Community security management system and method based on Internet of things

A technology of management system and Internet of Things, which is applied in the field of community security, can solve the problems of life inconvenience and owner inconvenience, and achieve the effect of protecting safety

Active Publication Date: 2020-11-13
湖南大汉无忧智慧科技有限公司
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although this kind of access control device achieves the purpose of community security, it also brings inconvenience to the owner. For example, when the owner forgets to bring the magnetic card, the magnetic card is lost, foreign guests visit or takeaway delivery, etc., he must go to the gate of the community. To cope, to bring inconvenience to life

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Community security management system and method based on Internet of things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] A community security management system based on the Internet of Things, including a community user information management module, a user identity division and judgment module, an Internet of Things identity authentication module and an access control module, the community user information management module is used to manage community users information; the community user information includes user identity information, household registration information, access card number, historical habits in the community, and biological information of users; the historical habits in the community include the correspondence between historical action tracks and historical time periods, and the user The biological information includes user fingerprints, voiceprints and facial features; the user identity division module obtains the user's age according to the user identity information, and distinguishes the user's identity as a general user, a child, and an old man according to the age; th...

Embodiment 2

[0029] Such as figure 1 The illustrated embodiment further provides a method for community security management based on the Internet of Things, the method comprising:

[0030] Step 1, manage community user information; the community user information includes user identity information, household registration information, access card number, historical habits in the community and biological information of users; the historical habits in the community include historical action tracks and historical time periods Correspondence, the biological information of the user includes user fingerprints, voiceprints and facial features;

[0031] Step 2, classify the user's identity, obtain the user's age according to the user's identity information, and distinguish the user's identity into general users, children and the elderly according to the age;

[0032] Step 3, judge the unused users, if it is judged that the user is a child or the elderly, then according to the user's historical habi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a community security management method based on the Internet of things. The method is characterized by comprising the steps that community user information is managed, whereinthe community user information comprises user identity information, household registration information, access control card numbers, historical habits in a community and biological information of users, the historical habits in the community comprise a corresponding relationship between a historical action track and a historical time period, and the biological information of users comprises user fingerprints, voiceprints and facial features; identity division is carried out on a user, the age of the user is acquired according to the user identity information, and the identity of the user is classified into a general user, a child or an old person according to the age; and the user is judged, and different identity authentication modes are carried out. Through the method, relatively weak users can be tracked and protected, and multiple identity recognition can be carried out on adult users who may have dangers.

Description

technical field [0001] The invention relates to the technical field of community security, in particular to a community security management system and method based on the Internet of Things. Background technique [0002] At present, community security is the focus of social security prevention and management. In order to prevent outsiders from entering and leaving the community at will, a variety of access control devices have been launched on the market. Now, various access control devices in the community basically use the way of card swiping to open the community gate. close. [0003] Although this kind of access control device achieves the purpose of community security, it also brings inconvenience to the owner. For example, when the owner forgets to bring the magnetic card, the magnetic card is lost, foreign guests visit or takeaway delivery, etc., he must go to the gate of the community. Going to meet and bring inconvenience to life. [0004] Therefore, the present i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/25G07C9/27G06K9/00G10L17/22G06Q50/26
CPCG07C9/25G07C9/27G10L17/22G06Q50/26G06V40/70Y02D30/70
Inventor 刘慧付胜龙付东哲
Owner 湖南大汉无忧智慧科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products