Method for realizing dynamic authentication deploying and canceling defense control by using deploying and canceling defense controller and alarm host computer
A technology of alarm host and arming and disarming, which is applied in the arming and disarming control of security systems. In the field of security systems, it can solve the problems of non-authentication of remote control users, potential safety hazards, and easy interception and forgery of signals.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] In order to understand the technical content of the present invention more clearly, the following examples are given in detail.
[0031] Such as figure 1 As shown, the security system includes an alarm host 1 , an arming and disarming controller 2 and an ID card 3 . The arming and disarming controller 2 has an arming and disarming control key 4, and the arming and disarming controller 2 is connected to the alarm host 1 through wireless signals.
[0032] In one embodiment, the method for realizing dynamic authentication arming and disarming control between the arming and disarming controller in the security system and the alarm host computer of the present invention includes code checking and arming and disarming operations.
[0033] The code pairing operation, such as figure 2 shown, including the following steps:
[0034] (11) The user controls the arming and disarming controller through the arming and disarming control key to perform code matching;
[0035] (12) ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 