TW202414250A - Security graphic control system - Google Patents

Security graphic control system Download PDF

Info

Publication number
TW202414250A
TW202414250A TW111135247A TW111135247A TW202414250A TW 202414250 A TW202414250 A TW 202414250A TW 111135247 A TW111135247 A TW 111135247A TW 111135247 A TW111135247 A TW 111135247A TW 202414250 A TW202414250 A TW 202414250A
Authority
TW
Taiwan
Prior art keywords
server
security
interface
visitor
data
Prior art date
Application number
TW111135247A
Other languages
Chinese (zh)
Inventor
張迺森
陳蕙美
王志強
張偉倫
簡霈錦
陳昶祿
Original Assignee
中興保全科技股份有限公司
Filing date
Publication date
Application filed by 中興保全科技股份有限公司 filed Critical 中興保全科技股份有限公司
Publication of TW202414250A publication Critical patent/TW202414250A/en

Links

Images

Abstract

A security graphic control system includes a first server, a second server, and a third server. The first server is configured to store customer subscription data and apparatus configuration data corresponding to at least one electronic device in a security system. The second server is configured to enable the security system according to the customer subscription data and the apparatus configuration data and obtain an apparatus signal of the security system. The second server has a user database to verify a login authority of an administrator account and a user account. The third server is configured to store a configuration file corresponding to the customer subscription data for providing a monitoring interface. The monitoring interface is configured to display the status of the at least one electronic device according to the apparatus signal. The third server has a front end and a back end for the administrator account and the user account to respectively access the back end to edit the configuration data and access the front end to operate the monitoring interface after logging in from the second server.

Description

保全圖控系統Security image control system

本發明是關於一種圖形化控制技術,尤其是關於一種保全圖控系統。The present invention relates to a graphical control technology, and more particularly to a security graphical control system.

為了場域的安全性,一般透過保全廠商於場域設置保全系統。保全廠商提供設置於場域的控制設備(例如本地電腦)給客戶,以使客戶可以透過控制設備控制保全系統。當客戶具有圖形化控制保全系統的需求時,保全廠商可以於控制設備建立設定檔(例如圖資)及其相關的監控介面。然而,由於設備的限制,當客戶對設定檔或是監控介面具有更新需求時,客戶需通知保全廠商回收控制設備,而無法直接對控制設備進行修改操作,且在此情形中,保全廠商也無法遠端地對控制設備進行修改操作。再者,控制設備容易因不當的操作而遭到電腦病毒侵入,導致被盜用的風險增加。For the safety of the site, a security system is usually installed on the site through a security vendor. The security vendor provides the customer with control equipment (such as a local computer) installed on the site so that the customer can control the security system through the control equipment. When the customer has a need for graphical control of the security system, the security vendor can create a configuration file (such as image data) and its related monitoring interface on the control device. However, due to equipment limitations, when the customer has an update requirement for the configuration file or the monitoring interface, the customer needs to notify the security vendor to recall the control device, and cannot directly modify the control device. In this case, the security vendor cannot remotely modify the control device. Furthermore, the control device is easily invaded by computer viruses due to improper operation, resulting in an increased risk of theft.

鑒於上述,本發明提供一種保全圖控系統。保全圖控系統包含一第一伺服器、一第二伺服器及一第三伺服器。第一伺服器儲存一客戶訂閱資料及一設備配置資料。設備配置資料對應一保全系統中的至少一電子設備。第二伺服器連接第一伺服器及保全系統。第二伺服器依據客戶訂閱資料與設備配置資料啟用保全系統,並獲得保全系統的一設備訊號。第二伺服器具有一使用者資料庫,以驗證一管理者帳戶與一使用者帳戶之登入權限。第三伺服器連接第二伺服器。第三伺服器儲存有對應客戶訂閱資料的一設備資訊顯示設定檔,以依據設備資訊顯示設定檔提供一監控介面。監控介面依據設備訊號顯示至少一電子設備的狀態。第三伺服器具有一前台端及一後台端,以供管理者帳戶於第二伺服器登入後進入後台端編輯設備資訊顯示設定檔,並供使用者帳戶於第二伺服器登入後進入前台端操作監控介面。In view of the above, the present invention provides a security image control system. The security image control system includes a first server, a second server and a third server. The first server stores a customer subscription data and a device configuration data. The device configuration data corresponds to at least one electronic device in a security system. The second server is connected to the first server and the security system. The second server activates the security system based on the customer subscription data and the device configuration data, and obtains a device signal of the security system. The second server has a user database to verify the login authority of an administrator account and a user account. The third server is connected to the second server. The third server stores a device information display profile corresponding to the customer subscription data to provide a monitoring interface based on the device information display profile. The monitoring interface displays the status of at least one electronic device according to the device signal. The third server has a front-end and a back-end, so that the administrator account can enter the back-end to edit the device information display configuration file after logging in to the second server, and the user account can enter the front-end to operate the monitoring interface after logging in to the second server.

綜上所述,依據本發明之實施例,可以使客戶能夠隨時對監控介面進行操作(例如修改操作),使保全人員可以遠端地對設備資訊顯示設定檔進行編輯,及增加系統的登入安全性以減少被盜用的風險。In summary, according to the embodiments of the present invention, customers can operate the monitoring interface at any time (such as modifying operations), security personnel can remotely edit the device information display profile, and increase the login security of the system to reduce the risk of theft.

參照圖1,係為本發明依據一些實施例之保全圖控系統10的方塊示意圖。保全圖控系統10包含第一伺服器11、第二伺服器13及第三伺服器15。第二伺服器13經由網路連接第一伺服器11及保全系統20。第三伺服器15經由網路連接第二伺服器13。保全系統20包含保全主機21及連接保全主機21的至少一電子設備22、23、25。在此僅繪示三個電子設備,但本發明並不限於此,電子設備的數量可以依據客戶的需求來調整。電子設備可透過有線通訊或無線通訊方式連接保全主機21。在一些實施例中,電子設備22、23、25可以是保全監控設備或是物聯網設備。保全監控設備例如是門窗感測器、人體偵測器或監視攝影機等。物聯網設備例如是冰箱、電視、冷氣、插座、燈泡等連網受控設備,但本發明並非以此為限。Refer to Figure 1, which is a block diagram of a security image control system 10 according to some embodiments of the present invention. The security image control system 10 includes a first server 11, a second server 13 and a third server 15. The second server 13 is connected to the first server 11 and the security system 20 via a network. The third server 15 is connected to the second server 13 via a network. The security system 20 includes a security host 21 and at least one electronic device 22, 23, 25 connected to the security host 21. Only three electronic devices are shown here, but the present invention is not limited to this, and the number of electronic devices can be adjusted according to customer needs. The electronic device can be connected to the security host 21 via wired communication or wireless communication. In some embodiments, the electronic devices 22, 23, 25 can be security monitoring devices or Internet of Things devices. Security monitoring equipment is, for example, door and window sensors, human body detectors, or surveillance cameras. IoT devices are, for example, refrigerators, televisions, air conditioners, sockets, light bulbs, and other networked controlled devices, but the present invention is not limited thereto.

第一伺服器11儲存客戶訂閱資料及設備配置資料。客戶訂閱資料是客戶訂閱保全服務的記錄,例如訂閱期限、報價金額、保全系統欲設置的地點(於後稱為案場)、及客戶身分資料(如客戶編號、客戶名稱及聯絡電話)等。設備配置資料對應保全系統20的電子設備22、23、25,例如設備配置資料包含欲架設的電子設備22、23、25的類型、名稱及型號等。舉例來說,在客戶欲訂閱保全服務時,保全人員可以根據客戶所選擇的服務內容整理出客戶訂閱資料及設備配置資料,並將客戶訂閱資料及設備配置資料透過輸入裝置(例如鍵盤、滑鼠、語音輸入器、觸碰輸入器、具有傳輸介面的輸入器等)(圖未示)輸入及儲存於第一伺服器11。The first server 11 stores customer subscription information and equipment configuration information. Customer subscription information is a record of customer subscription to security services, such as subscription period, quotation amount, location of security system to be set up (hereinafter referred to as site), and customer identity information (such as customer number, customer name and contact number), etc. Equipment configuration information corresponds to the electronic equipment 22, 23, 25 of the security system 20, for example, the equipment configuration information includes the type, name and model of the electronic equipment 22, 23, 25 to be set up. For example, when a customer wants to subscribe to a security service, the security personnel can organize the customer's subscription information and equipment configuration information according to the service content selected by the customer, and input and store the customer's subscription information and equipment configuration information in the first server 11 through an input device (such as a keyboard, mouse, voice input device, touch input device, input device with a transmission interface, etc.) (not shown).

第二伺服器13依據客戶訂閱資料及設備配置資料啟用保全系統20,並獲得保全系統20的設備訊號。舉例來說,保全人員於案場架設完保全系統20的保全主機21及電子設備22、23、25之後,確認保全系統20是否可以連接至管制中心(圖未示)。在確認保全系統20成功連接至管制中心之後,保全人員操作終端裝置連接第一伺服器11,以完成開通作業。所述開通作業是指第一伺服器11與第二伺服器13之間完成資料串接,即第一伺服器11將客戶訂閱資料及設備配置資料發送至第二伺服器13,第二伺服器13根據客戶訂閱資料及設備配置資料啟用保全系統20。例如,第二伺服器13根據客戶訂閱資料得知保全服務已被訂閱之後,發送置入有設備配置資料的啟動訊號至保全主機21,以將保全主機21的控制功能啟動,並使保全主機21儲存設備配置資料以供其控制電子設備21、23、25的運作。第二伺服器13還將保全主機21與客戶訂閱資料相關聯。在保全系統20被啟用之後,第二伺服器13即可從保全系統20的保全主機21獲得有關電子設備22、23、25的設備訊號。設備訊號可以包含保全監控設備的監控訊號及/或物聯網設備的控制訊號。監控訊號例如是指示保全監控設備是否偵測到異常行為(例如遭到入侵)的訊號,當訊號指示異常狀態時表示保全監控設備偵測到異常行為,當訊號指示正常狀態時表示保全監控設備未偵測到異常行為。控制訊號例如是物聯網設備被開啟時所產生的開啟訊號或是物聯網設備被關閉時所產生的關閉訊號。The second server 13 activates the security system 20 according to the customer subscription data and equipment configuration data, and obtains the equipment signal of the security system 20. For example, after the security personnel have set up the security host 21 and electronic equipment 22, 23, and 25 of the security system 20 at the scene, they confirm whether the security system 20 can be connected to the control center (not shown). After confirming that the security system 20 is successfully connected to the control center, the security personnel operate the terminal device to connect to the first server 11 to complete the activation operation. The activation operation refers to the completion of data concatenation between the first server 11 and the second server 13, that is, the first server 11 sends the customer subscription data and equipment configuration data to the second server 13, and the second server 13 activates the security system 20 according to the customer subscription data and equipment configuration data. For example, after the second server 13 learns that the security service has been subscribed according to the customer subscription data, it sends a startup signal with device configuration data to the security host 21 to start the control function of the security host 21 and enable the security host 21 to store the device configuration data for controlling the operation of the electronic devices 21, 23, and 25. The second server 13 also associates the security host 21 with the customer subscription data. After the security system 20 is activated, the second server 13 can obtain device signals related to the electronic devices 22, 23, and 25 from the security host 21 of the security system 20. The device signal can include a monitoring signal of a security monitoring device and/or a control signal of an IoT device. A monitoring signal is, for example, a signal indicating whether the security monitoring device has detected abnormal behavior (e.g., intrusion). When the signal indicates an abnormal state, it means that the security monitoring device has detected abnormal behavior. When the signal indicates a normal state, it means that the security monitoring device has not detected abnormal behavior. A control signal is, for example, a turn-on signal generated when the IoT device is turned on or a turn-off signal generated when the IoT device is turned off.

第三伺服器15儲存有對應客戶訂閱資料的設備資訊顯示設定檔。設備資訊顯示設定檔可以是案場的各樓層的平面圖或是案場的立體圖等圖資。第三伺服器15依據設備資訊顯示設定檔及設備配置資料提供監控介面。例如,監控介面可以是結合有設備資訊顯示設定檔及設備配置資料的圖形化介面。具體來說,監控介面可以以視覺化呈現電子設備22、23、25在案場的架設位置。例如根據於案場的架設位置,以視覺化圖案作為電子設備22、23、25而繪製於圖資中的對應位置。The third server 15 stores a device information display profile corresponding to the customer subscription data. The device information display profile can be a floor plan of each floor of the site or a three-dimensional map of the site. The third server 15 provides a monitoring interface based on the device information display profile and the device configuration data. For example, the monitoring interface can be a graphical interface that combines the device information display profile and the device configuration data. Specifically, the monitoring interface can visually present the installation location of the electronic devices 22, 23, and 25 on the site. For example, based on the installation location of the site, a visual pattern is drawn as the corresponding position of the electronic devices 22, 23, and 25 in the map data.

監控介面依據設備訊號顯示電子設備22、23、25的狀態。例如,監控介面可以以視覺化的形式顯示電子設備22、23、25的狀態。具體來說,監控介面可以用不同的顏色及/或圖案來顯示電子設備22、23、25的不同狀態。舉例來說,監控介面具有電子設備22、23、25的名稱欄位及狀態欄位。當狀態欄位顯示綠色圓圈時表示對應的電子設備22、23、25被開啟,當狀態欄位顯示紅色叉叉時表示對應的電子設備22、23、25被關閉。The monitoring interface displays the status of the electronic devices 22, 23, 25 according to the device signal. For example, the monitoring interface can display the status of the electronic devices 22, 23, 25 in a visual form. Specifically, the monitoring interface can use different colors and/or patterns to display the different status of the electronic devices 22, 23, 25. For example, the monitoring interface has a name field and a status field of the electronic devices 22, 23, 25. When the status field displays a green circle, it means that the corresponding electronic device 22, 23, 25 is turned on, and when the status field displays a red cross, it means that the corresponding electronic device 22, 23, 25 is turned off.

第二伺服器13具有使用者資料庫,以驗證管理者帳戶及使用者帳戶之登入權限。經過第二伺服器13驗證通過後,可進入第三伺服器15使用其服務。管理者帳戶係供保全人員使用,使用者帳戶係供客戶使用。The second server 13 has a user database to verify the login authority of the administrator account and the user account. After passing the verification of the second server 13, you can enter the third server 15 to use its services. The administrator account is for security personnel to use, and the user account is for customers to use.

第三伺服器15具有一前台端及一後台端。在一些實施例中,前台端及後台端可以由網頁實現。管理者帳戶於第二伺服器13登入後進入後台端編輯設備資訊顯示設定檔,例如對設備資訊顯示設定檔進行新增、刪除、及/或修改等動作。使用者帳戶於第二伺服器13登入後進入前台端操作監控介面。如此,客戶(如案場警衛人員)能夠隨時對監控介面進行操作,且保全人員也可以遠端地對設備資訊顯示設定檔進行編輯與維護,而不會受硬體設備的限制。在一些實施例中,在登入第二伺服器13而進入第三伺服器15後,第二伺服器13可以利用SSL加密對管理者帳戶進行編輯時所產生的指令進行加密,並對使用者帳戶進行操作時所產生的指令進行加密。如此,可以降低被盜用的風險。在一些實施例中,管理者帳戶除了透過後台端編輯設備資訊顯示設定檔之外,還可以透過後台端上傳一韌體更新檔至第三伺服器15,以使第三伺服器15根據韌體更新檔進行韌體更新。The third server 15 has a front-end and a back-end. In some embodiments, the front-end and the back-end can be implemented by web pages. After logging in to the second server 13, the administrator account enters the back-end to edit the device information display configuration file, such as adding, deleting, and/or modifying the device information display configuration file. After logging in to the second server 13, the user account enters the front-end to operate the monitoring interface. In this way, customers (such as site security personnel) can operate the monitoring interface at any time, and security personnel can also remotely edit and maintain the device information display configuration file without being restricted by hardware equipment. In some embodiments, after logging into the second server 13 and entering the third server 15, the second server 13 can use SSL encryption to encrypt the instructions generated when the administrator account is edited, and encrypt the instructions generated when the user account is operated. In this way, the risk of theft can be reduced. In some embodiments, in addition to editing the device information display configuration file through the backend, the administrator account can also upload a firmware update file to the third server 15 through the backend, so that the third server 15 performs firmware updates according to the firmware update file.

參照圖2,係為本發明依據一些實施例之監控介面的部分示意圖。在一些實施例中,除了以圖資方式呈現監控介面之外,還可以呈現經過彙整的資訊,如儀表板(dashboard)。使用者帳戶透過前台端對監控介面進行的操作可以是將同一類型但位於不同場域的電子設備22、23、25的狀態顯示於同一畫面,並新增場域資料(例如台北店、新北店等)於場域欄位。但本發明並不限於此,對於監控介面的操作也可以是將不同類型且同一場域的電子設備22、23、25的狀態顯示於同一畫面,或是將不同類型且不同場域的電子設備22、23、25的狀態顯示於多個畫面。Refer to FIG. 2, which is a partial schematic diagram of the monitoring interface according to some embodiments of the present invention. In some embodiments, in addition to presenting the monitoring interface in the form of graphics, aggregated information such as a dashboard can also be presented. The user account can operate the monitoring interface through the front end to display the status of electronic devices 22, 23, 25 of the same type but located in different fields on the same screen, and add field data (such as Taipei store, New Taipei store, etc.) in the field field. However, the present invention is not limited to this, and the operation of the monitoring interface can also be to display the status of electronic devices 22, 23, 25 of different types and in the same field on the same screen, or to display the status of electronic devices 22, 23, 25 of different types and in different fields on multiple screens.

在一些實施例中,客戶訂閱資料與使用者帳戶相關聯。當客戶不續訂保全服務時,保全人員操作第一伺服器11以禁用客戶訂閱資料。第一伺服器11的客戶訂閱資料被禁用後,第二伺服器13禁止使用者帳戶登入而進入第三伺服器15的前台端。也就是說,在保全服務被訂閱時,客戶能透過使用者帳戶登入第二伺服器13而進入第三伺服器15的前台端,在保全服務沒有被訂閱時,客戶無法透過使用者帳戶登入第二伺服器13,從而無法進入第三伺服器15的前台端。如此,可以確保客戶於第三伺服器15的使用權限是被實時更新,以節省資源。In some embodiments, customer subscription information is associated with a user account. When a customer does not renew the security service, the security personnel operate the first server 11 to disable the customer subscription information. After the customer subscription information of the first server 11 is disabled, the second server 13 prohibits the user account from logging in and entering the front end of the third server 15. In other words, when the security service is subscribed, the customer can log in to the second server 13 through the user account and enter the front end of the third server 15. When the security service is not subscribed, the customer cannot log in to the second server 13 through the user account, and thus cannot enter the front end of the third server 15. In this way, it can be ensured that the customer's usage rights on the third server 15 are updated in real time to save resources.

在一些實施例中,前台端具有一登入二維碼。第二伺服器13於終端裝置掃描登入二維碼後獲得登入訊息。例如,客戶的終端裝置安裝有與第二伺服器13相配合的應用程式,應用程式透過終端裝置的影像擷取裝置(例如相機)掃描登入二維碼以產生登入訊息,並將登入訊息透過網路傳輸至第二伺服器13。第二伺服器13根據使用者資料庫及登入訊息,驗證使用者帳戶。在一些實施例中,登入二維碼例如是QR碼。In some embodiments, the front end has a login QR code. The second server 13 obtains a login message after the terminal device scans the login QR code. For example, the client's terminal device is installed with an application that cooperates with the second server 13. The application scans the login QR code through the image capture device (such as a camera) of the terminal device to generate a login message, and transmits the login message to the second server 13 through the network. The second server 13 verifies the user account based on the user database and the login message. In some embodiments, the login QR code is, for example, a QR code.

在一些實施例中,第二伺服器13儲存有第一交談識別碼(session ID)。在一些實施例中,第一交談識別碼可以儲存於使用者資料庫。在使用者帳戶登入第二伺服器13而進入第三伺服器15的前台端時,第三伺服器15產生第二交談識別碼,並將第二交談識別碼傳輸至第二伺服器13。第二伺服器13依據第一交談識別碼及第二交談識別碼,判斷是否將使用者帳戶登出從而無法進入前台端。例如,第二伺服器13比對第一交談識別碼是否相符第二交談識別碼。在第一交談識別碼相符第二交談識別碼時,表示客戶並未透過使用者帳戶在異地登入而進入前台端,此時第二伺服器13維持使用者帳戶的登入。在第一交談識別碼不相符第二交談識別碼時,表示客戶透過使用者帳戶在異地登入而進入前台端,此時第二伺服器13將使用者帳戶登出從而無法進入前台端。如此,可以確保客戶無法在異地登入而進入前台端以操作監控介面,從而降低被盜用的風險。In some embodiments, the second server 13 stores a first session ID. In some embodiments, the first session ID can be stored in a user database. When the user account logs into the second server 13 and enters the front end of the third server 15, the third server 15 generates a second session ID and transmits the second session ID to the second server 13. The second server 13 determines whether to log out the user account based on the first session ID and the second session ID, thereby preventing the user from entering the front end. For example, the second server 13 compares the first session ID with the second session ID. When the first session identification code matches the second session identification code, it means that the customer has not logged in to the front end through the user account at a remote location, and the second server 13 maintains the login of the user account. When the first session identification code does not match the second session identification code, it means that the customer has logged in to the front end through the user account at a remote location, and the second server 13 logs out the user account so that the customer cannot enter the front end. In this way, it can be ensured that the customer cannot log in to the front end at a remote location to operate the monitoring interface, thereby reducing the risk of theft.

在一些實施例中,在使用者帳戶登入而進入前台端之後且監控介面在一時段未被操作時,第二伺服器13將使用者帳戶登出從而無法進入前台端。也就是說,在監控介面被閒置該時段後,可以將使用者帳戶登出,以節省能源及被盜用的風險。In some embodiments, after the user account logs in and enters the front end and the monitoring interface is not operated for a period of time, the second server 13 logs out the user account so that the front end cannot be entered. In other words, after the monitoring interface is idle for the period of time, the user account can be logged out to save energy and the risk of being stolen.

在一些實施例中,在管理者帳戶登入而進入後台端之後,第二伺服器13(例如第二伺服器13的計時器)累計登入時間,在登入時間大於時間閾值時,第二伺服器13使管理者帳戶登出而無法進入後台端。如此,確保保全人員以管理者帳戶登入第二伺服器13並進入第三伺服器15的後台端後所進行的編輯是在有限的時間內完成。也就是說,設備資訊顯示設定檔的更新不會遭到拖延。In some embodiments, after the administrator account logs in and enters the backend, the second server 13 (e.g., the timer of the second server 13) accumulates the login time. When the login time is greater than the time threshold, the second server 13 logs out the administrator account and prevents the administrator from entering the backend. In this way, it is ensured that the editing performed by the security personnel after logging in to the second server 13 with the administrator account and entering the backend of the third server 15 is completed within a limited time. In other words, the update of the device information display profile will not be delayed.

在一些實施例中,監控介面包含保全設定介面、解除介面、異常通知介面、設備啟閉介面、實時影像介面及異常影像介面。保全設定介面供設定保全系統20的保全狀態為啟用狀態或解除狀態。例如,保全設定介面具有保全啟用按鍵及保全解除按鍵。客戶可以以使用者帳戶登入第二伺服器13並進入第三伺服器15的前台端之後,點選保全啟用按鍵以設定保全系統20的保全主機21的保全狀態為啟用狀態,或是點選保全解除按鍵以設定保全系統20的保全主機21的保全狀態為解除狀態。具體來說,在點選保全啟用按鍵之後,第三伺服器15經由第二伺服器13傳輸第一操作訊號至保全系統20的保全主機21,以使保全主機21響應第一操作訊號後將保全狀態設定為啟用狀態。在點選保全解除按鍵之後,第三伺服器15經由第二伺服器13傳輸第二操作訊號至保全系統20的保全主機21,以使保全主機21響應第二操作訊號後將保全狀態設定為解除狀態。在保全系統20處於啟用狀態且案場發生異常行為時,電子設備22、23、25可以發出警報及產生指示異常狀態的設備訊號。在保全系統20處於解除狀態下案場發生異常行為時,電子設備22、23、25雖偵測到異常行為,然而保全主機21不發出警報。In some embodiments, the monitoring interface includes a security setting interface, a release interface, an abnormal notification interface, a device activation and deactivation interface, a real-time image interface, and an abnormal image interface. The security setting interface is used to set the security status of the security system 20 to an activated state or a released state. For example, the security setting interface has a security activation button and a security release button. After the customer logs in to the second server 13 with a user account and enters the front end of the third server 15, he clicks the security activation button to set the security status of the security host 21 of the security system 20 to an activated state, or clicks the security release button to set the security status of the security host 21 of the security system 20 to a released state. Specifically, after the security activation button is clicked, the third server 15 transmits a first operation signal to the security host 21 of the security system 20 via the second server 13, so that the security host 21 sets the security status to the activation state after responding to the first operation signal. After the security release button is clicked, the third server 15 transmits a second operation signal to the security host 21 of the security system 20 via the second server 13, so that the security host 21 sets the security status to the release state after responding to the second operation signal. When the security system 20 is in the activation state and abnormal behavior occurs at the scene, the electronic devices 22, 23, and 25 can issue an alarm and generate a device signal indicating the abnormal state. When an abnormal behavior occurs at the scene while the security system 20 is in the released state, although the electronic devices 22, 23, and 25 detect the abnormal behavior, the security host 21 does not issue an alarm.

異常通知介面響應於設備訊號為異常狀態時,發出異常通知,以提醒客戶案場當前發生異常行為。在一些實施例中,以電子設備22、23、25包含攝影機為例進行說明,若案場發生入侵或異常事件時,異常通知介面會彈跳出該區域的所有攝影機的即時畫面,並發出異常警示聲,直至案場警衛人員關閉該異常警示聲為止。在一些實施例中,在電子設備22、23、25發出警報時,異常通知介面主動彈跳出提醒,並將異常通知介面的畫面導向警報發生原因為何。在一些實施例中,在電子設備22、23、25發出警報時,異常通知介面主動帶出該區域的攝影機的即時畫面,以即時監控警報狀況。在一些實施例中,在電子設備22、23、25發出警報時,異常通知介面發出異常警示聲,直到案場警衛人員點擊異常通知介面的確認按鍵後停止播放,以確保警報發生時有人知悉。在一些實施例中,在案場發生入侵或異常事件時,異常通知介面會顯示是哪一個電子設備22、23、25發生異常(即哪一個電子設備22、23、25當前產生指示異常狀態的設備訊號)。The abnormal notification interface responds to the abnormal state of the device signal and issues an abnormal notification to remind the customer that abnormal behavior is currently occurring at the scene. In some embodiments, the electronic devices 22, 23, and 25 include cameras as an example for explanation. If an invasion or abnormal event occurs at the scene, the abnormal notification interface will pop up the real-time images of all cameras in the area and issue an abnormal alarm until the scene security personnel turn off the abnormal alarm. In some embodiments, when the electronic devices 22, 23, and 25 issue an alarm, the abnormal notification interface automatically pops up a reminder and directs the screen of the abnormal notification interface to the cause of the alarm. In some embodiments, when an electronic device 22, 23, 25 issues an alarm, the abnormal notification interface automatically brings out the real-time picture of the camera in the area to monitor the alarm status in real time. In some embodiments, when an electronic device 22, 23, 25 issues an alarm, the abnormal notification interface issues an abnormal warning sound until the security personnel at the scene clicks the confirmation button of the abnormal notification interface to stop playing, so as to ensure that someone is aware of the alarm. In some embodiments, when an intrusion or abnormal event occurs at the scene, the abnormal notification interface will display which electronic device 22, 23, 25 has an abnormality (i.e., which electronic device 22, 23, 25 currently generates a device signal indicating an abnormal state).

設備啟閉介面供控制電子設備22、23、25的開啟或關閉。例如,設備啟閉介面具有多個開啟按鍵及多個關閉按鍵,每一電子設備22、23、25分別對應一個開啟按鍵及一個關閉按鍵。客戶可以以使用者帳戶登入第二伺服器13並進入第三伺服器15的前台端之後,點選開啟按鍵以將對應的電子設備22、23、25開啟,或是點選關閉按鍵以將對應的電子設備22、23、25關閉。具體來說,在點選開啟按鍵之後,第三伺服器15經由第二伺服器13傳輸第三操作訊號至對應的電子設備22、23、25,以使對應的電子設備22、23、25響應第三操作訊號後開啟。在點選關閉按鍵之後,第三伺服器15經由第二伺服器13傳輸第四操作訊號至對應的電子設備22、23、25,以使對應的電子設備22、23、25響應第四操作訊號後關閉。The device startup and shutdown interface is used to control the opening and closing of the electronic devices 22, 23, 25. For example, the device startup and shutdown interface has multiple startup buttons and multiple shutdown buttons, and each electronic device 22, 23, 25 corresponds to one startup button and one shutdown button. After the customer logs in to the second server 13 with a user account and enters the front end of the third server 15, he clicks the startup button to turn on the corresponding electronic device 22, 23, 25, or clicks the shutdown button to turn off the corresponding electronic device 22, 23, 25. Specifically, after the on button is clicked, the third server 15 transmits a third operation signal to the corresponding electronic device 22, 23, 25 via the second server 13, so that the corresponding electronic device 22, 23, 25 responds to the third operation signal and then turns on. After the off button is clicked, the third server 15 transmits a fourth operation signal to the corresponding electronic device 22, 23, 25 via the second server 13, so that the corresponding electronic device 22, 23, 25 responds to the fourth operation signal and then turns off.

實時影像介面顯示電子設備22、23、25所拍攝的實時影像。舉例來說,以電子設備22、23、25包含監控攝影機的例子進行說明,該監控攝影機拍攝案場的景象以產生實時影像。終端裝置經過登入第二伺服器13而連線到第三伺服器15之後,可直接或間接連線至監控攝影機以獲得並於其上的實時影像介面顯示實時影像,以供客戶隨時監控案場的即時狀況。The real-time image interface displays the real-time image captured by the electronic devices 22, 23, and 25. For example, the electronic devices 22, 23, and 25 include a surveillance camera, which captures the scene of the case to generate a real-time image. After the terminal device logs into the second server 13 and connects to the third server 15, it can directly or indirectly connect to the surveillance camera to obtain and display the real-time image on the real-time image interface, so that the customer can monitor the real-time status of the case at any time.

異常影像介面顯示在異常狀態時電子設備22、23、25所拍攝的監控錄影影像。舉例來說,以電子設備22、23、25包含監控攝影機及門窗感測器的例子進行說明,當門窗感測器偵測到異常行為(例如門窗被異常地開啟)時,即異常狀態(設備訊號指示異常狀態)時,保全主機21產生觸發訊號至監控攝影機,以使監控攝影機響應觸發訊號後,將在異常行為的時點的前後一時段(如前後15秒)內對案場拍攝所產生的監控錄影影像傳輸至第二伺服器13。第三伺服器15從第二伺服器13獲得監控錄影影像,並透過異常影像介面顯示監控錄影影像,以供客戶可以直接檢視異常行為的相關影像而無需檢視其他無關影像。在一些實施例中,監控錄影影像也可以是傳輸至保全圖控系統10外部的其他伺服器(例如亞馬遜雲端服務),並將監控錄影影像傳輸給第三伺服器15。The abnormal image interface displays the surveillance video images taken by the electronic devices 22, 23, and 25 in the abnormal state. For example, the electronic devices 22, 23, and 25 include surveillance cameras and door and window sensors. When the door and window sensors detect abnormal behavior (such as doors and windows being abnormally opened), that is, abnormal state (device signals indicate abnormal state), the security host 21 generates a trigger signal to the surveillance camera, so that the surveillance camera responds to the trigger signal and transmits the surveillance video images generated by shooting the scene within a period before and after the abnormal behavior (such as 15 seconds before and after) to the second server 13. The third server 15 obtains the surveillance video images from the second server 13 and displays the surveillance video images through the abnormal image interface so that the customer can directly view the relevant images of the abnormal behavior without viewing other irrelevant images. In some embodiments, the surveillance video images can also be transmitted to other servers outside the security image control system 10 (such as Amazon cloud services), and the surveillance video images are transmitted to the third server 15.

在一些實施例中,異常影像介面還發出警示音,以提醒客戶案場具有異常行為發生。在一些實施例中,異常影像介面還標記處於異常狀態的電子設備22、23、25。例如,以視覺化圖案標記出處於異常狀態的電子設備22、23、25的類型、名稱及於圖資中的位置。如此,客戶即可快速得知哪一電子設備22、23、25因偵測到異常行為而發出警報。In some embodiments, the abnormal image interface also emits a warning sound to remind the customer that abnormal behavior has occurred at the scene. In some embodiments, the abnormal image interface also marks the electronic devices 22, 23, 25 in an abnormal state. For example, the type, name and location of the electronic devices 22, 23, 25 in an abnormal state in the image data are marked with a visual pattern. In this way, the customer can quickly know which electronic device 22, 23, 25 has issued an alarm due to abnormal behavior.

在一些實施例中,客戶的第一終端裝置的應用程式發送邀請連結至訪客的第二終端裝置。例如,客戶操作第一終端裝置的應用程式登入第二伺服器13並產生邀請連結,將邀請連結經由網路傳輸至第二終端裝置。第二終端裝置根據邀請連結下載應用程式,訪客輸入訪客資料於第二終端裝置,第二終端裝置透過應用程式及網路將訪客資料上傳至第二伺服器13。在一些實施例中,訪客資料可以儲存於使用者資料庫。在一些實施例中,訪客資料包含訪客身分資料、訪客的頭像影像及拜訪時間等。第二伺服器13在接收到訪客資料後,透過網路發出會議資料至第二終端裝置的應用程式。在一些實施例中,會議資料包含會議室號碼。在一些實施例中,前台端具有一報到二維碼。在一些實施例中,報到二維碼例如是QR碼。In some embodiments, the application of the first terminal device of the client sends an invitation link to the second terminal device of the visitor. For example, the client operates the application of the first terminal device to log in to the second server 13 and generate an invitation link, and transmits the invitation link to the second terminal device via the network. The second terminal device downloads the application according to the invitation link, and the visitor enters the visitor information in the second terminal device, and the second terminal device uploads the visitor information to the second server 13 through the application and the network. In some embodiments, the visitor information can be stored in a user database. In some embodiments, the visitor information includes the visitor identity information, the visitor's head image, and the visit time, etc. After receiving the visitor data, the second server 13 sends the conference data to the application of the second terminal device through the network. In some embodiments, the conference data includes the conference room number. In some embodiments, the front end has a check-in QR code. In some embodiments, the check-in QR code is, for example, a QR code.

在一些實施例中,第二伺服器13透過第二終端裝置的應用程式掃描報到二維碼以獲得報到訊息。例如,訪客的第二終端裝置的應用程式透過第二終端裝置的影像擷取裝置(例如相機)掃描報到二維碼以產生報到訊息,並將報到訊息透過網路傳輸至第二伺服器13。第二伺服器13根據訪客資料及報到訊息,判斷是否開啟保全系統20的電子設備22、23、25中的訪客閘門。具體來說,第二伺服器13比對訪客資料的訪客身分資料是否相符報到訊息,若訪客身分資料相符報到訊息,則開啟訪客閘門以供訪客進入案場從而前往目的位置(例如會議室)。若訪客身分資料不相符報到訊息,則關閉訪客閘門以拒絕訪客進入案場。In some embodiments, the second server 13 obtains the check-in message by scanning the check-in QR code through the application of the second terminal device. For example, the application of the visitor's second terminal device scans the check-in QR code through the image capture device (such as a camera) of the second terminal device to generate the check-in message, and transmits the check-in message to the second server 13 through the network. The second server 13 determines whether to open the visitor gate in the electronic devices 22, 23, and 25 of the security system 20 based on the visitor data and the check-in message. Specifically, the second server 13 compares the visitor identity data of the visitor data with the check-in message. If the visitor identity data matches the check-in message, the visitor gate is opened to allow the visitor to enter the case site and then go to the destination (such as a conference room). If the visitor identity data does not match the check-in message, the visitor gate is closed to refuse the visitor from entering the case site.

在一些實施例中,透過使用者帳戶登入而進入第三伺服器15的前台端的硬體裝置(例如電腦)可以具備影像擷取裝置(例如相機),該影像擷取裝置可以拍攝訪客的臉部以產生一待辨識人臉影像,且該硬體裝置可以透過前台端及網路將待辨識人臉影像傳輸給第三伺服器15,第三伺服器15根據訪客資料中的頭像影像及待辨識人臉影像進行人臉辨識,以產生一辨識結果,並根據辨識結果判斷是否開啟保全系統20的電子設備22、23、25中的訪客閘門。具體來說,在辨識結果是頭像影像相符於待辨識人臉影像時,則開啟訪客閘門以供訪客進入案場從而前往目的位置(例如會議室)。若辨識結果是頭像影像不相符於待辨識人臉影像,則關閉訪客閘門以拒絕訪客進入案場。In some embodiments, a hardware device (such as a computer) that enters the front-end of the third server 15 through user account login can be equipped with an image capture device (such as a camera), which can capture the face of the visitor to generate a facial image to be recognized, and the hardware device can transmit the facial image to be recognized to the third server 15 through the front-end and the network. The third server 15 performs facial recognition based on the head portrait image in the visitor data and the facial image to be recognized to generate a recognition result, and determines whether to open the visitor gate in the electronic equipment 22, 23, and 25 of the security system 20 based on the recognition result. Specifically, when the recognition result is that the head image matches the face image to be recognized, the visitor gate is opened to allow the visitor to enter the case and then go to the destination (such as a conference room). If the recognition result is that the head image does not match the face image to be recognized, the visitor gate is closed to refuse the visitor from entering the case.

在一些實施例中,在訪客閘門開啟之後,第二伺服器13經由網路發送指引資料至第二終端裝置以顯示於其應用程式。指引資料可以是如何前往目的位置的導引圖。如此,訪客依據指引資料即可前往目的位置。In some embodiments, after the visitor gate is opened, the second server 13 sends guidance data to the second terminal device via the network to display on its application. The guidance data can be a guide map of how to go to the destination. In this way, the visitor can go to the destination according to the guidance data.

在一些實施例中,監控介面包含訪客追蹤介面及訪客時限介面。訪客追蹤介面顯示訪客的當前位置及透過第二終端裝置的應用程式與訪客進行通話。舉例來說,以電子設備22、23、25包含監控攝影機為例進行說明,監控攝影機可以持續跟隨訪客並拍攝訪客以傳輸一追蹤影像至第二伺服器13。第三伺服器15可以根據追蹤影像及設備資訊顯示設定檔中的案場的相關圖資(例如地形平面圖或地形立體圖),進行影像辨識以判斷出訪客的當前位置,並將訪客的當前位置顯示於訪客追蹤介面。如此,客戶即可追蹤訪客於案場中的行進動線,以確保訪客並未迷路。在一些實施例中,追蹤影像可以是儲存於保全圖控系統10外部的其他伺服器(例如亞馬遜雲端服務),並將追蹤影像傳輸至第三伺服器15。在一些實施例中,訪客追蹤介面具有一訪客通話按鍵,案場警衛人員的第一終端裝置以使用者帳戶登入第二伺服器13並進入第三伺服器15之後,可以點選訪客通話按鍵,而與第二終端裝置建立網路通話通道,以使警衛人員及訪客可以透過網路通話通道來進行通話。In some embodiments, the monitoring interface includes a visitor tracking interface and a visitor time limit interface. The visitor tracking interface displays the current location of the visitor and communicates with the visitor through the application of the second terminal device. For example, the electronic devices 22, 23, 25 include a surveillance camera, which can continuously follow the visitor and take pictures of the visitor to transmit a tracking image to the second server 13. The third server 15 can perform image recognition to determine the visitor's current location based on the relevant map data (such as a topographical plan or a topographical stereogram) of the case in the device information display setting file based on the tracking image and the device information, and display the visitor's current location on the visitor tracking interface. In this way, the customer can track the visitor's movement line in the case to ensure that the visitor is not lost. In some embodiments, the tracking image can be stored in other servers outside the security image control system 10 (such as Amazon cloud services), and the tracking image is transmitted to the third server 15. In some embodiments, the visitor tracking interface has a visitor call button. After the first terminal device of the case security personnel logs into the second server 13 with a user account and enters the third server 15, the visitor call button can be clicked to establish an Internet call channel with the second terminal device, so that the security personnel and the visitor can communicate through the Internet call channel.

訪客時限介面根據訪客資料中的拜訪時間發出一時限通知,並供延長或縮短拜訪時間。舉例來說,第三伺服器15根據拜訪時間得知其時長,並在拜訪時間即將截止時(如拜訪時間截止的前5分鐘),第三伺服器15透過訪客時限介面發出時限通知。如此,警衛人員透過時限通知即可得知訪客即將離開案場。在一些實施例中,時限通知包含將訪客時限介面所顯示的訪客的當前位置呈現視覺化及/或聽覺化的提醒。例如,在拜訪時間即將截止時,將訪客的當前位置的標記點以黃色呈現;在拜訪時間已截止時,將訪客的當前位置的標記點以紅色呈現,且訪客時限介面發出提醒音訊。在一些實施例中,訪客時限介面具有一延長按鍵及一縮短按鍵,案場警衛人員的第一終端裝置以使用者帳戶登入第二伺服器13並進入第三伺服器15之後,可以點選延長按鍵,以延長拜訪時間的時長。在案場警衛人員點選縮短按鍵時,可以縮短拜訪時間的時長。The visitor time limit interface issues a time limit notification according to the visit time in the visitor data, and provides for extending or shortening the visit time. For example, the third server 15 learns the duration of the visit time according to the visit time, and when the visit time is about to expire (such as 5 minutes before the visit time expires), the third server 15 issues a time limit notification through the visitor time limit interface. In this way, the security personnel can know that the visitor is about to leave the case through the time limit notification. In some embodiments, the time limit notification includes a visual and/or auditory reminder of the current location of the visitor displayed on the visitor time limit interface. For example, when the visiting time is about to expire, the mark point of the visitor's current location is presented in yellow; when the visiting time has expired, the mark point of the visitor's current location is presented in red, and the visiting time limit interface sends a reminder audio message. In some embodiments, the visiting time limit interface has an extension button and a shortening button. After the first terminal device of the case security personnel logs in to the second server 13 with a user account and enters the third server 15, the extension button can be clicked to extend the duration of the visiting time. When the case security personnel clicks the shortening button, the duration of the visiting time can be shortened.

綜上所述,依據本發明之實施例,可以使客戶能夠隨時對監控介面進行操作(例如修改操作),使保全人員可以遠端地對設備資訊顯示設定檔進行編輯,及增加系統的登入安全性以減少被盜用的風險。In summary, according to the embodiments of the present invention, customers can operate the monitoring interface at any time (such as modifying operations), security personnel can remotely edit the device information display profile, and increase the login security of the system to reduce the risk of theft.

10:保全圖控系統 11:第一伺服器 13:第二伺服器 15:第三伺服器 20:保全系統 21:保全主機 22、23、25:電子設備 10: Security image control system 11: First server 13: Second server 15: Third server 20: Security system 21: Security host 22, 23, 25: Electronic equipment

[圖1]係為本發明依據一些實施例之保全圖控系統的方塊示意圖。 [圖2]係為本發明依據一些實施例之監控介面的部分示意圖。 [Figure 1] is a block diagram of a security image control system according to some embodiments of the present invention. [Figure 2] is a partial diagram of a monitoring interface according to some embodiments of the present invention.

10:保全圖控系統 10: Security image control system

11:第一伺服器 11: First server

13:第二伺服器 13: Second server

15:第三伺服器 15: Third server

20:保全系統 20: Security system

21:保全主機 21:Secure host

22、23、25:電子設備 22, 23, 25: Electronic equipment

Claims (10)

一種保全圖控系統,包含: 一第一伺服器,儲存一客戶訂閱資料及一設備配置資料,其中該設備配置資料對應一保全系統中的至少一電子設備; 一第二伺服器,連接該第一伺服器及該保全系統,以依據該客戶訂閱資料與該設備配置資料啟用該保全系統,並獲得該保全系統的一設備訊號,其中該第二伺服器具有一使用者資料庫,以驗證一管理者帳戶與一使用者帳戶之登入權限;及 一第三伺服器,連接該第二伺服器,儲存有對應該客戶訂閱資料的一設備資訊顯示設定檔,以依據該設備資訊顯示設定檔及該設備配置資料提供一監控介面,該監控介面依據該設備訊號顯示該至少一電子設備的狀態,其中該第三伺服器具有一前台端及一後台端,以供該管理者帳戶於該第二伺服器登入後進入該後台端編輯該設備資訊顯示設定檔,並供該使用者帳戶於該第二伺服器登入後進入該前台端操作該監控介面。 A security image control system, comprising: A first server, storing a customer subscription data and a device configuration data, wherein the device configuration data corresponds to at least one electronic device in a security system; A second server, connected to the first server and the security system, to activate the security system according to the customer subscription data and the device configuration data, and obtain a device signal of the security system, wherein the second server has a user database to verify the login authority of an administrator account and a user account; and A third server is connected to the second server and stores a device information display profile corresponding to the customer subscription data, so as to provide a monitoring interface according to the device information display profile and the device configuration data, and the monitoring interface displays the status of the at least one electronic device according to the device signal, wherein the third server has a front-end and a back-end, so that the administrator account can enter the back-end to edit the device information display profile after logging into the second server, and the user account can enter the front-end to operate the monitoring interface after logging into the second server. 如請求項1所述之保全圖控系統,其中,該客戶訂閱資料與該使用者帳戶相關聯,該第一伺服器中的該客戶訂閱資料被禁用後,該第二伺服器禁止該使用者帳戶登入該第三伺服器的該前台端。The security image control system as described in claim 1, wherein the customer subscription data is associated with the user account, and after the customer subscription data in the first server is disabled, the second server prohibits the user account from logging into the front-end of the third server. 如請求項1所述之保全圖控系統,其中,該前台端具有一登入二維碼,該第二伺服器於一終端裝置掃描該登入二維碼後獲得一登入訊息,該第二伺服器根據該使用者資料庫及該登入訊息驗證該使用者帳戶。The security image control system as described in claim 1, wherein the front-end has a login QR code, and the second server obtains a login message after a terminal device scans the login QR code, and the second server verifies the user account based on the user database and the login message. 如請求項1所述之保全圖控系統,其中,該第二伺服器儲存有一第一交談識別碼,在該使用者帳戶登入該前台端時,該第二伺服器從該第三伺服器獲得一第二交談識別碼,並依據該第一交談識別碼及該第二交談識別碼,判斷是否使該使用者帳戶登出該前台端。The security image control system as described in claim 1, wherein the second server stores a first conversation identification code, and when the user account logs into the front-end, the second server obtains a second conversation identification code from the third server, and determines whether to log out the user account from the front-end based on the first conversation identification code and the second conversation identification code. 如請求項1所述之保全圖控系統,其中,在該使用者帳戶登入該前台端之後且該監控介面在一時段未被操作時,該第二伺服器使該使用者帳戶登出該前台端。The security image control system as described in claim 1, wherein after the user account logs into the front-end and the monitoring interface has not been operated for a period of time, the second server causes the user account to log out of the front-end. 如請求項1所述之保全圖控系統,其中,在該管理者帳戶登入該後台端之後,該第二伺服器累計一登入時間,在該登入時間大於一時間閾值時,該第二伺服器使該管理者帳戶登出該後台端。The security image control system as described in claim 1, wherein after the administrator account logs into the backend, the second server accumulates a login time, and when the login time is greater than a time threshold, the second server logs out the administrator account from the backend. 如請求項1所述之保全圖控系統,其中,該監控介面包含一保全設定介面、一解除介面、一異常通知介面、一設備啟閉介面、一實時影像介面及一異常影像介面,其中,該保全設定介面供設定該保全系統的一保全狀態為一啟用狀態或一解除狀態;該異常通知介面響應於該設備訊號為一異常狀態時,發出一異常通知;該設備啟閉介面供控制該至少一電子設備的開啟或關閉;該實時影像介面顯示該至少一電子設備所拍攝的一實時影像;該異常影像介面顯示在該異常狀態時該至少一電子設備所拍攝的一監控錄影影像。A security image control system as described in claim 1, wherein the monitoring interface includes a security setting interface, a release interface, an abnormal notification interface, a device start-up and shutdown interface, a real-time image interface and an abnormal image interface, wherein the security setting interface is used to set a security state of the security system to an enabled state or a released state; the abnormal notification interface issues an abnormal notification when the device signal is in an abnormal state; the device start-up and shutdown interface is used to control the opening or closing of the at least one electronic device; the real-time image interface displays a real-time image taken by the at least one electronic device; and the abnormal image interface displays a surveillance video image taken by the at least one electronic device in the abnormal state. 如請求項7所述之保全圖控系統,其中,該異常影像介面還發出一警示音及標記處於該異常狀態的該電子設備。As described in claim 7, the security image control system, wherein the abnormal image interface also emits a warning sound and marks the electronic device in the abnormal state. 如請求項1所述之保全圖控系統,其中,該前台端具有一報到二維碼,該第二伺服器透過一第一終端裝置的一應用程式發送一邀請連結至一第二終端裝置,該第二終端裝置根據該邀請連結下載該應用程式並透過該應用程式上傳一訪客資料至該第二伺服器,且該第二伺服器發出一會議資料至該第二終端裝置的該應用程式; 其中,該第二伺服器透過該第二終端裝置的該應用程式掃描該報到二維碼以獲得一報到訊息,該第二伺服器根據該訪客資料及該報到訊息,判斷是否開啟該保全系統的該至少一電子設備中的一訪客閘門;或該第三伺服器透過該前台端根據從該第二伺服器獲得的該訪客資料對一訪客進行人臉辨識,以判斷是否開啟該訪客閘門; 其中,在該訪客閘門開啟之後,該第二終端裝置的該應用程式顯示一指引資料,以指引該訪客至一目的位置。 The security image control system as described in claim 1, wherein the front-end has a check-in QR code, the second server sends an invitation link to a second terminal device through an application of a first terminal device, the second terminal device downloads the application according to the invitation link and uploads visitor data to the second server through the application, and the second server sends conference data to the application of the second terminal device; The second server scans the check-in QR code through the application of the second terminal device to obtain a check-in message, and the second server determines whether to open a visitor gate in the at least one electronic device of the security system according to the visitor data and the check-in message; or the third server performs facial recognition on a visitor through the front-end according to the visitor data obtained from the second server to determine whether to open the visitor gate; After the visitor gate is opened, the application of the second terminal device displays a guide data to guide the visitor to a destination. 如請求項9所述之保全圖控系統,其中,該監控介面包含一訪客追蹤介面及一訪客時限介面,該訪客追蹤介面顯示該訪客的一當前位置及透過該第二終端裝置的該應用程式與該訪客進行通話,該訪客時限介面根據該訪客資料中的一拜訪時間發出一時限通知,並供延長或縮短該拜訪時間。A security image control system as described in claim 9, wherein the monitoring interface includes a visitor tracking interface and a visitor time limit interface, the visitor tracking interface displays a current location of the visitor and communicates with the visitor through the application of the second terminal device, and the visitor time limit interface issues a time limit notification based on a visit time in the visitor data and provides for extending or shortening the visit time.
TW111135247A 2022-09-16 Security graphic control system TW202414250A (en)

Publications (1)

Publication Number Publication Date
TW202414250A true TW202414250A (en) 2024-04-01

Family

ID=

Similar Documents

Publication Publication Date Title
US10559193B2 (en) Premises management systems
US9300921B2 (en) Video security systems and methods
US8520068B2 (en) Video security system
US7015806B2 (en) Distributed monitoring for a video security system
US11373495B2 (en) Supervising property access with portable camera
AU2019295856B2 (en) Object tracking using disparate monitoring systems
WO2016150045A1 (en) Housebreaking alarm method and device
US20200211346A1 (en) Sharing video stream during an alarm event
US20130329047A1 (en) Escort security surveillance system
US10891492B2 (en) Method and a system for providing privacy enabled surveillance in a building
US20120200711A1 (en) System and method for integrated surveillance and event notification
US8942990B2 (en) Return fraud protection system
KR20150018037A (en) System for monitoring and method for monitoring using the same
US9230373B2 (en) System and method to aggregate control of multiple devices via multicast messages and automatic set up of connections
CN113223222A (en) Intelligent monitoring system for industrial pollution source
US9183735B1 (en) Methods and systems for remote management of security systems
TW202414250A (en) Security graphic control system
TWM635530U (en) Security graphic control system
JP2001357012A (en) Illegal network access preventing system