Check patentability & draft patents in minutes with Patsnap Eureka AI!

Wireless arming and disarming control device and method based on ID (identity) card authentication in security system

A technology of security systems and control devices, applied in signal transmission systems, instruments, alarms, etc., can solve the problems of legal identity confirmation of users, inconvenient for users to carry around, and no authentication, etc. Convenient, wide-ranging effects

Inactive Publication Date: 2012-08-15
SHANGHAI DAREGLOBAL TECHNOLOGIES CO LTD
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But in this way, there will be a large number of remote controls, and it is inconvenient for users to carry them around due to the size of the remote control
[0006] (2) If the remote control is placed near the entrance door, it is more convenient for the user to use, but the legal identity of the user cannot be confirmed, and there is a great potential safety hazard
[0007] (3) Even if the above two situations are not considered, when the user uses the remote control normally, the remote control itself does not authenticate the user's identity. If a certain remote control is taken by an outsider, it can also control the arming and disarming of the security host , which is actually a very big security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless arming and disarming control device and method based on ID (identity) card authentication in security system
  • Wireless arming and disarming control device and method based on ID (identity) card authentication in security system
  • Wireless arming and disarming control device and method based on ID (identity) card authentication in security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to understand the technical content of the present invention more clearly, the following examples are given in detail.

[0029] see figure 1 As shown, it is a schematic structural diagram of the wireless arming and disarming control device based on ID card authentication in the security system of the present invention.

[0030] The security system includes an alarm host 1 . In one embodiment, the wireless arming and disarming control device includes a wireless controller 2 and an ID card 3, the ID card 3 stores user identity information, and the wireless controller 2 includes an ID card identification module, Arming and disarming control key 4, main control module and wireless transceiver module, described ID card recognition module, arming and disarming control key and wireless transceiver module are all connected to described main control module, and described wireless transceiver module is connected to all The alarm host 1 described above.

[0031] In a p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a wireless arming and disarming control device and method based on ID (identity) card authentication in a security system. The device comprises a wireless controller and an ID card, wherein the ID card stores the user identity information, the wireless controller comprises an ID card identification module, an arming and disarming control key, a main control module and a wireless transceiver module, and the wireless transceiver module is wirelessly connected with an alarm mainframe. The invention also relates to a method for realizing the wireless arming and disarming control based on the ID card authentication by using the device. In the method, a user puts the ID card near the wireless controller, the ID card identification module reads the user identity information from the ID card, and authenticates with the alarm mainframe according to the user identity information, and if the authentication is successful, the security system performs the corresponding arming or disarming control according to a key signal of the arming and disarming control key. The security for the arming and disarming control of the security system is greatly improved, and the wireless arming and disarming control device based on the ID (identity) card authentication disclosed by the invention has the advantages of simple structure of equipment, low cost, convenience for use of the user, and relatively wide application area.

Description

technical field [0001] The invention relates to the technical field of security systems, in particular to the technical field of arming and disarming control in the security system, and specifically refers to a wireless arming and disarming control device and method based on ID card authentication in the security system. Background technique [0002] All kinds of security alarm hosts with anti-theft alarm function need to have two working states of "arming" and "disarming". Traditional arming and disarming control methods include the following two methods: [0003] 1. Control through a wired or wireless keyboard connected to the host. Generally, you need to press the arm or disarm function key, or enter the menu to select the arm or disarm option, and then enter the user password through the keyboard to arm and disarm the alarm panel. The defect of this control method is that the user must operate through the keyboard and remember the password, which is cumbersome and less...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G08B25/00G08C17/02
Inventor 徐正伟李洪坤陈广
Owner SHANGHAI DAREGLOBAL TECHNOLOGIES CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More