,则执行步骤304,否则,执行步骤306;
步骤304,智能卡按照第二频率通过Wi-Fi向周围发送无线探测请求报文;
其中,上述无线探测请求帧中携带有智能卡的标识信息;
步骤306,智能卡按照第一频率通过Wi-Fi向周围发送无线探测请求报文;
步骤308,安防监控设备监听到智能卡发送的无线探测请求报文后,向云服务器上报所监听到的无线探测请求报文的报文内容信息;
其中,上述报文内容信息携带有智能卡的标识信息和智能卡的工作模式信息;
步骤310,云服务器根据上述报文内容信息判断智能卡是否处于紧急工作模式;若是,则执行步骤312;否则,执行步骤314;
步骤312,云服务器执行针对紧急事件的安防策略;
步骤314,云服务器向上述安防监控设备发送图像采集指令;
其中,上述图像采集指令中携带有智能卡所对应的设备相关信息;
步骤316,安防监控设备检测自身处于在线状态;若是,则执行步骤318;否则,执行步骤320;
步骤318,安防监控设备根据云服务器下发的图像采集指令进行图像采集,并将上述设备相关信息添加至上述图像数据中上报至云服务器;
步骤320,安防监控设备进行图像采集,并将上述设备相关信息添加至该图像数据中,在处于在线状态时,将该图像数据上报至云服务器;
步骤322,云服务器对该图像数据进行分析或者存储。
其中,本申请实施例所提供方法中各个步骤的具体实现过程可参考图1所示实施例,此处不再赘述。
本申请实施例提供的安防监控方法,便携式设备可以向外发送无线探测请求报文,当安防监控设备监听到便携式设备发送的无线探测请求报文后,向云服务器上报所监听到的报文内容信息,云服务器在接收到安防监控设备上报的报文内容信息后,向安防监控设备下发针对该便携式设备所对应用户 的安防指令,从而使得该安防监控设备执行针对便携式设备所对应用户的安防操作;也即,在本申请实施例中,通过便携式设备、安防监控设备以及云服务器三者相互配合,能够在用户需要进行安防保障时及时执行针对用户的安防操作,增强了用户安防保障的及时性和有效性。
对应于图2所示实施例提供的方法,基于相同的思路,本申请实施例还提供了一种安防监控设备,用于执行图2所示实施例提供的方法,图4为本申请实施例提供的安防监控设备的模块组成示意图,如图4所示,该设备包括:
监听模块402,用于监听便携式设备发送的无线探测请求报文;其中,所述无线探测请求报文中携带有所述便携式设备的设备相关信息;
通信模块404,用于在监听到所述无线探测请求报文时,向云服务器上报所监听到的所述无线探测请求报文的报文内容信息;以及,接收所述云服务器下发的针对所述便携式设备所对应用户的安防指令;
处理器406,用于根据所述安防指令的指示执行相应的安防操作。
可选的,本申请实施例所提供的安防监控设备可实现图2所示实施例中的全部方法步骤,此处不再赘述。
本申请实施例提供的安防监控设备,能够在用户需要进行安防保障时及时执行针对用户的安防操作,增强了用户安防保障的及时性和有效性。
相应于本申请实施例提供的一种安防监控方法,本申请实施例提供一种网络设备,参见图5所示,网络设备包括处理器510、收发机530、存储器520和总线接口。其中:
在本发明实施例中,网络设备500还包括:存储在存储器520上并可在所述处理器510上运行的计算机程序,所述计算机程序被所述处理器510执行时实现上述安防监控方法的全部方法步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。
在图5中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器510代表的一个或多个处理器和存储器520代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是本领域所公知的,因此,本文不再对其 进行进一步描述。总线接口提供接口。收发机530可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。
处理器510负责管理总线架构和通常的处理,存储器520可以存储处理器510在执行操作时所使用的数据。
本发明实施例还提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时实现上述方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。其中,所述的计算机可读存储介质,如只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等。
在本申请提供的又一实施例中,还提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述任意实施例所述的方法步骤。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本发明各个实施例所述的方法。
上面结合附图对本发明的实施例进行了描述,但是本发明并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本发明的启示下,在不脱离本发明宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本发明的保护之内。

Claims (17)

  1. 一种安防监控系统,其特征在于,包括:便携式设备、安防监控设备和云服务器;
    所述便携式设备,用于向外发送无线探测请求报文;其中,所述无线探测请求报文中携带有所述便携式设备的设备相关信息;
    所述安防监控设备,用于监听所述无线探测请求报文,在监听到所述无线探测请求报文时,向所述云服务器上报所监听到的所述无线探测请求报文的报文内容信息;以及,接收所述云服务器下发的安防指令,根据所述安防指令的指示执行相应的安防操作;
    所述云服务器,用于接收所述报文内容信息,并向所述安防监控设备下发针对所述便携式设备所对应用户的安防指令。
  2. 如权利要求1所述的系统,其特征在于,所述安防指令用于指示所述安防监控设备采集图像数据;
    相应的,所述安防监控设备,具体用于:
    采集自身所对应的待监控区域内的图像数据,并将所述设备相关信息添加至所述图像数据中,将添加有所述设备相关信息的图像数据上传至所述云服务器;
    所述云服务器,还用于:
    对所述图像数据进行分析,若分析结果指示所述便携式设备所对应用户存在紧急事件,则执行针对所述紧急事件的安防策略。
  3. 如权利要求2所述的系统,其特征在于,所述设备相关信息中携带有所述便携式设备接收的信号强度指示RSSI数据;
    所述云服务器,还用于:
    当接收到多个所述安防监控设备上报的所述便携式设备所对应的报文内容信息时,根据多个所述安防监控设备所上报的所述便携式设备所对应的RSSI值,确定所述便携式设备所对应的方位信息,并将所述方位信息发送给所述安防监控设备;
    所述安防监控设备,用于接收所述方位信息,根据所述方位信息调整自身所对应的监控区域。
  4. 如权利要求2所述的系统,其特征在于,所述云服务器,具体用于:
    向所述安防监控设备下发紧急事件警报指令,以使所述安防监控设备根据所述紧急事件警报指令的指示执行相应的安防操作。
  5. 如权利要求1所述的系统,其特征在于,所述安防监控设备,具体用于:
    按照预设加密算法对所述报文内容信息进行加密,将所述报文内容信息所对应的密文数据上传至所述云服务器。
  6. 如权利要求1所述的系统,其特征在于,所述安防监控设备,还用于:
    在自身处于离线状态时,采集自身所对应待监控区域内的图像数据,将所述设备相关信息添加至所述图像数据中,在自身处于在线状态时,将添加有所述设备相关信息的图像数据上传至云服务器。
  7. 如权利要求1所述的系统,其特征在于,所述便携式设备,具体用于:
    在处于紧急工作模式时,按照第一预设频率向外发送无线探测请求报文,在处于非紧急工作模式时,按照第二预设频率向外发送无线探测请求报文;其中,所述第一预设频率大于所述第二预设频率。
  8. 如权利要求1所述的系统,其特征在于,所述报文内容信息中还携带有所述便携式设备所对应的工作模式信息;所述工作模式包括紧急工作模式和非紧急工作模式;
    所述云服务器,具体用于:
    根据所述报文内容信息判断所述便携式设备是否处于紧急工作模式,若是,则执行针对所述便携式设备所对应用户的紧急安防操作。
  9. 如权利要求1所述的系统,其特征在于,所述便携式设备,还用于向所述安防监控设备发送所述安防请求;
    所述安防监控设备,还用于接收所述便携式设备发送的所述安防请求,根据所述安防请求、按照预先设定的安防策略执行针对所述便携式设备所对应用户的安防操作。
  10. 一种安防监控方法,应用于安防监控设备,其特征在于,所述方法包括:
    监听便携式设备发送的无线探测请求报文;其中,所述无线探测请求报 文中携带有所述便携式设备的设备相关信息;
    在监听到所述无线探测请求报文时,向云服务器上报所监听到的所述无线探测请求报文的报文内容信息;
    接收所述云服务器下发的针对所述便携式设备所对应用户的安防指令,根据所述安防指令的指示执行相应的安防操作。
  11. 如权利要求10所述的方法,其特征在于,所述根据所述安防指令的指示执行相应的安防操作,包括:
    采集自身所对应的待监控区域内的图像数据;
    将所述设备相关信息添加至所述图像数据中,并将添加有所述设备相关信息的图像数据上传至所述云服务器。
  12. 如权利要求10所述的方法,其特征在于,所述方法还包括:
    在自身处于离线状态时,采集自身所对应待监控区域内的图像数据;
    将所述设备相关信息添加至所述图像数据中,并在自身处于在线状态时,将添加有所述设备相关信息的图像数据上传至云服务器。
  13. 如权利要求10所述的方法,其特征在于,所述方法还包括:
    接收所述便携式设备发送的所述安防请求;
    根据所述安防请求、按照预先设定的安防策略执行针对所述便携式设备所对应用户的安防操作。
  14. 一种安防监控设备,其特征在于,所述设备包括:
    监听模块,用于监听便携式设备发送的无线探测请求报文;其中,所述无线探测请求报文中携带有所述便携式设备的设备相关信息;
    通信模块,用于在监听到所述无线探测请求报文时,向云服务器上报所监听到的所述无线探测请求报文的报文内容信息;以及,接收所述云服务器下发的针对所述便携式设备所对应用户的安防指令;
    处理器,用于根据所述安防指令的指示执行相应的安防操作。
  15. 一种计算机设备,其特征在于,包括处理器、通信接口、存储器和通信总线;其中,所述处理器、所述通信接口以及所述存储器通过总线完成相互间的通信;所述存储器,用于存放计算机程序;所述处理器,用于执行所述存储器上所存放的程序,实现权利要求10-13任一所述的方法步骤。
  16. 一种计算机可读存储介质,其特征在于,所述存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现权利要求10-13任一所述的方法步骤。
  17. 一种包含指令的计算机程序产品,其特征在于,当其在计算机上运行时,使得所述计算机执行权利要求10-13任一项所述的方法。
PCT/CN2022/094993 2021-06-23 2022-05-25 一种安防监控系统及安防监控方法、设备 WO2022267803A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110699892.9A CN113438306B (zh) 2021-06-23 2021-06-23 一种安防监控系统及安防监控方法、设备
CN202110699892.9 2021-06-23

Publications (1)

Publication Number Publication Date
WO2022267803A1 true WO2022267803A1 (zh) 2022-12-29

Family

ID=77753600

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/094993 WO2022267803A1 (zh) 2021-06-23 2022-05-25 一种安防监控系统及安防监控方法、设备

Country Status (2)

Country Link
CN (1) CN113438306B (zh)
WO (1) WO2022267803A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113438306B (zh) * 2021-06-23 2022-07-08 杭州萤石软件有限公司 一种安防监控系统及安防监控方法、设备

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105163281A (zh) * 2015-09-07 2015-12-16 广东欧珀移动通信有限公司 一种室内定位方法及用户终端
CN105848094A (zh) * 2016-05-11 2016-08-10 大连乐图数字科技有限公司 一种追踪方法、设备以及系统
CN108242120A (zh) * 2017-08-08 2018-07-03 上海仁微电子科技股份有限公司 一种基于身份识别和定位追踪的安防检测系统及其方法
CN109379716A (zh) * 2018-11-22 2019-02-22 上海道枢信息技术有限公司 一种用于安防监控项目的室内定位方法及系统
EP3755010A1 (en) * 2019-06-21 2020-12-23 Pycom Ltd User-requested message transmission to devices near a second device
CN112235711A (zh) * 2019-06-28 2021-01-15 北京海益同展信息科技有限公司 安防系统及用于该安防系统的定位方法
CN113438306A (zh) * 2021-06-23 2021-09-24 杭州萤石软件有限公司 一种安防监控系统及安防监控方法、设备

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102201152A (zh) * 2011-05-20 2011-09-28 汕头市星达电子科技有限公司 智能安防监控报警系统及其方法
EP2871624B1 (en) * 2012-07-05 2017-03-01 Technomirai Co., Ltd Digital security network system and method
CN103838155A (zh) * 2012-11-27 2014-06-04 海尔集团公司 家庭安防控制方法、家庭服务器及安防控制系统
CN107979741B (zh) * 2016-10-25 2021-03-23 杭州萤石网络有限公司 一种安防监控方法、自主行动装置及安防监控系统
CN109802871B (zh) * 2019-03-04 2020-07-10 佛山大鱼智能家居科技有限公司 智能安防系统的控制方法

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105163281A (zh) * 2015-09-07 2015-12-16 广东欧珀移动通信有限公司 一种室内定位方法及用户终端
CN105848094A (zh) * 2016-05-11 2016-08-10 大连乐图数字科技有限公司 一种追踪方法、设备以及系统
CN108242120A (zh) * 2017-08-08 2018-07-03 上海仁微电子科技股份有限公司 一种基于身份识别和定位追踪的安防检测系统及其方法
CN109379716A (zh) * 2018-11-22 2019-02-22 上海道枢信息技术有限公司 一种用于安防监控项目的室内定位方法及系统
EP3755010A1 (en) * 2019-06-21 2020-12-23 Pycom Ltd User-requested message transmission to devices near a second device
CN112235711A (zh) * 2019-06-28 2021-01-15 北京海益同展信息科技有限公司 安防系统及用于该安防系统的定位方法
CN113438306A (zh) * 2021-06-23 2021-09-24 杭州萤石软件有限公司 一种安防监控系统及安防监控方法、设备

Also Published As

Publication number Publication date
CN113438306A (zh) 2021-09-24
CN113438306B (zh) 2022-07-08

Similar Documents

Publication Publication Date Title
US10446000B2 (en) Detecting an intruder's wireless device during a break in to a premises
US9761123B2 (en) System and method for identifying alarm system problems
US8392552B2 (en) System and method for providing configurable security monitoring utilizing an integrated information system
CN105745869B (zh) 用于区域性网络/家庭网络的安全网关
CA2989010C (en) Systems, methods and techniques for device pairing via a short-range pairing mechanism
US9414214B2 (en) Emergency radio communications system incorporating integral public safety radio bridging capability
WO2022267803A1 (zh) 一种安防监控系统及安防监控方法、设备
CN107094298A (zh) 防范非法无线网络接入的模块、无线网络接入设备及方法
CN113408006A (zh) 监控数据访问方法、装置、室内监控系统及存储介质
CN108400953A (zh) 控制终端上网及终端上网的方法,路由器设备及终端
TW201336287A (zh) 手機監控警報方法及系統
CN111723410A (zh) 硬盘加密方法、硬盘锁系统、硬盘加密设备及存储介质
CN107483544A (zh) 一种移动智能监控系统及监控方法
CA3064667A1 (en) Network­based alert system and method
US20190037612A1 (en) Connecting method to an information capture device
US20080288628A1 (en) Methods, systems, and computer program products for monitoring communications and taking a responsive action
CN113341856B (zh) 一种安防监控系统及安防监控方法、设备
WO2012000331A1 (zh) 仓库监控方法、系统及移动终端
US10104638B1 (en) Network device location detection and monitoring using a distributed wireless network
KR101458365B1 (ko) 영상기기 보이스 알람 시스템 및 그 운용방법
US10825329B2 (en) Identifying data of a person using of a personal emergency device
EP3485662B1 (en) Live paging system and methods of using the same
US10204497B1 (en) Alarm notification system
KR101983252B1 (ko) 주변기기 정보 수집 방법 및 시스템
JP2001357012A (ja) ネットワーク不正アクセス防止システム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22827300

Country of ref document: EP

Kind code of ref document: A1

WD Withdrawal of designations after international publication
NENP Non-entry into the national phase

Ref country code: DE