Method for authorizing security team of security and protection system and authorizing security team by user

A security system and security technology, applied in data processing applications, instruments, calculations, etc., can solve problems such as low authorization efficiency and complicated processes

Inactive Publication Date: 2017-05-31
温州风暴智能科技有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Security users need to know the ID of the input user terminal and the ID of the security team to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authorizing security team of security and protection system and authorizing security team by user
  • Method for authorizing security team of security and protection system and authorizing security team by user
  • Method for authorizing security team of security and protection system and authorizing security team by user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] figure 1 It is a flow chart of the security team authorization method of the security system provided by Embodiment 1 of the present invention.

[0047] refer to figure 1 , the execution subject is the server, and the method includes the following steps:

[0048]Step S301, receiving the registration information sent by the security supervisor terminal, and replying a response message to the security supervisor terminal according to the registration information;

[0049] Here, the registration information includes registration data information and key information.

[0050] The registration data information may include at least one of the following information: team name information, address code information of the security supervisor terminal, mobile phone number and business registration number.

[0051] Specifically, the registration data information includes the following four situations: first, the registration data information includes the team name information a...

Embodiment 2

[0073] image 3 It is a flow chart of the security supervisor authorization method of the security system provided by Embodiment 2 of the present invention.

[0074] refer to figure 1 , the execution subject is the server, and the method includes the following steps:

[0075] Step S101, receiving registration information sent by the user terminal, and replying a response message to the user terminal according to the registration information;

[0076] Here, the registration information includes at least one of the following information: user address information, name and mobile phone number. That is, the registration information may include one or more of the user's address information, name and mobile phone number. User address information, name and mobile phone number can be saved in the security system.

[0077] The registration information also includes descriptive information capable of identifying the user to which the security system belongs, and the above informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for authorizing a security team of a security and protection system and authorizing the security team by a user; the method includes steps of receiving a request adding information sent by a security charging terminal; according to the request adding information, judging if it is the security charging terminal; if yet, sending an authorization code to the security charging terminal so that the security charging terminal sends the authorization code to a security guard terminal; receiving the authorization code sent by the security guard terminal; according to the security team ID corresponding to the authorization code, generating a security team authorization record, and sending the confirmation information of successful authorization to the security guard terminal, and receiving the authorization request information sent by the user terminal; according to the user ID and the security system ID, generating the authorization code; sending the authorization code to the user terminal so that the user terminal sends the authorization code to the security guard terminal; receiving the authorization code sent by the security guard terminal; according to the authorization code, generating the authorization record, storing the record to the security system authorization table, and sending the confirmation information of successful authorization to the security guard terminal.

Description

technical field [0001] The invention relates to the field of security technology, in particular to a method for authorization of a security team of a security system and a method for a user to authorize the security team. Background technique [0002] At present, the security system in the community requires the security user to individually authorize each security guard in the security team, and only through online operation can monitoring be carried out, and an alarm will be issued in case of an accident. Security users need to know the ID of the input user terminal and the ID of the security team to authorize the security team. The process is complicated and the authorization efficiency is low. Contents of the invention [0003] In view of this, the object of the present invention is to provide a security system security team authorization and a method for users to authorize the security team, enabling security users to directly authorize security team security guards t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q50/16
CPCG06Q50/163
Inventor 林勇郭伟峰祝金龙
Owner 温州风暴智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products