Unlock instant, AI-driven research and patent intelligence for your innovation.

Security and protection monitoring method, system and server based on Internet of Things and artificial intelligence

A security monitoring and artificial intelligence technology, applied in transmission systems, closed-circuit television systems, instruments, etc., can solve the problems of surveillance video attacks, affecting the privacy security of security monitoring, and insufficient security.

Inactive Publication Date: 2021-01-15
陈洋洋
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, some surveillance videos in the security monitoring process are vulnerable to IoT attacks, resulting in far less security
For example, criminals may simulate data access requests by launching IoT attacks, so that data can be retrieved for some surveillance video services, affecting the privacy and security of security monitoring

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security and protection monitoring method, system and server based on Internet of Things and artificial intelligence
  • Security and protection monitoring method, system and server based on Internet of Things and artificial intelligence
  • Security and protection monitoring method, system and server based on Internet of Things and artificial intelligence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] Reference is now made in detail to the specific embodiments illustrated in the accompanying drawings. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure. However, it will be understood by those skilled in the art that the present disclosure may be practiced without these specific details. Among other implementation possibilities, well-known methods, procedures, components, and circuits have not been described in detail so as not to unnecessarily obscure the embodiments.

[0065] figure 1 It is an interactive schematic diagram of the security monitoring system 10 based on the Internet of Things and artificial intelligence provided by an embodiment of the present disclosure. The security monitoring system 10 based on the Internet of Things and artificial intelligence may include a cloud communication server 100 and a security monitoring terminal 200 communicatively connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a security and protection monitoring method, system and server based on the Internet of Things and artificial intelligence, and the method comprises the steps:determining a to-be-monitored video service as a key monitoring video service when the to-be-monitored video service is not matched with an associated monitoring video service, so that the features of an Internet-of-Things access service are determined in a preset historical time period, and at least one security and protection monitoring calling item is further determined, and the correspondingsecurity and protection monitoring calling information is analyzed and processed according to the preset artificial intelligence model corresponding to the key monitoring video service by obtaining the security and protection monitoring calling information of the at least one security and protection monitoring calling item. Thus, the key monitoring video service associated with the initiated dataaccess request simulated by the lawbreaker through initiating the Internet of Things attack can be effectively identified, and the security monitoring label corresponding to the key monitoring video service is identified, so that subsequent network big data information anti-disclosure processing can be facilitated, and the privacy security of security monitoring is improved.

Description

technical field [0001] The present disclosure relates to the technical field of the Internet of Things and security monitoring, and in particular, relates to a security monitoring method, system and server based on the Internet of Things and artificial intelligence. Background technique [0002] With the rapid development of Internet of Things technology, smart security monitoring has been widely used in various industries. Through the interaction between security monitoring terminals and cloud servers, intelligent information management in the process of security monitoring can effectively improve the convenience of security monitoring. [0003] However, some surveillance videos in the security monitoring process are vulnerable to IoT attacks, resulting in far less security. For example, criminals may simulate data access requests by launching IoT attacks, so that data can be retrieved for some surveillance video services, affecting the privacy and security of security moni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/18H04L29/08H04L29/06
CPCG16Y30/10G16Y40/10G16Y40/50H04L63/102H04L63/1425H04L67/12H04N7/181
Inventor 陈洋洋
Owner 陈洋洋