Intelligent security management system and its control method
A management system and security technology, applied in the direction of instruments, single input/output port registers, time registers, etc., can solve the problems that cannot solve the hidden dangers of the owner of the IC card duplication technology security system, and achieve the goal of solving security loopholes Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0018] Please refer to figure 1 , figure 1 It is a structural block diagram of an intelligent security management system 100 provided by the first embodiment of the present invention, including: a server 110, a relay control module 120, a plurality of card readers 130, and a control device corresponding to each of the card readers 130 140.
[0019] The server 110 may be a network server, a database server, etc., and may establish a communication connection with the relay control module 120 for sending control parameters and instructions to the relay control module 120. The control parameters and instructions can be implemented by logic programming, and can be modified according to actual conditions. At the same time, the server 110 is also used to receive the user ID data sent by the relay control module 120. Of course, the user ID data needs to be entered into the server 110 in advance.
[0020] Please see figure 2 , The relay control module 120 may include: a communication modu...
no. 2 example
[0047] Please refer to Figure 5 , Figure 5 It is a flowchart of a control method of an intelligent security management system provided by the second embodiment of the present invention. The method is applied to an intelligent security management system. The intelligent security management system includes a server, a relay control module, a plurality of card readers, and a control device corresponding to each of the card readers, and the relay control module router, mobile The terminal establishes a network connection with the server, and the relay control module is respectively coupled with each of the card readers and each of the control devices. The following will Figure 5 The illustrated process is explained, and the method includes:
[0048] Step S110: The card reader reads user ID data.
[0049] Step S120: The relay control module obtains the address of the card reader and the user ID data, and sends them to the server.
[0050] Step S130: The server sends control parame...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com