Method and system for performing security control using security device
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of safety equipment and safety control, which is applied in the electronic field to achieve the effect of avoiding information leakage
Inactive Publication Date: 2018-07-20
TENDYRON CORP
View PDF10 Cites 3 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
Also, the user must remain connected to the network to be able to access the user's desktop stored on the server
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0030] This embodiment provides a method for performing security control by using a security device.
[0031] figure 1 A flow chart of a method for using security equipment to perform security control provided in this embodiment, as shown in figure 1 As shown, the method mainly includes the following steps:
[0032] In step S101, the security chip of the security device sends an image acquisition command to the camera device of the security device after receiving the monitoring command sent by the host computer after successfully logging in to the system client, instructing the camera device to perform image capture.
[0033] In this embodiment, the user logs in to the system through the system client of the upper computer. After logging in to the system, the user enters a security state and needs to monitor the user's current environment. The upper computer sends a monitoring command to the security chip of the security device.
[0034] In a specific application, the securi...
Embodiment 2
[0059] This embodiment provides a system for performing security control by using a security device, and the system can be used to implement the method provided in Embodiment 1 above.
[0060] figure 2 A schematic diagram of the architecture of a system using security devices for security control provided in this embodiment, as shown in figure 2 As shown, the system mainly includes: a security device 20 , a background 22 and a host computer 24 . The functions of each component in the system will be described below, and other related matters can be referred to the description of Embodiment 1.
[0061] In this embodiment, the upper computer 24 is configured to send a monitoring instruction after successfully logging in to the system client.
[0062] Such as figure 2As shown, the safety device 20 mainly includes: a safety chip 201, configured to send an image acquisition instruction to the camera device 202 of the safety device 20 after receiving the monitoring instruction,...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention discloses a method and a system for performing security control using a security device. The method includes the steps that: a security chip of the security device sends an image acquisition instruction to a camera device of the security device after receiving a monitoring instruction from a host computer; the camera device of the security device acquires a video stream collected bythe camera in real time and transmits the video stream to the security chip; the security chip sends the video stream to the host computer through an external interface of the security device in realtime, and the host computer sends the video stream to a background; the background performs image processing to the intercepted multi-frame image; the background identifies a target object from the processed plurality of image information respectively, and determines a change mode of the target object according to the shape and/or position of the target object in the plurality of image information; the background sends a security control instruction to the host computer when the background determines that the change mode of the target object meets a predetermined security control mode; and thehost computer receives the security control instruction, and executes corresponding security control operation according to the security control instruction.
Description
technical field [0001] The invention relates to the field of electronic technology, in particular to a method and system for safety control using safety equipment. Background technique [0002] The advantage of computer virtualization is that it greatly increases the computing efficiency and flexibility of computing hardware platforms. For example, computer virtualization allows multiple virtual computing machines (computing machines) to run on a common computing hardware platform. [0003] Server-based computing allows networked client systems (located remotely from a server) to access computing resources on the server. For example, a client can use a remote desktop protocol (such as RDP or VNC) to remotely access a desktop and communicate user input (such as keyboard or mouse input) to the remote system. Also, the user must remain connected to the network to be able to access the user's desktop stored on the server. As an alternative to server-based computing, client co...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.