TWI539408B - Cloud security identifying system - Google Patents

Cloud security identifying system Download PDF

Info

Publication number
TWI539408B
TWI539408B TW103129110A TW103129110A TWI539408B TW I539408 B TWI539408 B TW I539408B TW 103129110 A TW103129110 A TW 103129110A TW 103129110 A TW103129110 A TW 103129110A TW I539408 B TWI539408 B TW I539408B
Authority
TW
Taiwan
Prior art keywords
security
identification
identification data
host
employee
Prior art date
Application number
TW103129110A
Other languages
Chinese (zh)
Other versions
TW201608527A (en
Inventor
張俊元
李榮貴
王志強
王中玉
林家弘
Original Assignee
中興保全股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中興保全股份有限公司 filed Critical 中興保全股份有限公司
Priority to TW103129110A priority Critical patent/TWI539408B/en
Priority to CN201410449058.4A priority patent/CN105469459A/en
Priority to JP2014193872A priority patent/JP5941957B2/en
Priority to KR1020140134884A priority patent/KR20160023516A/en
Publication of TW201608527A publication Critical patent/TW201608527A/en
Application granted granted Critical
Publication of TWI539408B publication Critical patent/TWI539408B/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/215Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/29Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards

Description

雲端保全辨識系統Cloud Security Identification System

本發明提供一種保全系統,特別是一種雲端保全辨識系統。 The invention provides a security system, in particular a cloud security identification system.

坊間多數社區、辦公大樓及營業場所為了要保障其內部人員及財產的安全,多半會設置保全系統以及保全員工,藉以透過保全系統的偵測以及保全員工的監控,以保障社區、辦公大樓或營業場所的安危,以免宵小或強盜入侵等不法情形發生。 In order to protect the safety of its internal staff and property, most communities, office buildings and business premises in the community will mostly set up a security system and security staff to protect the community, office building or business through the detection of the security system and the monitoring of the security staff. The safety of the place, so as not to cause small or robbery invasions and other illegal circumstances.

一般連線型保全服務的作業中,當管制中心收到保全主機傳送的異常信號時,管制員會先派遣客戶附近的保全員到達現場處理。當保全員到達客戶現場處理時,會先於保全系統上刷巡迴卡進入巡迴主狀態後,再進入防護區處理,如此一來即不會觸動警鈴裝置。然而對於龐大的客戶群來說,為了避免卡號重覆的安全考量,通常都會用不同的系統碼卡號來區分不同的客戶,以方便卡片管理。 In the operation of the general-line security service, when the control center receives the abnormal signal transmitted by the security host, the controller will dispatch the security guard near the customer to the site for processing. When the security guard arrives at the customer site for processing, the tour card will be swiped into the tour master state before the security system, and then enter the protection zone, so that the alarm device will not be touched. However, for a large customer base, in order to avoid the repeated safety considerations of the card number, different system code card numbers are usually used to distinguish different customers to facilitate card management.

巡迴卡的管理通常是將每個客戶的巡迴卡及鑰匙(有交鑰匙的客戶)分類置於勤務區的勤務車後車箱內。此外。更另有一份備份放於勤務點幹部辦公室,每日對於卡片的清點與管理相當費時,並且一大箱巡迴卡及鑰匙置於後車箱也相當笨重。 The management of the tour card is usually to classify each customer's tour card and key (turnkey customers) into the service car trunk of the service area. Also. Another copy is placed in the cadre office of the service point. The daily inventory and management of the card is quite time-consuming, and a large box of tour cards and keys are placed in the rear box.

因此,如何在傳統的巡迴卡模式中,取得更有效及省時方便的管理,係為本案之發明人以及從事此相關行業之技術領域者亟欲改善的課題。 Therefore, how to obtain more effective and time-saving and convenient management in the traditional tour card mode is an issue that the inventor of the case and the technical field engaged in this related industry want to improve.

有鑑於此,本發明提出一種雲端保全辨識系統,包含:管制中心,用以儲存識別資料;保全主機,連接於該管制中心,用以執行基本保全功能;感知器,連接於保全主機,用以偵測異常事件,當偵測異常事件時,保全主機回報異常事件至管制中心,並自管制中心下載識別資料;及辨識模組,連接於保全主機,用以讀取保全資訊,當保全資訊與下載之識別資料相符合時,保全主機設定為巡迴模式。 In view of this, the present invention provides a cloud security identification system, including: a control center for storing identification data; a security host connected to the control center for performing a basic security function; and a sensor connected to the security host for Detecting an abnormal event, when detecting an abnormal event, the security host returns an abnormal event to the control center, and downloads the identification data from the control center; and the identification module is connected to the security host to read the security information, when the security information is When the downloaded identification data matches, the security host is set to the tour mode.

其中,本發明更包含電子鎖,連接於保全主機,當保全資訊與識別資料相符合時,電子鎖執行解鎖動作。 Wherein, the invention further comprises an electronic lock connected to the security host, and when the security information matches the identification data, the electronic lock performs an unlocking action.

此外,管制中心更包含考勤系統,用以登入並紀錄出勤狀況。其中,保全主機自管制中心下載之識別資料,出勤狀況為已登入。再者,前述之識別資料或保全資訊更包含員工卡號或生物識別特徵。 In addition, the control center also includes an attendance system to log in and record attendance. Among them, the protection host downloads the identification data from the control center, and the attendance status is already logged in. Furthermore, the aforementioned identification data or security information further includes an employee card number or a biometric feature.

再者,保全主機更包含一計時模組,當該保全主機自該管制中心下載該識別資料後,於一第一特定時間結束後,該辨識模組未讀取該保全資訊,則該保全主機刪除下載之該識別資料。於該第一特定時間內,該辨識模組已讀取一使用者資訊,則該保全主機刪除下載之該識別資料。 Furthermore, the security host further includes a timing module. After the security host downloads the identification data from the control center, after the first specific time is over, the identification module does not read the security information, and the security host Delete the identification information downloaded. During the first specific time, the identification module has read a user information, and the security host deletes the downloaded identification data.

此外,於該第一特定時間內,該辨識模組讀取該保全資訊,且該保全資訊與下載之該識別資料相符合時,該計時模組啟動一第 二特定時間計時。該保全主機於該第二特定時間結束後,刪除下載之該識別資料。 In addition, during the first specific time, the identification module reads the security information, and when the security information matches the downloaded identification data, the timing module starts a first Two specific time periods. The security host deletes the downloaded identification data after the second specific time ends.

其中,於該第二特定時間內,該辨識模組再次讀取該保全資訊,則該保全主機刪除下載之該識別資料,且啟動一警戒狀態。 In the second specific time, the identification module reads the security information again, and the security host deletes the downloaded identification data and starts an alert state.

以下在實施方式中詳細敘述本發明之詳細特徵及優點,其內容足以使任何熟習相關技藝者瞭解本發明之技術內容並據以實施,且根據本說明書所揭露之內容、申請專利範圍及圖式,任何熟習相關技藝者可輕易地理解本發明相關之目的及優點。 The detailed features and advantages of the present invention are described in detail in the embodiments of the present invention. The objects and advantages associated with the present invention can be readily understood by those skilled in the art.

10‧‧‧管制中心 10‧‧‧Control Center

11‧‧‧識別資料 11‧‧‧ Identification data

12‧‧‧考勤系統 12‧‧‧Attendance System

20‧‧‧保全主機 20‧‧‧Security host

21‧‧‧計時模組 21‧‧‧Timekeeping Module

30‧‧‧感知器 30‧‧‧ Sensor

40‧‧‧辨識模組 40‧‧‧ Identification Module

50‧‧‧電子鎖 50‧‧‧Electronic lock

[第1圖]係本發明雲端保全辨識系統之示意圖。 [Fig. 1] is a schematic diagram of the cloud security identification system of the present invention.

[第2圖]係本發明管制中心之示意圖。 [Fig. 2] is a schematic view of the control center of the present invention.

[第3圖]係本發明雲端保全辨識系統另依實施例之示意圖。 [Fig. 3] is a schematic diagram of another embodiment of the cloud preservation identification system of the present invention.

[第4圖]係本發明保全主機之示意圖。 [Fig. 4] is a schematic diagram of the security host of the present invention.

請參閱第1圖,第1圖為本發明雲端保全辨識系統之示意圖。本發明之雲端保全辨識系統,包含管制中心10、保全主機20、感知器30及辨識模組40。 Please refer to FIG. 1 , which is a schematic diagram of a cloud security identification system according to the present invention. The cloud security identification system of the present invention comprises a control center 10, a security host 20, a sensor 30 and an identification module 40.

請參閱第2圖,第2圖為本發明管制中心之示意圖。管制中心10較佳地係位於遠端之中控電腦主機,用以接收各地回傳之資料,例如,異常事件之發報。以本發明而言,管制中心10係儲存有識別資料11,其中,識別資料11較佳地為保全公司員工之員工卡號,或是員工之個人 生物識別特徵,例如,員工之個人虹膜辨識資料、指紋辨識資料、人臉辨識資料或是指靜脈辨識資料。 Please refer to FIG. 2, which is a schematic view of the control center of the present invention. The control center 10 is preferably located at a remote central control computer host for receiving data returned from various places, for example, an abnormal event. For the purposes of the present invention, the control center 10 stores identification data 11 which is preferably the employee card number of the employee of the company or the individual of the employee. Biometric features, such as personal iris identification data, fingerprint identification data, face recognition data, or finger vein identification data.

基此,管制中心10更具有考勤系統12,用以使員工利用個人之保全資訊登入並記錄出勤狀況。保全資訊較佳地為保全公司員工之員工卡號,或是員工之個人生物識別特徵,例如,員工之個人虹膜辨識資料、指紋辨識資料、人臉辨識資料或是指靜脈辨識資料。當員工出示保全資訊於考勤系統12登入時,管制中心10把登入之員工保全資訊與儲存之識別資料11作檢視,若資料相符時,此員工之識別資料11設定為已登入。 Accordingly, the control center 10 further has an attendance system 12 for enabling employees to log in and record attendance status using personal security information. The preservation information is preferably the employee card number of the employee of the company or the personal biometric characteristics of the employee, for example, the employee's personal iris identification data, fingerprint identification data, face recognition data or finger vein identification data. When the employee presents the security information to the attendance system 12, the control center 10 checks the registered employee security information and the stored identification data 11. If the data matches, the employee identification data 11 is set to be logged in.

再請參閱第1圖,保全主機20連接於管制中心10,其係用已執行基本之保全功能,較佳地可透過有線通訊方式,例如RS485、RS232、USB、乙太網路等,或無線通訊模式,例如,射頻、無線網路、ZigBee、Zwave、藍牙、近場通訊(NFC)或其他等無線之通訊協定連接於管制中心10,但本發明並非以此為限。 Referring again to FIG. 1, the security host 20 is connected to the control center 10, which is implemented with a basic security function, preferably via wired communication, such as RS485, RS232, USB, Ethernet, etc., or wireless. The communication mode, for example, radio frequency, wireless network, ZigBee, Zwave, Bluetooth, Near Field Communication (NFC) or other wireless communication protocol is connected to the control center 10, but the invention is not limited thereto.

感知器30係連接於保全主機20,用以偵測異常事件。感知器30較佳地可為煙霧偵測器、火災偵測器、窗戶振動偵測器、一氧化碳偵測器、二氧化碳偵測器、紅外線偵測器、影像監視器、異物偵測器、監控攝影機、窗戶開啟監控器等,但本發明並非以此為限。當感知器30偵測到異常事件時,保全主機20將回報此異常事件至管制中心10,同時,保全主機20自管制中心10下載員工之識別資料11。以本發明而言,下載之員工識別資料11較佳地為考勤系統12設定為已登入之識別資料11。並且由管制中心10提供離異常事件地點較近之員工之識別資料11 下載至保全主機20,同時管制中心10派遣該名員工前往異常事件地點。 The sensor 30 is connected to the security host 20 for detecting an abnormal event. The sensor 30 is preferably a smoke detector, a fire detector, a window vibration detector, a carbon monoxide detector, a carbon dioxide detector, an infrared detector, an image monitor, a foreign object detector, and a surveillance camera. The window opens the monitor, etc., but the invention is not limited thereto. When the sensor 30 detects an abnormal event, the security host 20 will report the abnormal event to the control center 10, and at the same time, the security host 20 downloads the employee identification data 11 from the control center 10. For the purposes of the present invention, the downloaded employee identification data 11 is preferably set to the attendance system 11 as the entered identification data 11. And the identification information of the employees who are close to the location of the abnormal event is provided by the control center 10 Download to the security host 20, and the control center 10 dispatches the employee to the location of the abnormal event.

辨識模組40係連接於保全主機20,用以讀取保全資訊。辨識模組40較佳地可為讀卡機或生物特徵辨識機,但本發明並非以此為限。當管制中心10派遣之保全員工到達異常事件地點後,保全員工可出示個人之保全資訊(內容如前所述),若保全資訊與保全主機20所下載之識別資料11相符合,則保全主機20設定為巡迴模式,巡迴模式則是保全員工巡迴各用戶檢查設備時可使用的特殊狀態。在巡迴狀態下,感知器30同樣會被禁能,以避免保全員工誤觸警報,進入巡迴狀態可讓管制中心10知道有保全員工在用戶端,避免保全員工監守自盜之情事發生。 The identification module 40 is connected to the security host 20 for reading security information. The identification module 40 is preferably a card reader or a biometric identifier, but the invention is not limited thereto. After the security staff dispatched by the control center 10 arrives at the abnormal event location, the security employee can present the personal security information (the content is as described above). If the security information matches the identification data 11 downloaded by the security host 20, the security host 20 is secured. Set to the patrol mode, the patrol mode is a special state that can be used when the employee patrols the user to check the device. In the patrolling state, the sensor 30 will also be disabled to prevent the security staff from accidentally touching the alarm. The patrol state allows the control center 10 to know that there is a security employee at the user end, and to prevent the employee from being arrested for self-stealing.

請參閱第3圖,第3圖為本發明雲端保全辨識系統另依實施例之示意圖。本實施例中,雲端保全辨識系統更包含電子鎖50,連接於保全主機20,當保全資訊與識別資料11相符合時,電子鎖50執行解鎖動作,使得保全員工得以進入異常事件地點檢查詳細發生狀況。 Please refer to FIG. 3, which is a schematic diagram of another embodiment of the cloud security identification system according to the present invention. In this embodiment, the cloud security identification system further includes an electronic lock 50 connected to the security host 20. When the security information matches the identification data 11, the electronic lock 50 performs an unlocking action, so that the security employee can enter the abnormal event location to check the detailed occurrence. situation.

請參閱第4圖,第4圖為本發明保全主機之示意圖。保全主機20更具有計時模組21,計時模組21較佳地為計時器,當異常事件發生,保全主機20至管制中心10下載識別資料11後,計時模組21即啟動第一特定時間計時,例如,此第一特定時間設定為30分鐘,當30分鐘過後,辨識模組40仍未讀取到保全員工之保全資訊,則保全主機20將刪除所下載之識別資料11。即使30分鐘後保全員工到達,並出示保全資訊,保全員工仍無法順利進入異常事件發生點。 Please refer to FIG. 4, which is a schematic diagram of the security host of the present invention. The maintenance module 20 further has a timing module 21, and the timing module 21 is preferably a timer. When an abnormal event occurs, the security module 20 downloads the identification data 11 from the control center 10, and the timing module 21 starts the first specific time timing. For example, the first specific time is set to 30 minutes. After the 30 minutes, the identification module 40 still does not read the security information of the security employee, and the security host 20 deletes the downloaded identification data 11. Even after 30 minutes, the security staff arrived and presented the security information, and the security staff could not smoothly enter the incident.

基此,若客戶比保全員工早到達異常事件發生點,當辨識模組40讀取到客戶之使用者資訊,則保全主機20將刪除所下載之識別資 料11。即使第一特定時間內保全員工到達,並出示保全資訊,保全員工仍無法順利進入異常事件發生點。為前所述之使用者資訊,較佳地可為使用者之個人卡、密碼或個人生物特徵,但本發明並非以此為限。 Based on this, if the customer arrives at the abnormal event occurrence point earlier than the security employee, when the identification module 40 reads the user information of the customer, the security host 20 deletes the downloaded identification resource. Material 11. Even if the security employee arrives at the first specific time and presents the security information, the security employee will not be able to successfully enter the abnormal event. The user information described above may preferably be a user's personal card, password or personal biometric, but the invention is not limited thereto.

再者,若保全員工第一特定時間內到達異常事件發生點,並且出示之保全資訊與保全主機20所下載之識別資料11相符合時,計時模組21將啟動第二特定時間計時。此第二特定時間計時係指保全員工在異常事件發生點排除狀況之處理時間,例如,第二特定時間為一小時,亦即保全員工有一小時時間排除異常事件狀況。於第二特定時間計時結束後,保全主機20將刪除所下載之識別資料11,保全員工無法再次進入異常事件發生點。 Moreover, if the security employee arrives at the abnormal event occurrence point in the first specific time, and the security information presented meets the identification data 11 downloaded by the security host 20, the timing module 21 starts the second specific time counting. The second specific time count refers to the processing time for the employee to exclude the abnormal event occurrence point. For example, the second specific time is one hour, that is, the security employee has one hour to exclude the abnormal event condition. After the second specific time period is over, the security host 20 will delete the downloaded identification data 11 and the security employee cannot enter the abnormal event occurrence point again.

若於第二特定時間內,保全員工即把異常事件狀況排除,則保全員工將再次出示保全資訊,當辨識模組40於第二特定時間內讀取到保全資訊時,代表異常已排除,保全主機20將刪除所下載之識別資料11,並同時啟動警戒狀態,回復並執行保全功能。 If the maintenance employee excludes the abnormal event condition within the second specific time, the security employee will present the security information again. When the identification module 40 reads the security information in the second specific time, the representative abnormality has been excluded, and the security is excluded. The host 20 will delete the downloaded identification data 11 and simultaneously activate the alert state, replying and executing the security function.

本發明藉由管制中心之識別資料,配合客戶端之辨識模組讀取保全資訊,以保全員工之保全資訊取代習知之巡迴卡,解決巡迴卡清點、管理不便及費時的問題。 The invention uses the identification data of the control center to read the security information with the identification module of the client, and replaces the security information of the employee with the security information of the employee to solve the problem of inventory check, management inconvenience and time consuming.

雖然本發明的技術內容已經以較佳實施例揭露如上,然其並非用以限定本發明,任何熟習此技藝者,在不脫離本發明之精神所作些許之更動與潤飾,皆應涵蓋於本發明的範疇內,因此本發明之保護範圍當視後附之申請專利範圍所界定者為準。 Although the technical content of the present invention has been disclosed in the above preferred embodiments, it is not intended to limit the present invention, and any modifications and refinements made by those skilled in the art without departing from the spirit of the present invention are encompassed by the present invention. The scope of protection of the present invention is therefore defined by the scope of the appended claims.

10‧‧‧管制中心 10‧‧‧Control Center

20‧‧‧保全主機 20‧‧‧Security host

30‧‧‧感知器 30‧‧‧ Sensor

40‧‧‧辨識模組 40‧‧‧ Identification Module

Claims (11)

一種雲端保全辨識系統,包含:一管制中心,用以儲存一識別資料,其中該識別資料為執勤中的保全員工的識別資料;一保全主機,連接於該管制中心,用以執行基本保全功能;一感知器,連接於該保全主機,用以偵測一異常事件,當偵測該異常事件時,該保全主機回報該異常事件至該管制中心,並自該管制中心下載該識別資料;及一辨識模組,連接於該保全主機,用以讀取一保全資訊,當該保全資訊與下載之該識別資料相符合時,該保全主機設定為一巡迴模式。 A cloud security identification system includes: a control center for storing an identification data, wherein the identification data is identification data of a security employee on duty; and a security host connected to the control center for performing a basic security function; a sensor connected to the security host for detecting an abnormal event. When detecting the abnormal event, the security host reports the abnormal event to the control center, and downloads the identification data from the control center; The identification module is connected to the security host for reading a security information. When the security information is consistent with the downloaded identification data, the security host is set to a tour mode. 如請求項1所述之雲端保全辨識系統,更包含一電子鎖,連接於該保全主機,當該保全資訊與該識別資料相符合時,該電子鎖執行一解鎖動作。 The cloud security identification system according to claim 1 further includes an electronic lock connected to the security host, and when the security information matches the identification data, the electronic lock performs an unlocking action. 如請求項1所述之雲端保全辨識系統,其中該管制中心更包含一考勤系統,係用以提供保全員工登入並紀錄一出勤狀況,其中執勤中的保全員工的識別資料為已登入的識別資料。 The cloud security identification system according to claim 1, wherein the control center further comprises an attendance system for providing a security employee login and recording an attendance status, wherein the identification information of the security employee on duty is the logged-in identification data. . 如請求項1或3所述之雲端保全辨識系統,其中該識別資料為離異常事件地點較近之保全員工的識別資料。 The cloud security identification system according to claim 1 or 3, wherein the identification data is identification data of a security employee that is closer to an abnormal event location. 如請求項1所述之雲端保全辨識系統,其中該識別資料更包含一員工卡號或一生物識別特徵。 The cloud security identification system of claim 1, wherein the identification data further comprises an employee card number or a biometric feature. 如請求項1所述之雲端保全辨識系統,其中該保全資訊更包含一員工卡號或一生物識別特徵。 The cloud security identification system of claim 1, wherein the security information further comprises an employee card number or a biometric feature. 如請求項1所述之雲端保全辨識系統,其中該保全主機更包含一計時模組,當該保全主機自該管制中心下載該識別資料後,於一第一特定時間結束後,該辨識模組未讀取該保全資訊,則該保全主機刪除下載之該識別資料。 The cloud security identification system of claim 1, wherein the security host further comprises a timing module, and after the security host downloads the identification data from the control center, the identification module is finished after a first specific time If the security information is not read, the security host deletes the downloaded identification data. 如請求項7所述之雲端保全辨識系統,其中於該第一特定時間內,該辨識模組已讀取一使用者資訊,則該保全主機刪除下載之該識別資料。 The cloud security identification system of claim 7, wherein the identification module has read a user information during the first specific time, and the security host deletes the downloaded identification data. 如請求項7所述之雲端保全辨識系統,其中於該第一特定時間內,該辨識模組讀取該保全資訊,且該保全資訊與下載之該識別資料相符合時,該計時模組啟動一第二特定時間計時。 The cloud security identification system of claim 7, wherein the identification module reads the security information during the first specific time, and the timing module starts when the security information matches the downloaded identification data. A second specific time is counted. 如請求項9所述之雲端保全辨識系統,其中該保全主機於該第二特定時間結束後,刪除下載之該識別資料。 The cloud security identification system of claim 9, wherein the security host deletes the downloaded identification data after the second specific time ends. 如請求項9所述之雲端保全辨識系統,其中於該第二特定時間內,該辨識模組再次讀取該保全資訊,則該保全主機刪除下載之該識別資料,且啟動一警戒狀態。The cloud security identification system of claim 9, wherein the identification module reads the security information again during the second specific time, the security host deletes the downloaded identification data, and initiates an alert state.
TW103129110A 2014-08-22 2014-08-22 Cloud security identifying system TWI539408B (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
TW103129110A TWI539408B (en) 2014-08-22 2014-08-22 Cloud security identifying system
CN201410449058.4A CN105469459A (en) 2014-08-22 2014-09-04 Cloud security identification system
JP2014193872A JP5941957B2 (en) 2014-08-22 2014-09-24 Cloud type security authentication system
KR1020140134884A KR20160023516A (en) 2014-08-22 2014-10-07 Cloud security identifying system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW103129110A TWI539408B (en) 2014-08-22 2014-08-22 Cloud security identifying system

Publications (2)

Publication Number Publication Date
TW201608527A TW201608527A (en) 2016-03-01
TWI539408B true TWI539408B (en) 2016-06-21

Family

ID=55535487

Family Applications (1)

Application Number Title Priority Date Filing Date
TW103129110A TWI539408B (en) 2014-08-22 2014-08-22 Cloud security identifying system

Country Status (4)

Country Link
JP (1) JP5941957B2 (en)
KR (1) KR20160023516A (en)
CN (1) CN105469459A (en)
TW (1) TWI539408B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110276858A (en) * 2018-03-13 2019-09-24 新谊整合科技股份有限公司 Save setting device, safety system and method from damage
JP7300622B2 (en) * 2018-12-27 2023-06-30 パナソニックIpマネジメント株式会社 Control system and information processing system
WO2021084612A1 (en) * 2019-10-29 2021-05-06 株式会社 テクノミライ Digital safety response security system, method, and program

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3312335B2 (en) * 1999-07-30 2002-08-05 株式会社コムスクエア User authentication method, user authentication system and recording medium
JP4115273B2 (en) * 2002-12-27 2008-07-09 綜合警備保障株式会社 Monitoring method and monitoring system
JP2006107484A (en) * 2004-09-13 2006-04-20 Toshin:Kk Method for detecting and repairing glass member destruction
JP2008040937A (en) * 2006-08-09 2008-02-21 Nikon Corp Monitoring system in facility
JP4863521B2 (en) * 2008-06-30 2012-01-25 東芝エレベータ株式会社 Elevator maintenance management system
JP2010079669A (en) * 2008-09-26 2010-04-08 Hitachi Kokusai Electric Inc Radio communication system for security
CN103092145B (en) * 2011-11-08 2014-09-24 云辰电子开发股份有限公司 Property management method and management system
JP6144897B2 (en) * 2012-11-16 2017-06-07 セコム株式会社 COMMUNICATION DEVICE, COMMUNICATION SYSTEM, AND RADIO DEVICE DETECTING PROGRAM
JP6096484B2 (en) * 2012-11-22 2017-03-15 セコム株式会社 COMMUNICATION SYSTEM, COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
CN203415000U (en) * 2013-06-27 2014-01-29 台湾新光保全股份有限公司 Integral type security guard host and guard attendance and dispatching management system using the host

Also Published As

Publication number Publication date
KR20160023516A (en) 2016-03-03
TW201608527A (en) 2016-03-01
JP2016045925A (en) 2016-04-04
JP5941957B2 (en) 2016-06-29
CN105469459A (en) 2016-04-06

Similar Documents

Publication Publication Date Title
US11341794B2 (en) Unattended touchless health-check screening systems incorporating biometrics and thermographic technologies
US7907753B2 (en) Access control system with symbol recognition
CA2729193C (en) Access control system based upon behavioral patterns
US9652953B2 (en) Surveillance of a secure area
US20110050875A1 (en) Method and apparatus for detecting behavior in a monitoring system
JP6095731B2 (en) Electronic tag security device
TWM527479U (en) Intellectual entry system
TWI539408B (en) Cloud security identifying system
EP3828759A1 (en) Asset tracking and notification processing
JP2020038456A (en) Entry/exit management system
TWI620086B (en) Permission-rating visual-surveillance system
KR20150112635A (en) Doorlock system
JP2006120084A5 (en)
RU172497U1 (en) BIOMETRIC ACCESS RESTRICTION DEVICE
CN105139502A (en) Intelligent material evidence access control system
JP2007072808A (en) Security system, malfunction prevention method, and malfunction prevention program
TWI599991B (en) Intelligent access control system
US20160303575A1 (en) Recordable media destruction system and method
KR200483521Y1 (en) Cloud security identifying system
Rajkumar et al. Visitor Monitoring System Using Raspberry PI and PI Camera
Silva A new level of Biometric Technology Solutions
CN115497207A (en) Access control system
TWM446460U (en) Transmit device using network
TW201351947A (en) Message transmitting device using network