CN105469459A - Cloud security identification system - Google Patents

Cloud security identification system Download PDF

Info

Publication number
CN105469459A
CN105469459A CN201410449058.4A CN201410449058A CN105469459A CN 105469459 A CN105469459 A CN 105469459A CN 201410449058 A CN201410449058 A CN 201410449058A CN 105469459 A CN105469459 A CN 105469459A
Authority
CN
China
Prior art keywords
damage
identification data
saved
clouds
preservation host
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410449058.4A
Other languages
Chinese (zh)
Inventor
张俊元
李荣贵
王志强
王中玉
林家弘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taiwan Secom Co ltd
Original Assignee
Taiwan Secom Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taiwan Secom Co ltd filed Critical Taiwan Secom Co ltd
Publication of CN105469459A publication Critical patent/CN105469459A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/215Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/29Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Alarm Systems (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

A cloud security identification system, comprising: the control center is used for storing the identification data; a security host connected to the control center for executing basic security function; the sensor is connected with the security host and used for detecting abnormal events, when the abnormal events are detected, the security host returns the abnormal events to the control center and downloads the identification data from the control center; and the identification module is connected with the security host and used for reading the security information, and when the security information is consistent with the downloaded identification data, the security host is set to be in a tour mode.

Description

Identification system is saved in high in the clouds from damage
Technical field
The invention provides a kind of safety system, particularly identification system is saved in a kind of high in the clouds from damage.
Background technology
In the streets most community, office block and place of business are in order to ensure the safety of its internal staff and property, safety system is most likely set and saves personnel from damage, so as to through safety system detection and save the monitoring of personnel from damage, to ensure the safety of community, office block or place of business, in order to avoid the illegal situation such as the thieves or robbers who act under cover of night or robber's invasion occurs.
General connecting line type is saved from damage in the operation of service, and when Control Centre receives the abnormal signal that preservation host transmits, controller can first send the person of saving from damage near client to reach the spot process.When the person of saving from damage arrives curstomer's site process, after touring major state being entered prior to safety system being brushed touring card, then entering guard plot process, namely can not touch alarm bell device thus.But for huge customers, in order to avoid the safety grounds that card number repeats, usually all different clients can be distinguished with different systematic code card numbers, to facilitate card management.
The touring card of each client and key (have and hand over the client of key) classification are normally placed in the duties car trunk of logistic support area by the management of touring card.In addition.More separately have a backup to be put in duties point cadre office, every day checking and managing quite time-consuming for card, and a touring card of large case and key are placed in trunk also suitable heaviness.
Therefore, how in traditional touring mode card, obtain more effectively and save time and manage easily, for the inventor of this case and the those skilled in the art that is engaged in these relevant industries desire most ardently the problem of improvement.
Summary of the invention
In view of this, the present invention proposes a kind of high in the clouds and saves identification system from damage, comprises: Control Centre, in order to storing identification data; Preservation host, is connected to this Control Centre, in order to perform basic security function; Perceptron, is connected to preservation host, and in order to detect anomalous event, when detecting anomalous event, preservation host return anomalous event to Control Centre, and downloads identification data from Control Centre; And recognition module, be connected to preservation host, save information from damage in order to read, when saving information from damage and being consistent with the identification data of download, preservation host is set as Circuit model.
Identification system is saved in above-mentioned high in the clouds from damage, also comprises an electronic lock, is connected to this preservation host, when this save from damage information be consistent with this identification data time, this electronic lock performs a unlocking motion.
Identification system is saved in above-mentioned high in the clouds from damage, and wherein this Control Centre also comprises an attendance checking system, to turn out for work situation in order to login and to note down one.
Identification system is saved in above-mentioned high in the clouds from damage, wherein this identification data of downloading from this Control Centre of this preservation host, and this situation of turning out for work is for login.
Identification system is saved in above-mentioned high in the clouds from damage, and wherein this identification data also comprises an employee job card number or a biometric feature.
Identification system is saved in above-mentioned high in the clouds from damage, and wherein this is saved information from damage and also comprises an employee job card number or a biometric feature.
Identification system is saved in above-mentioned high in the clouds from damage, wherein this preservation host also comprises a timing module, when this preservation host is after this Control Centre downloads this identification data, after one first special time terminates, this recognition module does not read this and saves information from damage, then this preservation host deletes this identification data downloaded.
Identification system is saved in above-mentioned high in the clouds from damage, and wherein in this first special time, this recognition module has read user's information, then this preservation host deletes this identification data downloaded.
Identification system is saved in above-mentioned high in the clouds from damage, and wherein in this first special time, this recognition module reads this and saves information from damage, and this saves information from damage when being consistent with this identification data of download, and this timing module starts one second special time timing.
Identification system is saved in above-mentioned high in the clouds from damage, and wherein this preservation host is after this second special time terminates, and deletes this identification data downloaded.
Identification system is saved in above-mentioned high in the clouds from damage, and wherein in this second special time, this recognition module again reads this and saves information from damage, then this preservation host deletes this identification data downloaded, and starts a state of alert.
Below detailed features of the present invention and advantage is described in embodiments in detail, its content is enough to make any those skilled in the art understand technology contents of the present invention and implement according to this, and content, claim and the accompanying drawing disclosed by this instructions, any those skilled in the art can understand the object and advantage that the present invention is correlated with easily.
Accompanying drawing explanation
Fig. 1 saves in high in the clouds of the present invention the schematic diagram of identification system from damage;
The schematic diagram of Fig. 2 Control Centre of the present invention;
Fig. 3 saves in high in the clouds of the present invention identification system from damage separately according to the schematic diagram of embodiment;
The schematic diagram of Fig. 4 preservation host of the present invention.
Wherein, Reference numeral:
10 Control Centre 11 identification data
12 attendance checking system 20 preservation hosts
21 timing module 30 perceptrons
40 recognition module 50 electronic locks
Embodiment
Refer to Fig. 1, Fig. 1 is the schematic diagram that identification system is saved in high in the clouds of the present invention from damage.Identification system is saved in high in the clouds of the present invention from damage, comprises Control Centre 10, preservation host 20, perceptron 30 and recognition module 40.
Refer to Fig. 2, Fig. 2 is the schematic diagram of Control Centre of the present invention.Control Centre 10 is preferably arranged in the control host computer of far-end, in order to receive the data of various places passback, such as, and transmitting messages of anomalous event.With the present invention, Control Centre 10 stores identification data 11, wherein, identification data 11 is preferably for saving personnel employee's card number of company from damage, or the individual biometric feature of employee, such as, employee individual human iris's Identification Data, identification of fingerprint data, human face recognition data or refer to vein Identification Data.
Base this, Control Centre 10 has more attendance checking system 12, in order to make employee utilize individual information of saving from damage login and record the situation of turning out for work.Save information from damage preferably for saving personnel employee's card number of company from damage, or the individual biometric feature of employee, such as, individual human iris's Identification Data, identification of fingerprint data, the human face recognition data of employee or refer to vein Identification Data.When employee show save from damage information login in attendance checking system 12 time, the identification data 11 that the employee logined saves information and storage from damage is inspected by Control Centre 10, if when data conform to, the identification data 11 of this employee is set as logining.
Refer to Fig. 1 again, preservation host 20 is connected to Control Centre 10, it is with the basic security function of executed, preferably can pass through wire communication mode, such as RS485, RS232, USB, Ethernet etc., or wireless communication mode, such as, radio frequency, Wi-Fi, ZigBee, Zwave, bluetooth, near-field communication (NFC) or other etc. wireless communications protocol be connected to Control Centre 10, but the present invention is not as limit.
Perceptron 30 is connected to preservation host 20, in order to detect anomalous event.Perceptron 30 preferably can be smoke-detectors, fire detector, window vibrating detector, carbon monoxide detector, carbon dioxide indicator, infrared detector, video monitor, foreign matter detector, monitoring camera, window unlatching watch-dog etc., but the present invention is not as limit.When perceptron 30 detects anomalous event, preservation host 20 will return this anomalous event to Control Centre 10, and meanwhile, preservation host 20 downloads the identification data 11 of employee from Control Centre 10.With the present invention, employee's identification data 11 of download is preferably set as logged identification data 11 for attendance checking system 12.And provide the identification data 11 from the employee close to anomalous event place to be downloaded to preservation host 20 by Control Centre 10, Control Centre 10 sends this employee to go to anomalous event place simultaneously.
Recognition module 40 is be connected to preservation host 20, saves information from damage in order to read.Recognition module 40 preferably can be card reader or biological characteristic identification machine, but the present invention is not as limit.After when Control Centre 10, saving from damage of sending, personnel arrived anomalous event place, save from damage personnel can show individual save information (content as previously mentioned) from damage, if save information from damage to be consistent with the identification data 11 that preservation host 20 is downloaded, then preservation host 20 is set as Circuit model, and Circuit model is then spendable special state when saving the touring each user's checkout facility of personnel from damage.Under touring state, perceptron 30 can be disabled equally, to avoid saving personnel's false touch alarm from damage, enters touring state and Control Centre 10 can be allowed to know have and save personnel from damage at user side, avoids saving from damage the facts that personnel defalcate and occurs.
Refer to Fig. 3, Fig. 3 is that high in the clouds of the present invention saves identification system from damage separately according to the schematic diagram of embodiment.In the present embodiment, high in the clouds is saved identification system from damage and is more comprised electronic lock 50, is connected to preservation host 20, when saving information from damage and being consistent with identification data 11, electronic lock 50 performs unlocking motion, makes to save from damage personnel and is entered anomalous event place and check detailed situation occurred.
Refer to Fig. 4, Fig. 4 is the schematic diagram of preservation host of the present invention.Preservation host 20 has more timing module 21, timing module 21 is preferably timer, when anomalous event occurs, after preservation host 20 to Control Centre 10 downloads identification data 11, namely timing module 21 starts the first special time timing, such as, this first special time is set as 30 minutes, after 30 minutes, recognition module 40 do not read yet save personnel from damage save information from damage, then preservation host 20 will delete the identification data 11 downloaded.Arrive even if save personnel after 30 minutes from damage, and show and save information from damage, save personnel from damage and still cannot enter anomalous event origination point smoothly.
Base this, if client's ratio saves personnel's Zao arrival anomalous event origination point from damage, when recognition module 40 reads user's information of client, then preservation host 20 will delete the identification data 11 downloaded.Arrive even if save personnel in the first special time from damage, and show and save information from damage, save personnel from damage and still cannot enter anomalous event origination point smoothly.For front described user's information, preferably can be individual's card of user, password or personal biology characteristics, but the present invention is not as limit.
Moreover, arrive anomalous event origination point if save from damage in personnel first special time, and show save information from damage when being consistent with the identification data 11 that preservation host 20 is downloaded, timing module 21 is by the timing of startup second special time.This second special time timing refers to save from damage personnel get rid of situation processing time at anomalous event origination point, and such as, the second special time is one hour, that is saves personnel from damage and have a hours to get rid of anomalous event situation.After the second special time timing terminates, preservation host 20 will delete the identification data 11 downloaded, and saving personnel from damage cannot enter anomalous event origination point again.
If in the second special time, save personnel from damage namely anomalous event situation to be got rid of, then save personnel from damage again to show and save information from damage, when recognition module 40 read in the second special time save information from damage time, represent and extremely get rid of, preservation host 20 will delete the identification data 11 downloaded, and starts the state of alert simultaneously, replys and performs security function.
The present invention is by the identification data of Control Centre, and the recognition module of fit end reads saves information from damage, replaces known touring card with the information of saving from damage of saving personnel from damage, solves touring card and checks, manages inconvenience and time-consuming problem.
Although technology contents of the present invention discloses as above with preferred embodiment; so itself and be not used to limit the present invention; any those skilled in the art; do not depart from of the present invention spirit do a little change and retouching; all should be covered by category of the present invention, therefore protection scope of the present invention is when being as the criterion depending on claims.

Claims (11)

1. an identification system is saved in high in the clouds from damage, it is characterized in that, comprises:
One Control Centre, in order to store an identification data;
One preservation host, is connected to this Control Centre, in order to perform basic security function;
One perceptron, is connected to this preservation host, and in order to detect an anomalous event, when detecting this anomalous event, this preservation host returns this anomalous event to this Control Centre, and downloads this identification data from this Control Centre; And
One recognition module, is connected to this preservation host, saves information from damage in order to read one, when this save from damage information be consistent with this identification data of download time, this preservation host is set as a Circuit model.
2. identification system is saved in high in the clouds as claimed in claim 1 from damage, it is characterized in that, also comprises an electronic lock, be connected to this preservation host, when this save from damage information be consistent with this identification data time, this electronic lock performs a unlocking motion.
3. identification system is saved in high in the clouds as claimed in claim 1 from damage, and it is characterized in that, wherein this Control Centre also comprises an attendance checking system, to turn out for work situation in order to login and to note down one.
4. identification system is saved in high in the clouds as claimed in claim 3 from damage, it is characterized in that, wherein this identification data of downloading from this Control Centre of this preservation host, and this situation of turning out for work is for login.
5. identification system is saved in high in the clouds as claimed in claim 1 from damage, it is characterized in that, wherein this identification data also comprises an employee job card number or a biometric feature.
6. identification system is saved in high in the clouds as claimed in claim 1 from damage, it is characterized in that, wherein this is saved information from damage and also comprises an employee job card number or a biometric feature.
7. identification system is saved in high in the clouds as claimed in claim 1 from damage, it is characterized in that, wherein this preservation host also comprises a timing module, when this preservation host is after this Control Centre downloads this identification data, after one first special time terminates, this recognition module does not read this and saves information from damage, then this preservation host deletes this identification data downloaded.
8. identification system is saved in high in the clouds as claimed in claim 7 from damage, and it is characterized in that, wherein in this first special time, this recognition module has read user's information, then this preservation host deletes this identification data downloaded.
9. identification system is saved in high in the clouds as claimed in claim 7 from damage, it is characterized in that, wherein in this first special time, this recognition module reads this and saves information from damage, and this saves information from damage when being consistent with this identification data of download, this timing module starts one second special time timing.
10. identification system is saved in high in the clouds as claimed in claim 9 from damage, and it is characterized in that, wherein this preservation host is after this second special time terminates, and deletes this identification data downloaded.
Identification system is saved in 11. high in the clouds as claimed in claim 9 from damage, it is characterized in that, wherein in this second special time, this recognition module again reads this and saves information from damage, then this preservation host deletes this identification data downloaded, and starts a state of alert.
CN201410449058.4A 2014-08-22 2014-09-04 Cloud security identification system Pending CN105469459A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
TW103129110 2014-08-22
TW103129110A TWI539408B (en) 2014-08-22 2014-08-22 Cloud security identifying system

Publications (1)

Publication Number Publication Date
CN105469459A true CN105469459A (en) 2016-04-06

Family

ID=55535487

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410449058.4A Pending CN105469459A (en) 2014-08-22 2014-09-04 Cloud security identification system

Country Status (4)

Country Link
JP (1) JP5941957B2 (en)
KR (1) KR20160023516A (en)
CN (1) CN105469459A (en)
TW (1) TWI539408B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110276858A (en) * 2018-03-13 2019-09-24 新谊整合科技股份有限公司 Save setting device, safety system and method from damage

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7300622B2 (en) * 2018-12-27 2023-06-30 パナソニックIpマネジメント株式会社 Control system and information processing system
JP7244135B2 (en) * 2019-10-29 2023-03-22 株式会社 テクノミライ Digital safety response security system, method and program

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004213358A (en) * 2002-12-27 2004-07-29 Sogo Keibi Hosho Co Ltd Monitoring method and monitoring system
CN101618819A (en) * 2008-06-30 2010-01-06 东芝电梯株式会社 Maintenance management system of lifter
CN103092145A (en) * 2011-11-08 2013-05-08 云辰电子开发股份有限公司 Property management method and management system
CN203415000U (en) * 2013-06-27 2014-01-29 台湾新光保全股份有限公司 Integral type security guard host and guard attendance and dispatching management system using the host

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3312335B2 (en) * 1999-07-30 2002-08-05 株式会社コムスクエア User authentication method, user authentication system and recording medium
JP2006107484A (en) * 2004-09-13 2006-04-20 Toshin:Kk Method for detecting and repairing glass member destruction
JP2008040937A (en) * 2006-08-09 2008-02-21 Nikon Corp Monitoring system in facility
JP2010079669A (en) * 2008-09-26 2010-04-08 Hitachi Kokusai Electric Inc Radio communication system for security
JP6144897B2 (en) * 2012-11-16 2017-06-07 セコム株式会社 COMMUNICATION DEVICE, COMMUNICATION SYSTEM, AND RADIO DEVICE DETECTING PROGRAM
JP6096484B2 (en) * 2012-11-22 2017-03-15 セコム株式会社 COMMUNICATION SYSTEM, COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004213358A (en) * 2002-12-27 2004-07-29 Sogo Keibi Hosho Co Ltd Monitoring method and monitoring system
CN101618819A (en) * 2008-06-30 2010-01-06 东芝电梯株式会社 Maintenance management system of lifter
CN103092145A (en) * 2011-11-08 2013-05-08 云辰电子开发股份有限公司 Property management method and management system
CN203415000U (en) * 2013-06-27 2014-01-29 台湾新光保全股份有限公司 Integral type security guard host and guard attendance and dispatching management system using the host

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110276858A (en) * 2018-03-13 2019-09-24 新谊整合科技股份有限公司 Save setting device, safety system and method from damage

Also Published As

Publication number Publication date
JP5941957B2 (en) 2016-06-29
TW201608527A (en) 2016-03-01
KR20160023516A (en) 2016-03-03
TWI539408B (en) 2016-06-21
JP2016045925A (en) 2016-04-04

Similar Documents

Publication Publication Date Title
US9965908B2 (en) Mobile access control system and method
Pawar et al. Smart home security using IoT and face recognition
US20150379795A1 (en) Active Detection Type Radio Frequency Identification Smart Door Lock Controller
CN201212325Y (en) Intelligent control and management confidential cabinet
CN108492404B (en) Face lock unlocking method and device with additional expression recognition function
US11187573B1 (en) Connected scale device
US9196136B2 (en) Device and method for monitoring locking devices
GB2520698A (en) Device for use in online shopping
KR20120074569A (en) The door lock system of both access management and security system and the door lock operation system using thereof
US10810846B1 (en) Firearm security system for securing a firearm and notifying an owner of unauthorized access of the firearm
US20150116111A1 (en) Open Security System
CN105469459A (en) Cloud security identification system
US10636264B2 (en) Office building security system using fiber sensing
CN102098419A (en) Filtering video events in a secured area using loose coupling within a security system
WO2021092432A1 (en) Touchless smart storage box with face recognition system
CN105139502A (en) Intelligent material evidence access control system
US20230066608A1 (en) Security system including automation notification and surveillance integration
US20160378268A1 (en) System and method of smart incident analysis in control system using floor maps
CN207650858U (en) A kind of electronic tag and electronic tag detector for authentication
KR200483521Y1 (en) Cloud security identifying system
CN110276864A (en) A kind of noninductive intelligent unlocking method and system
CN110276863A (en) A kind of intelligence based on human-body biological sign is noninductive method for unlocking and system
CN216133433U (en) Safety detection system for file entering and exiting storehouse
CN210442852U (en) Fingerprint access control system
CN211149534U (en) Intelligent storage and control system for valuables

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160406