CN113689686A - Intelligent security method and system applying big data service - Google Patents

Intelligent security method and system applying big data service Download PDF

Info

Publication number
CN113689686A
CN113689686A CN202110821576.4A CN202110821576A CN113689686A CN 113689686 A CN113689686 A CN 113689686A CN 202110821576 A CN202110821576 A CN 202110821576A CN 113689686 A CN113689686 A CN 113689686A
Authority
CN
China
Prior art keywords
terminal
information
area
time period
alarm information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110821576.4A
Other languages
Chinese (zh)
Other versions
CN113689686B (en
Inventor
白锦文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Judun Technology Development Co ltd
Original Assignee
Guangzhou Judun Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Judun Technology Development Co ltd filed Critical Guangzhou Judun Technology Development Co ltd
Priority to CN202110821576.4A priority Critical patent/CN113689686B/en
Publication of CN113689686A publication Critical patent/CN113689686A/en
Application granted granted Critical
Publication of CN113689686B publication Critical patent/CN113689686B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B31/00Predictive alarm systems characterised by extrapolation or other computation using updated historic data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Computation (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Artificial Intelligence (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)

Abstract

The invention relates to the technical field of intelligent security, in particular to an intelligent security method and system applying big data service, which comprises the following steps: receiving trigger information from a first area; under the condition that the trigger information from the first area is obtained, sending first alarm information to at least one second terminal; when receiving execution information from a first terminal within a preset time period, sending completion information to a second terminal which has sent first alarm information in advance, and after receiving second alarm information, a security worker in a first area associated with the first terminal can send the execution information through the first terminal, wherein the preset time period refers to a time period when a time span from a starting point to an ending point when the first alarm information is sent reaches a preset time span. The method and the system have the effect of monitoring the work of security personnel, so that the security personnel can respond to the emergency in time.

Description

Intelligent security method and system applying big data service
Technical Field
The invention relates to the technical field of intelligent security, in particular to an intelligent security method and system applying big data service.
Background
In the security protection mode of some buildings in the prior art, the building is generally divided into a plurality of areas, each area of the building is monitored by using a camera device and the like, a plurality of security protection personnel are arranged to patrol the plurality of areas respectively, and the security protection personnel in one area are responsible for security protection of one area. However, the inventors believe that this approach has the following disadvantages: when the security personnel in charge of the area is in negligence or poor in opening, the response to the emergency is not timely, and therefore improvement is needed.
Disclosure of Invention
In order to play a role in monitoring the work of security personnel and enable the security personnel to respond to an emergency in time, the application provides the intelligent security method and the intelligent security system applying the big data service.
The above object of the present invention is achieved by the following technical solutions:
an intelligent security method applying big data service comprises the following steps:
receiving trigger information from a first area, wherein the trigger information is generated by a front-end camera device, the front-end camera device shoots the first area in real time to obtain video stream data, and the front-end camera device analyzes the video stream data and generates the trigger information according to an analysis result;
under the condition that trigger information from a first area is obtained, first alarm information is sent to at least one second terminal, the second terminal is associated with security personnel in a second area, and after the second terminal receives the first alarm information, the security personnel associated with the second terminal can send out second alarm information through the second terminal;
receiving execution information from a first terminal, wherein the first terminal is associated with security personnel in the first area, and after the first terminal receives second alarm information, the security personnel in the first area associated with the first terminal can send the execution information through the first terminal;
when receiving execution information from a first terminal within a preset time period, sending completion information to a second terminal which has sent first alarm information in advance, wherein after the first terminal receives the second alarm information, security personnel in a first area associated with the first terminal can send the execution information through the first terminal, and the preset time period refers to a time period when a time span from a starting point to a terminating point when the first alarm information is sent reaches a preset time span.
By adopting the technical scheme, the front-end camera shooting equipment shoots the first area in real time to obtain video stream data, and the front-end camera equipment analyzes the acquired video stream data, generates trigger information according to the analysis result, that is, when an emergency occurs in the first area, trigger information can be generated, and after receiving the trigger information, sending the first alarm information to at least one second terminal, after the second terminal receives the first alarm information, the security personnel associated with the second terminal may send a second alarm message to the first terminal via the second terminal, at which point, the security personnel associated with the first terminal can send out the execution information through the first terminal, when the security personnel send out the execution information within the preset time period, the method indicates that the security personnel carry out accident handling in time, thereby having the effect of mutual supervision among the security personnel.
The present application may be further configured in a preferred example to: further comprising:
when the request information from the first terminal is received within a preset time period, or,
when any one of the execution information and the request information is not received from the first terminal within a preset time period:
the method comprises the steps of obtaining video stream data in a specified time period of a first area, analyzing the video stream data to generate recommended processing people, sending first assistance information to second terminals which are screened out according to a preset rule and have the same number as the recommended processing people, sending request information to security personnel in the first area related to the first terminal through the first terminal after the first terminal receives second alarm information, wherein the first assistance information comprises position information of the first terminal;
and when the second terminal reaches the position corresponding to the position information of the first terminal, sending a completion message to the second terminal which has sent the first assistance message in advance.
By adopting the technical scheme, the request information indicates that the security protection personnel in the first area need assistance, when the request information is received, the video stream data is analyzed to generate the recommended number of people to be processed, then the first assistance information is sent to the second terminals which are screened out according to the preset rule and have the same number as the recommended number of people to be processed, and when the security protection personnel related to the second terminals reach the position of the first terminal, the completion information is sent to the second terminal which sends the first assistance information in advance, so that when accidents or accidents occur to the security protection personnel in the first area, or the security protection personnel in the first area need assistance, the security protection personnel in other areas can support the first area according to the specific conditions of the emergency.
The present application may be further configured in a preferred example to: the second terminal is a terminal other than the first terminal, in which the information received last time is not the second alarm information.
By adopting the technical scheme, the terminal is screened, so that the workload of security personnel processing the region is reduced.
The present application may be further configured in a preferred example to: the second terminals which are screened out according to the preset rule and have the same number as the recommended number of the processing persons comprise the following steps:
and screening out the second terminals with the same quantity according to the sorting from far to near of the first sequence table, wherein the first sequence table is used for sorting each second terminal from far to near according to the position corresponding to the position information of the first terminal.
By adopting the technical scheme, the security personnel in the area with relatively short distance can be supported.
The present application may be further configured in a preferred example to: analyzing the video stream data to generate a recommended number of processing people comprises:
inputting the video stream data into a neural network model trained in advance through big data to generate recommended treatment population, wherein the neural network model is obtained by a plurality of groups of experimental data through machine learning training, and each group of experimental data in the plurality of groups of experimental data comprises: video stream data, and a recommended number of processing people corresponding to the video stream data.
The application also provides an intelligent security system applying the big data service.
An intelligent security system applying big data service, comprising:
the trigger information receiving module is used for receiving trigger information from a first area, the trigger information is generated by front-end camera equipment, the front-end camera equipment shoots the first area in real time to obtain video stream data, and the front-end camera equipment analyzes the video stream data and generates the trigger information according to an analysis result;
the alarm information sending module is used for sending first alarm information to at least one second terminal under the condition that trigger information from a first area is obtained, the second terminal is associated with security personnel in the second area, and after the second terminal receives the first alarm information, the security personnel associated with the second terminal can send out second alarm information through the second terminal;
the execution information receiving module is used for receiving execution information from a first terminal, the first terminal is associated with security personnel in the first area, and after the first terminal receives second alarm information, the security personnel in the first area associated with the first terminal can send out the execution information through the first terminal;
the system comprises a completion information sending module and a second terminal, wherein the completion information sending module is used for sending completion information to a second terminal which sends first alarm information in advance when receiving execution information from a first terminal within a preset time period, after the first terminal receives second alarm information, security personnel in a first area associated with the first terminal can send the execution information through the first terminal, and the preset time period refers to a time period when a time span from a starting point to a terminating point when the first alarm information is sent reaches a preset time span.
The present application may be further configured in a preferred example to: further comprising:
an assistance information sending module, configured to, when the request information is received from the first terminal within a preset time period, or when any one of the execution information and the request information is not received from the first terminal within the preset time period: the method comprises the steps of obtaining video stream data in a specified time period of a first area, analyzing the video stream data to generate recommended processing people, sending first assistance information to second terminals which are screened out according to a preset rule and have the same number as the recommended processing people, sending request information to security personnel in the first area related to the first terminal through the first terminal after the first terminal receives second alarm information, wherein the first assistance information comprises position information of the first terminal;
and the assistance completion sending module is used for sending completion information to the second terminal which previously sends the first assistance information when the second terminal reaches the position corresponding to the position information of the first terminal.
The present application may be further configured in a preferred example to: the second terminals which are screened out according to the preset rule and have the same number as the recommended number of the processing persons comprise the following steps:
and screening out the second terminals with the same quantity according to the sorting from far to near of the first sequence table, wherein the first sequence table is used for sorting each second terminal from far to near according to the position corresponding to the position information of the first terminal.
In summary, the present application includes at least one of the following beneficial technical effects:
1. the method comprises the steps that a front-end camera device shoots a first area in real time to obtain video stream data, analyzes the obtained video stream data, generates trigger information according to an analysis result, namely when an emergency occurs in the first area, the trigger information can be generated, after the trigger information is received, first alarm information is sent to at least one second terminal, after the second terminal receives the first alarm information, security personnel associated with the second terminal can send second alarm information to the first terminal through the second terminal, at the moment, the security personnel associated with the first terminal can send execution information through the first terminal, and when the security personnel send the execution information within a preset time period, the security personnel can timely carry out accident processing, so that a mutual supervision effect is achieved among the security personnel;
2. the request information indicates that security personnel in the first area need assistance, when the request information is received, the video stream data is analyzed to generate recommended processing personnel number, then the first assistance information is sent to the second terminals which are screened out according to the preset rule and have the same number as the recommended processing personnel number, when the security personnel related to the second terminals reach the position of the first terminal, the completion information is sent to the second terminals which send the first assistance information in advance, and therefore when accidents or accidents occur to the security personnel in the first area or the security personnel in the first area need assistance, the security personnel in other areas can support the first area according to the specific conditions of the emergency.
Drawings
FIG. 1 is a flowchart of a security method using big data services according to an embodiment of the present application;
FIG. 2 is a schematic block diagram of an embodiment of the present disclosure, in which a smart security system using big data services is applied;
fig. 3 is a schematic diagram of an apparatus in an embodiment of the present application.
Detailed Description
The present application is described in further detail below with reference to the attached drawings.
The application discloses an intelligent security method applying big data service, which specifically comprises the following steps with reference to fig. 1:
s1, receiving trigger information from the first area;
the trigger information is generated by front-end camera equipment, the front-end camera equipment shoots the first area in real time to obtain video stream data, and the front-end camera equipment analyzes the video stream data and generates the trigger information according to an analysis result;
in one embodiment, a building group consisting of a building and a plurality of buildings, or an area needing security precaution, is divided into a plurality of areas, including a first area to an nth area, each area is provided with a front-end camera device, the corresponding area is shot in real time, video stream data of the first area is obtained, after the video stream data is obtained, the front-end camera device analyzes the video stream data, specifically, behavior analysis is performed, the front-end camera device can adopt an intelligent network camera with iDS-2CD6124FWD-I (Z)/B behavior analysis, and the front-end camera device generates trigger information according to a behavior analysis result when behaviors such as fighting, quarrel, mechanical holding and the like are obtained through analysis; the terminal can be a handheld device, such as an intelligent device with a communication function, such as an interphone, a mobile phone and the like with a screen display function and a positioning function.
S2, under the condition that the trigger information from the first area is obtained, sending first alarm information to at least one second terminal;
the second terminal is associated with security personnel in the second area, after the second terminal receives the first alarm information, the security personnel associated with the second terminal can send out second alarm information through the second terminal, and the first terminal is associated with the security personnel in the first area;
the areas can be distinguished by numbering the front-end camera equipment, and identifying the trigger information sent by different front-end camera equipment through identifying the numbers, so that the area where the trigger information is located is determined, and the association can be equipment, and security personnel in charge of the area can be equipped with a terminal. For example, security personnel in the first area are provided with the first terminal. When the second terminal receives the first alarm information, after the security personnel consult the first alarm information, the second alarm information can be sent out through the second terminal, and before the second terminal receives the first alarm information, the second terminal cannot send out the second alarm information.
In a preferred embodiment, the second terminal is a terminal other than the first terminal, which has received the information not the second alarm information most recently.
This kind of setting for the security personnel who just received second alarm information can not receive first alarm information, and then has reduced the security personnel of second alarm information and received the possibility of first alarm information again, thereby can comparatively focus on and handle emergency.
S3, receiving the execution information from the first terminal;
after the first terminal receives the second alarm information, security personnel in a first area associated with the first terminal can send out execution information through the first terminal;
the first terminal receives the second alarm information from the second terminal, at this time, security personnel associated with the first terminal can send execution information through the first terminal, and before the first terminal receives the second alarm information, the first terminal cannot send the execution information, so that when the security personnel send the execution information through the first terminal, the execution confirmation of the security personnel in the first area is represented.
S4, when receiving the execution information from the first terminal within a preset time period, transmitting a completion information to the second terminal having previously transmitted the first alarm information;
after the first terminal receives the second alarm information, security personnel in the first area associated with the first terminal can send execution information through the first terminal, and the preset time period refers to a time period when a time span from a starting point to a terminating point when the first alarm information is sent reaches a preset time span.
For example, the preset time period may be a time period having a time span of 30s from when the first alarm information is issued, and the time span may be set autonomously in advance, and when the execution information from the first terminal is received within the time period, the completion information is transmitted to the second terminal that has previously transmitted the first alarm information.
S5, when the request information from the first terminal is received within the preset time period, or when any one of the execution information and the request information from the first terminal is not received within the preset time period: acquiring video stream data in a specified time period of a first area, analyzing the video stream data to generate recommended processing people, and sending first assistance information to second terminals which are screened out according to a preset rule and have the same number as the recommended processing people;
after the first terminal receives the second alarm information, security personnel in a first area associated with the first terminal can send request information through the first terminal, and the first assistance information comprises position information of the first terminal;
when a security worker sends a request information representation request for assistance through a first terminal, or the security worker does not send any one of request information and execution information through the first terminal within a preset time period, which indicates that the security worker in a first area may need assistance or cannot process an emergency, when the request information of the first terminal is received, video stream data in a specified time period of the first area is obtained, the specified time period may be a time period in which a time span from a starting point to an ending point of the trigger information is received as a preset time span, for example, the preset time span is 20s, the video stream data is analyzed, so as to generate a recommended processing number of people, then first assistance information is sent to second terminals which are screened out according to a preset rule and have the same number as the recommended processing number of people, and when the security worker associated with the second terminals arrives at the position of the first terminal, and sending a completion message to the second terminal which has previously sent the first assistance message, so that when an accident or accident occurs to the security personnel in the first area or the security personnel in the first area needs help, the security personnel in the other areas can support the first area according to the specific situation of the emergency.
Wherein analyzing the video stream data to generate the recommended number of people to process comprises:
inputting video stream data into a neural network model trained in advance through big data to generate recommended treatment population, wherein the neural network model is obtained by a plurality of groups of experimental data through machine learning training, and each group of experimental data in the plurality of groups of experimental data comprises: video stream data, and a recommended number of processing people corresponding to the video stream data.
And with the increase of experimental data, the reasoning of recommended treatment population is more accurate.
The second terminals which are screened out according to the preset rule and have the same number with the recommended number of the processing people comprise the following steps:
and screening out the second terminals with the same quantity according to the sorting from far to near of the first sequence table, wherein the first sequence table is used for sorting each second terminal from far to near according to the position corresponding to the position information of the first terminal.
For example, there are 10 second terminals, the first sequence list sorts the 10 second terminals according to their distance from the first terminal, and the recommended number of people to be treated is 3, then the first assistance information is sent to the first three second terminals in the first sequence list.
S6, when the second terminal reaches the position corresponding to the position information of the first terminal, sending a completion message to the second terminal that has sent the first assistance message earlier.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
In an embodiment, an intelligent security system using big data service is provided, and the intelligent security system using big data service corresponds to the intelligent security method using big data service in the above embodiment one to one. As shown in fig. 2, the smart security system using big data service includes a trigger information receiving module, an alarm information sending module, an execution information receiving module, and a completion information sending module. The functional modules are explained in detail as follows:
the trigger information receiving module is used for receiving trigger information from the first area, the trigger information is generated by front-end camera equipment, the front-end camera equipment shoots the first area in real time to obtain video stream data, the front-end camera equipment analyzes the video stream data and generates the trigger information according to an analysis result;
the alarm information sending module is used for sending first alarm information to at least one second terminal under the condition that the trigger information from the first area is obtained, the second terminal is associated with security personnel in the second area, and after the second terminal receives the first alarm information, the security personnel associated with the second terminal can send out second alarm information through the second terminal;
the execution information receiving module is used for receiving execution information from the first terminal, the first terminal is associated with security personnel in the first area, and after the first terminal receives the second alarm information, the security personnel in the first area associated with the first terminal can send out the execution information through the first terminal;
the system comprises a completion information sending module and a second terminal, wherein the completion information sending module is used for sending the completion information to the second terminal which sends first alarm information in advance when receiving execution information from the first terminal in a preset time period, after the first terminal receives the second alarm information, security personnel in a first area associated with the first terminal can send the execution information through the first terminal, and the preset time period refers to a time period when a time span from a starting point to a terminating point when the first alarm information is sent reaches a preset time span.
Optionally, the method further includes:
an assistance information sending module, configured to, when the request information is received from the first terminal within a preset time period, or when any one of the execution information and the request information is not received from the first terminal within the preset time period: acquiring video stream data in a specified time period of a first area, analyzing the video stream data to generate a recommended processing number of people, sending first assistance information to second terminals which are screened out according to a preset rule and have the same number as the recommended processing number of people, and sending request information by security personnel in the first area related to the first terminal through the first terminal after the first terminal receives second alarm information, wherein the first assistance information comprises position information of the first terminal;
and the assistance completion sending module is used for sending completion information to the second terminal which has sent the first assistance information before when the second terminal reaches the position corresponding to the position information of the first terminal.
For specific limitations of the smart security system applying the big data service, reference may be made to the above limitations of the smart security method applying the big data service, and details are not described herein again. All modules in the intelligent security system applying the big data service can be completely or partially realized through software, hardware and a combination of the software and the hardware. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 3. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to realize an intelligent security method applying big data service.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
receiving trigger information from the first area, wherein the trigger information is generated by front-end camera equipment, the front-end camera equipment shoots the first area in real time to obtain video stream data, and the front-end camera equipment analyzes the video stream data and generates the trigger information according to an analysis result;
under the condition that the trigger information from the first area is obtained, sending first alarm information to at least one second terminal, wherein the second terminal is associated with security personnel in the second area, and after receiving the first alarm information, the security personnel associated with the second terminal can send out second alarm information through the second terminal;
receiving execution information from the first terminal, wherein the first terminal is associated with security personnel in the first area, and after the first terminal receives the second alarm information, the security personnel in the first area associated with the first terminal can send the execution information through the first terminal;
when receiving execution information from a first terminal within a preset time period, sending completion information to a second terminal which has sent first alarm information in advance, and after receiving second alarm information, a security worker in a first area associated with the first terminal can send the execution information through the first terminal, wherein the preset time period refers to a time period when a time span from a starting point to an ending point when the first alarm information is sent reaches a preset time span.
The computer program can realize the intelligent security method applying the big data service in any one of the above method embodiments when being executed by the processor.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
receiving trigger information from the first area, wherein the trigger information is generated by front-end camera equipment, the front-end camera equipment shoots the first area in real time to obtain video stream data, and the front-end camera equipment analyzes the video stream data and generates the trigger information according to an analysis result;
under the condition that the trigger information from the first area is obtained, sending first alarm information to at least one second terminal, wherein the second terminal is associated with security personnel in the second area, and after receiving the first alarm information, the security personnel associated with the second terminal can send out second alarm information through the second terminal;
receiving execution information from the first terminal, wherein the first terminal is associated with security personnel in the first area, and after the first terminal receives the second alarm information, the security personnel in the first area associated with the first terminal can send the execution information through the first terminal;
when receiving execution information from a first terminal within a preset time period, sending completion information to a second terminal which has sent first alarm information in advance, and after receiving second alarm information, a security worker in a first area associated with the first terminal can send the execution information through the first terminal, wherein the preset time period refers to a time period when a time span from a starting point to an ending point when the first alarm information is sent reaches a preset time span.
The computer program can realize the intelligent security method applying the big data service in any one of the above method embodiments when being executed by the processor.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the system is divided into different functional units or modules to perform all or part of the above-mentioned functions.
The above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (8)

1. An intelligent security method applying big data service is characterized by comprising the following steps:
receiving trigger information from a first area, wherein the trigger information is generated by a front-end camera device, the front-end camera device shoots the first area in real time to obtain video stream data, and the front-end camera device analyzes the video stream data and generates the trigger information according to an analysis result;
under the condition that trigger information from a first area is obtained, first alarm information is sent to at least one second terminal, the second terminal is associated with security personnel in a second area, and after the second terminal receives the first alarm information, the security personnel associated with the second terminal can send out second alarm information through the second terminal;
receiving execution information from a first terminal, wherein the first terminal is associated with security personnel in the first area, and after the first terminal receives second alarm information, the security personnel in the first area associated with the first terminal can send the execution information through the first terminal;
when receiving execution information from a first terminal within a preset time period, sending completion information to a second terminal which has sent first alarm information in advance, wherein after the first terminal receives the second alarm information, security personnel in a first area associated with the first terminal can send the execution information through the first terminal, and the preset time period refers to a time period when a time span from a starting point to a terminating point when the first alarm information is sent reaches a preset time span.
2. The smart security method applying big data services as claimed in claim 1, further comprising:
when the request information from the first terminal is received within a preset time period, or,
when any one of the execution information and the request information is not received from the first terminal within a preset time period:
the method comprises the steps of obtaining video stream data in a specified time period of a first area, analyzing the video stream data to generate recommended processing people, sending first assistance information to second terminals which are screened out according to a preset rule and have the same number as the recommended processing people, sending request information to security personnel in the first area related to the first terminal through the first terminal after the first terminal receives second alarm information, wherein the first assistance information comprises position information of the first terminal;
and when the second terminal reaches the position corresponding to the position information of the first terminal, sending a completion message to the second terminal which has sent the first assistance message in advance.
3. The smart security method using big data service as claimed in claim 1, wherein the second terminal is a terminal other than the first terminal, in which the information received last time is not the second alarm information.
4. The intelligent security method using big data service as claimed in claim 2, wherein the second terminals screened out according to the preset rule and having the same number of people as the recommended number of people to be processed comprise the steps of:
and screening out the second terminals with the same quantity according to the sorting from far to near of the first sequence table, wherein the first sequence table is used for sorting each second terminal from far to near according to the position corresponding to the position information of the first terminal.
5. The smart security method applying big data service as claimed in claim 1, wherein analyzing the video stream data to generate a recommended number of people to handle comprises:
inputting the video stream data into a neural network model trained in advance through big data to generate recommended treatment population, wherein the neural network model is obtained by a plurality of groups of experimental data through machine learning training, and each group of experimental data in the plurality of groups of experimental data comprises: video stream data, and a recommended number of processing people corresponding to the video stream data.
6. The utility model provides an use wisdom security protection system of big data service which characterized in that includes:
the trigger information receiving module is used for receiving trigger information from a first area, the trigger information is generated by front-end camera equipment, the front-end camera equipment shoots the first area in real time to obtain video stream data, and the front-end camera equipment analyzes the video stream data and generates the trigger information according to an analysis result;
the alarm information sending module is used for sending first alarm information to at least one second terminal under the condition that trigger information from a first area is obtained, the second terminal is associated with security personnel in the second area, and after the second terminal receives the first alarm information, the security personnel associated with the second terminal can send out second alarm information through the second terminal;
the execution information receiving module is used for receiving execution information from a first terminal, the first terminal is associated with security personnel in the first area, and after the first terminal receives second alarm information, the security personnel in the first area associated with the first terminal can send out the execution information through the first terminal;
the system comprises a completion information sending module and a second terminal, wherein the completion information sending module is used for sending completion information to a second terminal which sends first alarm information in advance when receiving execution information from a first terminal within a preset time period, after the first terminal receives second alarm information, security personnel in a first area associated with the first terminal can send the execution information through the first terminal, and the preset time period refers to a time period when a time span from a starting point to a terminating point when the first alarm information is sent reaches a preset time span.
7. The system of claim 6, further comprising:
an assistance information sending module, configured to, when the request information is received from the first terminal within a preset time period, or when any one of the execution information and the request information is not received from the first terminal within the preset time period: the method comprises the steps of obtaining video stream data in a specified time period of a first area, analyzing the video stream data to generate recommended processing people, sending first assistance information to second terminals which are screened out according to a preset rule and have the same number as the recommended processing people, sending request information to security personnel in the first area related to the first terminal through the first terminal after the first terminal receives second alarm information, wherein the first assistance information comprises position information of the first terminal;
and the assistance completion sending module is used for sending completion information to the second terminal which previously sends the first assistance information when the second terminal reaches the position corresponding to the position information of the first terminal.
8. The intelligent security system using big data services as claimed in claim 7, wherein the second terminals screened out according to the predetermined rule and having the same number of people as the recommended number of people to handle comprise:
and screening out the second terminals with the same quantity according to the sorting from far to near of the first sequence table, wherein the first sequence table is used for sorting each second terminal from far to near according to the position corresponding to the position information of the first terminal.
CN202110821576.4A 2021-07-20 2021-07-20 Intelligent security method and system applying big data service Active CN113689686B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110821576.4A CN113689686B (en) 2021-07-20 2021-07-20 Intelligent security method and system applying big data service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110821576.4A CN113689686B (en) 2021-07-20 2021-07-20 Intelligent security method and system applying big data service

Publications (2)

Publication Number Publication Date
CN113689686A true CN113689686A (en) 2021-11-23
CN113689686B CN113689686B (en) 2022-11-01

Family

ID=78577495

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110821576.4A Active CN113689686B (en) 2021-07-20 2021-07-20 Intelligent security method and system applying big data service

Country Status (1)

Country Link
CN (1) CN113689686B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5844481A (en) * 1997-03-11 1998-12-01 Quintus; John J. Intrusion detector for security systems
KR20100060783A (en) * 2008-11-28 2010-06-07 삼성전자주식회사 System and method for sos rescue and prevention of crime
CN102930702A (en) * 2012-10-31 2013-02-13 深圳辉锐天眼科技有限公司 Zero false alarm networking video security method and system thereof
CN104348894A (en) * 2013-08-09 2015-02-11 联想(北京)有限公司 Information processing method, cloud server and mobile terminal
WO2015158081A1 (en) * 2014-04-17 2015-10-22 小米科技有限责任公司 User prompting method and device
CN206696985U (en) * 2017-03-09 2017-12-01 广东中安金狮科创有限公司 Intelligent alarm device and warning system
CN109769204A (en) * 2019-03-15 2019-05-17 上海救要救信息科技有限公司 A kind of method and apparatus for rescuer's offer rescue information
CN110267250A (en) * 2019-07-04 2019-09-20 长沙环康科技有限公司 Intelligent rescue system and its backstage response rescue signal method
CN112535832A (en) * 2020-11-06 2021-03-23 珠海格力电器股份有限公司 Intelligent fire regulation and control method, system and intelligent equipment
CN113076369A (en) * 2021-04-20 2021-07-06 广东粤安科技股份有限公司 Real-time fire-fighting supervision method and system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5844481A (en) * 1997-03-11 1998-12-01 Quintus; John J. Intrusion detector for security systems
KR20100060783A (en) * 2008-11-28 2010-06-07 삼성전자주식회사 System and method for sos rescue and prevention of crime
CN102930702A (en) * 2012-10-31 2013-02-13 深圳辉锐天眼科技有限公司 Zero false alarm networking video security method and system thereof
CN104348894A (en) * 2013-08-09 2015-02-11 联想(北京)有限公司 Information processing method, cloud server and mobile terminal
WO2015158081A1 (en) * 2014-04-17 2015-10-22 小米科技有限责任公司 User prompting method and device
CN206696985U (en) * 2017-03-09 2017-12-01 广东中安金狮科创有限公司 Intelligent alarm device and warning system
CN109769204A (en) * 2019-03-15 2019-05-17 上海救要救信息科技有限公司 A kind of method and apparatus for rescuer's offer rescue information
CN110267250A (en) * 2019-07-04 2019-09-20 长沙环康科技有限公司 Intelligent rescue system and its backstage response rescue signal method
CN112535832A (en) * 2020-11-06 2021-03-23 珠海格力电器股份有限公司 Intelligent fire regulation and control method, system and intelligent equipment
CN113076369A (en) * 2021-04-20 2021-07-06 广东粤安科技股份有限公司 Real-time fire-fighting supervision method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘荣辉: "《大数据架构技术与实例分析》", 31 August 2017 *

Also Published As

Publication number Publication date
CN113689686B (en) 2022-11-01

Similar Documents

Publication Publication Date Title
CN110689317A (en) Intelligent maintenance method and device, computer equipment and storage medium
CN109754095B (en) Deployment information generation method and device, computer equipment and storage medium
CN110413308B (en) Software operation and maintenance method, device, equipment and computer storage medium
CN109508790A (en) Fault data processing method, device and computer equipment based on leased equipment
CN111046075A (en) Project supervision informatization construction and management method and device
WO2022165965A1 (en) Behavior data monitoring method and apparatus, and device and medium
CN111401799A (en) Man-machine cooperative scheduling method and device, electronic equipment and storage medium
CN113160509A (en) Risk sensing method and system suitable for communities and construction sites
CN113689686B (en) Intelligent security method and system applying big data service
CN115311825A (en) Alarm data pushing method and device for PCB (printed Circuit Board) equipment, computer equipment and storage medium
CN112434335A (en) Business problem processing method and device, computer equipment and storage medium
EP1736916A1 (en) Provision of data in distributed systems
CN113086803A (en) Method and system for detecting elevator by using robot and robot
DE112018000928T5 (en) RADIO COMMUNICATION DEVICE AND CONTROL METHOD THEREOF
CN111192173A (en) Examination invigilating system and method, server, computer readable storage medium
US20230078371A1 (en) Method and apparatus for controlling wafer preparation
CN112738027B (en) Data processing method and device and electronic equipment
CN109302441B (en) Electronic supervision method for patrol visit service
CN110020933B (en) Automatic quitting method and device applied to financial business system and computer equipment
CN112788131B (en) Method, system and storage medium for generating early warning picture based on artificial intelligence
CN111722983B (en) Configurable event operation control method and system
CN113743249B (en) Method, device and equipment for identifying violations and readable storage medium
CN116798099B (en) Intelligent identification and management method and system for identities of labor workers
CN117994887B (en) Gate system
CN115527282A (en) Smart campus student supervision method, system, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant