Method and system for controlling terminal unit

A technology for terminal equipment and control terminals, applied in transmission systems, instruments, electrical digital data processing, etc., can solve the problem that the network side cannot reverse control data to terminal equipment, etc., to improve efficiency, enhance comprehensive command and remote dispatch effect of ability

Inactive Publication Date: 2012-07-04
UNISTRONG BEIDOU NAVIGATION
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] From the above description, we can know that in the existing public security network, the network side cannot reversely control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for controlling terminal unit
  • Method and system for controlling terminal unit
  • Method and system for controlling terminal unit

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0028] Example 1

[0029] The public security intranet architecture corresponding to the embodiment of the present invention includes a VPN (Virtual Private Network), a secure access platform, and a public security intranet; among them, VPN is the basis for operators in 3G (third-generation mobile communications) networks The private network is constructed by adding tunnel technology and security encryption technology; the security access platform is deployed at the boundary of the public security intranet. It is constructed by the Ministry of Public Security in accordance with the network boundary security access specification and adopts a differentiated link security defense method to construct a boundary protection, The boundary access platform of identity authentication, application security, security isolation and the platform's own security protection functions realizes the isolation between the VPN and the public security intranet; the public security intranet refers to the...

Example Embodiment

[0116] Example 2

[0117] See Figure 5 , A system for controlling terminal equipment, the system comprising:

[0118] The proxy server 401 in the virtual private network is used to obtain the control instruction in the public security intranet when the terminal device 404 is a dumb terminal device, and issue the control instruction to the terminal device 404;

[0119] The secure access server 402 on the secure access platform is used to obtain control instructions in the public security intranet when the terminal device 404 is a mobile communication device, and issue the control instructions to the terminal device 404;

[0120] The application server 403 in the public security intranet is used to obtain control instructions in the public security intranet when the terminal device 404 is a mobile computer device or a smart fixed device, and issue the control instruction to the terminal device 404;

[0121] The terminal device 404 is configured to receive the control instruction and exec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for controlling a terminal unit and belongs to the technical field of a police network. According to the method, when the terminal unit is dumb terminal equipment, an acting server obtains a control instruction in an internal police network and sends the control instruction to the terminal equipment; when the terminal equipment is mobile call equipment, a safe access server obtains the control instruction in the internal police network and sends the control instruction to the terminal equipment; when the terminal equipment is mobile computer equipment or intelligent fixed equipment, an application server in the internal police network obtains the control instruction in the internal police network and sends the control instruction to the terminal equipment; and the terminal equipment receives the control instruction and executes the operation indicated by the control instruction. Through adoption of the technical scheme provided by the invention, the capability of comprehensively commanding and remotely scheduling the terminal equipment is greatly strengthened, more measures are provided for policemen to utilize different terminal equipment to investigate crimes and acquiring evidences, thereby improving the efficiency of field law enforcement and handling of public security officers.

Description

technical field [0001] The invention relates to the technical field of public security networks, in particular to a method and system for controlling terminal equipment. Background technique [0002] The deployment of the public security network facilitates the exchange of information among police officers, and improves the police officers' ability to handle cases to a certain extent. The existing public security network architecture only supports the following information interaction methods: [0003] 1. The dumb terminal device uploads the acquired positioning data to the public security network; [0004] 2. The mobile device requests information from the public security network through a short message or Web query. [0005] From the above description, it can be known that in the existing public security network, the network side cannot reversely control internal data to terminal devices, that is, it is impossible to control external terminal devices from the network sid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06H04L12/46G06F17/30G06Q50/26
Inventor 曹红杰刘丹王顺
Owner UNISTRONG BEIDOU NAVIGATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products