Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Intelligent security management system and control method thereof

A management system and security technology, applied in the direction of instruments, time registers, single input port/output port registers, etc., can solve the problems that cannot solve the hidden dangers of the owner of the IC card duplication technology security system, and achieve the goal of solving security loopholes Effect

Active Publication Date: 2017-09-22
徐坚
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the purpose of the embodiment of the present invention is to provide an intelligent security management system and its control method, so as to alleviate the problem that the current security system cannot solve the problem that the IC card duplication technology causes a large security risk to the security system and the owner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent security management system and control method thereof
  • Intelligent security management system and control method thereof
  • Intelligent security management system and control method thereof

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0018] Please refer to figure 1 , figure 1 It is a structural block diagram of an intelligent security management system 100 provided in the first embodiment of the present invention, including: a server 110, a relay control module 120, a plurality of card readers 130, and a control device corresponding to each of the card readers 130 140.

[0019] Wherein, the server 110 may be a network server, a database server, etc., and may establish a communication connection with the relay control module 120 for sending control parameters and instructions to the relay control module 120 . The control parameters and instructions can be implemented by logic programming, and can be modified according to actual conditions. At the same time, the server 110 is also used to receive the user's ID data sent by the relay control module 120 , of course, the user's ID data needs to be entered in the server 110 in advance.

[0020] Please see figure 2 , the relay control module 120 may include:...

no. 2 example

[0047] Please refer to Figure 5 , Figure 5 It is a flowchart of a control method of an intelligent security management system provided by the second embodiment of the present invention. The method is applied to an intelligent security management system, the intelligent security management system includes a server, a relay control module, a plurality of card readers and a control device corresponding to each of the card readers, the relay control module router, mobile The terminal establishes a network connection with the server, and the relay control module is respectively coupled with each of the card readers and each of the control devices. The following will be Figure 5 As illustrated in the flow chart, the method includes:

[0048] Step S110: the card reader reads user ID data.

[0049] Step S120: The relay control module obtains the address and user ID data of the card reader, and sends them to the server.

[0050] Step S130: the server sends control parameters an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an intelligent security management system and a control method thereof, relating to the safety and protection field. The intelligent security management system comprises a server, a relay control module, multiple card readers and control equipment corresponding to each card reader; the card readers are used for reading the ID data of a user; the relay control module is used for acquiring the addresses of the card readers and the ID data of the user, and sending the addresses and the data to the server; the server is used for judging the extent of power of the user based on the addresses of the card readers and the ID data of the user, and sending a control parameter and command to the relay control module according to the extent of power of the user; and the relay control module is further used for receiving the control parameter and command sent by the sever, so as to control the control equipment. The system can relieve the problem that the current security system cannot solve greater potential risk caused by IC card replica technique to the security system and proprietors.

Description

technical field [0001] The invention relates to the security field, in particular to an intelligent security management system and a control method thereof. Background technique [0002] With the development of the times, owners pay more and more attention to the security in the community. The existing security system mainly reads the IC through the card reader, and then sends the data to the access controller or the server. However, the emergence of IC card duplication technology makes the original IC card access control useless, which poses a greater safety hazard to the security system and the owner. Contents of the invention [0003] In view of this, the purpose of the embodiments of the present invention is to provide an intelligent security management system and its control method, so as to alleviate the problem that the current security system cannot solve the large security risks caused by IC card duplication technology to the security system and the owner. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/00182G07C9/00571G07C9/27G07C2009/00261
Inventor 徐坚郭萍徐一帆
Owner 徐坚
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products