CN1783150A - Cipher anti-riot control system and its technical plan - Google Patents
Cipher anti-riot control system and its technical plan Download PDFInfo
- Publication number
- CN1783150A CN1783150A CN 200410097775 CN200410097775A CN1783150A CN 1783150 A CN1783150 A CN 1783150A CN 200410097775 CN200410097775 CN 200410097775 CN 200410097775 A CN200410097775 A CN 200410097775A CN 1783150 A CN1783150 A CN 1783150A
- Authority
- CN
- China
- Prior art keywords
- password
- cipher
- control system
- alarm device
- application apparatus
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Alarm Systems (AREA)
Abstract
The cipher anti-riot control system consists of cipher input device, computer, software, output equipment, stepped alarm and site recording instrument. The design thought includes creating an artificial safety alarm platform for violent crime to pass through. The technological scheme includes setting ciphers in the computer including safety cipher and danger cipher, using the safety cipher normally, using the danger cipher in special case, starting the stepped alarm and the site recording instrument optionally for warning. The present invention can well protect lift and property.
Description
Technical field
What the present invention relates to is a kind of cipher anti-riot control system and technical scheme thereof, particularly is applied in the cipher anti-riot control system of security fields such as uprising power strike, is to belong to electronics and message area.
Technical background
Along with the violent crime of current society is more and more diversified, grade of malignancy is more and more higher, and in some important fields, such as the economy that often has violent crime to take place, such case can take place in fields such as politics.For example there is a kind of criminal tendency to utilize violence that the litigant is controlled exactly now, force then to chase after the purpose that password that they say bankbook card number in bank reaches profit, under the situation that exists this leak also to have no idea to solve at present, utilized by the offender through regular meeting; Be exactly in important industry in addition, some monitoring gates of these the insides, base that needs such as military affairs are safe and secret just need strong defence strength, just can avoid having been controlled unconsciously by the stranger.And existing product and technical scheme generally all are the protections to the scene, for example Chinese patent 91105448.0 (a kind of anti-theft automatic alarming system); Chinese patent 02111003.4 (multiterminal networking fingerprint identification entrance guard system).In case these products and technical scheme are can't solve the litigant to be controlled by violence, also how can in time report to the police the security of the lives and property that how can maximum magnitude ground protection oneself safely.Exist these problems also not have to be the present invention under the situation of solution that can be intact.
Summary of the invention:
The present invention is directed to deficiency and defective on the existing existing product technical scheme, invented and a kind ofly can have enough defensive measures, the core technology scheme of the cipher anti-riot control system of counterforce capability and cipher anti-riot control system thereof.
Cipher anti-riot control system generally is by PIN PAD, main frame (or cipher processor), and computer software, the output application apparatus, the classifying alarm device, field recorder is formed.It is to come control hardware to report to the police with software, for realizing such purpose, in the technical scheme of the present invention, in the database of main frame, be provided with earlier a plurality of passwords, they are divided into security password and dangerous password two big classes, and wherein dangerous password can be divided into numerous grades again.Receive the password comparative analysis that password and main frame set in advance from PIN PAD then, if input password is a security password, classifying alarm device then, field recorder is less than moving.Export the result that application apparatus is normally wanted simultaneously.If the input password is dangerous password, then judge the grade of dangerous password earlier, come control classification alarm respectively according to the grade of dangerous password again, field recorder is wanted to move.Also to control simultaneously the result that the output application apparatus can normally be wanted, reach into cipher anti-riot control system thus.
Description of drawings:
Fig. 1 forms synoptic diagram for cipher anti-riot control system hardware
Fig. 2 is a cipher anti-riot control system technical scheme synoptic diagram
Fig. 1 illustrates (as shown in Figure 1):
Fig. 1 is that the hardware of cipher anti-riot control system is formed synoptic diagram, and it is by PIN PAD, main frame (or cipher processor), and the output application apparatus, the classifying alarm device, field recorder is formed.At first password is to be input to main frame (or cipher processor) from PIN PAD, and the grade of main frame (or cipher processor) analysis and judgement password is controlled the output application apparatus then, classifying alarm device, the action of field recorder.General classifying alarm device is mounted in the alarm monitoring center of far-end.Field recorder is as complementary application apparatus, and sometimes the needs in order to control cost can be selectable application apparatuss.The output application apparatus is to select to use different output application apparatuss according to different environments for use, and such as the cipher anti-riot control system that is applied in the bank savings system, its output application apparatus is exactly a cash dispenser.Be applied in the cipher anti-riot control system of safety door, its output application apparatus is again the switchgear of control gate.
Fig. 2 illustrates (as shown in Figure 2):
Fig. 2 is a cipher anti-riot control system technical scheme synoptic diagram, its application principle, and alarm procedure is as follows:
One: the input of security password: the password that has only this talent of user to have, can not have any pilot process, the result that the output application apparatus is directly normally wanted after using this password.The while field recorder, the classifying alarm device does not produce action.(this is the legal password that uses at ordinary times with the person of gathering around of password)
Two: the input of unusual password: the dangerous password that can use different brackets according to the hazard level of residing environment at that time.
1。The dangerous password of one-level: when these data are activated, that is to say when inputed the dangerous password of one-level to system after,
A: field recorder will be noted the current everything that takes place, and has the time of needs to inquire about after supplying with,
B: but the classifying alarm device does not also reach alert if, and the classifying alarm device is not reported to the police.(above these two actions all are the operations of carrying out at a distance, and on-the-spot people can not know these actions have taken place),
C: export application apparatus simultaneously and have normal result and come out.(this action also is in order to confuse on-the-spot people's alarm this fact of whether reporting to the police).
2。The dangerous password of secondary: when this password is activated, that is to say when inputed the dangerous password of secondary to system after,
A: field recorder will be noted the current everything that takes place, and has the time of needs to inquire about after supplying with,
B: but the classifying alarm device has reached alert if, enables the secondary alarm equipment alarm
C: export application apparatus simultaneously and have normal result and come out.
3。Highest dangerous password: when this password is activated, that is to say when inputed highest dangerous password to system after,
A: field recorder will be noted the current everything that takes place, and has the time of needs to inquire about after supplying with,
B: but the classifying alarm device has reached alert if, enables highest alarm equipment alarm
C: exporting application apparatus does not simultaneously have normal result to come out.(this action be exactly need protection important result can not allow on-the-spot people know).
Three: the input of other invalid password: do not have any pilot process, do not have any result.
Annotate: all these above alert if can be done different the setting according to different environments for use, (adjust database just can achieve the goal) sometimes the alert if in same grade also can be provided with a plurality of passwords, so just can be good at confusing that others does not know which is genuine.
Specific embodiment
For understanding technical scheme of the present invention better, be further described below in conjunction with specific embodiment.
Embodiment 1: the bank savings cipher anti-riot control system: such as the cipher anti-riot control system that is applied in the bank savings system.Pickup camera, PIN PAD replace the field recorder of cipher anti-riot control system, PIN PAD respectively; The classifying alarm device is installed in the alarm monitoring center, is provided with security password and multistage for the bank book card number according to requirement of client then, and a plurality of alarm cipher have so just constituted a complete bank savings cipher anti-riot control system.What the client used at ordinary times is the security password that the bankbook card number is established, pickup camera attonity when password safe in utilization, and the classifying alarm device is not reported to the police, and same can getting saved; When emergency condition takes place when, if just controlled by force also and can not worry by others, because they will know that certainly the password of bank card just can go money is taken out in bank, others can't take out money if there is not correct password, so just can provide one " 2 grades of alarm cipher ", they are can't judge this password true and false, reported to the police when so just can allow the offender reach money in alarm monitoring center secret, so not only keep the safety of own lives and properties, also made the offender have nowhere to run.
Embodiment 2: the safety door cipher anti-riot control system: a certain fan is important such as being applied in, safety door cipher anti-riot control system on the door that ensures need be perfectly safe, its output application apparatus is the switchgear of control gate, and the classifying alarm device is installed in the alarm monitoring center of far-end; What the legal user of password used at ordinary times is that security password is opened door, and classifying alarm device, field recorder do not produce action; When if emergency condition takes place, just the scene is controlled by the people, exist and have to again under the irresistible strength open this door to them, at this time just can provide one 2 grades passwords (alarm cipher), can open door though obtain this password, but when opening just in the warning of the alarm monitoring center of far-end secret, (can certainly give five-star alarm cipher, the gate is not opened under the situation about can report to the police like this), all can carry out under the monitoring of oneself.
Can utilize this cipher anti-riot control system to apply it to other every field, such as anti-terrorism, various aspects such as kidnapping.In other words when others wants to finish a certain task by force, they will consider to do like this and have which type of result, whether reported to the police by secret oneself is not also known, opens a kind of effect of deterrence at heart fully, helps to prevent that more violent crime from taking place.
Claims (5)
1, a kind of cipher anti-riot control system and technical scheme thereof are by PIN PAD, main frame (or cipher processor), and computer software, the output application apparatus, the classifying alarm device, field recorder is formed.Its being characterized as of technical scheme of the cipher anti-riot that adopts control:
1) be provided with 4 passwords at main frame (or cipher processor) earlier, they are respectively security passwords, the dangerous password of one-level, the dangerous password of secondary, highest dangerous password.
2) the password comparative analysis that sets in advance of password that receives from PIN PAD then and main frame (or cipher processor):
A) when the input password was security password, field recorder was not enabled so, and the classifying alarm device is not reported to the police, and exported application apparatus simultaneously and obtained normal result.
B) when the input password was one-level danger password, field recorder will be enabled so, and the classifying alarm device is not reported to the police, and the output application apparatus obtains normal result.
C) when the input password was secondary danger password, field recorder will be enabled so, and the classifying alarm device is reported to the police, and the output application apparatus obtains normal result.
D) when the input password was highest dangerous password, field recorder will be enabled so, and the classifying alarm device is reported to the police, and the output application apparatus can not obtain normal result.
E) when input password during for other invalid password, classifying alarm device so, field recorder is not enabled, and exports application apparatus simultaneously without any the result.
2, as the said cipher anti-riot control system of claim 1, the feature of its technical scheme is the dangerous password that can be provided with any a plurality of grades.
3, as the said cipher anti-riot control system of claim 1, the feature of its technical scheme is that the password setting of a grade that can be therein has a plurality of passwords that same equivalence can take place.
4, as the said cipher anti-riot control system of claim 1, the feature that its most basic hardware is formed can be just by PIN PAD, cipher processor (or main frame), and the output application apparatus, the classifying alarm device is formed; Field recorder can be selectable hardware device.
5, as the said cipher anti-riot control system of claim 1, the feature of its technical scheme can be that a main frame correspondence is overlapped independently PIN PAD more, forms the cipher anti-riot control system that networking is used.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200410097775 CN1783150A (en) | 2004-12-01 | 2004-12-01 | Cipher anti-riot control system and its technical plan |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200410097775 CN1783150A (en) | 2004-12-01 | 2004-12-01 | Cipher anti-riot control system and its technical plan |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1783150A true CN1783150A (en) | 2006-06-07 |
Family
ID=36773292
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200410097775 Pending CN1783150A (en) | 2004-12-01 | 2004-12-01 | Cipher anti-riot control system and its technical plan |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1783150A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102708604A (en) * | 2012-01-12 | 2012-10-03 | 苏州百正信息科技有限公司 | Anti-violence password control system and technical scheme thereof |
CN115439971A (en) * | 2022-08-31 | 2022-12-06 | 中国工商银行股份有限公司 | Self-service bank access control monitoring management method and system |
-
2004
- 2004-12-01 CN CN 200410097775 patent/CN1783150A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102708604A (en) * | 2012-01-12 | 2012-10-03 | 苏州百正信息科技有限公司 | Anti-violence password control system and technical scheme thereof |
CN115439971A (en) * | 2022-08-31 | 2022-12-06 | 中国工商银行股份有限公司 | Self-service bank access control monitoring management method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8242905B2 (en) | System and method for adjusting a security level and signaling alarms in controlled areas | |
CN102622818B (en) | All-directional intelligent monitoring method for bank ATMs | |
CN205050228U (en) | National treasury access control system of bank based on iris discernment | |
CN107992739A (en) | User authentication method, apparatus and system | |
CN110443924A (en) | Wisdom building site management system and method | |
US10157537B1 (en) | Remotely controlled access security system | |
Patoliya et al. | Face detection based ATM security system using embedded Linux platform | |
CN111311788A (en) | Intelligent storage and control system for valuables and implementation method | |
CN108960128A (en) | A kind of safety defense monitoring system for warehouse | |
CN110689694B (en) | Intelligent monitoring system and method based on image processing | |
Johnston | Tamper detection for safeguards and treaty monitoring: fantasies, realities, and potentials | |
CN106652119A (en) | Dynamic password management system | |
KR19980015298A (en) | Financial security methods and devices | |
Roache | Computer crime deterrence | |
CN210262831U (en) | Gate machine | |
CN1783150A (en) | Cipher anti-riot control system and its technical plan | |
KR101262363B1 (en) | Entrance control system | |
CN204926247U (en) | Multistage intelligent entrance guard system that do not to select unblock more based on fingerprint identification | |
CN102708604A (en) | Anti-violence password control system and technical scheme thereof | |
CN1441380A (en) | Vital fingerprint distinguishing technology for identity antifake and resisting forcing | |
CN109194672A (en) | A kind of network intrusions warning system and method based on man machine language's interaction | |
Spero et al. | Security begins at home: everyday security behaviour and lessons for cybersecurity research | |
Goliwale et al. | Intrusion detection system using data mining | |
Khodjanova | Information Security Privacy and Information Security Policy | |
Raman et al. | IoT based Anti Theft Controlling and Security System for ATM Machine |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |