Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intelligent security management system and its control method

A management system and security technology, applied in the direction of instruments, single input/output port registers, time registers, etc., can solve the problems that cannot solve the hidden dangers of the owner of the IC card duplication technology security system, and achieve the goal of solving security loopholes Effect

Active Publication Date: 2020-09-29
徐坚
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the purpose of the embodiment of the present invention is to provide an intelligent security management system and its control method, so as to alleviate the problem that the current security system cannot solve the problem that the IC card duplication technology causes a large security risk to the security system and the owner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent security management system and its control method
  • Intelligent security management system and its control method
  • Intelligent security management system and its control method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0018] Please refer to figure 1 , figure 1 It is a structural block diagram of an intelligent security management system 100 provided by the first embodiment of the present invention, including: a server 110, a relay control module 120, a plurality of card readers 130, and a control device corresponding to each of the card readers 130 140.

[0019] The server 110 may be a network server, a database server, etc., and may establish a communication connection with the relay control module 120 for sending control parameters and instructions to the relay control module 120. The control parameters and instructions can be implemented by logic programming, and can be modified according to actual conditions. At the same time, the server 110 is also used to receive the user ID data sent by the relay control module 120. Of course, the user ID data needs to be entered into the server 110 in advance.

[0020] Please see figure 2 , The relay control module 120 may include: a communication modu...

no. 2 example

[0047] Please refer to Figure 5 , Figure 5 It is a flowchart of a control method of an intelligent security management system provided by the second embodiment of the present invention. The method is applied to an intelligent security management system. The intelligent security management system includes a server, a relay control module, a plurality of card readers, and a control device corresponding to each of the card readers, and the relay control module router, mobile The terminal establishes a network connection with the server, and the relay control module is respectively coupled with each of the card readers and each of the control devices. The following will Figure 5 The illustrated process is explained, and the method includes:

[0048] Step S110: The card reader reads user ID data.

[0049] Step S120: The relay control module obtains the address of the card reader and the user ID data, and sends them to the server.

[0050] Step S130: The server sends control parame...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an intelligent security management system and a control method thereof, relating to the safety and protection field. The intelligent security management system comprises a server, a relay control module, multiple card readers and control equipment corresponding to each card reader; the card readers are used for reading the ID data of a user; the relay control module is used for acquiring the addresses of the card readers and the ID data of the user, and sending the addresses and the data to the server; the server is used for judging the extent of power of the user based on the addresses of the card readers and the ID data of the user, and sending a control parameter and command to the relay control module according to the extent of power of the user; and the relay control module is further used for receiving the control parameter and command sent by the sever, so as to control the control equipment. The system can relieve the problem that the current security system cannot solve greater potential risk caused by IC card replica technique to the security system and proprietors.

Description

Technical field [0001] The present invention relates to the field of security, in particular, to an intelligent security management system and a control method thereof. Background technique [0002] With the development of the times, owners are paying more and more attention to security in the community. The existing security system mainly uses a card reader to read the IC, and then sends the data to the access controller or server. However, the emergence of IC card duplication technology makes the original IC card access control behave in vain, which poses a greater security risk to the security system and the owner. Summary of the invention [0003] In view of this, the purpose of the embodiments of the present invention is to provide an intelligent security management system and a control method thereof, so as to alleviate the problem that the current security system cannot solve the problem of the IC card copy technology to the security system and the owner. [0004] In the fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/27G07C9/00
CPCG07C9/00182G07C9/00571G07C9/27G07C2009/00261
Inventor 徐坚郭萍徐一帆
Owner 徐坚
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products