Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security system and method based on big data

A network security system and big data technology, applied in the direction of road vehicle traffic control system, traffic control system, traffic flow detection, etc., can solve the problems such as the inability to divert the traffic flow in advance, the lack of key protection for sudden accidents at the intersection, etc. The effect of preventing secondary accidents, reducing the possibility, and saving human resources

Inactive Publication Date: 2018-11-09
牛静洁
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the hysteresis of vehicle guidance in the prior art, the inability to guide traffic flow in advance, and the lack of key protection against unexpected accidents at intersections, the present invention provides a network security system and method based on big data, which controls traffic lights In order to achieve targeted traffic flow guidance, special rescue vehicles can be guided in advance; for some major accidents, vehicles can be reminded to detour and rescue in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security system and method based on big data
  • Network security system and method based on big data
  • Network security system and method based on big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] Such as figure 1 Shown, a kind of network security system based on big data, it comprises comprehensive traffic management system, information collection module, control management module, control terminal module and rescue module; The traffic information on the corresponding road is transmitted to the comprehensive traffic management system; the comprehensive traffic management system controls the control terminal module located at the intersection of the corresponding road through the control management module; the control terminal module includes railings, traffic lights, broadcasters and screen; the railing is arranged at the crossing, corresponding to the traffic signal light information, and is used to control the flow of traffic; the broadcaster is used to broadcast the road conditions ahead; the screen displays the road conditions ahead in text form Play; the screen and the broadcaster will forecast the vehicles passing the intersection at the accident site, rem...

Embodiment 2

[0055] A method for using a network security system based on big data, adopting a network security system based on big data described in Embodiment 1, the specific operation steps of the method are described below:

[0056] a. adopt a kind of network security system based on big data described in claim 1, the information collection module will monitor the traffic information on the intersection corresponding road and deliver to the comprehensive traffic management system, and the comprehensive traffic management system will receive from the information collection The pass information of the module is screened and parsed.

[0057] b. The comprehensive traffic management system controls the control terminal module located at the corresponding road intersection through the control management module, and specifically controls the traffic status of the railings and the display status and display duration of the red street lights according to the traffic information such as the average...

Embodiment 3

[0059] A method for using a network security system based on big data, using the network security system based on big data described in Embodiment 1, the specific operation steps of the cooperation between the rescue module and the integrated traffic management system will be described below :

[0060] A method for using a network security system based on big data, the steps of which are:

[0061] A. The network security system also includes a rescue module and a rescue module; after the traffic information received from the information collection module is screened and analyzed by the comprehensive traffic management system, the traffic conditions of the accident situation and the roads around the accident are analyzed. The data information is passed to the rescue module.

[0062] B. The rescue module feeds back the driving route of the rescue vehicle to the comprehensive traffic management system; the comprehensive traffic management system controls the control terminal mod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security system and method based on big data, and belongs to the technical field of intelligent traffic. The network security system comprises a traffic integrated management system, an information acquisition module, a control management module and a control terminal module; the information acquisition module is used for transmitting acquired traffic informationon roads corresponding to an intersection to be monitored to the traffic integrated management system; the traffic integrated management system controls the control terminal module located on the corresponding intersection through the control management module; the control terminal module comprises a handrail, a traffic light, a broadcaster and a screen; and the handrail is arranged at the intersection, corresponds to the traffic light information and is used for controlling the passage of the traffic flow. According to the network security system and method, the traffic signal lamp is controlled to realize targeted evacuation and guidance of the traffic flow, and evacuation and guidance can be carried out on special emergency vehicles in advance in a targeted mode; and for some major accidents, vehicles can be reminded to detour, and rescue can be carried out in time.

Description

technical field [0001] The invention belongs to the technical field of intelligent transportation, and in particular relates to a network security system and method based on big data. Background technique [0002] With the development of society and the improvement of people's living standards, private cars have become an indispensable consumer product for a family. However, with the explosive growth of private cars, the road traffic conditions have encountered unprecedented challenges. Especially in China, a country with a large population and densely distributed population, the problem of traffic jams is already very serious. At the same time, the traffic flow is controlled by setting traffic lights at urban intersections, but the turn-on time of the traffic lights is a fixed time, often resulting in fewer vehicles in a certain direction, but the green light is turned on for a long time, there are many vehicles in a certain direction, and the red light is very long. The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G08G1/07G08G1/095G08G1/01E01F13/06
CPCE01F13/06G08G1/0145G08G1/07G08G1/095
Inventor 牛静洁
Owner 牛静洁
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products