Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method of security service processing and security platform and security gateway

A security gateway, security technology, applied in the direction of network connection, data exchange network, instruments, etc., can solve the problems of poor user-friendliness, high technical threshold, difficult to operate, etc., to reduce criminal cases and various disasters, reduce the use of Cost and loss reduction effect

Inactive Publication Date: 2013-05-22
ZTE CORP
View PDF11 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Most of the arming and disarming of the existing community security systems on the market need to be realized by programming. The technical threshold is relatively high, it is not easy to operate, and the user friendliness is not good. It must be set by professional installation and maintenance personnel, and it is not easy to modify. If you want to modify, it may also involve issues such as maintenance costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of security service processing and security platform and security gateway
  • Method of security service processing and security platform and security gateway
  • Method of security service processing and security platform and security gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] There are arm and disarm buttons on the hardware of the security gateway. When the user needs to start the security, press the arm button on the security gateway. The specific steps are as follows:

[0060] Step 101, the user presses the arm button on the security gateway;

[0061] Step 102, the security gateway detects the trigger signal of the arm button;

[0062] Step 103, the security gateway reports the arming signal to the security platform;

[0063] Step 104: After receiving the confirmation signal returned by the security platform, the security gateway starts arming, that is, starts the security service.

[0064] When the user wants to cancel the security, press the disarm button on the security gateway, including the following steps:

[0065] Step 111, the user presses the disarm button on the security gateway;

[0066] Step 112, the security gateway detects the trigger signal of the disarm button;

[0067] Step 113, the security gateway reports the disarmi...

Embodiment 2

[0070] The security gateway has a matching remote control on the hardware, and the security function can be turned on and off through the remote control, including the following steps:

[0071] Step 201, the user presses the arm button on the remote controller;

[0072] Step 202, the security gateway detects the trigger signal of the arm button;

[0073] Step 203, the security gateway reports the arming signal to the security platform;

[0074] In step 204, the security gateway starts arming after receiving the confirmation signal from the security platform.

[0075] The disarming process is similar, as follows:

[0076] Step 211, the user presses the disarm button on the remote controller;

[0077] Step 212, the security gateway detects the trigger signal of the disarm button;

[0078] Step 213, the security gateway reports the disarming signal to the security platform;

[0079] Step 214: After receiving the confirmation signal from the security platform, the security gate...

Embodiment 3

[0081] The security gateway is connected to an identification system such as fingerprint recognition or voice recognition. When the user needs to start the security, he must first authenticate his identity through the identification system, and then start the security on the identification system; when disarming, he also needs to perform identity authentication before disarming; including The following steps:

[0082] Step 301, the identity recognition system performs identity authentication, and sends the identity authentication information to the security gateway;

[0083] Step 302, the security gateway confirms that the identity authentication is passed;

[0084] Step 303, the user presses the arm button on the identification system;

[0085] Step 304: After detecting the arming button signal, the security gateway reports the arming signal to the security platform;

[0086] In step 305, the security gateway starts arming after receiving the confirmation signal from the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method of security service processing, a security platform and a security gateway. The method of the security service processing includes that the security gateway detects a trigger signal of a preset button; and a security service is decided to be opened or closed according to the trigger signal. The problems that an existing security system in the market is high in technology threshold of security organizing and security withdrawing and difficult to operate, and a specially-assigned person is needed for maintenance are solved, a convenient and rapid mode of the security organizing and the security withdrawing is provided, normal users can master an operation method rapidly and expertly, the method of the security service processing is easy to learn and understand and very high in user friendliness.

Description

technical field [0001] The invention relates to the field of network-based security technologies, in particular to a method for processing security services, a security platform and a security gateway. Background technique [0002] With the development of digital technology and network technology, as well as the sudden emergence of the concepts of intelligent buildings and intelligent houses, various network-based security systems have developed vigorously. For maintaining social stability, deterring crimes, and protecting the safety of people's lives and property, security systems played an increasingly important role. At present, the basic structure of the security system can be summarized into two parts. The first part is the security resident equipment that completes the collection, summary and reporting of security information, and the second part is the security platform that completes the development and control of security services. Among them, the security resident...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G08B25/00H04L29/08H04L12/58H04L12/66
CPCH04L63/20H04L29/08G08B25/10
Inventor 缪建成
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products