WO2018152670A1 - Big data management method and device for security monitoring - Google Patents
Big data management method and device for security monitoring Download PDFInfo
- Publication number
- WO2018152670A1 WO2018152670A1 PCT/CN2017/074209 CN2017074209W WO2018152670A1 WO 2018152670 A1 WO2018152670 A1 WO 2018152670A1 CN 2017074209 W CN2017074209 W CN 2017074209W WO 2018152670 A1 WO2018152670 A1 WO 2018152670A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- stored
- storage
- storage center
- monitoring system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
Definitions
- the invention relates to the field of security, and in particular relates to a big data management method and device for security monitoring.
- the security monitoring system is a system that uses optical fibers, coaxial cables or microwaves to transmit video signals in its closed loop and from camera to image display and recording. It can reflect the monitored object in real time, image and reality. It can be used for long-term monitoring instead of manual in harsh environments and recorded by video recorder. At the same time, the alarm system equipment alarms for illegal intrusion.
- the existing security monitoring is not flexible in the storage of big data, and cannot meet the requirements of current security monitoring data storage.
- the invention provides a big data management method for security monitoring, which solves the defect that the prior art cannot meet the requirements of current security monitoring data storage.
- a method for managing big data for security monitoring comprising the following steps:
- the monitoring system receives the data to be stored
- the monitoring system sends the data to be stored to the storage center, where the stored data carries the time and data identifier of the data storage;
- the monitoring system instructs the storage center to identify whether to store the data based on the stored time and the data.
- the method further includes:
- the monitoring system sends a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives the data corresponding to the data identifier returned by the storage center.
- the method further includes:
- the monitoring system receives the response of the data storage returned by the storage center and deletes the data.
- a big data management device for security monitoring comprising:
- transceiver unit configured to receive data to be stored, and send the data to be stored to a storage center, where the stored data carries time and data identifiers of the data storage;
- a processing unit configured to instruct the storage center to store the data according to the stored time and the data identifier.
- the transceiver unit is further configured to send a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives the data corresponding to the data identifier returned by the storage center.
- the processing unit is configured to receive a response that the data center returned by the storage center is successful, and delete the data.
- a big data management device for security monitoring comprising: a processor, a transceiver, a memory, and a bus, wherein the processor, the transceiver, and the memory are connected by using a bus;
- the transceiver is configured to receive data to be stored, and send the data to be stored to a storage center, where the stored data carries time and data identifiers of the data storage.
- a processor configured to indicate, by the storage center, whether to store the data according to the stored time and the data identifier.
- the transceiver is further configured to send a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives data corresponding to the data identifier returned by the storage center.
- the processor is configured to receive a response of the data storage returned by the storage center, and delete the data.
- the technical solution provided by the specific embodiments of the present invention has the advantage of meeting the requirements of current security monitoring data storage.
- FIG. 1 is a schematic flowchart diagram of a big data management method for security monitoring provided by the present invention.
- FIG. 2 is a schematic structural diagram of a big data management device for security monitoring according to the present invention.
- FIG. 3 is a schematic structural diagram of a big data management apparatus for security monitoring according to the present invention.
- FIG. 1 is a big data management method for security monitoring according to a first preferred embodiment of the present invention.
- the method is implemented by a security system.
- the method is as shown in FIG. 1 and includes the following steps:
- Step S101 The monitoring system receives the data to be stored.
- Step S102 The monitoring system sends the data to be stored to the storage center, where the stored data carries the time of the data storage.
- Step S103 The monitoring system instructs the storage center to identify whether the data is stored according to the stored time and the data identifier.
- the technical solution provided by the present invention can manage big data according to the storage time of data and data identification, so it has the advantage of being able to realize security data storage.
- the foregoing method may further include:
- the monitoring system sends a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives the data corresponding to the data identifier returned by the storage center.
- the foregoing method may further include:
- the monitoring system receives the response of the data storage returned by the storage center and deletes the data.
- FIG. 2 is a big data management device for security monitoring according to a second preferred embodiment of the present invention. As shown in FIG. 2, the device includes:
- the transceiver unit 201 is configured to receive data to be stored, and send the data to be stored to a storage center, where the stored data carries time and data identifiers of the data storage;
- the processing unit 202 is configured to instruct the storage center to identify whether the data is stored according to the stored time and the data.
- the transceiver unit 201 is further configured to send a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives the data corresponding to the data identifier returned by the storage center.
- the processing unit 202 is configured to receive a response that the data center returned by the storage center is successful, and delete the data.
- the present invention also provides a security monitoring and monitoring big data management device 30, the device comprising: a processor 301, a transceiver 302, a memory 303 and a bus 304, wherein the processor, the transceiver, and the memory are connected by a bus;
- the transceiver 302 is configured to receive data to be stored, and send the data to be stored to a storage center, where the stored data carries time and data identifiers of the data storage.
- the processor 301 is configured to instruct the storage center to identify whether the data is stored according to the stored time and the data.
- the transceiver 302 is further configured to send a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives data corresponding to the data identifier returned by the storage center.
- the processor 301 is configured to receive a response that the data center returned by the storage center is successful, and delete the data.
- Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
- a storage medium may be any available media that can be accessed by a computer.
- the computer readable medium may include random access memory (Random) Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium.
- a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Alarm Systems (AREA)
Abstract
Description
本发明涉及安防领域,尤其涉及一种安防监控的大数据管理方法及装置。The invention relates to the field of security, and in particular relates to a big data management method and device for security monitoring.
安防监控系统是应用光纤、同轴电缆或微波在其闭合的环路内传输视频信号,并从摄像到图像显示和记录构成独立完整的系统。它能实时、形象、真实地反映被监控对象,它可以在恶劣的环境下代替人工进行长时间监视,通过录像机记录下来。同时报警系统设备对非法入侵进行报警。The security monitoring system is a system that uses optical fibers, coaxial cables or microwaves to transmit video signals in its closed loop and from camera to image display and recording. It can reflect the monitored object in real time, image and reality. It can be used for long-term monitoring instead of manual in harsh environments and recorded by video recorder. At the same time, the alarm system equipment alarms for illegal intrusion.
现有的安防监控在大数据的存储上不灵活,无法满足目前安防监控数据存储的要求。The existing security monitoring is not flexible in the storage of big data, and cannot meet the requirements of current security monitoring data storage.
提供一种安防监控的大数据管理方法,其解决了现有技术无法满足目前安防监控数据存储的要求缺陷。The invention provides a big data management method for security monitoring, which solves the defect that the prior art cannot meet the requirements of current security monitoring data storage.
一方面,提供一种安防监控的大数据管理方法,所述方法包括如下步骤:In one aspect, a method for managing big data for security monitoring is provided, the method comprising the following steps:
监控系统接收待存储的数据;The monitoring system receives the data to be stored;
监控系统将待存储的数据发送至存储中心,该存储的数据携带该数据存储的时间和数据标识;The monitoring system sends the data to be stored to the storage center, where the stored data carries the time and data identifier of the data storage;
监控系统指示所述存储中心依据所述存储的时间以及数据标识是否存储该数据。The monitoring system instructs the storage center to identify whether to store the data based on the stored time and the data.
可选的,所述方法还包括:Optionally, the method further includes:
监控系统向存储中心发送数据提取请求,该数据提取请求包括该数据标识,监控系统接收存储中心返回的该数据标识对应的数据。The monitoring system sends a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives the data corresponding to the data identifier returned by the storage center.
可选的,所述方法还包括:Optionally, the method further includes:
监控系统接收存储中心返回的数据存储成功的响应,将该数据删除。The monitoring system receives the response of the data storage returned by the storage center and deletes the data.
第二方面,提供一种安防监控的大数据管理装置,所述装置包括:In a second aspect, a big data management device for security monitoring is provided, the device comprising:
收发单元,用于接收待存储的数据,将待存储的数据发送至存储中心,该存储的数据携带该数据存储的时间和数据标识;a transceiver unit, configured to receive data to be stored, and send the data to be stored to a storage center, where the stored data carries time and data identifiers of the data storage;
处理单元,用于指示所述存储中心依据所述存储的时间以及数据标识是否存储该数据。And a processing unit, configured to instruct the storage center to store the data according to the stored time and the data identifier.
可选的,所述收发单元,还用于向存储中心发送数据提取请求,该数据提取请求包括该数据标识,监控系统接收存储中心返回的该数据标识对应的数据。Optionally, the transceiver unit is further configured to send a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives the data corresponding to the data identifier returned by the storage center.
可选的,所述处理单元,用于接收存储中心返回的数据存储成功的响应,将该数据删除。Optionally, the processing unit is configured to receive a response that the data center returned by the storage center is successful, and delete the data.
第三方面,提供一种安防监控的大数据管理设备,所述设备包括:处理器、收发器、存储器和总线,其中,处理器、收发器、存储器通过总线连接;In a third aspect, a big data management device for security monitoring is provided, the device comprising: a processor, a transceiver, a memory, and a bus, wherein the processor, the transceiver, and the memory are connected by using a bus;
收发器,用于接收待存储的数据,将待存储的数据发送至存储中心,该存储的数据携带该数据存储的时间和数据标识。The transceiver is configured to receive data to be stored, and send the data to be stored to a storage center, where the stored data carries time and data identifiers of the data storage.
处理器,用于指示所述存储中心依据所述存储的时间以及数据标识是否存储该数据。And a processor, configured to indicate, by the storage center, whether to store the data according to the stored time and the data identifier.
可选的,所述收发器,还用于向存储中心发送数据提取请求,该数据提取请求包括该数据标识,监控系统接收存储中心返回的该数据标识对应的数据。Optionally, the transceiver is further configured to send a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives data corresponding to the data identifier returned by the storage center.
可选的,所述处理器,用于接收存储中心返回的数据存储成功的响应,将该数据删除。Optionally, the processor is configured to receive a response of the data storage returned by the storage center, and delete the data.
本发明具体实施方式提供的技术方案具有满足目前安防监控数据存储的要求的优点。The technical solution provided by the specific embodiments of the present invention has the advantage of meeting the requirements of current security monitoring data storage.
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below. Obviously, the drawings in the following description are only It is a certain embodiment of the present invention, and other drawings can be obtained from those skilled in the art without any creative work.
图1为本发明提供的一种安防监控的大数据管理方法的流程示意图。FIG. 1 is a schematic flowchart diagram of a big data management method for security monitoring provided by the present invention.
图2为本发明提供的一种安防监控的大数据管理装置的结构示意图。2 is a schematic structural diagram of a big data management device for security monitoring according to the present invention.
图3为本发明提供的一种安防监控的大数据管理装置的结构示意图。FIG. 3 is a schematic structural diagram of a big data management apparatus for security monitoring according to the present invention.
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, but not all embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
参阅图1,图1为本发明第一较佳实施方式提供的一种安防监控的大数据管理方法,该方法由安防系统实现,该方法如图1所示,包括如下步骤:Referring to FIG. 1, FIG. 1 is a big data management method for security monitoring according to a first preferred embodiment of the present invention. The method is implemented by a security system. The method is as shown in FIG. 1 and includes the following steps:
步骤S101、监控系统接收待存储的数据。Step S101: The monitoring system receives the data to be stored.
步骤S102、监控系统将待存储的数据发送至存储中心,该存储的数据携带该数据存储的时间。Step S102: The monitoring system sends the data to be stored to the storage center, where the stored data carries the time of the data storage.
步骤S103、监控系统指示所述存储中心依据所述存储的时间以及数据标识是否存储该数据。Step S103: The monitoring system instructs the storage center to identify whether the data is stored according to the stored time and the data identifier.
本发明提供的技术方案能够依据数据的存储的时间以及数据标识对大数据进行管理,所以其具有能够实现安防数据存储的优点。The technical solution provided by the present invention can manage big data according to the storage time of data and data identification, so it has the advantage of being able to realize security data storage.
可选的,上述方法在步骤S103之后还可以包括:Optionally, after the step S103, the foregoing method may further include:
监控系统向存储中心发送数据提取请求,该数据提取请求包括该数据标识,监控系统接收存储中心返回的该数据标识对应的数据。The monitoring system sends a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives the data corresponding to the data identifier returned by the storage center.
可选的,上述方法在步骤S103之后还可以包括:Optionally, after the step S103, the foregoing method may further include:
监控系统接收存储中心返回的数据存储成功的响应,将该数据删除。The monitoring system receives the response of the data storage returned by the storage center and deletes the data.
参阅图2,图2为本发明第二较佳实施方式提供的一种安防监控的大数据管理装置,该装置如图2所示,包括:Referring to FIG. 2, FIG. 2 is a big data management device for security monitoring according to a second preferred embodiment of the present invention. As shown in FIG. 2, the device includes:
收发单元201,用于接收待存储的数据,将待存储的数据发送至存储中心,该存储的数据携带该数据存储的时间和数据标识;The transceiver unit 201 is configured to receive data to be stored, and send the data to be stored to a storage center, where the stored data carries time and data identifiers of the data storage;
处理单元202,用于指示所述存储中心依据所述存储的时间以及数据标识是否存储该数据。The processing unit 202 is configured to instruct the storage center to identify whether the data is stored according to the stored time and the data.
可选的,所述收发单元201,还用于向存储中心发送数据提取请求,该数据提取请求包括该数据标识,监控系统接收存储中心返回的该数据标识对应的数据。Optionally, the transceiver unit 201 is further configured to send a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives the data corresponding to the data identifier returned by the storage center.
可选的,所述处理单元202,用于接收存储中心返回的数据存储成功的响应,将该数据删除。Optionally, the processing unit 202 is configured to receive a response that the data center returned by the storage center is successful, and delete the data.
本发明还提供一种安防监控的大数据管理设备30,所述设备包括:处理器301、收发器302、存储器303和总线304,其中,处理器、收发器、存储器通过总线连接;The present invention also provides a security monitoring and monitoring big data management device 30, the device comprising: a processor 301, a transceiver 302, a memory 303 and a bus 304, wherein the processor, the transceiver, and the memory are connected by a bus;
收发器302,用于接收待存储的数据,将待存储的数据发送至存储中心,该存储的数据携带该数据存储的时间和数据标识。The transceiver 302 is configured to receive data to be stored, and send the data to be stored to a storage center, where the stored data carries time and data identifiers of the data storage.
处理器301,用于指示所述存储中心依据所述存储的时间以及数据标识是否存储该数据。The processor 301 is configured to instruct the storage center to identify whether the data is stored according to the stored time and the data.
可选的,所述收发器302,还用于向存储中心发送数据提取请求,该数据提取请求包括该数据标识,监控系统接收存储中心返回的该数据标识对应的数据。Optionally, the transceiver 302 is further configured to send a data extraction request to the storage center, where the data extraction request includes the data identifier, and the monitoring system receives data corresponding to the data identifier returned by the storage center.
可选的,所述处理器301,用于接收存储中心返回的数据存储成功的响应,将该数据删除。Optionally, the processor 301 is configured to receive a response that the data center returned by the storage center is successful, and delete the data.
需要说明的是,对于前述的各方法实施方式或实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为根据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述实施方式或实施例均属于优选实施例,所涉及的动作和单元并不一定是本发明所必须的。It should be noted that, for the foregoing method embodiments or embodiments, for the sake of simple description, they are all expressed as a series of action combinations, but those skilled in the art should know that the present invention is not subject to the described action sequence. Limitations, as certain steps may be performed in other sequences or concurrently in accordance with the present invention. In the following, those skilled in the art should also understand that the embodiments or examples described in the specification are preferred embodiments, and the actions and units involved are not necessarily required by the present invention.
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。In the above embodiments, the descriptions of the various embodiments are different, and the details that are not detailed in a certain embodiment can be referred to the related descriptions of other embodiments.
本发明实施例方法中的步骤可以根据实际需要进行顺序调整、合并和删减。The steps in the method of the embodiment of the present invention may be sequentially adjusted, merged, and deleted according to actual needs.
本发明实施例装置中的单元可以根据实际需要进行合并、划分和删减。本领域的技术人员可以将本说明书中描述的不同实施例以及不同实施例的特征进行结合或组合。The units in the apparatus of the embodiment of the present invention may be combined, divided, and deleted according to actual needs. Those skilled in the art can combine or combine the different embodiments described in the specification and the features of the different embodiments.
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到本发明可以用硬件实现,或固件实现,或它们的组合方式来实现。当使用软件实现时,可以将上述功能存储在计算机可读介质中或作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是计算机能够存取的任何可用介质。以此为例但不限于:计算机可读介质可以包括随机存取存储器(Random Access Memory,RAM)、只读存储器(Read-Only Memory,ROM)、电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质。此外。任何连接可以适当的成为计算机可读介质。例如,如果软件是使用同轴电缆、光纤光缆、双绞线、数字用户线(Digital Subscriber Line,DSL)或者诸如红外线、无线电和微波之类的无线技术从网站、服务器或者其他远程源传输的,那么同轴电缆、光纤光缆、双绞线、DSL或者诸如红外线、无线和微波之类的无线技术包括在所属介质的定影中。如本发明所使用的,盘(Disk)和碟(disc)包括压缩光碟(CD)、激光碟、光碟、数字通用光碟(DVD)、软盘和蓝光光碟,其中盘通常磁性的复制数据,而碟则用激光来光学的复制数据。上面的组合也应当包括在计算机可读介质的保护范围之内。Through the description of the above embodiments, those skilled in the art can clearly understand that the present invention can be implemented in hardware, firmware implementation, or a combination thereof. When implemented in software, the functions described above may be stored in or transmitted as one or more instructions or code on a computer readable medium. Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another. A storage medium may be any available media that can be accessed by a computer. Taking this as an example, but not limited to: the computer readable medium may include random access memory (Random) Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium. For example, if the software is using coaxial cable, fiber optic cable, twisted pair, digital subscriber line (Digital Subscriber Line, DSL) or wireless technology such as infrared, radio and microwave transmission from a website, server or other remote source, then coaxial cable, fiber optic cable, twisted pair, DSL or such as infrared, wireless and microwave Wireless technology is included in the fixing of the associated medium. As used in the present invention, a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.
总之,以上所述仅为本发明技术方案的较佳实施例而已,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。 In summary, the above description is only a preferred embodiment of the technical solution of the present invention, and is not intended to limit the scope of the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.
Claims (9)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2017/074209 WO2018152670A1 (en) | 2017-02-21 | 2017-02-21 | Big data management method and device for security monitoring |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2017/074209 WO2018152670A1 (en) | 2017-02-21 | 2017-02-21 | Big data management method and device for security monitoring |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2018152670A1 true WO2018152670A1 (en) | 2018-08-30 |
Family
ID=63252441
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2017/074209 Ceased WO2018152670A1 (en) | 2017-02-21 | 2017-02-21 | Big data management method and device for security monitoring |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2018152670A1 (en) |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101060624A (en) * | 2007-05-08 | 2007-10-24 | 杭州华三通信技术有限公司 | Video data processing method and storage equipment |
| CN105338027A (en) * | 2014-07-30 | 2016-02-17 | 杭州海康威视系统技术有限公司 | Method, system and device for cloud storage of video data |
| US20160292189A1 (en) * | 2015-03-31 | 2016-10-06 | Advanced Digital Broadcast S.A. | System and method for managing content deletion |
-
2017
- 2017-02-21 WO PCT/CN2017/074209 patent/WO2018152670A1/en not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101060624A (en) * | 2007-05-08 | 2007-10-24 | 杭州华三通信技术有限公司 | Video data processing method and storage equipment |
| CN105338027A (en) * | 2014-07-30 | 2016-02-17 | 杭州海康威视系统技术有限公司 | Method, system and device for cloud storage of video data |
| US20160292189A1 (en) * | 2015-03-31 | 2016-10-06 | Advanced Digital Broadcast S.A. | System and method for managing content deletion |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2018218806A1 (en) | Terminal privacy protection method and system | |
| WO2017117715A1 (en) | Attendance method and system for monitoring system | |
| WO2018152669A1 (en) | Security control method and device for security monitoring | |
| WO2018152670A1 (en) | Big data management method and device for security monitoring | |
| WO2018161339A1 (en) | Application method and apparatus for big data searching in security monitoring | |
| WO2018218808A1 (en) | Short message information reading method and system | |
| WO2018148958A1 (en) | Data transmission method and device for security protection and monitoring | |
| WO2017107205A1 (en) | Method and system for transmitting video software | |
| WO2018161341A1 (en) | Method and apparatus for implementing security monitoring on basis of cloud technology | |
| WO2018027557A1 (en) | Wifi attendance record method and system in security | |
| WO2018148957A1 (en) | Method and device for applying big data in security protection system | |
| WO2018148956A1 (en) | Cloud backup method and system for security protection and monitoring | |
| WO2018165863A1 (en) | Data classification method and apparatus in safety and protection monitoring | |
| WO2018027560A1 (en) | Gprs attendance recording method and system for use in security | |
| WO2018032335A1 (en) | Method and system for closing mobile phone applications | |
| WO2018209646A1 (en) | Smart household monitoring method and system | |
| WO2018027561A1 (en) | Method and system for recording attendance on floor for security | |
| WO2018205110A1 (en) | Method and system for monitoring working state of winding machine | |
| WO2018205141A1 (en) | Method and system for stitching and arranging video clips | |
| WO2018035666A1 (en) | Deep sleep analysis method and system of internet of things device | |
| WO2018023710A1 (en) | Secure playing method and system for video | |
| WO2018205135A1 (en) | Network multimedia video rapid playback method and system | |
| WO2018227364A1 (en) | Method and system for establishing terminal multicast group | |
| WO2018027558A1 (en) | Method and system for recording attendance with bluetooth in security | |
| WO2018027559A1 (en) | Beidou attendance record method and system in security |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17897988 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 171219) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 17897988 Country of ref document: EP Kind code of ref document: A1 |