Unlock instant, AI-driven research and patent intelligence for your innovation.

Universal security equipment control method for extensible protocol and system

A technology for security equipment and extended protocols, applied in transmission systems, TV system components, image communications, etc., can solve problems such as difficulty in achieving unification and good scalability, difficulty in high-level unification, and difficulty in being compatible with various equipment. Achieve the effects of reducing development and deployment costs, good user experience, and enhancing scalability

Active Publication Date: 2012-10-24
ENC DATA SERVICE CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although some manufacturers and organizations have specified relevant protocol standards for security monitoring equipment, a large manufacturer is self-contained, and it is difficult to have a high degree of unification. Unifying equipment protocol standards is still a long way to go.
[0004] It is difficult to achieve a high degree of unification and good scalability for the control of legacy systems and the control of various new devices now
At this stage, multiple protocols of monitoring equipment coexist, which brings difficulties for the control system to be compatible with various equipment. A general, easy-to-handle and expandable method is bound to be needed to solve such problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Universal security equipment control method for extensible protocol and system
  • Universal security equipment control method for extensible protocol and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] seefigure 1 , the present invention discloses a general security equipment control method with an extensible protocol, the method includes the following steps:

[0040] [Step 1] Analyze the protocol format.

[0041] [Step 2] Drive the format to the external record according to the user-defined format storage device protocol.

[0042] Use a custom format to define various corresponding device protocol actions, and define data types, data formats, offsets, and data ranges for control actions to format and organize device protocols.

[0043] Although various control protocols have their own specific formats, the format of each specific action is relatively definite for a specific control protocol itself. According to this idea, the protocol control design method of the present invention analyzes and refines the actions of the control protocol, extracts the specific composition form of each byte or even the bit corresponding to the byte in the protocol, and defines various...

Embodiment 2

[0073] The invention discloses a general security equipment control method with an extensible protocol and a corresponding control system.

[0074] The protocol control design method of the present invention organizes and expands the routine actions and settings of the security monitoring equipment. By extracting the fixed type and dynamic variation of the protocol, the protocol format of the specific action is abstracted, and a format storage mechanism that is easy to expand and maintain is formulated.

[0075] The control system of the present invention mainly includes a protocol control extension update system, a protocol control extension configuration system, and a control execution system.

[0076]The control execution system parses the stored action format of the corresponding type of protocol and combines it into a protocol code, sends and controls the corresponding device; the storage format here can be any custom file format. Although various control protocols have ...

Embodiment 3

[0091] The following shows part of a certain type of script-driven protocol, including an upward action:

[0092]

[0093]

[0094]

[0095] SetBitMode v1.0

[0096] zlg

[0097] 20091026

[0098]

[0099]

[0100] 8

[0101] 0

[0102]

[0103]

[0104] CONST

[0105] HEXASCII

[0106] FF

[0107]

[0108]

[0109]

[0110]

[0111]

[0112] ADDRESS CODE

[0113] HEXASCII

[0114]

[0115]

[0116]

[0117]

[0118]

[0119]

[0120] ORFLAG

[0121] HEXASCII

[0122] 01

[0123]

[0124]

[0125]

[0126]

[0127]

[0128] CONST

[0129] HEXASCII

[0130] 00

[0131]

[0132]

[0133]

[0134]

[0135]

[0136] CONST

[0137] HEXASCII

[0138] 00

[0139]

[0140]

[0141] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a universal security equipment control method for an extensible protocol and a system. The method comprises the following steps: A, analyzing the format of the protocol; B, storing an equipment protocol driving format to an external record according to a self-defined format, defining various corresponding equipment protocol motions by using the self-defined format, and defining a data type, a data format, an offset and a data range for a control motion for formatting an organization equipment protocol; and C, analyzing the self-defined equipment protocol format drivingrecord, and combining fixed format data and non-fixed format data of the control motion to form a protocol command of the control equipment. The universal security equipment control method for the extensible protocol and the system enhance the extensibility and maintainability of the system, reduce the development and deployment costs, and bring better user experiences for users.

Description

technical field [0001] The invention belongs to the technical field of security monitoring and relates to a security equipment control method, in particular to a general security equipment control method with an extensible protocol; at the same time, the invention also relates to a control system corresponding to the general security equipment control method with an extensible protocol. Background technique [0002] The existing security video monitoring system has great limitations in controlling the monitoring equipment, and generally only supports the protocol of its own equipment or the protocols of a few other products. If it is necessary to support the protocols of other manufacturers, it is necessary to further modify the original system to make it compatible with the equipment of other companies. Every update or modification requires code-level modification and development of the original system. It needs to be redeveloped and compiled, and the original system needs...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04N5/232
Inventor 赵刘岗余端张亚平
Owner ENC DATA SERVICE CO LTD