CN114979258B - Method and system for pushing security system message to chat software - Google Patents
Method and system for pushing security system message to chat software Download PDFInfo
- Publication number
- CN114979258B CN114979258B CN202210570070.5A CN202210570070A CN114979258B CN 114979258 B CN114979258 B CN 114979258B CN 202210570070 A CN202210570070 A CN 202210570070A CN 114979258 B CN114979258 B CN 114979258B
- Authority
- CN
- China
- Prior art keywords
- rule
- message
- pushing
- event
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 230000002159 abnormal effect Effects 0.000 claims description 9
- 230000009471 action Effects 0.000 claims description 7
- 230000006870 function Effects 0.000 claims description 7
- 230000000875 corresponding effect Effects 0.000 description 38
- 238000004891 communication Methods 0.000 description 8
- 230000001960 triggered effect Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 6
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000010276 construction Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012806 monitoring device Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000004080 punching Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000000779 smoke Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000026676 system process Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/06—Message adaptation to terminal or network requirements
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Alarm Systems (AREA)
Abstract
The application discloses a method and a system for pushing security system information to chat software, wherein the method comprises the following steps: acquiring event data generated by security equipment; determining a push contact according to the event data and a preset first rule, wherein the push contact has a corresponding relation with the contact in the chat software; the first rule is a message pushing rule or a security device rule; and generating a corresponding security system message according to the event data and a preset message template, and pushing the security system message to a contact in chat software. The method and the system can push the self-defined security system information to the corresponding contact person in the chat software in different time periods, and can meet the requirement of pushing the self-defined security system information to the user in different time periods according to different scenes.
Description
Technical Field
The application relates to the technical field of message pushing, in particular to a method and a system for pushing security system messages to chat software.
Background
Message pushing refers to sending a message to one or more users in a "broadcast" manner according to certain protocols and standards. In the security system, the pushing and notification of the security message are generally performed by using a mobile phone short message, an email box and a software real-time monitoring mode.
The security messages in the security system generally adopt a fixed message form, and templates for pushing the messages cannot be customized; and can only push the message of the incident correlated to linkage rule of the security equipment, can't self-define the incident type to push the message; in addition, no matter what time period is generated, the security system can push messages to users, and the requirement of pushing custom messages to users according to different scenes and different time periods cannot be met.
Disclosure of Invention
The application aims to provide a method and a system for pushing security system messages to chat software, which are used for solving the technical problem that user-defined messages cannot be pushed to users according to different scenes and different time periods in the prior art.
The aim of the application can be achieved by the following technical scheme:
a method of pushing security system messages to chat software, comprising:
acquiring event data generated by security equipment;
determining a push contact according to the event data and a preset first rule, wherein the push contact has a corresponding relation with a contact in chat software; the first rule is a message pushing rule or a security device rule;
and generating a corresponding security system message according to the event data and a preset message template, and pushing the security system message to a contact in chat software.
Optionally, when an event occurrence point in the event data is the same as an event occurrence point associated with a message in the message pushing rule, an event type in the event data corresponds to a message type in the message pushing rule, an event time in the event data is within an effective time period in the message pushing rule, and a state of the message pushing rule is an enabling state, an address book contact corresponding to the message pushing rule is a pushing contact.
Optionally, the security equipment rule at least includes an event number, an event occurrence point, and an access control rule, where the access control rule at least includes an access control linkage rule, and when the first rule is a security equipment rule, determining, according to the event data and a preset first rule, to push the contact includes:
when an entrance guard linkage rule exists on a door where an event occurrence point in the security equipment rule exists and an event number in the event data exists on an event number in the security equipment rule, judging whether an entrance guard linkage event is generated at the event occurrence point in the entrance guard linkage rule, and if so, taking an address book contact corresponding to the security equipment rule as a push contact.
Optionally, the preset message template at least includes:
message mode, message format, message type;
wherein the message mode refers to the content of the beginning and the end of a message, the message format is one or more of text, pictures or videos, and the message type is one or more of normal, abnormal or alarm.
Optionally, the security system includes a message pushing center, and before acquiring event data generated by the security device, the security system further includes:
setting message pushing rules in a message pushing center, wherein the setting of the pushing type, the valid time period of the rules, the pushed message type, the event occurrence point associated with the message, the corresponding address book contact person and whether the message pushing is in an enabling state or not are included.
Optionally, the security system includes a door control module, and before acquiring event data generated by the security device, the security system further includes:
the security equipment rules are set in the access control module, and the security equipment rules comprise equipment rule names, trigger event numbers, trigger event occurrence points, output points for executing output actions, output points for linkage of other functions, access control time periods, access control linkage rules and global linkage rules.
Optionally, before acquiring the event data generated by the security device, the method further includes:
and configuring address book contacts in the message pushing center, and binding the address book contacts with contacts in chat software.
Optionally, pushing the message to the contact in the chat software includes:
pushing the message to the contacts in the chat software within a regular effective period of time.
Optionally, the entrance guard linkage rule includes:
rule names, associated access control equipment, linkage triggering conditions, linkage input points and linkage output points.
The application also provides a system for pushing the security system information to the chat software, which comprises:
the event data acquisition module is used for acquiring event data generated by the security equipment;
the push contact person determining module is used for determining push contact persons according to event data and preset message push rules or event data and preset security equipment rules, wherein the push contact persons have corresponding relations with contact persons in chat software;
and the message generating and pushing module is used for generating a corresponding message according to the event data and a preset message template and pushing the message to the contact person in the chat software.
The application provides a method and a system for pushing security system information to chat software, wherein the method comprises the following steps: acquiring event data generated by security equipment; determining a push contact according to the event data and a preset first rule, wherein the push contact has a corresponding relation with a contact in chat software; the first rule is a message pushing rule or a security device rule; and generating a corresponding security system message according to the event data and a preset message template, and pushing the security system message to a contact in chat software.
In view of this, the beneficial effects brought by the application are:
according to the application, the security system acquires event data generated by security equipment and analyzes the event data, and sets a customized message pushing rule and security equipment rules according to different scenes, wherein the preset message pushing rule can customize the type of the message pushed, the effective time period of the rule and the like, and determines the pushing contact person of the security message through the event data, the preset message pushing rule and the preset security equipment rule; and generating security messages with custom message templates according to the event data and the preset message templates. Because the push contact has a corresponding relation with the contact (user group and/or person) in the chat software, the security system can push the self-defined security message to the corresponding contact in the chat software in different time periods, and the requirement of pushing the self-defined message to the user in different time periods according to different scenes can be met.
Drawings
FIG. 1 is a schematic flow chart of the method of the present application;
fig. 2 is a schematic diagram of the system of the present application.
Detailed Description
The embodiment of the application provides a method and a system for pushing security system messages to chat software, which are used for solving the technical problem that user-defined messages cannot be pushed to users according to different scenes and different time periods in the prior art.
In order that the application may be readily understood, a more complete description of the application will be rendered by reference to the appended drawings. Preferred embodiments of the present application are shown in the drawings. This application may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein in the description of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. The term "and/or" as used herein includes any and all combinations of one or more of the associated listed items.
Referring to fig. 1, the following is an embodiment of a method for pushing a security system message to chat software according to the present application, including:
s100: acquiring event data generated by security equipment;
s200: determining a push contact according to the event data and a preset first rule, wherein the push contact has a corresponding relation with a contact in chat software; the first rule is a message pushing rule or a security device rule;
s300: and generating a corresponding security system message according to the event data and a preset message template, and pushing the security system message to a contact in chat software.
In this embodiment, the security device and the security system are in communication connection, so the following operations are first performed:
(1) Installation and network construction of a security system: the installation and deployment are carried out by downloading a security system software installation package, a network is set, and the smoothness of the network is kept;
(2) Networking the security equipment, and setting communication connection between the security equipment and a security system: the security equipment is conducted with network access, if the security equipment and the security system are in different network segments, the server address of the security equipment is modified by a background which is required to enter the security equipment, and the server address of the security equipment is pointed to the ip address of the security system; or downloading the equipment inquiry gadget of the security system to search and modify the server address of the security equipment, and pointing the server address of the security equipment to the ip address of the security system. After the communication setting is completed, the security equipment and the security system can perform data communication.
In this embodiment, after the security device and the security system can perform data communication, the security device is added to the security system. When security equipment is added to the security system, the security equipment is searched on the security system, the security equipment is found according to the SN or the IP address of the security equipment, then the security equipment is added to the security system, and the communication state is kept by sending an http request to a server. Further, the server caches the heartbeat of the security device into redis, then judges the state of the security device by detecting the heartbeat value of the security device, and if the security device is in an offline state, event data generated by the security device is not transmitted to chat software.
Specifically, when each security device is added to the security system, relevant information such as event types supported by the security device, parameters (only stored in a database) set by which rules are supported by the security device, access control of the security device, read heads of the access control, auxiliary input, auxiliary output and the like is pushed to the security system, and then the security system processes the information, stores the data in the database and displays the data in the security system in a list form.
It should be noted that, the auxiliary input of the security device is mainly used for receiving devices such as an infrared sensor, a smoke sensor and the like; the auxiliary output of the security equipment is mainly used for connecting an alarm and is used in linkage.
In this embodiment, data generated by security devices are referred to as event data in a security system, and an event of a device includes SN of the security device, an event number, time of occurrence of the event, that is, event time, place of occurrence of the event, that is, event occurrence point (entrance guard of the security device, abbreviated as event point), event source, and a triggering manner of the event.
It is worth to say that, install two read heads on security protection equipment's an entrance guard generally, correspond personnel's the state of going out, entering respectively, and only select one of them state to exist when using, the read head of entrance guard can show that personnel's the state of going out or entering state when the event takes place. The event source indicates who the security device event triggered, such as a person pin and/or other non-human actions such as power down. The trigger mode of the event indicates what mode the event is triggered by, such as swiping a card, verifying a fingerprint, a face, etc.
It should be noted that the event type may include three attributes of an event name, an event number, and an event level, and the event level may include three of abnormality, normality, and alarm, and the event type and the security device are bound together through an id (SN or IP address) of the security device. It can be understood that the event types can also be said to include normal, abnormal and alarm, when the event level in a certain event type is abnormal, the event type of the event is considered to be abnormal, and the security system can judge what type the event belongs to according to the event number.
Because the event types and the event numbers supported by each security device are unique, the event types and the event numbers are in one-to-one correspondence, the event types can be found through the event numbers, and then the event levels of the event types are obtained.
In this embodiment, the security system pushes the message to the mobile phone chat software in two ways: one is to set message pushing rules in a message pushing center of the security system, and the other is to set device rules in an access control module of the security system.
The security system in this embodiment at least includes: the system module (including a message pushing center), the attendance module and the access control module. The security system further comprises, before acquiring event data generated by the security device:
(1) Address book contact person for setting message pushing center
In this embodiment, contacts in the chat software include groups of users and/or individuals. The user group in the chat software refers to the group of people with the same hobbies or characteristics, which can chat and communicate. User group construction and disassembly in chat software APP: the user group is established according to the situation, and the naming of the user group can be authority group name or shift name, and the user group can be named according to the event type.
In this embodiment, if the mobile phone chat software is to delete the contact bound with the address book contact of the security system, and the contact is found to be used by other functions through inspection, the contact in the chat software cannot be deleted; if the contacts in the chat software are successfully deleted, the message corresponding to the event generated by the security equipment is not pushed to the corresponding user person or user group.
The message pushing center of the security system and chat software APP are bound through a token, and the specific process is as follows:
and (3) newly adding an address book contact person in a message pushing center of the security system, jumping to an APP webpage version of chat software through a connection request, logging in an account, selecting a contact person (a user group and/or a user person) to be bound, generating a token for the contact person after the binding is successful, storing the token in information of the newly added contact person, and displaying information of the contact person in an address book list of the message pushing center after the newly added contact person is successful, wherein in a preferred embodiment, the token of the contact person is displayed in the address book in the message pushing.
It can be appreciated that contacts in the address book in the message push have a correspondence with contacts in the chat software.
(2) Setting message templates in system modules of security systems
The preset message template at least comprises: message mode, message format, message type; wherein the message pattern refers to the beginning and ending content of the message; the message format is one or more of text, pictures or video, and the message type is one or more of normal, abnormal or alarm.
It should be noted that, the message mode refers to a template of the custom message, and a user can custom push the beginning and ending contents of the message according to the requirement; the content format of the message pushing can be three formats of text, picture and video, and the three formats can be combined with each other or sent separately.
(3) Setting message pushing rules in a message pushing center, including setting: the method comprises the steps of pushing types, valid time periods of rules, pushed message types, event occurrence points associated with the messages, corresponding address book contacts and whether the message types, the event occurrence points and the corresponding address book contacts are in an enabling state or not. The specific process is as follows:
newly-built message pushing rules, selecting pushing types, wherein the pushing types can be access control or attendance checking in a preferred embodiment; setting a pushing effective time period; selecting the entrance guard of the entrance guard equipment associated with the message as an event point associated with the message; setting the type of the pushed message, which mainly comprises abnormal, normal and alarming types, wherein one or more of the three types can be selected, and all types can be selected for pushing; configuring address book contacts bound by the message pushing rule; it may also be configured whether this message pushing rule is enabled.
It should be noted that the valid time period in the message pushing rule refers to what time period the message pushing rule takes effect. In this embodiment, an effective time period of a message pushing rule may be set, and the security system may push a message only in the set effective time period, for example, set an effective time period of pushing a card-punching record as a shift-in period, set an effective time period of pushing a patrol as a shift-out period, and so on.
In this embodiment, a corresponding type of a message or an event to be notified may be selected according to a requirement, a type of a pushed message set in a message pushing rule may correspond to one or more types of events, for example, if a normal type and a warning type are selected for the type of the message, when an event occurring in a security device is a normal type or a warning type, the type of the event in event data is considered to correspond to the type of the message in the message pushing rule; when the event of the security device is of an abnormal type, the event type in the event data is not corresponding to the message type in the message pushing rule.
In this embodiment, address book contacts bound by the message pushing rule are configured, and each message pushing rule is bound with the address book contacts of the message pushing center, that is, the message pushing rule corresponds to the address book contacts.
(4) The security equipment rule is set in an access control module of the security system, and the specific process is as follows:
newly adding security equipment rules, setting names of the equipment rules, selecting a triggered event number, setting a triggered event occurrence point, selecting an output event point of related actions, and setting output point information of other functions, an access control time period, an access control linkage rule and a global linkage rule.
It should be noted that, in this embodiment, the security device may include an access control device, a monitoring device, and the like, and in general, the security device should be kept in an online state. Security devices, such as door check devices, may include one or more door check devices, each door check having a read head mounted thereon, and an event point may more particularly refer to the read head of the door check triggering an event. In a preferred embodiment, the event point of the related action selected and output may be the entrance guard of the entrance guard device selected to execute the response action.
In this embodiment, when security equipment is entrance guard equipment, security equipment rule also refers to entrance guard rule, carries out rule setting to entrance guard on the entrance guard equipment in security system, reaches the effect that reacts to the function of entrance guard or the action that the user produced when using entrance guard equipment to verify. For example, the access time period is one of access rules, and this rule refers to the use time of the access set by the user on the security system, and the user can only use the access in a specified effective time period.
In addition, the entrance guard rules also comprise rules of linkage, anti-diving, interlocking, first person normally open, global linkage and the like. In a preferred embodiment, the entrance guard rule in this embodiment mainly refers to an entrance guard linkage rule and a global linkage rule, where the entrance guard linkage rule and the security device are in a one-to-one correspondence, and the global linkage rule and the security device are in a one-to-many relationship.
Specifically, when the entrance guard module of the security system sets an entrance guard linkage rule, the entrance guard linkage rule is newly added, the name of the entrance guard linkage rule is input, the associated security equipment is selected, the linkage triggering condition (selectable), the linkage input point is selected, the linkage output point is selected, and the output point of other functional linkages is set. After the entrance guard linkage rule is added, the entrance guard linkage rule is stored in a database of the security system.
If the entrance guard where the event point in the event data is located has an entrance guard linkage rule, when the event number in the event data is in the event number of the linkage triggering condition of the entrance guard linkage rule, namely the event number in the event data is included in the event number of the linkage triggering condition of the entrance guard linkage rule, the entrance guard linkage rule is triggered if the corresponding entrance guard linkage event in the entrance guard linkage rule is indicated. The security system judges which type (abnormal, normal and alarm) the event belongs to according to the event number.
In this embodiment, the linkage triggering condition refers to an event type supported by the security device, and when the security device rule is set, the triggering linkage condition is added to display all event types supported by the security device. The linkage input points refer to all doors under the selected access control equipment; the linkage output point refers to the entrance guard of the entrance guard equipment which reacts to the entrance guard linkage event; the output points of other functional linkage are the mailbox, the short message and the contact person in the address book of the security system, and the functional contents are the mailbox, the telephone number and the contact person information respectively.
It is worth to say that a plurality of security device rules may exist in one security device, i.e. a plurality of security device rules may be set for one security device. By setting output points of linkage of other functions, each security device rule binds corresponding address book contacts in the security system. The security equipment rules are associated with address book contacts through contact ids, the information of the address book contacts is mainly token, and the contacts in the address book are bound with user groups or individuals in mobile phone chat software App through token.
In this embodiment, the process of door control linkage is: when any one of the linkage triggering conditions occurs at a certain input point of the access control equipment, further reacting at the set linkage output point.
In this embodiment, after the message pushing rules are set by the message pushing center of the security system, the main process of pushing the security system message to the chat software according to the message pushing rules is as follows:
firstly, the security device transmits generated event data to a security system through an access push protocol, the security system acquires and analyzes the event data generated by the security device, if an event occurrence point in the event data is contained in an event occurrence point associated with a message configured by a message push rule, the generated event type is also contained in an event type corresponding to the message type configured by the message push rule (the event type in the event data corresponds to the message type in the message push rule), the time of event generation, namely the event time, is within an effective time period of the message push rule, and the state of the message push rule is an enabling state, the security system takes an address book contact configured by the message push rule as a push contact. The push contact has a corresponding relationship with the contact in the chat software, and in a preferred embodiment, the push contact corresponds to a user person or user group in the chat software through a token.
Then, the security system generates a corresponding message according to the event data and a preset message template, and pushes the message to a contact in chat software, wherein the preset message template at least comprises: message mode, message format, message type. The security system adds the content corresponding to the event data as the main content of the message between the message beginning and the message ending according to the message beginning and the message ending set by the message mode in the message template, thereby generating a complete message. Because the push contact has a corresponding relation with the contact in the chat software, the corresponding contact in the chat software can be determined after the push contact is obtained, and therefore, the security system pushes the generated complete message to the corresponding contact (user group and/or user person) in the chat software.
In this embodiment, after the security device rule is set by the access control module of the security system, the main process of pushing the security system message to the chat software according to the security device rule is as follows:
firstly, the security equipment transmits the generated event data to a security system through an access control push protocol, and the security system acquires and analyzes the event data generated by the security equipment. When the entrance guard linkage rule exists at the entrance guard where the event occurrence point in the security equipment rule exists and the event number in the event data exists in the event number of the linkage triggering condition in the entrance guard linkage rule, the entrance guard linkage rule is triggered. It can be appreciated that the gate linkage rule is triggered when a gate linkage event corresponding to the gate linkage rule setting is generated.
And the security system judges whether an event occurrence point in the entrance guard linkage rule generates an entrance guard linkage event, and if so, the address book contact bound in the security equipment rule is used as a push contact.
And then, the security system generates a corresponding message according to the event data and a preset message template, and pushes the message to the contact in the chat software. The security system adds the content corresponding to the event data as the main content of the message between the message beginning and the message ending according to the message beginning and the message ending set by the message mode in the message template, thereby generating a complete message. The security system pushes the generated complete message to the corresponding contact (user group and/or user person) in the chat software.
According to the method for pushing the security system information to the chat software, the security system obtains event data generated by the security equipment and analyzes the event data, and user-defined information pushing rules and security equipment rules are set according to different scenes, wherein the preset information pushing rules can be used for self-defining the type of the pushed information and the effective time period of the rules, and push contacts for security information are determined according to the event data, the preset information pushing rules and the preset security equipment rules; and generating security messages with custom message templates according to the event data and the preset message templates. Because the push contact has a corresponding relation with the contact (user group and/or person) in the chat software, the security system can push the self-defined security message to the corresponding contact in the chat software in different time periods, and the requirement of pushing the self-defined message to the user in different time periods according to different scenes can be met.
Referring to fig. 2, the present application further provides an embodiment of a system for pushing a security system message to chat software, including:
the event data acquisition module 11 is used for acquiring event data generated by the security equipment;
a push contact determining module 22, configured to determine a push contact according to the event data and a preset first rule, where the push contact has a correspondence with a contact in chat software; the first rule is a message pushing rule or a security device rule;
and the message generating and pushing module 33 is configured to generate a corresponding security system message according to the event data and a preset message template, and push the security system message to a contact in chat software.
According to the system for pushing the security system information to the chat software, the security system acquires event data generated by security equipment and analyzes the event data, and a user-defined message pushing rule and security equipment rules are set according to different scenes, wherein the preset message pushing rule can self-define the type of the pushed message and the effective time period of the rules, and push contacts for security information are determined according to the event data, the preset message pushing rule and the preset security equipment rules; and generating security messages with custom message templates according to the event data and the preset message templates. Because the push contact has a corresponding relation with the contact (user group and/or person) in the chat software, the security system can push the self-defined security message to the corresponding contact in the chat software in different time periods, and the requirement of pushing the self-defined message to the user in different time periods according to different scenes can be met.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In the embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The above embodiments are only for illustrating the technical solution of the present application, and are not limiting; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application.
Claims (8)
1. A method for pushing security system messages to chat software, comprising:
acquiring event data generated by security equipment;
determining a push contact according to the event data and a preset first rule, wherein the push contact has a corresponding relation with a contact in chat software; the first rule is a message pushing rule or a security device rule;
when the first rule is a message pushing rule, determining to push the contact according to the event data and a preset first rule includes:
when the event occurrence point in the event data is the same as the event occurrence point associated with the message in the message pushing rule, the event type in the event data corresponds to the message type in the message pushing rule, the event time in the event data is within the effective time period in the message pushing rule, and the state of the message pushing rule is an enabling state, the address book contact corresponding to the message pushing rule is a pushing contact;
the security equipment rule at least comprises an event number, an event occurrence point and an access control rule, the access control rule at least comprises an access control linkage rule, and when the first rule is the security equipment rule, the step of determining the pushing contact according to the event data and the preset first rule comprises the following steps:
when an entrance guard linkage rule exists on a door where an event occurrence point in the security equipment rule exists and an event number in the event data exists on an event number in the security equipment rule, judging whether an entrance guard linkage event is generated at the event occurrence point in the entrance guard linkage rule, and if so, taking an address book contact corresponding to the security equipment rule as a push contact;
and generating a corresponding security system message according to the event data and a preset message template, and pushing the security system message to a contact in chat software.
2. The method for pushing a security system message to chat software according to claim 1, wherein the preset message template at least comprises:
message mode, message format, message type;
wherein the message mode refers to the content of the beginning and the end of a message, the message format is one or more of text, pictures or videos, and the message type is one or more of normal, abnormal or alarm.
3. The method for pushing a security system message to chat software according to claim 1, wherein the security system comprises a message pushing center, and further comprising, before obtaining event data generated by the security device:
setting message pushing rules in a message pushing center, wherein the setting of the pushing type, the valid time period of the rules, the pushed message type, the event occurrence point associated with the message, the corresponding address book contact person and whether the message pushing is in an enabling state or not are included.
4. The method for pushing a security system message to chat software according to claim 1, wherein the security system comprises a return access module, and further comprising, before acquiring event data generated by the security device:
the security equipment rules are set in the access control module, and the security equipment rules comprise equipment rule names, trigger event numbers, trigger event occurrence points, output points for executing output actions, output points for linkage of other functions, access control time periods, access control linkage rules and global linkage rules.
5. The method for pushing a security system message to chat software according to claim 1, further comprising, before obtaining event data generated by the security device:
and configuring address book contacts in the message pushing center, and binding the address book contacts with contacts in chat software.
6. The method of pushing a security system message to chat software of claim 3, wherein pushing the message to a contact in the chat software comprises:
pushing the message to the contacts in the chat software within a regular effective period of time.
7. The method for pushing security system messages to chat software according to claim 4, wherein the entrance guard linkage rule comprises:
rule names, associated access control equipment, linkage triggering conditions, linkage input points and linkage output points.
8. A system for pushing security system messages to chat software, comprising:
the event data acquisition module is used for acquiring event data generated by the security equipment;
the push contact person determining module is used for determining push contact persons according to the event data and a preset first rule, and the push contact persons have corresponding relations with contact persons in chat software; the first rule is a message pushing rule or a security device rule;
when the first rule is a message pushing rule, determining to push the contact according to the event data and a preset first rule includes:
when the event occurrence point in the event data is the same as the event occurrence point associated with the message in the message pushing rule, the event type in the event data corresponds to the message type in the message pushing rule, the event time in the event data is within the effective time period in the message pushing rule, and the state of the message pushing rule is an enabling state, the address book contact corresponding to the message pushing rule is a pushing contact;
the security equipment rule at least comprises an event number, an event occurrence point and an access control rule, the access control rule at least comprises an access control linkage rule, and when the first rule is the security equipment rule, the step of determining the pushing contact according to the event data and the preset first rule comprises the following steps:
when an entrance guard linkage rule exists on a door where an event occurrence point in the security equipment rule exists and an event number in the event data exists on an event number in the security equipment rule, judging whether an entrance guard linkage event is generated at the event occurrence point in the entrance guard linkage rule, and if so, taking an address book contact corresponding to the security equipment rule as a push contact;
and the message generating and pushing module is used for generating a corresponding security system message according to the event data and a preset message template and pushing the security system message to a contact person in chat software.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210570070.5A CN114979258B (en) | 2022-05-24 | 2022-05-24 | Method and system for pushing security system message to chat software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210570070.5A CN114979258B (en) | 2022-05-24 | 2022-05-24 | Method and system for pushing security system message to chat software |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114979258A CN114979258A (en) | 2022-08-30 |
CN114979258B true CN114979258B (en) | 2023-08-29 |
Family
ID=82955610
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210570070.5A Active CN114979258B (en) | 2022-05-24 | 2022-05-24 | Method and system for pushing security system message to chat software |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114979258B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117938792A (en) * | 2023-10-20 | 2024-04-26 | 云南省气象服务中心(云南省专业气象台、云南省气象影视中心) | Early warning information processing method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102592338A (en) * | 2012-02-06 | 2012-07-18 | 深圳市广宁实业有限公司 | Method for controlling access control system by mobile terminal and access control system |
CN110807885A (en) * | 2019-11-13 | 2020-02-18 | 普联技术有限公司 | Alarm method and alarm device based on WeChat |
CN111757049A (en) * | 2019-03-29 | 2020-10-09 | 杭州海康威视系统技术有限公司 | Security linkage method, device and system |
CN113112662A (en) * | 2021-04-15 | 2021-07-13 | 广州爽游网络科技有限公司 | Method for realizing access control electronic key and access control authority management in mobile phone chat software group |
CN113807549A (en) * | 2021-09-15 | 2021-12-17 | 佛山技研智联科技有限公司 | Alarm message pushing method, device, equipment and storage medium |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101771742A (en) * | 2008-12-31 | 2010-07-07 | 深圳富泰宏精密工业有限公司 | Safety reporting system and method |
US20120200711A1 (en) * | 2011-02-03 | 2012-08-09 | American Remote Video, Inc. | System and method for integrated surveillance and event notification |
-
2022
- 2022-05-24 CN CN202210570070.5A patent/CN114979258B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102592338A (en) * | 2012-02-06 | 2012-07-18 | 深圳市广宁实业有限公司 | Method for controlling access control system by mobile terminal and access control system |
CN111757049A (en) * | 2019-03-29 | 2020-10-09 | 杭州海康威视系统技术有限公司 | Security linkage method, device and system |
CN110807885A (en) * | 2019-11-13 | 2020-02-18 | 普联技术有限公司 | Alarm method and alarm device based on WeChat |
CN113112662A (en) * | 2021-04-15 | 2021-07-13 | 广州爽游网络科技有限公司 | Method for realizing access control electronic key and access control authority management in mobile phone chat software group |
CN113807549A (en) * | 2021-09-15 | 2021-12-17 | 佛山技研智联科技有限公司 | Alarm message pushing method, device, equipment and storage medium |
Non-Patent Citations (1)
Title |
---|
汪海燕 ; .监狱安防集成化综合平台的设计研究.工业控制计算机.2018,(第08期),第 134-136页、第139页. * |
Also Published As
Publication number | Publication date |
---|---|
CN114979258A (en) | 2022-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8260751B2 (en) | Log file time sequence stamping | |
TW468315B (en) | Method and system for providing cross-platform remote control, monitoring, and up-dating of a facility access controller | |
US8804576B2 (en) | Browsing management apparatus, browsing management method, and program product thereof | |
CN101164058A (en) | Presence monitoring in a serverless peer-to-peer system | |
US20080162692A1 (en) | System and method for identifying and blocking sexual predator activity on the internet | |
CN112711518B (en) | Log uploading method and device | |
CA2937679A1 (en) | Electronic vote system and method | |
CN114979258B (en) | Method and system for pushing security system message to chat software | |
US20210328975A1 (en) | System and method for encrypting a data alert | |
US20200027297A1 (en) | Voting techniques using virtual or augmented reality | |
CN111460322A (en) | Data processing method, device, equipment and readable storage medium | |
JP2002117135A (en) | Web site security system | |
KR101160719B1 (en) | Method and system for sending electronic mail over a network | |
CN107071026A (en) | A kind of rack electronic labelling system and method for inspecting based on electric ink display screen | |
CN1963830A (en) | Method and apparatus for recording game matters, method and system for examining game matters | |
US20050021651A1 (en) | Method and system for identification and presentation of statistical usage data for messaging systems | |
CN112180783B (en) | Information monitoring management method and device based on Internet | |
CN107483544A (en) | A kind of intelligent movable monitoring system and monitoring method | |
CN107644463A (en) | A kind of two-dimensional code scanning Work attendance method | |
CN110570535B (en) | Card punching management method and related device | |
CN113076369A (en) | Real-time fire-fighting supervision method and system | |
CN113190428A (en) | Method and device for acquiring user operation behavior data and terminal equipment | |
CN113722635A (en) | Mobile internet public opinion analysis and monitoring technology | |
JP3790114B2 (en) | Monitoring device | |
KR970012231A (en) | Throwing and counting ticket management device and method using smart card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |