Security monitoring method and device

A security monitoring and monitoring terminal technology, which is applied in location-based services, closed-circuit television systems, electrical components, etc., can solve problems such as the inability to meet the needs of panoramic multi-dimensional management, and achieve intelligence, improve comprehensiveness, and reduce monitoring. cost effect

Inactive Publication Date: 2018-06-05
STATE GRID CORP OF CHINA +1
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] As the scale of data centers becomes larger and larger, it is almost impossible to do data center operation and maintenance manually. Although the existing center monitoring and operation and maintenance can achieve full coverage of the data center, it is impossible to monitor each device according to the realization of the monitoring terminal. Unified and intelligent management cannot meet the existing panoramic and multi-dimensional management needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security monitoring method and device
  • Security monitoring method and device
  • Security monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0048] It should be noted that like numerals and let...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a security monitoring method and device. The security monitoring method comprises the steps of sending an inspection instruction to each mobile monitoring terminal, thereby enabling each mobile monitoring terminal to carry out inspection according to a preset inspection route, and displaying inspection images of each mobile monitoring terminal; receiving inspection data sent by each mobile monitoring terminal, analyzing whether abnormal information exists in the inspection data or not, and calling abnormal analysis data corresponding to the abnormal information if the abnormal information exists in the inspection data; and determining position information of the abnormal position in a to-be-inspected area, marking the abnormal analysis data in an environment view according to the position information, and displaying the abnormal analysis data, thereby prompting a worker. According to the embodiment of the invention, the comprehensiveness and intelligence in a monitoring process can be effectively improved.

Description

technical field [0001] The invention relates to the technical field of video surveillance, in particular to a security surveillance method and device. Background technique [0002] As the scale of data centers becomes larger and larger, it is almost impossible to do data center operation and maintenance manually. Although the existing center monitoring and operation and maintenance can achieve full coverage of the data center, it is impossible to monitor each device according to the realization of the monitoring terminal. The unified and intelligent management cannot meet the existing panoramic and multi-dimensional management needs. Contents of the invention [0003] In view of this, the purpose of the embodiments of the present invention is to provide a security monitoring method and device to improve the above problems. [0004] A preferred embodiment of the present invention provides a security monitoring method, which is applied to a security monitoring platform that...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/18H04W4/029G07C1/20H04L29/06
Inventor 曹波曾玉荣袁慧杨杉孟浩华毛竹贺欣
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products