Security and protection data aggregation management system based on edge architecture as well as management method thereof

A data aggregation and management system technology, applied in the transmission system, electrical components, etc., can solve the problems of information analysis and application delay, effective data omission, increase system operating costs, etc., and achieve the effect of simplifying analysis capabilities and functions

Active Publication Date: 2019-04-23
TERMINUSBEIJING TECH CO LTD
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of this, the purpose of this application is to propose an edge architecture-based security data aggregation management system and its management method to solve the delay in information analysis and application existing in the security data management process in the prior art, effectively Data is easy to be missed, while increasing the technical problems of system operating costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security and protection data aggregation management system based on edge architecture as well as management method thereof
  • Security and protection data aggregation management system based on edge architecture as well as management method thereof
  • Security and protection data aggregation management system based on edge architecture as well as management method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0039] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0040] Such as figure 1 As shown, it is a schematic structural diagram of the security data aggregation management system based on the edge architecture according to Embodiment 1 of the present application. From figure 1 It can be seen from the figure that the security dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a security and protection data aggregation management system based on edge architecture. The system comprises edge nodes, aggregation nodes and a data center,the data center is connected with multiple aggregation nodes in a communication manner, and each aggregation node is connected with multiple edge nodes in the communication manner; each edge node is used for acquiring the original security and protection data, storing multiple original security and protection data as data clusters according to a first preset rule, establishing a cluster head for each data cluster, performing associative storage on each cluster head and the corresponding data cluster and uploading each cluster head to a corresponding aggregation node; and the aggregation nodesaggregate the data clusters corresponding to multiple cluster heads into a data set according to a second preset rule and generate a set form corresponding to the data set. The security and protectiondata aggregation management system based on the edge architecture and provided by the embodiment of the invention can effectively avoid delay of information analysis and application in a process of managing security and protection data.

Description

technical field [0001] The present application relates to the technical field of security management, in particular to an edge architecture-based security data aggregation management system and a management method thereof. Background technique [0002] At present, cameras and sensors used for security all over the place will continuously generate security data, such as monitoring screen data, fire response data, infrared intrusion monitoring data, gas composition monitoring data to prevent gas or toxic gas leakage, etc., generally Security data will be continuously generated, recorded and updated at a relatively high frequency (for example, surveillance video at more than 10 frames per second, and other surveillance data once per minute), eventually forming a large amount of security data. [0003] The existing management of security data is to unify these security data into the data center for display, analysis, application and storage, such as displaying the monitoring scr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08
CPCH04L67/1097H04L67/12
Inventor 刘丰
Owner TERMINUSBEIJING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products