Security linkage system

A technology of security linkage and linkage, applied in the direction of program control devices, etc., can solve the problems of long time and inconvenient operation, and achieve the effect of convenient increase, accelerated processing speed, and convenient and simple use

Active Publication Date: 2015-08-05
GUANGZHOU YOUTAI SECURITY TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is not easy to operate, and it takes a long time for the system to execute

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security linkage system
  • Security linkage system
  • Security linkage system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0097] Now assume that a relationship between a smoke sensor and access control needs to be established. The specific realized function is: when the smoke sensor senses smoke, the access controller controls the door to remain closed, that is, the door cannot be opened at this time, and the door cannot be opened by swiping a card.

[0098] The specific operation is as follows:

[0099] Step 1: Register the plug-in; specifically: register the plug-in of the smoke sensor and the plug-in of the access controller, that is, load the plug-in of the smoke sensor and the plug-in of the access controller, and display it on the interactive interface of the linkage platform.

[0100] Step 2: Select the category; specifically: select the smoke sensor and access controller to be controlled on the interactive interface;

[0101] Step 3: Create an instance; specifically: create a trigger instance of the smoke sensor and create an action instance of the access controller.

[0102] Step 4: Set...

Embodiment 2

[0105] This embodiment is roughly the same as Embodiment 1, and the difference is that in step 5, when establishing an association relationship, specifically:

[0106] Use the form of advance parameters to establish an association between the smoke sensor and the access controller. see Figure 12 , which is a schematic diagram of establishing an association between the smoke sensor and the access controller in this embodiment. First extract the trigger parameters of the smoke sensor and the action parameters of the access control controller, and then establish the corresponding relationship between the parameters. For example, in this embodiment, in this embodiment, the parameter that the smoke sensor detects smoke is associated with the action parameter that the access controller controls the door to keep closed; the parameter that the smoke sensor does not detect smoke is associated with the action parameter that the access controller controls the door to open Make an asso...

Embodiment 3

[0108] The difference between this embodiment and Embodiment 1 is that this embodiment adds a judgment on temperature when judging whether to trigger. That is, when judging whether there is smoke, judge whether the temperature reaches the threshold at the same time, if so, then control the door to close; if not, control the door to open. The specific steps are as follows:

[0109] Step 1: Register the plug-in; specifically: register the plug-in of the smoke sensor, the temperature sensor and the plug-in of the access controller, that is, load the plug-in of the smoke sensor, the plug-in of the temperature sensor and the plug-in of the access controller, and displayed on the interactive interface of the platform.

[0110] Step 2: Select the category; specifically: select the smoke sensor, temperature sensor and access controller to be controlled on the interactive interface;

[0111] Step 3: Create an instance; specifically: first create a trigger instance of the smoke sensor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security linkage system. The system comprises a plurality of linkage platforms. One of the linkage platforms is used as a central linkage platform and the other linkage platforms are used as secondary linkage platforms establishing connection with the central linkage platform. Each linkage platform comprises an acquisition module, a linkage engine, an instantiation module and a linkage establishment module. The acquisition module is used for acquiring plug-in components. The linkage engine is used for loading the plug-in components and sending the plug-in components to the instantiation module. The instantiation module is used for instantiating the plug-in components to respectively form a triggering instance and a movement instance. The linkage establishment module is used for establishing linkage between the triggering instance and the movement instance. Through connection of the central linkage platform and the plurality of secondary linkage platforms, distributed management is realized, so that remote control is realized.

Description

technical field [0001] The invention relates to a security linkage system, in particular to a system with flexible collocation and combination, strong expression ability, self-adaptation, easy expansion, and can form an open platform. Background technique [0002] Existing security systems generally include: closed-circuit monitoring system, anti-theft alarm system, building intercom system, parking plant management system, community card system, infrared perimeter alarm system, electronic fence, patrol system, attendance access control system, security computer room system , electronic examination room system, smart door lock and so on. Among them, the development of security technology is developing in the direction of digitization, networking, integration, and intelligence. The core content is that the security system is developing in the direction of integration. The so-called system integration mainly includes two aspects: hardware system integration and software syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/44
Inventor 张帆
Owner GUANGZHOU YOUTAI SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products