Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for realizing dynamic authentication deploying and canceling defense control by using deploying and canceling defense controller and alarm host computer

A technology of alarm host and arming and disarming, which is applied in the arming and disarming control of security systems. In the field of security systems, it can solve the problems of non-authentication of remote control users, potential safety hazards, and easy interception and forgery of signals.

Inactive Publication Date: 2014-05-28
SHANGHAI DAREGLOBAL TECHNOLOGIES CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method also has the following problems: when the user uses the remote control normally, the remote control itself does not authenticate the user's identity. If a remote control is taken by an outsider, it can also arm and disarm the security host. Therefore, There is a big security risk
Swipe the card on the arming and disarming controller for identity authentication, and then arm or disarm, but the fixed signal between the arming and disarming controller and the host is easy to be intercepted and forged, and there are still certain security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing dynamic authentication deploying and canceling defense control by using deploying and canceling defense controller and alarm host computer
  • Method for realizing dynamic authentication deploying and canceling defense control by using deploying and canceling defense controller and alarm host computer
  • Method for realizing dynamic authentication deploying and canceling defense control by using deploying and canceling defense controller and alarm host computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to understand the technical content of the present invention more clearly, the following examples are given in detail.

[0031] Such as figure 1 As shown, the security system includes an alarm host 1 , an arming and disarming controller 2 and an ID card 3 . The arming and disarming controller 2 has an arming and disarming control key 4, and the arming and disarming controller 2 is connected to the alarm host 1 through wireless signals.

[0032] In one embodiment, the method for realizing dynamic authentication arming and disarming control between the arming and disarming controller in the security system and the alarm host computer of the present invention includes code checking and arming and disarming operations.

[0033] The code pairing operation, such as figure 2 shown, including the following steps:

[0034] (11) The user controls the arming and disarming controller through the arming and disarming control key to perform code matching;

[0035] (12) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for realizing dynamic authentication deploying and canceling defense control by using a deploying and canceling defense controller and an alarm host computer in a security and defense system. After match code in the match-code operation process is completed, the deploying and canceling defense controller and the alarm host computer calculate the address of the deploying and canceling defense controller according to an encryption algorithm corresponding to encryption algorithm codes in a match code instruction and respectively generate a dynamic authentication ID which is stored; and after authentication in the deploying and canceling defense operation process is completed, the deploying and canceling defense controller and the alarm host computer calculate the previous generated dynamic authentication IDs according to the encryption algorithm corresponding to the encryption algorithm codes in a deploying defense or canceling defense instruction and respectively generate a new dynamic authentication ID which is stored for next deploying and canceling defense operation, so that each match code operation and deploying and canceling defense operation can generate a new dynamic authentication ID for the authentication of the next deploying and canceling defense operation. Therefore, the deploying and canceling defense control of dynamic authentication can be realized, signals can be effectively prevented from counterfeiting and the security of the security and defense system can be greatly improved.

Description

technical field [0001] The invention relates to the technical field of security systems, in particular to the technical field of arming and disarming control in the security system, and specifically refers to a method for realizing dynamic authentication arming and disarming control by an arming and disarming controller and an alarm host. Background technique [0002] All kinds of security alarm hosts with anti-theft alarm function need to have two working states of "arming" and "disarming". Traditional arming and disarming control methods include the following two methods: [0003] 1. Control through a wired or wireless keyboard connected to the host. Generally, you need to press the arm or disarm function key, or enter the menu to select the arm or disarm option, and then enter the user password through the keyboard to arm and disarm the alarm panel. The defect of this control method is that the user must operate through the keyboard and remember the password, which is c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G08B25/00G08B25/14
Inventor 徐正伟李洪坤赵曙辉
Owner SHANGHAI DAREGLOBAL TECHNOLOGIES CO LTD