[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN113778508A - Alarm method and system based on alarm center - Google Patents

Alarm method and system based on alarm center Download PDF

Info

Publication number
CN113778508A
CN113778508A CN202110841723.4A CN202110841723A CN113778508A CN 113778508 A CN113778508 A CN 113778508A CN 202110841723 A CN202110841723 A CN 202110841723A CN 113778508 A CN113778508 A CN 113778508A
Authority
CN
China
Prior art keywords
alarm
module
message
personnel
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110841723.4A
Other languages
Chinese (zh)
Other versions
CN113778508B (en
Inventor
沈洪彬
苏金波
王永昆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Fenxiang Technology Co ltd
Original Assignee
Beijing Fenxiang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Fenxiang Technology Co ltd filed Critical Beijing Fenxiang Technology Co ltd
Priority to CN202110841723.4A priority Critical patent/CN113778508B/en
Publication of CN113778508A publication Critical patent/CN113778508A/en
Application granted granted Critical
Publication of CN113778508B publication Critical patent/CN113778508B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/35Creation or generation of source code model driven
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/76Adapting program code to run in a different environment; Porting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/546Message passing systems or structures, e.g. queues
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/54Indexing scheme relating to G06F9/54
    • G06F2209/547Messaging middleware

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)
  • Alarm Systems (AREA)

Abstract

The invention provides an alarming method and system based on an alarming center. Wherein the method comprises: the alarm input is encapsulated into a uniform interface type, and the sources of alarms in different modes can realize subsequent alarm access by sending the alarms according to the uniform interface; carrying out secondary processing on the alarm message of the uniform interface, secondarily packaging the alarm message into data required by a subsequent program, and then secondarily consuming the data; consuming the secondarily packaged alarm message, and configuring an alarm rule; and acquiring personnel information, and carrying out specific alarm realization according to the configured alarm rule.

Description

Alarm method and system based on alarm center
Technical Field
The invention relates to the technical field of intelligent alarm, in particular to an alarm method and an alarm system based on an alarm center.
Background
With the increase of alarm software and modes, the alarm configuration of new business online causes great trouble to development/operation and maintenance personnel, and mainly solves the problems of complicated alarm configuration and repeated alarm configuration.
Along with the continuous expansion of the system and the continuous increase of the service, various alarm conditions can also emerge endlessly, the receiving mode of the alarm is also changed to be diversified due to the occurrence of diversified data acquisition, and along with different requirements of different projects, the contradiction that the alarm is complicated to realize also arises.
One technical solution with publication number CN112559287A is to provide a method and an apparatus for optimizing a task flow in data, which can monitor the execution condition of the task flow and send an alarm, thereby effectively supervising the task flow. When the task flow is abnormal, the alarm can be given, the key abnormal node on the task flow can be accurately positioned, the execution time of the optimized task flow can be predicted, and whether the optimized task flow can be completed in the preset time or not can be judged in advance.
The prior art solves the problem that each system is individually configured with an alarm mode, each system has an own unique alarm mode and configuration mode according to the mode supported by the system, or short messages, or nails, or telephones, and each system maintains own rules and alarm receiving personnel and media.
The problems that exist are that:
1 there is no uniform way, each system requires different personnel to maintain;
2, the personnel management mode of each system is self-maintenance, and the personnel change operation is troublesome and easy to miss;
3, the alarm mode needs to be changed, or more-dimensional alarms are expected, the independent opening is needed, and the codes cannot be reused;
4, the system structure is not formed, the configuration file is slow to enter hands, and the time cost is wasted.
Disclosure of Invention
The invention aims to provide an alarming method and an alarming system based on an alarming center station, which aim to solve the technical problems in the prior art.
The first aspect of the invention provides an alarm method based on an alarm center, which comprises the following steps:
s1: the alarm input is encapsulated into a uniform interface type, and the sources of alarms in different modes can realize subsequent alarm access by sending the alarms according to the uniform interface;
s2: carrying out secondary processing on the alarm message of the uniform interface, secondarily packaging the alarm message into data required by a subsequent program, and then secondarily consuming the data;
s3: consuming the secondarily packaged alarm message, and configuring an alarm rule;
s4: and acquiring personnel information, and carrying out specific alarm realization according to the configured alarm rule.
According to the method provided by the first aspect of the present invention, the warning method further includes: code access of a restful style needs to be supported, and alarm triggering is carried out according to fixed parameters in a post + parameter mode; the mode of the source of the alarm is various.
According to the method provided by the first aspect of the present invention, the mode of the source of the alarm is specifically zabbix custom alarm or trigger after program embedding point or skywalk alarm trigger.
According to the method provided by the first aspect of the present invention, before the secondary consumption, the method further comprises: and using kafka as the processing middleware of the alarm message, and storing the alarm message after secondary encapsulation into the kafka.
The second aspect of the present invention provides an alarm system based on an alarm center, wherein the method includes: the system comprises an alarm source unified interface module, an access layer, a control layer, a basic layer and a cache and persistence module;
the alarm source unified interface module encapsulates alarm input into a unified interface type, the source of alarms in different modes can be sent according to the unified interface to realize a subsequent alarm access layer, the access layer carries out secondary processing on the alarm message of the unified interface, secondary encapsulation is carried out on the alarm message into data required by a subsequent program, then secondary consumption is carried out, the control layer consumes the alarm message after secondary encapsulation, alarm rule configuration is carried out, personnel information is acquired, and specific alarm realization is carried out according to the configured alarm rule; and the control layer performs data persistence through the basic layer according to the configured alarm rule.
According to the apparatus provided by the second aspect of the present invention, the access stratum further includes: kafka; before the secondary consumption, the method further comprises the following steps: and using kafka as the processing middleware of the alarm message, and storing the alarm message after secondary encapsulation into the kafka.
According to a second aspect of the invention, there is provided an apparatus, the control layer comprising: role module, baseuser module, notice project; the role module carries out alarm rule configuration; the baseuser module is responsible for acquiring personnel information; and the notice project carries out specific alarm realization.
According to the apparatus provided by the second aspect of the present invention, the role supports a custom rule, and performs data persistence through the base layer; the role module configures the message system, the alarm mode and the configuration of personnel.
According to the apparatus provided by the second aspect of the present invention, the baseuser module pulls the organization architecture personnel information and the group information; the baseuser module dynamically pulls the organization architecture personnel information of the company, updates the information in real time, and realizes that personnel are changed to the role module in a task planning mode; the baseuser module is responsible for the maintenance of personnel alarm media, manages in a group and personnel mode and maintains a tree structure diagram.
According to the device provided by the second aspect of the present invention, after the role module obtains the personnel information through the baseuser module, the role module can send the personnel information to the notice project for specific alarm realization according to the rule;
the schema information in the notice item is persisted in data through base, different warning media are maintained, and specific warning realization is realized by receiving parameters;
the notice project realizes the sending of the alarm message through different modules of the notice project by receiving different alarm media modes given by the role module and the incoming personnel information.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages:
the alarm method and the alarm system based on the alarm middle station have more flexible configuration, can realize the alarm in a mode of N to N, can be connected with more systems by the middle station telephone, and are compatible with the data access of all restful styles; the bottleneck can not be generated, the flow is smoother, and the robustness of the system is increased. Meanwhile, the application provides an alarming method and device based on an alarming center platform, a unified mode is adopted, different personnel are not needed for maintenance of each system, and the working efficiency is improved; is not easy to be omitted, and reduces the labor cost.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description in the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a block diagram of an alarm system based on an alarm center, which is adopted by the present invention;
fig. 2 is a diagram of a monitoring alarm architecture employed in the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The first aspect of the invention provides an alarm method based on an alarm center, which comprises the following steps:
s1: code access of a restful style is supported, and alarm triggering is carried out according to fixed parameters in a post + parameter mode; the alarm input is encapsulated into a uniform interface type, and the sources of alarms in different modes can realize subsequent alarm access by sending the alarms according to the uniform interface; the mode of the source of the alarm is specifically modes of various sources needing alarm, such as the self-defined alarm of zabbix, the trigger after program embedding, the alarm trigger of sky walking and the like;
parameter of json Format
{message:””,requestId:””,data:{“projectname”:””,”servername”:””}}
S2: performing secondary processing on the alarm message of the unified interface, secondarily encapsulating the alarm message into data required by a subsequent program, using kafka as a processing middleware of the alarm message, storing the secondarily encapsulated alarm message into the kafka, and then performing secondary consumption;
and (3) alarm rules:
1. the project needs to be sent to the owner for alarm configuration;
2. what the notification medium is after this personal alert (phone/sms/.).
S3: consuming the secondarily packaged alarm message, and configuring an alarm rule;
and the personnel information is formed by a personnel architecture of enterprise WeChat, and can be automatically selected when the alarm rule is configured.
S4: and acquiring personnel information, and carrying out specific alarm realization according to the configured alarm rule.
In some embodiments:
1. configuring program error log alarm, and transmitting the program into an access layer in an api mode;
2. configuring an alarm rule, selecting an incoming rule- > and selecting this rule will alarm those;
3. what way these people want to alarm (phone, sms, wechat).
In some embodiments:
1. the testservcer reports json data information in an http//192.168.10.11:8700/upload mode;
2. and configuring the testserver to be three corresponding to the alarm personnel, and jointly selecting the alarm modes, such as: short messages;
3. the silent time after the alarm is selected, e.g. 24h alarm once.
As shown in fig. 1, an alarm system based on an alarm center, the system includes: the system comprises an alarm source unified interface module, an access layer, a control layer, a basic layer and a cache and persistence module;
the access stratum further comprises: kafka;
the alarm source unified interface module encapsulates alarm input into a unified interface type, the source of the multimode alarm can realize a subsequent alarm access layer by sending according to the unified interface, the access layer carries out secondary processing on the alarm message of the unified interface, secondary encapsulation is carried out on the alarm message into data required by a subsequent program, kafka is used as a processing middleware of the alarm message, and the secondarily encapsulated alarm message is stored into kafka and then consumed for the second time; kafka is used as a message queue, so that snow peak valley filling of data and data loss prevention can be guaranteed, and data consistency is guaranteed; the control layer consumes the alarm information after secondary packaging, performs alarm rule configuration, acquires personnel information, and performs specific alarm realization according to the configured alarm rule; the control layer carries out data persistence through the basic layer according to the configured alarm rule without losing the configuration rule;
the control layer includes: role module, baseuser module, notice project; the role module carries out alarm rule configuration; the baseuser module is responsible for acquiring personnel information; the notice project carries out specific alarm realization;
the role supports a custom rule and performs data persistence through the base layer; the role module configures a message system, an alarm mode and personnel configuration;
the rule of role realizes the configuration alarm with other services by pulling the information of the organization architecture personnel and the group information through the baseuser module;
the baseuser module dynamically pulls the organization architecture personnel information of the company, updates the information in real time, realizes personnel change to the role module in a task planning mode, and realizes the baseuser as a unified entrance and exit of personnel management so as to avoid the problem of repeated configuration; .
The baseuser module is responsible for the maintenance of personnel alarm media, manages in a group-by-group personnel mode, maintains a tree structure diagram and is convenient for realizing the alarm mode of a group;
after the role module acquires the personnel information through the baseuser module, the role module can send the personnel information to a notice project for realizing specific alarm according to the rule;
the schema information in the notice item is persisted in data through base, different warning media are maintained, and specific warning realization is realized by receiving parameters;
the notice project realizes the sending of the alarm message through different modules by receiving different alarm media modes given by the role module and the transmitted personnel information;
judging that when the type is in different modes such as short message/telephone/mail/enterprise WeChat and the like, the type is sent to different processing modules, and each module has self-defined rules;
and the node sends all messages to be subjected to warehousing management so as to facilitate the subsequent analysis of the report.
As shown in fig. 2, the middle station receives different projects to deliver messages, and realizes message access;
the middle station receives alarm rule configuration in a web mode, and carries out alarm personnel in the web mode, and an alarm medium is selected;
the middle station receives the grafana mode to inquire and analyze the alarm message and inquire the historical alarm record;
the middle support role sends the message needing alarm to the downstream service for alarm processing by the delivery mode, and the final alarm is realized.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the invention. One of ordinary skill in the art can understand and implement it without inventive effort.
Embodiments of the subject matter and the functional operations described in this specification can be implemented in: digital electronic circuitry, tangibly embodied computer software or firmware, computer hardware including the structures disclosed in this specification and their structural equivalents, or a combination of one or more of them. Embodiments of the subject matter described in this specification can be implemented as one or more computer programs, i.e., one or more modules of computer program instructions, encoded on a tangible, non-transitory program carrier for execution by, or to control the operation of, data processing apparatus. Alternatively or additionally, the program instructions may be encoded on an artificially generated propagated signal, e.g., a machine-generated electrical, optical, or electromagnetic signal, that is generated to encode and transmit information to suitable receiver apparatus for execution by the data processing apparatus. The computer storage medium may be a machine-readable storage device, a machine-readable storage substrate, a random or serial access memory device, or a combination of one or more of them.
The processes and logic flows described in this specification can be performed by one or more programmable computers executing one or more computer programs to perform corresponding functions by operating on input data and generating output. The processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit).
Computers suitable for executing computer programs include, for example, general and/or special purpose microprocessors, or any other type of central processing unit. Generally, a central processing unit will receive instructions and data from a read-only memory and/or a random access memory. The basic components of a computer include a central processing unit for implementing or executing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks. However, a computer does not necessarily have such a device. Moreover, a computer may be embedded in another device, e.g., a mobile telephone, a Personal Digital Assistant (PDA), a mobile audio or video player, a game console, a Global Positioning System (GPS) receiver, or a portable storage device such as a Universal Serial Bus (USB) flash drive, to name a few.
Computer-readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices (e.g., EPROM, EEPROM, and flash memory devices), magnetic disks (e.g., an internal hard disk or a removable disk), magneto-optical disks, and CD ROM and DVD-ROM disks.
While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any invention or of what may be claimed, but rather as descriptions of features specific to particular embodiments of particular inventions. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. In other instances, features described in connection with one embodiment may be implemented as discrete components or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In some cases, multitasking and parallel processing may be advantageous. Moreover, the separation of various system modules and components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
Thus, particular embodiments of the subject matter have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. Further, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some implementations, multitasking and parallel processing may be advantageous.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1. An alarm method based on an alarm center is characterized by comprising the following steps:
s1: the alarm input is encapsulated into a uniform interface type, and the sources of alarms in different modes can realize subsequent alarm access by sending the alarms according to the uniform interface;
s2: carrying out secondary processing on the alarm message of the uniform interface, secondarily packaging the alarm message into data required by a subsequent program, and then secondarily consuming the data;
s3: consuming the secondarily packaged alarm message, and configuring an alarm rule;
s4: and acquiring personnel information, and carrying out specific alarm realization according to the configured alarm rule.
2. The alarm method based on the alarm center according to claim 1, wherein the alarm method further comprises: code access of a restful style needs to be supported, and alarm triggering is carried out according to fixed parameters in a post + parameter mode; the mode of the source of the alarm is various.
3. The alarm method based on the alarm center according to claim 2, wherein the mode of the source of the alarm is specifically zabbix's custom alarm or trigger after program burial or skywalk's alarm trigger.
4. The alert method based on an alert center according to claim 1, wherein the secondary consumption further comprises before: and using kafka as the processing middleware of the alarm message, and storing the alarm message after secondary encapsulation into the kafka.
5. An alarm system based on an alarm center, the system comprising: the system comprises an alarm source unified interface module, an access layer, a control layer, a basic layer and a cache and persistence module;
the alarm source unified interface module encapsulates alarm input into a unified interface type, the source of alarms in different modes can be sent according to the unified interface to realize a subsequent alarm access layer, the access layer carries out secondary processing on the alarm message of the unified interface, secondary encapsulation is carried out on the alarm message into data required by a subsequent program, then secondary consumption is carried out, the control layer consumes the alarm message after secondary encapsulation, alarm rule configuration is carried out, personnel information is acquired, and specific alarm realization is carried out according to the configured alarm rule; and the control layer performs data persistence through the basic layer according to the configured alarm rule.
6. The alarm system based on an alarm center according to claim 5, wherein the access layer further comprises: kafka; before the secondary consumption, the method further comprises the following steps: and using kafka as the processing middleware of the alarm message, and storing the alarm message after secondary encapsulation into the kafka.
7. The middle station alarm system according to claim 5, wherein said control layer comprises: role module, baseuser module, notice project; the role module carries out alarm rule configuration; the baseuser module is responsible for acquiring personnel information; and the notice project carries out specific alarm realization.
8. The alarm console-based alarm system of claim 7, wherein said role supports custom rules and persists data through said base layer; the role module configures the message system, the alarm mode and the configuration of personnel.
9. The middle station alarm system according to claim 8, wherein the baseuser module pulls organization architecture personnel information and group information; the baseuser module dynamically pulls the organization architecture personnel information of the company, updates the information in real time, and realizes that personnel are changed to the role module in a task planning mode; the baseuser module is responsible for the maintenance of personnel alarm media, manages in a group and personnel mode and maintains a tree structure diagram.
10. The alarm system based on the alarm center according to claim 8, wherein the role module can send the personnel information to the notice project for specific alarm realization according to the rule after acquiring the personnel information through the baseuser module;
the schema information in the notice item is persisted in data through base, different warning media are maintained, and specific warning realization is realized by receiving parameters;
the notice project realizes the sending of the alarm message through different modules of the notice project by receiving different alarm media modes given by the role module and the incoming personnel information.
CN202110841723.4A 2021-07-26 2021-07-26 Alarm method and system based on alarm center Active CN113778508B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110841723.4A CN113778508B (en) 2021-07-26 2021-07-26 Alarm method and system based on alarm center

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110841723.4A CN113778508B (en) 2021-07-26 2021-07-26 Alarm method and system based on alarm center

Publications (2)

Publication Number Publication Date
CN113778508A true CN113778508A (en) 2021-12-10
CN113778508B CN113778508B (en) 2024-04-16

Family

ID=78836368

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110841723.4A Active CN113778508B (en) 2021-07-26 2021-07-26 Alarm method and system based on alarm center

Country Status (1)

Country Link
CN (1) CN113778508B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100131394A1 (en) * 2008-11-25 2010-05-27 Hans-Joerg Rutsch Managing consistent interfaces for tax authority business objects across heterogeneous systems
CN106850283A (en) * 2017-01-19 2017-06-13 上海斐讯数据通信技术有限公司 One kind is based on event driven cloud AC alarming processing system and methods
CN110730305A (en) * 2019-10-28 2020-01-24 北京旷视科技有限公司 Multi-source snapshot image processing and accessing method and device based on blocking queue
CN111786833A (en) * 2020-07-01 2020-10-16 浪潮云信息技术股份公司 Alarm matching processing implementation method based on cloud service platform
CN112532456A (en) * 2020-12-04 2021-03-19 浪潮云信息技术股份公司 Alarm monitoring method in cloud environment
CN112671560A (en) * 2020-12-11 2021-04-16 广东电力通信科技有限公司 High-availability distributed real-time alarm processing method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100131394A1 (en) * 2008-11-25 2010-05-27 Hans-Joerg Rutsch Managing consistent interfaces for tax authority business objects across heterogeneous systems
CN106850283A (en) * 2017-01-19 2017-06-13 上海斐讯数据通信技术有限公司 One kind is based on event driven cloud AC alarming processing system and methods
CN110730305A (en) * 2019-10-28 2020-01-24 北京旷视科技有限公司 Multi-source snapshot image processing and accessing method and device based on blocking queue
CN111786833A (en) * 2020-07-01 2020-10-16 浪潮云信息技术股份公司 Alarm matching processing implementation method based on cloud service platform
CN112532456A (en) * 2020-12-04 2021-03-19 浪潮云信息技术股份公司 Alarm monitoring method in cloud environment
CN112671560A (en) * 2020-12-11 2021-04-16 广东电力通信科技有限公司 High-availability distributed real-time alarm processing method and system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
PHILIP A.LEGG, ET AL: "Automated insider threat detection system using user and role-based profile assessment", 《IEEE SYSTEMS JOURNAL》, pages 1 - 10 *
李太凤;朱艳;: "Orion NPM在校园网管理中实现短信报警的方法", 《绵阳师范学院学报》, no. 05, pages 1 - 5 *
黄雅萍: "基于物联网的智慧消防水压监测系统", 《中国优秀硕士论文电子期刊网》, pages 1 - 92 *

Also Published As

Publication number Publication date
CN113778508B (en) 2024-04-16

Similar Documents

Publication Publication Date Title
US10292370B2 (en) Tracking and monitoring of animals with combined wireless technology and geo-fencing
US10574808B2 (en) Automatic setting of an alert mode on a wireless device
CA2743307C (en) Mobile tag tracking system
US8340699B2 (en) Method and system for monitoring high availability support system
CN102034342A (en) Methods and arrangements for smart sensors
MX2009004835A (en) Communication of notifications in a wireless broadcast network.
CN105591821A (en) Monitoring system and business system
US20210367448A1 (en) Power Grid Monitoring Using Network Devices in a Cable Network
US20060025159A1 (en) System and method for context-based notification of a received transmission
CN113778508A (en) Alarm method and system based on alarm center
CN108171470A (en) A kind of based reminding method and device
CN104038368B (en) Device alarm full-data notification system and method for electric-power communication network
CN205262616U (en) Cold chain logistics temperature remote monitering system
CN202121619U (en) Wireless sensing network periphery monitoring system without infrastructure
CN116216075A (en) Tracking method based on packaging box, system and electronic equipment thereof
US10939231B2 (en) Geofencing
Soh et al. Cold chain management system via low power wide area network and IoT
CN105574602A (en) Alarming method for third party to call application program interface (API)
Anggraini et al. Optimal USB to Serial Converter and Delphi Software Integration for Emergency Call Handling
US11908291B2 (en) Reconfigurable power modes
CN209170411U (en) A kind of gateway and gateway
US11963084B2 (en) Intelligent route selection of messages for low-power wide-area devices and other devices
KR101246092B1 (en) Data transmission system and method capable of load balancing and multiple access
CN110234087B (en) Logistics tracing method capable of sharing data
CN118785016A (en) Multi-mode data transmission method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant