Method and system for performing security control using security device

A technology of safety equipment and safety control, which is applied in the electronic field to achieve the effect of avoiding information leakage

Inactive Publication Date: 2018-07-20
TENDYRON CORP
View PDF10 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Also, the user must remain connected to the network to be able to access the user's desktop stored on the server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for performing security control using security device
  • Method and system for performing security control using security device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] This embodiment provides a method for performing security control by using a security device.

[0031] figure 1 A flow chart of a method for using security equipment to perform security control provided in this embodiment, as shown in figure 1 As shown, the method mainly includes the following steps:

[0032] In step S101, the security chip of the security device sends an image acquisition command to the camera device of the security device after receiving the monitoring command sent by the host computer after successfully logging in to the system client, instructing the camera device to perform image capture.

[0033] In this embodiment, the user logs in to the system through the system client of the upper computer. After logging in to the system, the user enters a security state and needs to monitor the user's current environment. The upper computer sends a monitoring command to the security chip of the security device.

[0034] In a specific application, the securi...

Embodiment 2

[0059] This embodiment provides a system for performing security control by using a security device, and the system can be used to implement the method provided in Embodiment 1 above.

[0060] figure 2 A schematic diagram of the architecture of a system using security devices for security control provided in this embodiment, as shown in figure 2 As shown, the system mainly includes: a security device 20 , a background 22 and a host computer 24 . The functions of each component in the system will be described below, and other related matters can be referred to the description of Embodiment 1.

[0061] In this embodiment, the upper computer 24 is configured to send a monitoring instruction after successfully logging in to the system client.

[0062] Such as figure 2As shown, the safety device 20 mainly includes: a safety chip 201, configured to send an image acquisition instruction to the camera device 202 of the safety device 20 after receiving the monitoring instruction,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for performing security control using a security device. The method includes the steps that: a security chip of the security device sends an image acquisition instruction to a camera device of the security device after receiving a monitoring instruction from a host computer; the camera device of the security device acquires a video stream collected bythe camera in real time and transmits the video stream to the security chip; the security chip sends the video stream to the host computer through an external interface of the security device in realtime, and the host computer sends the video stream to a background; the background performs image processing to the intercepted multi-frame image; the background identifies a target object from the processed plurality of image information respectively, and determines a change mode of the target object according to the shape and/or position of the target object in the plurality of image information; the background sends a security control instruction to the host computer when the background determines that the change mode of the target object meets a predetermined security control mode; and thehost computer receives the security control instruction, and executes corresponding security control operation according to the security control instruction.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a method and system for safety control using safety equipment. Background technique [0002] The advantage of computer virtualization is that it greatly increases the computing efficiency and flexibility of computing hardware platforms. For example, computer virtualization allows multiple virtual computing machines (computing machines) to run on a common computing hardware platform. [0003] Server-based computing allows networked client systems (located remotely from a server) to access computing resources on the server. For example, a client can use a remote desktop protocol (such as RDP or VNC) to remotely access a desktop and communicate user input (such as keyboard or mouse input) to the remote system. Also, the user must remain connected to the network to be able to access the user's desktop stored on the server. As an alternative to server-based computing, client co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/18H04N5/913H04N21/2347H04N21/4405G06K9/00G06F21/88G06F21/84
CPCH04N5/913H04N7/188H04N21/2347H04N21/4405G06F21/84G06F21/88G06V40/166G06V40/172G06V20/41
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products