CN105469459A - Cloud security identification system - Google Patents
Cloud security identification system Download PDFInfo
- Publication number
- CN105469459A CN105469459A CN201410449058.4A CN201410449058A CN105469459A CN 105469459 A CN105469459 A CN 105469459A CN 201410449058 A CN201410449058 A CN 201410449058A CN 105469459 A CN105469459 A CN 105469459A
- Authority
- CN
- China
- Prior art keywords
- damage
- identification data
- saved
- clouds
- preservation host
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004321 preservation Methods 0.000 claims description 47
- 230000002547 anomalous effect Effects 0.000 claims description 23
- 230000033001 locomotion Effects 0.000 claims description 3
- 230000002159 abnormal effect Effects 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000000034 method Methods 0.000 description 3
- CURLTUGMZLYLDI-UHFFFAOYSA-N Carbon dioxide Chemical compound O=C=O CURLTUGMZLYLDI-UHFFFAOYSA-N 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 210000003462 vein Anatomy 0.000 description 2
- UGFAIRIUMAVXCW-UHFFFAOYSA-N Carbon monoxide Chemical compound [O+]#[C-] UGFAIRIUMAVXCW-UHFFFAOYSA-N 0.000 description 1
- 229910002092 carbon dioxide Inorganic materials 0.000 description 1
- 239000001569 carbon dioxide Substances 0.000 description 1
- 229910002091 carbon monoxide Inorganic materials 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/215—Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/29—Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Alarm Systems (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
A cloud security identification system, comprising: the control center is used for storing the identification data; a security host connected to the control center for executing basic security function; the sensor is connected with the security host and used for detecting abnormal events, when the abnormal events are detected, the security host returns the abnormal events to the control center and downloads the identification data from the control center; and the identification module is connected with the security host and used for reading the security information, and when the security information is consistent with the downloaded identification data, the security host is set to be in a tour mode.
Description
Technical field
The invention provides a kind of safety system, particularly identification system is saved in a kind of high in the clouds from damage.
Background technology
In the streets most community, office block and place of business are in order to ensure the safety of its internal staff and property, safety system is most likely set and saves personnel from damage, so as to through safety system detection and save the monitoring of personnel from damage, to ensure the safety of community, office block or place of business, in order to avoid the illegal situation such as the thieves or robbers who act under cover of night or robber's invasion occurs.
General connecting line type is saved from damage in the operation of service, and when Control Centre receives the abnormal signal that preservation host transmits, controller can first send the person of saving from damage near client to reach the spot process.When the person of saving from damage arrives curstomer's site process, after touring major state being entered prior to safety system being brushed touring card, then entering guard plot process, namely can not touch alarm bell device thus.But for huge customers, in order to avoid the safety grounds that card number repeats, usually all different clients can be distinguished with different systematic code card numbers, to facilitate card management.
The touring card of each client and key (have and hand over the client of key) classification are normally placed in the duties car trunk of logistic support area by the management of touring card.In addition.More separately have a backup to be put in duties point cadre office, every day checking and managing quite time-consuming for card, and a touring card of large case and key are placed in trunk also suitable heaviness.
Therefore, how in traditional touring mode card, obtain more effectively and save time and manage easily, for the inventor of this case and the those skilled in the art that is engaged in these relevant industries desire most ardently the problem of improvement.
Summary of the invention
In view of this, the present invention proposes a kind of high in the clouds and saves identification system from damage, comprises: Control Centre, in order to storing identification data; Preservation host, is connected to this Control Centre, in order to perform basic security function; Perceptron, is connected to preservation host, and in order to detect anomalous event, when detecting anomalous event, preservation host return anomalous event to Control Centre, and downloads identification data from Control Centre; And recognition module, be connected to preservation host, save information from damage in order to read, when saving information from damage and being consistent with the identification data of download, preservation host is set as Circuit model.
Identification system is saved in above-mentioned high in the clouds from damage, also comprises an electronic lock, is connected to this preservation host, when this save from damage information be consistent with this identification data time, this electronic lock performs a unlocking motion.
Identification system is saved in above-mentioned high in the clouds from damage, and wherein this Control Centre also comprises an attendance checking system, to turn out for work situation in order to login and to note down one.
Identification system is saved in above-mentioned high in the clouds from damage, wherein this identification data of downloading from this Control Centre of this preservation host, and this situation of turning out for work is for login.
Identification system is saved in above-mentioned high in the clouds from damage, and wherein this identification data also comprises an employee job card number or a biometric feature.
Identification system is saved in above-mentioned high in the clouds from damage, and wherein this is saved information from damage and also comprises an employee job card number or a biometric feature.
Identification system is saved in above-mentioned high in the clouds from damage, wherein this preservation host also comprises a timing module, when this preservation host is after this Control Centre downloads this identification data, after one first special time terminates, this recognition module does not read this and saves information from damage, then this preservation host deletes this identification data downloaded.
Identification system is saved in above-mentioned high in the clouds from damage, and wherein in this first special time, this recognition module has read user's information, then this preservation host deletes this identification data downloaded.
Identification system is saved in above-mentioned high in the clouds from damage, and wherein in this first special time, this recognition module reads this and saves information from damage, and this saves information from damage when being consistent with this identification data of download, and this timing module starts one second special time timing.
Identification system is saved in above-mentioned high in the clouds from damage, and wherein this preservation host is after this second special time terminates, and deletes this identification data downloaded.
Identification system is saved in above-mentioned high in the clouds from damage, and wherein in this second special time, this recognition module again reads this and saves information from damage, then this preservation host deletes this identification data downloaded, and starts a state of alert.
Below detailed features of the present invention and advantage is described in embodiments in detail, its content is enough to make any those skilled in the art understand technology contents of the present invention and implement according to this, and content, claim and the accompanying drawing disclosed by this instructions, any those skilled in the art can understand the object and advantage that the present invention is correlated with easily.
Accompanying drawing explanation
Fig. 1 saves in high in the clouds of the present invention the schematic diagram of identification system from damage;
The schematic diagram of Fig. 2 Control Centre of the present invention;
Fig. 3 saves in high in the clouds of the present invention identification system from damage separately according to the schematic diagram of embodiment;
The schematic diagram of Fig. 4 preservation host of the present invention.
Wherein, Reference numeral:
10 Control Centre 11 identification data
12 attendance checking system 20 preservation hosts
21 timing module 30 perceptrons
40 recognition module 50 electronic locks
Embodiment
Refer to Fig. 1, Fig. 1 is the schematic diagram that identification system is saved in high in the clouds of the present invention from damage.Identification system is saved in high in the clouds of the present invention from damage, comprises Control Centre 10, preservation host 20, perceptron 30 and recognition module 40.
Refer to Fig. 2, Fig. 2 is the schematic diagram of Control Centre of the present invention.Control Centre 10 is preferably arranged in the control host computer of far-end, in order to receive the data of various places passback, such as, and transmitting messages of anomalous event.With the present invention, Control Centre 10 stores identification data 11, wherein, identification data 11 is preferably for saving personnel employee's card number of company from damage, or the individual biometric feature of employee, such as, employee individual human iris's Identification Data, identification of fingerprint data, human face recognition data or refer to vein Identification Data.
Base this, Control Centre 10 has more attendance checking system 12, in order to make employee utilize individual information of saving from damage login and record the situation of turning out for work.Save information from damage preferably for saving personnel employee's card number of company from damage, or the individual biometric feature of employee, such as, individual human iris's Identification Data, identification of fingerprint data, the human face recognition data of employee or refer to vein Identification Data.When employee show save from damage information login in attendance checking system 12 time, the identification data 11 that the employee logined saves information and storage from damage is inspected by Control Centre 10, if when data conform to, the identification data 11 of this employee is set as logining.
Refer to Fig. 1 again, preservation host 20 is connected to Control Centre 10, it is with the basic security function of executed, preferably can pass through wire communication mode, such as RS485, RS232, USB, Ethernet etc., or wireless communication mode, such as, radio frequency, Wi-Fi, ZigBee, Zwave, bluetooth, near-field communication (NFC) or other etc. wireless communications protocol be connected to Control Centre 10, but the present invention is not as limit.
Perceptron 30 is connected to preservation host 20, in order to detect anomalous event.Perceptron 30 preferably can be smoke-detectors, fire detector, window vibrating detector, carbon monoxide detector, carbon dioxide indicator, infrared detector, video monitor, foreign matter detector, monitoring camera, window unlatching watch-dog etc., but the present invention is not as limit.When perceptron 30 detects anomalous event, preservation host 20 will return this anomalous event to Control Centre 10, and meanwhile, preservation host 20 downloads the identification data 11 of employee from Control Centre 10.With the present invention, employee's identification data 11 of download is preferably set as logged identification data 11 for attendance checking system 12.And provide the identification data 11 from the employee close to anomalous event place to be downloaded to preservation host 20 by Control Centre 10, Control Centre 10 sends this employee to go to anomalous event place simultaneously.
Recognition module 40 is be connected to preservation host 20, saves information from damage in order to read.Recognition module 40 preferably can be card reader or biological characteristic identification machine, but the present invention is not as limit.After when Control Centre 10, saving from damage of sending, personnel arrived anomalous event place, save from damage personnel can show individual save information (content as previously mentioned) from damage, if save information from damage to be consistent with the identification data 11 that preservation host 20 is downloaded, then preservation host 20 is set as Circuit model, and Circuit model is then spendable special state when saving the touring each user's checkout facility of personnel from damage.Under touring state, perceptron 30 can be disabled equally, to avoid saving personnel's false touch alarm from damage, enters touring state and Control Centre 10 can be allowed to know have and save personnel from damage at user side, avoids saving from damage the facts that personnel defalcate and occurs.
Refer to Fig. 3, Fig. 3 is that high in the clouds of the present invention saves identification system from damage separately according to the schematic diagram of embodiment.In the present embodiment, high in the clouds is saved identification system from damage and is more comprised electronic lock 50, is connected to preservation host 20, when saving information from damage and being consistent with identification data 11, electronic lock 50 performs unlocking motion, makes to save from damage personnel and is entered anomalous event place and check detailed situation occurred.
Refer to Fig. 4, Fig. 4 is the schematic diagram of preservation host of the present invention.Preservation host 20 has more timing module 21, timing module 21 is preferably timer, when anomalous event occurs, after preservation host 20 to Control Centre 10 downloads identification data 11, namely timing module 21 starts the first special time timing, such as, this first special time is set as 30 minutes, after 30 minutes, recognition module 40 do not read yet save personnel from damage save information from damage, then preservation host 20 will delete the identification data 11 downloaded.Arrive even if save personnel after 30 minutes from damage, and show and save information from damage, save personnel from damage and still cannot enter anomalous event origination point smoothly.
Base this, if client's ratio saves personnel's Zao arrival anomalous event origination point from damage, when recognition module 40 reads user's information of client, then preservation host 20 will delete the identification data 11 downloaded.Arrive even if save personnel in the first special time from damage, and show and save information from damage, save personnel from damage and still cannot enter anomalous event origination point smoothly.For front described user's information, preferably can be individual's card of user, password or personal biology characteristics, but the present invention is not as limit.
Moreover, arrive anomalous event origination point if save from damage in personnel first special time, and show save information from damage when being consistent with the identification data 11 that preservation host 20 is downloaded, timing module 21 is by the timing of startup second special time.This second special time timing refers to save from damage personnel get rid of situation processing time at anomalous event origination point, and such as, the second special time is one hour, that is saves personnel from damage and have a hours to get rid of anomalous event situation.After the second special time timing terminates, preservation host 20 will delete the identification data 11 downloaded, and saving personnel from damage cannot enter anomalous event origination point again.
If in the second special time, save personnel from damage namely anomalous event situation to be got rid of, then save personnel from damage again to show and save information from damage, when recognition module 40 read in the second special time save information from damage time, represent and extremely get rid of, preservation host 20 will delete the identification data 11 downloaded, and starts the state of alert simultaneously, replys and performs security function.
The present invention is by the identification data of Control Centre, and the recognition module of fit end reads saves information from damage, replaces known touring card with the information of saving from damage of saving personnel from damage, solves touring card and checks, manages inconvenience and time-consuming problem.
Although technology contents of the present invention discloses as above with preferred embodiment; so itself and be not used to limit the present invention; any those skilled in the art; do not depart from of the present invention spirit do a little change and retouching; all should be covered by category of the present invention, therefore protection scope of the present invention is when being as the criterion depending on claims.
Claims (11)
1. an identification system is saved in high in the clouds from damage, it is characterized in that, comprises:
One Control Centre, in order to store an identification data;
One preservation host, is connected to this Control Centre, in order to perform basic security function;
One perceptron, is connected to this preservation host, and in order to detect an anomalous event, when detecting this anomalous event, this preservation host returns this anomalous event to this Control Centre, and downloads this identification data from this Control Centre; And
One recognition module, is connected to this preservation host, saves information from damage in order to read one, when this save from damage information be consistent with this identification data of download time, this preservation host is set as a Circuit model.
2. identification system is saved in high in the clouds as claimed in claim 1 from damage, it is characterized in that, also comprises an electronic lock, be connected to this preservation host, when this save from damage information be consistent with this identification data time, this electronic lock performs a unlocking motion.
3. identification system is saved in high in the clouds as claimed in claim 1 from damage, and it is characterized in that, wherein this Control Centre also comprises an attendance checking system, to turn out for work situation in order to login and to note down one.
4. identification system is saved in high in the clouds as claimed in claim 3 from damage, it is characterized in that, wherein this identification data of downloading from this Control Centre of this preservation host, and this situation of turning out for work is for login.
5. identification system is saved in high in the clouds as claimed in claim 1 from damage, it is characterized in that, wherein this identification data also comprises an employee job card number or a biometric feature.
6. identification system is saved in high in the clouds as claimed in claim 1 from damage, it is characterized in that, wherein this is saved information from damage and also comprises an employee job card number or a biometric feature.
7. identification system is saved in high in the clouds as claimed in claim 1 from damage, it is characterized in that, wherein this preservation host also comprises a timing module, when this preservation host is after this Control Centre downloads this identification data, after one first special time terminates, this recognition module does not read this and saves information from damage, then this preservation host deletes this identification data downloaded.
8. identification system is saved in high in the clouds as claimed in claim 7 from damage, and it is characterized in that, wherein in this first special time, this recognition module has read user's information, then this preservation host deletes this identification data downloaded.
9. identification system is saved in high in the clouds as claimed in claim 7 from damage, it is characterized in that, wherein in this first special time, this recognition module reads this and saves information from damage, and this saves information from damage when being consistent with this identification data of download, this timing module starts one second special time timing.
10. identification system is saved in high in the clouds as claimed in claim 9 from damage, and it is characterized in that, wherein this preservation host is after this second special time terminates, and deletes this identification data downloaded.
Identification system is saved in 11. high in the clouds as claimed in claim 9 from damage, it is characterized in that, wherein in this second special time, this recognition module again reads this and saves information from damage, then this preservation host deletes this identification data downloaded, and starts a state of alert.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW103129110 | 2014-08-22 | ||
TW103129110A TWI539408B (en) | 2014-08-22 | 2014-08-22 | Cloud security identifying system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105469459A true CN105469459A (en) | 2016-04-06 |
Family
ID=55535487
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410449058.4A Pending CN105469459A (en) | 2014-08-22 | 2014-09-04 | Cloud security identification system |
Country Status (4)
Country | Link |
---|---|
JP (1) | JP5941957B2 (en) |
KR (1) | KR20160023516A (en) |
CN (1) | CN105469459A (en) |
TW (1) | TWI539408B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110276858A (en) * | 2018-03-13 | 2019-09-24 | 新谊整合科技股份有限公司 | Save setting device, safety system and method from damage |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP7300622B2 (en) * | 2018-12-27 | 2023-06-30 | パナソニックIpマネジメント株式会社 | Control system and information processing system |
JP7244135B2 (en) * | 2019-10-29 | 2023-03-22 | 株式会社 テクノミライ | Digital safety response security system, method and program |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004213358A (en) * | 2002-12-27 | 2004-07-29 | Sogo Keibi Hosho Co Ltd | Monitoring method and monitoring system |
CN101618819A (en) * | 2008-06-30 | 2010-01-06 | 东芝电梯株式会社 | Maintenance management system of lifter |
CN103092145A (en) * | 2011-11-08 | 2013-05-08 | 云辰电子开发股份有限公司 | Property management method and management system |
CN203415000U (en) * | 2013-06-27 | 2014-01-29 | 台湾新光保全股份有限公司 | Integral type security guard host and guard attendance and dispatching management system using the host |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3312335B2 (en) * | 1999-07-30 | 2002-08-05 | 株式会社コムスクエア | User authentication method, user authentication system and recording medium |
JP2006107484A (en) * | 2004-09-13 | 2006-04-20 | Toshin:Kk | Method for detecting and repairing glass member destruction |
JP2008040937A (en) * | 2006-08-09 | 2008-02-21 | Nikon Corp | Monitoring system in facility |
JP2010079669A (en) * | 2008-09-26 | 2010-04-08 | Hitachi Kokusai Electric Inc | Radio communication system for security |
JP6144897B2 (en) * | 2012-11-16 | 2017-06-07 | セコム株式会社 | COMMUNICATION DEVICE, COMMUNICATION SYSTEM, AND RADIO DEVICE DETECTING PROGRAM |
JP6096484B2 (en) * | 2012-11-22 | 2017-03-15 | セコム株式会社 | COMMUNICATION SYSTEM, COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM |
-
2014
- 2014-08-22 TW TW103129110A patent/TWI539408B/en active
- 2014-09-04 CN CN201410449058.4A patent/CN105469459A/en active Pending
- 2014-09-24 JP JP2014193872A patent/JP5941957B2/en active Active
- 2014-10-07 KR KR1020140134884A patent/KR20160023516A/en not_active Application Discontinuation
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004213358A (en) * | 2002-12-27 | 2004-07-29 | Sogo Keibi Hosho Co Ltd | Monitoring method and monitoring system |
CN101618819A (en) * | 2008-06-30 | 2010-01-06 | 东芝电梯株式会社 | Maintenance management system of lifter |
CN103092145A (en) * | 2011-11-08 | 2013-05-08 | 云辰电子开发股份有限公司 | Property management method and management system |
CN203415000U (en) * | 2013-06-27 | 2014-01-29 | 台湾新光保全股份有限公司 | Integral type security guard host and guard attendance and dispatching management system using the host |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110276858A (en) * | 2018-03-13 | 2019-09-24 | 新谊整合科技股份有限公司 | Save setting device, safety system and method from damage |
Also Published As
Publication number | Publication date |
---|---|
JP5941957B2 (en) | 2016-06-29 |
TW201608527A (en) | 2016-03-01 |
KR20160023516A (en) | 2016-03-03 |
TWI539408B (en) | 2016-06-21 |
JP2016045925A (en) | 2016-04-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9965908B2 (en) | Mobile access control system and method | |
Pawar et al. | Smart home security using IoT and face recognition | |
US20150379795A1 (en) | Active Detection Type Radio Frequency Identification Smart Door Lock Controller | |
CN201212325Y (en) | Intelligent control and management confidential cabinet | |
CN108492404B (en) | Face lock unlocking method and device with additional expression recognition function | |
US11187573B1 (en) | Connected scale device | |
US9196136B2 (en) | Device and method for monitoring locking devices | |
GB2520698A (en) | Device for use in online shopping | |
KR20120074569A (en) | The door lock system of both access management and security system and the door lock operation system using thereof | |
US10810846B1 (en) | Firearm security system for securing a firearm and notifying an owner of unauthorized access of the firearm | |
US20150116111A1 (en) | Open Security System | |
CN105469459A (en) | Cloud security identification system | |
US10636264B2 (en) | Office building security system using fiber sensing | |
CN102098419A (en) | Filtering video events in a secured area using loose coupling within a security system | |
WO2021092432A1 (en) | Touchless smart storage box with face recognition system | |
CN105139502A (en) | Intelligent material evidence access control system | |
US20230066608A1 (en) | Security system including automation notification and surveillance integration | |
US20160378268A1 (en) | System and method of smart incident analysis in control system using floor maps | |
CN207650858U (en) | A kind of electronic tag and electronic tag detector for authentication | |
KR200483521Y1 (en) | Cloud security identifying system | |
CN110276864A (en) | A kind of noninductive intelligent unlocking method and system | |
CN110276863A (en) | A kind of intelligence based on human-body biological sign is noninductive method for unlocking and system | |
CN216133433U (en) | Safety detection system for file entering and exiting storehouse | |
CN210442852U (en) | Fingerprint access control system | |
CN211149534U (en) | Intelligent storage and control system for valuables |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160406 |