CN117560222A - Equipment management method, system, equipment and medium based on tree structure - Google Patents
Equipment management method, system, equipment and medium based on tree structure Download PDFInfo
- Publication number
- CN117560222A CN117560222A CN202410020661.4A CN202410020661A CN117560222A CN 117560222 A CN117560222 A CN 117560222A CN 202410020661 A CN202410020661 A CN 202410020661A CN 117560222 A CN117560222 A CN 117560222A
- Authority
- CN
- China
- Prior art keywords
- information
- tree structure
- user
- grouping
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000007726 management method Methods 0.000 title claims abstract description 50
- 238000000547 structure data Methods 0.000 claims abstract description 38
- 238000000034 method Methods 0.000 claims description 15
- 238000004590 computer program Methods 0.000 claims description 11
- 230000008676 import Effects 0.000 claims description 3
- 238000012544 monitoring process Methods 0.000 description 15
- 238000004891 communication Methods 0.000 description 5
- 238000012806 monitoring device Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 206010039203 Road traffic accident Diseases 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011897 real-time detection Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000000779 smoke Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/08—Mechanical actuation by opening, e.g. of door, of window, of drawer, of shutter, of curtain, of blind
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Automation & Control Theory (AREA)
- Multimedia (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a device management method, a system, a device and a medium based on a tree structure, which relate to the technical field of computers, wherein the device management method based on the tree structure comprises the steps of grouping each device according to basic information to obtain a plurality of grouping information; creating a tree structure based on the plurality of grouping information; according to the identity information of the user, setting at least one user authority for each device in the plurality of group information respectively to obtain a first authority information set; according to the first authority information set, user authorities of a plurality of pieces of grouping information are respectively determined, and a second authority information set is obtained; respectively importing a first authority information set and a second authority information set into corresponding grouping information according to the relation among all nodes in the tree structure to generate tree structure data; based on the tree structure, each device is managed, an account number and a password are not required to be set for each user, and efficiency and safety of device management are improved.
Description
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a device management method, system, device, and medium based on a tree structure.
Background
With the continuous development of social informatization technology, more and more devices (such as monitoring cameras) are put into public places (streets and offices), and how to effectively manage the devices is important. The current device management method manages devices by mainly allocating an account number and a password to each user and then giving the account number access rights to the devices. The disadvantage of this approach is: when a large number of devices need to be entitled, the operation is quite troublesome, account numbers and passwords are easy to leak, the efficiency and the safety of device management are low, and when comprehensive statistics is carried out on the service conditions of the devices in the later period, the service conditions of the devices cannot be intuitively seen due to single statistical latitude, so that the use experience is poor.
Disclosure of Invention
In order to solve the defects existing in the prior art, the embodiment of the invention provides a device management method, a system, a device and a medium based on a tree structure.
In a first aspect, a device management method based on a tree structure provided by an embodiment of the present invention includes the following steps:
grouping each device according to basic information to obtain a plurality of grouping information, wherein the basic information comprises the position information of the device, and each grouping information comprises at least one administrative level represented by the device and at least one sub-device set subordinate to the device;
creating a tree structure based on a plurality of the grouping information;
according to identity information of a user, setting at least one user authority for each device in a plurality of group information respectively to obtain a first authority information set, wherein the identity information comprises post information and level information;
according to the first authority information set, user authorities of a plurality of grouping information are respectively determined, and a second authority information set is obtained;
respectively importing the first authority information set and the second authority information set into corresponding grouping information according to the relation among all nodes in the tree structure to generate tree structure data;
based on the tree structure data, the method is used for managing each device and comprises the following steps:
acquiring the state of target equipment in real time;
judging whether the state of the target equipment is changed or not;
and if the state of the target equipment is determined to be changed, controlling a camera in a set area to shoot an image, identifying the image, and judging whether to control an alarm to send out an alarm according to an identification result.
In some examples, after creating the tree structure based on the plurality of grouping information, the method further comprises:
based on the basic information, an association relationship is established between the respective nodes.
In some examples, determining the user rights for the plurality of group information, respectively, from the first set of rights information includes:
and when the user rights of the devices in the grouping information are completely consistent, taking the user rights of one device in the devices as the user rights of the grouping information.
In some examples, determining the user rights for the plurality of group information, respectively, according to the first set of rights information further includes:
and when the user rights of the devices in the grouping information are not completely consistent, taking the union of the user rights of the devices as the user rights of the grouping information.
In some examples, according to the relationship between the nodes in the tree structure, the grouping information, the user authority of the grouping information, the devices in the grouping information and the user authority of the devices are respectively imported into the tree structure, and after generating the tree structure data, the method further includes:
and converting the tree structure data from space data to data type data and writing the data into a Redis cache.
In some examples, converting the tree structure data from space-type data to data-type data includes:
by "grouping: the device data flattening engine converts the tree structure data from a two-dimensional array to a one-dimensional array.
In some examples, writing to the Redis cache after converting the tree structure data from space-type data to data-type data includes:
and writing the tree structure data into a Redis cache in a set data type.
In some examples, managing the respective devices based on the tree structure data includes:
based on the tree structure data, each user accesses the corresponding equipment according to the access authority of the user and counts the using frequency and the failure rate of the equipment.
In a second aspect, a device management system based on a tree structure provided in an embodiment of the present invention includes:
the grouping module is configured to group each device according to basic information to obtain a plurality of grouping information, wherein the basic information comprises the position information of the device, and each grouping information comprises an administrative level represented by at least one device and at least one sub-device set subordinate to the device;
a creation module configured to create a tree structure based on a plurality of the grouping information;
the setting module is configured to set at least one user authority for each device in the group information according to the identity information of the user to obtain a first authority information set, wherein the identity information comprises post information and level information, and the number of the user authorities of each device is the same;
the determining module is configured to respectively determine the user rights of the plurality of grouping information according to the first right information set to obtain a second right information set;
the importing module is configured to import the first authority information set and the second authority information set into the tree structure according to the relation among all nodes in the tree structure, and generate tree structure data;
a management module configured to manage each of the devices based on the tree structure data, wherein the management module includes:
the acquisition unit is used for acquiring the state of the target equipment in real time;
a judging unit configured to judge whether a state of the target device is changed;
and the control unit is used for controlling the camera in the set area to shoot an image and identifying the image, and judging whether to control the alarm to give an alarm according to the identification result.
In a third aspect, an embodiment of the present invention provides an electronic device including a processor and a memory storing computer program instructions; the processor, when executing the computer program instructions, implements a device management method based on a tree structure as described in the first aspect above.
In a fourth aspect, an embodiment of the present invention provides a computer readable storage medium having stored thereon computer program instructions, where the computer program instructions, when executed by a processor, implement a device management method based on a tree structure as described in the first aspect.
Compared with the prior art, the device management method, the system, the device and the medium based on the tree structure provided by the embodiment of the invention have the following beneficial effects:
(1) By grouping the devices, the device management is more targeted, an account number and a password are not required to be set for each user, the probability of account number and password leakage is reduced, the efficiency and the safety of the device management are improved, the management cost is reduced, and unnecessary maintenance cost is reduced. Meanwhile, the equipment can be monitored and alarmed, illegal crimes or equipment faults can be found in time, the security level is improved, the equipment fault rate is reduced, and the reliability of a monitoring system is improved;
(2) Based on the tree structure, the association between the nodes is realized, the dynamic inheritance and dynamic expansion of the authority can be realized, and the management efficiency of the equipment is further improved;
(3) Based on the tree structure, a user can find the needed equipment by simply clicking, and meanwhile, the working state and the captured information of the equipment can be seen, so that the use experience of the user is improved.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings may be obtained according to these drawings without inventive effort to a person of ordinary skill in the art.
Fig. 1 is a schematic flow diagram of a device management method based on a tree structure according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a device management system based on a tree structure according to an embodiment of the present invention;
fig. 3 is a functional block diagram of an electronic device as a classical computing device according to one embodiment of the invention.
Description of the embodiments
Embodiments of the present disclosure are described in further detail below with reference to the drawings and examples. The following detailed description of the embodiments and the accompanying drawings are provided to illustrate the principles of the disclosure and not to limit the scope of the disclosure, which may be embodied in many different forms and not limited to the specific embodiments disclosed herein, but rather to include all technical solutions falling within the scope of the claims.
Embodiment 1, as shown in fig. 1, the device management method based on a tree structure provided in the embodiment of the present invention includes the following steps:
s101, grouping each device according to basic information to obtain a plurality of grouping information, wherein the basic information comprises the position information of the device, and each grouping information comprises at least one administrative level represented by the device and at least one sub-device set subordinate to the device.
Specifically, the basic information may be brand information and performance parameter information of the devices, that is, the brand information of the devices may be used to group the devices, or the performance parameter information of the devices may be used to group the devices. The equipment grouping can be carried out according to actual needs, similar equipment is divided into a group, each user does not need to be independently allocated with an account number and a password, the probability of account number and password leakage is reduced, the equipment management is more targeted, the management efficiency and the safety of the equipment are improved, the management cost can be reduced, and unnecessary maintenance cost is reduced. Meanwhile, the equipment can be monitored and alarmed, equipment faults can be found in time, the equipment fault rate is reduced, the reliability of a monitoring system is improved, and effective management of the equipment is realized.
S102, creating a tree structure based on the plurality of grouping information.
In some examples, after this step, the device management method based on the tree structure provided by the embodiment of the present invention further includes:
based on the basic information, an association relationship is established between the respective nodes.
Specifically, each node in the tree structure represents a device (including a monitoring device and other signal acquisition devices, such as a smoke sensor and a magnetic door sensor), and may also represent a user. Based on the basic information, the association relation between the nodes (between father and son nodes and between son nodes) can be realized in a reference mode, namely, the basic information of the son nodes comprises the basic information of father nodes or brothers nodes (when the nodes are equipment, the basic information is position information, and when the nodes are users, the basic information is position information), so that the association between the father nodes and the son nodes and between the son nodes and the son nodes can be realized, the dynamic inheritance and dynamic expansion of the authority can be realized, the management efficiency of the equipment is further improved, and the effective management of the equipment is further realized.
S103, at least one user authority is set for each device in the plurality of group information according to the identity information of the user, and a first authority information set is obtained, wherein the identity information comprises post information and level information.
Specifically, for the same device, users with different identity information and job information have different user rights. Such as a company security guard having the right to view all monitoring devices of the company, and staff of other departments having only the right to view the local door monitoring devices.
S104, according to the first authority information set, user authorities of a plurality of pieces of grouping information are respectively determined, and a second authority information set is obtained.
In some examples, step S104 specifically includes:
and when the user rights of the devices in the grouping information are completely consistent, taking the user rights of one device in the devices as the user rights of the grouping information.
Specifically, when the user rights of the first device, the second device, and the third device in certain group information are completely identical, the user rights of the group information are the same as the user rights of the first device or the second device or the third device.
In some examples, step S104 specifically further includes:
and when the user rights of the devices in the grouping information are not completely consistent, taking the union of the user rights of the devices as the user rights of the grouping information.
Specifically, when the user authority of the first device in a certain group information is authority 1 and authority 2; the user rights of the second equipment are rights 2 and 3; when the user rights of the third device are right 1 and right 3, the user rights of the grouping information are right 1, right 2 and right 3.
S105, respectively importing the first authority information set and the second authority information set into the tree structure according to the relation among all nodes in the tree structure, and generating tree structure data.
In particular, non-recursive traversal of tree structured data may help a user to quickly find and locate devices while batch operations may be performed, reducing repetitive operations and saving time.
In some examples, after step S105, the method further comprises:
the tree structure data is written into the Redis cache after being converted from space type data into data type data, and the reading speed of the tree structure data can be improved by writing the tree structure data into the Redis cache because the tree structure data needs to be frequently read.
In some examples, converting the tree structure data from space-type data to data-type data and writing the data into the Redis cache includes:
and writing the tree structure data into a Redis cache in a set data type.
Specifically, before the tree structure data falls into the database, the tree structure data is flattened, so that the tree structure data becomes a data structure for directly using the service.
S106, managing each device based on the tree structure data, including:
acquiring the state of target equipment in real time;
judging whether the state of the target equipment is changed or not;
if the state of the target equipment is determined to change, the camera in the set area is controlled to shoot an image and identify the image, whether the alarm is controlled to give an alarm is judged according to the identification result, the user can find needed equipment through simple clicking, meanwhile, the working state and captured information of the equipment can be seen, the use experience of the user is improved, meanwhile, the equipment can be monitored and alarmed, illegal crimes or equipment faults can be found in time, the security level or equipment fault rate is improved, and the reliability of a monitoring system is improved.
Specifically, taking a security system arranged in a household as an example, the root node is the security system, the child node comprises a camera, a door magnetic sensor and an alarm, wherein the camera is responsible for capturing images, the door magnetic sensor detects the state of a real-time detection door, when the door magnetic sensor detects that the door is opened, the camera is triggered to shoot the images and identify the images, whether a person opening the door is an authorized person (such as a family person) is judged, and if the person is not the authorized person, the alarm is controlled to give an alarm.
In some examples, step S106 specifically further includes:
based on the tree structure data, each user accesses the corresponding equipment according to the access authority of the user, counts the use frequency and the failure rate of the equipment, and facilitates the optimization of the layout of the equipment.
Embodiment 2 as shown in fig. 2, a device management system based on a tree structure according to an embodiment of the present invention includes:
the grouping module is configured to group each device according to basic information to obtain a plurality of grouping information, wherein the basic information comprises the position information of the device, and each grouping information comprises an administrative level represented by at least one device and at least one sub-device set subordinate to the device;
a creation module configured to create a tree structure based on a plurality of the grouping information;
the setting module is configured to set at least one user authority for each device in the group information according to the identity information of the user to obtain a first authority information set, wherein the identity information comprises post information and level information, and the number of the user authorities of each device is the same;
the determining module is configured to respectively determine the user rights of the plurality of grouping information according to the first right information set to obtain a second right information set;
the importing module is configured to import the first authority information set and the second authority information set into the tree structure according to the relation among all nodes in the tree structure, and generate tree structure data;
a management module configured to manage each of the devices based on the tree structure data, wherein the management module includes:
the acquisition unit is used for acquiring the state of the target equipment in real time;
a judging unit configured to judge whether a state of the target device is changed;
and the control unit is used for controlling the camera in the set area to shoot an image and identifying the image, and judging whether to control the alarm to give an alarm according to the identification result.
Embodiment 3, specific application scenarios of the device management method based on the tree structure provided in the embodiment of the present invention include, but are not limited to, the following respective scenarios:
scene one: handling traffic accidents
One day, traffic accidents occur in a certain city center, and emergency response treatment is needed. By adopting the equipment management method based on the tree structure, provided by the embodiment of the invention, traffic police can quickly locate the accident place, find the street-level monitoring camera closest to the accident place, observe the accident situation in real time through the camera, provide real-time traffic condition information for the traffic police, assist in dredging traffic and finally reduce traffic jam.
Specifically, each monitoring camera installed on two sides of a road has relevant authority and decision logic. An access control list can be set for each monitoring camera to ensure that only authorized traffic police have permission to execute access or other operations on the corresponding monitoring camera, and the access permissions of the traffic police with different identities are different (for example, the traffic police of the traffic administration of the district has the permission to access the monitoring camera arranged in the jurisdiction of the district, the traffic police of the traffic administration of the city has the permission to access the monitoring camera arranged on the road in the jurisdiction of the city, and the traffic police of the traffic administration of the province has the permission to access the monitoring camera arranged on the road in the jurisdiction of the province). By the reference mode, the association relation among the nodes (including between the father node and the child node and between the child node and the child node) can be realized, and the dynamic inheritance and the dynamic expansion of the authority can be realized through the association relation. When a certain traffic police has a certain right, the traffic police (level relation, superior relation and the like) with an association relation with the traffic police automatically has the right, so that dynamic inheritance of the right is realized. Aiming at the traffic police with new job, job-related or job-related variation, the corresponding authority can be set for the traffic police by editing the identity mark of the traffic police, so that the dynamic expansion of the authority is realized.
In addition, the setting behavior of the authority can be dynamically monitored in real time. Typically by log monitoring, anomaly detection, etc. For example, a log is recorded each time rights are changed or accessed, and then an anomaly detection algorithm is used to detect abnormal rights setting behavior. Once an anomaly is found, the system should trigger an alarm and take appropriate safeguards such as automatically isolating the attacked part, notifying an administrator, etc.
Scene II: device usage statistics and planning
The city government wishes to know the use of the monitoring devices in each area in order to better plan the security layout of the city. By adopting the device management method based on the tree structure, which is provided by the embodiment of the invention, the data such as the use frequency, the failure rate and the like of the monitoring cameras installed in the area can be obtained through the access rights of the traffic management teams in each area, and the urban traffic management bureau can know the data such as the use frequency, the failure rate and the like of each monitoring camera in the city by summarizing the data such as the use frequency, the failure rate and the like of the monitoring cameras installed in each area, thereby helping a urban government decision maker to judge whether to add or remove monitoring devices in a specific area or not, and further improving the overall urban safety level.
Embodiment 4, fig. 3 is a schematic block diagram showing a hardware structure of an embodiment of an electronic device provided by the present invention. The electronic device comprises a processor 601 and a memory 602 storing computer program instructions. The processor executes the computer program instructions to implement the device management method based on the tree structure disclosed in the embodiment of the invention.
In particular, the processor 601 may include a Central Processing Unit (CPU), or an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or may be configured as one or more integrated circuits that implement embodiments of the present invention.
Memory 602 may include mass storage for data or instructions. By way of example, and not limitation, memory 602 may include a Hard Disk Drive (HDD), floppy Disk Drive, flash memory, optical Disk, magneto-optical Disk, magnetic tape, or universal serial bus (Universal Serial Bus, USB) Drive, or a combination of two or more of the above. The memory 602 may include removable or non-removable (or fixed) media, where appropriate. Memory 602 may be internal or external to the integrated gateway disaster recovery device, where appropriate. In a particular embodiment, the memory 602 is a non-volatile solid state memory.
The memory may include Read Only Memory (ROM), random Access Memory (RAM), magnetic disk storage media devices, optical storage media devices, flash memory devices, electrical, optical, or other physical/tangible memory storage devices. Thus, in general, the memory includes one or more tangible (non-transitory) computer-readable storage media (e.g., memory devices) encoded with software comprising computer-executable instructions and when the software is executed (e.g., by one or more processors) it is operable to perform the operations described with reference to methods in accordance with aspects of the present disclosure.
In some examples, as shown in fig. 3, the electronic device may also include a communication interface 603 and a bus 610. As shown in fig. 3, the processor 601, the memory 602, and the communication interface 603 are connected to each other through a bus 610 and perform communication with each other. The electronic device in the embodiment of the invention can be a server or other computing devices, and also can be a cloud server.
The communication interface 603 is mainly used for implementing communication between each module, apparatus, unit and/or device in the embodiment of the present invention.
Bus 610 includes hardware, software, or both, coupling components of the online data flow billing device to each other. By way of example, and not limitation, the buses may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industry Standard Architecture (EISA) bus, a Front Side Bus (FSB), a HyperTransport (HT) interconnect, an Industry Standard Architecture (ISA) bus, an infiniband interconnect, a Low Pin Count (LPC) bus, a memory bus, a micro channel architecture (MCa) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCI-X) bus, a Serial Advanced Technology Attachment (SATA) bus, a video electronics standards association local (VLB) bus, or other suitable bus, or a combination of two or more of the above. Bus 610 may include one or more buses, where appropriate. Although embodiments of the invention have been described and illustrated with respect to a particular bus, the invention contemplates any suitable bus or interconnect.
The invention also provides a computer program product comprising computer program instructions which, when executed by a processor, implement the device management method based on the tree structure provided by the embodiment of the invention. Such as a software installation package, a plug-in compatible with the associated software system, etc.
It should be understood that the invention is not limited to the particular arrangements and instrumentality described above and shown in the drawings. For the sake of brevity, a detailed description of known methods is omitted here. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present invention are not limited to the specific steps described and shown, and those skilled in the art can make various changes, modifications and additions, or change the order between steps, after appreciating the spirit of the present invention.
Furthermore, the use of the terms first, second, and the like in this disclosure do not denote any order, quantity, or importance, but rather are used to distinguish one element from another.
In the foregoing, only the specific embodiments of the present invention are described, and it will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the systems, modules and units described above may refer to the processes in the foregoing method embodiments, which are not repeated herein. It should be understood that the scope of the present invention is not limited thereto, and any equivalent modifications or substitutions can be easily made by those skilled in the art within the technical scope of the present invention, and they should be included in the scope of the present invention.
Claims (10)
1. A device management method based on a tree structure, comprising:
grouping each device according to basic information to obtain a plurality of grouping information, wherein the basic information comprises the position information of the device, and each grouping information comprises at least one administrative level represented by the device and at least one sub-device set subordinate to the device;
creating a tree structure based on a plurality of the grouping information;
according to identity information of a user, setting at least one user authority for each device in a plurality of group information respectively to obtain a first authority information set, wherein the identity information comprises post information and level information;
according to the first authority information set, user authorities of a plurality of grouping information are respectively determined, and a second authority information set is obtained;
respectively importing the first authority information set and the second authority information set into corresponding grouping information according to the relation among all nodes in the tree structure to generate tree structure data;
based on the tree structure data, managing each device includes:
acquiring the state of target equipment in real time;
judging whether the state of the target equipment is changed or not;
and if the state of the target equipment is determined to be changed, controlling a camera in a set area to shoot an image, identifying the image, and judging whether to control an alarm to send out an alarm according to an identification result.
2. The device management method based on a tree structure according to claim 1, wherein after creating a tree structure based on a plurality of the grouping information, the method further comprises:
based on the basic information, an association relationship is established between the respective nodes.
3. The tree structure-based device managing method according to claim 1, wherein determining the user rights of the plurality of group information, respectively, according to the first set of rights information includes:
and when the user rights of the devices in the grouping information are completely consistent, taking the user rights of one device in the devices as the user rights of the grouping information.
4. The tree structure-based device managing method according to claim 1, wherein determining the user rights of the plurality of group information, respectively, according to the first set of rights information further comprises:
and when the user rights of the devices in the grouping information are not completely consistent, taking the union of the user rights of the devices as the user rights of the grouping information.
5. The device management method based on a tree structure according to claim 1, wherein the respective grouping information, the user rights of the respective grouping information, the respective devices in the respective grouping information, and the user rights of the respective devices are respectively imported into the tree structure according to the relationship between the respective nodes in the tree structure, and after generating the tree structure data, the method further comprises:
converting the tree structure data from space data to data and writing the data into a Redis cache;
and writing the tree structure data into a Redis cache in a set data type.
6. The device management method based on a tree structure according to claim 5, wherein converting the tree structure data from space-type data to data-type data comprises:
by "grouping: the device data flattening engine converts the tree structure data from a two-dimensional array to a one-dimensional array.
7. The device management method based on the tree structure according to claim 1, wherein managing each of the devices based on the tree structure data further comprises:
based on the tree structure data, each user accesses the corresponding equipment according to the access authority of the user and counts the using frequency and the failure rate of the equipment.
8. A device management system based on a tree structure, comprising:
the grouping module is configured to group each device according to basic information to obtain a plurality of grouping information, wherein the basic information comprises the position information of the device, and each grouping information comprises an administrative level represented by at least one device and at least one sub-device set subordinate to the device;
a creation module configured to create a tree structure based on a plurality of the grouping information;
the setting module is configured to set at least one user authority for each device in the group information according to the identity information of the user to obtain a first authority information set, wherein the identity information comprises post information and level information, and the number of the user authorities of each device is the same;
the determining module is configured to respectively determine the user rights of the plurality of grouping information according to the first right information set to obtain a second right information set;
the importing module is configured to import the first authority information set and the second authority information set into the tree structure according to the relation among all nodes in the tree structure, and generate tree structure data;
a management module configured to manage each of the devices based on the tree structure data, wherein the management module includes:
the acquisition unit is used for acquiring the state of the target equipment in real time;
a judging unit configured to judge whether a state of the target device is changed;
and the control unit is used for controlling the camera in the set area to shoot an image and identifying the image, and judging whether to control the alarm to give an alarm according to the identification result.
9. An electronic device comprising a processor and a memory storing computer program instructions; the processor, when executing the computer program instructions, implements a device management method based on a tree structure as claimed in any one of claims 1-7.
10. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon computer program instructions, which when executed by a processor, implement the tree-structure based device management method according to any of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410020661.4A CN117560222B (en) | 2024-01-08 | 2024-01-08 | Equipment management method, system, equipment and medium based on tree structure |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410020661.4A CN117560222B (en) | 2024-01-08 | 2024-01-08 | Equipment management method, system, equipment and medium based on tree structure |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117560222A true CN117560222A (en) | 2024-02-13 |
CN117560222B CN117560222B (en) | 2024-03-12 |
Family
ID=89818789
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410020661.4A Active CN117560222B (en) | 2024-01-08 | 2024-01-08 | Equipment management method, system, equipment and medium based on tree structure |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117560222B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060218394A1 (en) * | 2005-03-28 | 2006-09-28 | Yang Dung C | Organizational role-based controlled access management system |
US8296320B1 (en) * | 2007-04-30 | 2012-10-23 | Network Appliance, Inc. | Method and system for storing clients' access permissions in a cache |
CN106789984A (en) * | 2016-12-08 | 2017-05-31 | 浙江齐治科技股份有限公司 | A kind of access rights specification and visualization method and system |
CN108900483A (en) * | 2018-06-13 | 2018-11-27 | 江苏物联网研究发展中心 | Cloud storage fine-grained access control method, data upload and data access method |
CN111464493A (en) * | 2020-02-25 | 2020-07-28 | 视联动力信息技术股份有限公司 | Method and device for managing user permission of video network |
US20200358778A1 (en) * | 2019-05-07 | 2020-11-12 | Bank Of America Corporation | Role Discovery for Identity and Access Management in a Computing System |
CN112836207A (en) * | 2021-01-07 | 2021-05-25 | 湖北智泽云创科技有限公司 | Unified management system and method for authority of mala user |
CN115473769A (en) * | 2022-07-28 | 2022-12-13 | 厦门市政智慧城市科技有限公司 | Intelligent gateway system for monitoring urban facilities |
CN116405239A (en) * | 2023-01-09 | 2023-07-07 | 浪潮智慧科技有限公司 | Cross-platform multi-mobile application access management method and system |
-
2024
- 2024-01-08 CN CN202410020661.4A patent/CN117560222B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060218394A1 (en) * | 2005-03-28 | 2006-09-28 | Yang Dung C | Organizational role-based controlled access management system |
US8296320B1 (en) * | 2007-04-30 | 2012-10-23 | Network Appliance, Inc. | Method and system for storing clients' access permissions in a cache |
CN106789984A (en) * | 2016-12-08 | 2017-05-31 | 浙江齐治科技股份有限公司 | A kind of access rights specification and visualization method and system |
CN108900483A (en) * | 2018-06-13 | 2018-11-27 | 江苏物联网研究发展中心 | Cloud storage fine-grained access control method, data upload and data access method |
US20200358778A1 (en) * | 2019-05-07 | 2020-11-12 | Bank Of America Corporation | Role Discovery for Identity and Access Management in a Computing System |
CN111464493A (en) * | 2020-02-25 | 2020-07-28 | 视联动力信息技术股份有限公司 | Method and device for managing user permission of video network |
CN112836207A (en) * | 2021-01-07 | 2021-05-25 | 湖北智泽云创科技有限公司 | Unified management system and method for authority of mala user |
CN115473769A (en) * | 2022-07-28 | 2022-12-13 | 厦门市政智慧城市科技有限公司 | Intelligent gateway system for monitoring urban facilities |
CN116405239A (en) * | 2023-01-09 | 2023-07-07 | 浪潮智慧科技有限公司 | Cross-platform multi-mobile application access management method and system |
Also Published As
Publication number | Publication date |
---|---|
CN117560222B (en) | 2024-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104243569B (en) | A kind of city operating system | |
US7779465B2 (en) | Distributed peer attack alerting | |
CN104753936B (en) | OPC security gateway systems | |
KR101375813B1 (en) | Active security sensing device and method for intrusion detection and audit of digital substation | |
CN108446546A (en) | Abnormal access detection method, device, equipment and computer readable storage medium | |
CN114363044B (en) | Hierarchical alarm method, hierarchical alarm system, storage medium and terminal | |
CN102999716A (en) | virtual machine monitoring system and method | |
CN113726780A (en) | Network monitoring method and device based on situation awareness and electronic equipment | |
CN110324323A (en) | A kind of new energy plant stand relates to net end real-time, interactive process exception detection method and system | |
CN115459965A (en) | Multistep attack detection method for network security of power system | |
CN111614639A (en) | Network security analysis method based on boundary theory | |
CN111063197A (en) | Method and device for processing abnormal behavior information of vehicle in parking lot | |
CN117879961A (en) | Threat early warning analysis model of situation awareness system | |
Suo et al. | Research on the application of honeypot technology in intrusion detection system | |
CN113836564B (en) | Block chain-based network-connected automobile information security system | |
CN117560222B (en) | Equipment management method, system, equipment and medium based on tree structure | |
CN113691498B (en) | Electric power internet of things terminal safety state evaluation method and device and storage medium | |
CN106603489A (en) | Network security management and control apparatus for transformer substation | |
CN111709021B (en) | Attack event identification method based on mass alarms and electronic device | |
CN109462617B (en) | Method and device for detecting communication behavior of equipment in local area network | |
Ahmad et al. | Preventing surveillance cities: Developing a set of fundamental privacy provisions | |
CN115550034B (en) | Service flow monitoring method and device for distribution network power monitoring system | |
CN105471857A (en) | Power grid terminal invalid external connection monitoring blocking method | |
Jiang et al. | Design and practice of industrial control network security threat model | |
CN102752318B (en) | Information security verification method and system based on internet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |