_型說明: 【新型所屬之技術領域】 本_有_保全巡邏管理’特別是關於—種可紀錄保全 人貝巡邏資訊之保全巡邏資料紀錄裴置。 【先前技術】 保全勤務的業務通常分為兩種型態。一 =1全^藝全巡勒務,例如—個 义人囊ii的型態’會設置多個巡邏點,而由駐守的5 王人貝依據排班,進行常態性的巡邏。 ’、 器雜置感知 勤務也僅有隨機或不定時的巡^務有而 駐二而巡邏 非針對_住家進行監控,而是勤務也並 發出警科,能有保全人員迅速趕往現場王。用戶_保全系統 行巡ΐίί:下用可;if求對其住家進 簽到,而提升安全性,或在事^ ^透過保全人員的巡邏 ^邏心人士可 單—客戶並且於之=機,邏方式,其亦只適用於 於不特定客戶、時間、路、‘,’c點路線上巡邏,對 而無法發揮保全該有之功效。於叫性任務均不適用。因 f新型内容】 M430637 先前技術中,保全人昌、n一,丨—s Α 邏意義。鑑於上述問題容易遺失或造假,失去巡 置,可紀錄保全人出一種保全巡邏資料紀騎 置,t=二的戶端本:提邏資料紀錄裝 至一巡邏資料記錄伺===== 包含一讀卡機及一保全主機。 璉貝枓紀錄裝置 讀卡機驗讀喊_保全卡之酬資料。 於保全主機,且保全主其K機電連接 於本創作一或複數個實施例中 包含一顯示單元,連接於貧料紀錄裝置更 元產生-操作書面,用以’二王機用以驅動顯示單 邏資料記制服器匯】自該巡 :畫面。保全_動該顯示單元顯 ^ ϋ透過-嶋網路發送電子郵^=貧料記 一指定接收者。巡邏資料記錄伺服器二二=貝料兄錄至 以簡訊發送巡邏資料記錄至一指定^收者。仃動通訊網路發送 透過保全巡邏資料紀錄裝置,保 卡之識別資料,並紀錄保全人員之 ^接收巡邏用保全 ,時間匯整成巡邏記錄,並上傳巡資料及 服斋存槽,因而解決習知,保全人員料記錄飼 之情況發生,並且使用客戶亦能時時觀看失或造假 4 點,^2細敘述本創狀詳細特徵以及優 並據以麵,錄據本!^=技#者雜本難之技術内容 圖式,^孰之内容、帽專利範圍及 優點。’‘、胃技差者可輕易地理解本創作相關之目的及 【實施方式】 全巡紀不’為本創作實施例所揭露之一種保 2〇ί保上⑽,並上傳至―巡邏資料記錄伺服器 400。’、王^"貝料紀錄裝置包含一讀卡機300及保全主機 或』二2圖」田所示’讀卡機300設置於保全客戶端之大門 t 讀取巡邏用保全卡之識別資料⑽。當保 示到、f保勤務’並依據巡邏路線後端控制中心的指 接卡機:二,’保全人員透過所攜帶之巡邏用保全卡與 Γοο,而#彳^感應,使得讀卡機_讀轉全卡之識別資料 間,以供後機400記錄保全人員到此一保全客戶端的時 巡邏主機働糊保全人員到此^全客戶端 伴入,與讀卡機_ ^配套_置於保全客戶端。 連i至伴入主^η執行一基本保全功能;其中讀卡機綱電性 ,,至保王主機侧’且當讀卡機3GG讀取巡邏用保全卡之識 保全^權接收該巡邏用保全卡之識別資料 ⑼該讀卡機300讀取保全卡之識別資料100之 跡,Ik即被保全主機棚紀錄為—刷卡時間。再者,保全 =別,100以及此所紀錄之刷卡時間 二 二進行儲存,而保全主機 吁、。己錄至巡避貝枓s己錄伺服器2〇〇,使巡邏資料 M430637 記錄伺服器200進行存檔。 基此,對於保全客戶端的使用者而言,可直接透過保全主 機棚直接劉覽巡邏紀錄,以確認保全人員到此地巡視的頻率 ^確切時間點。使用者亦可透過其他電子襄置,例如電腦或是 機’直接與巡邏資料記錄伺服器20Q連結,而瀏覽巡邏 錄’或是巡邏記錄之歷史資料。 、 全巡所示’為本創作另一實施例所揭露之保 =此實施例中,保全巡邏資料紀錄裝置更可包含—顯 二500。顯示單元_連接於保全 顯示單元500產生一操作畫面51〇,使用= 透過刼作畫面510而瀏覽保全人員之巡邏紀錄。 服器测可經設定發送巡邏紀錄至 咬—ί記錄恤器通常連接於連接有—有線網路 ^ "^:^錄^200可透過一網際網路之 料記_服器發送作巡邏資 巡,資料記錄飼服器200村透過行動通訊網路 ====接收者保全用‘ ^惟前述之行動通訊網路較佳地可由^ 接收 訊,行動通訊網路包含第三代流動通訊技術忿 6 ίΐϊΖΓ (3.5G),利用3G或3.5G等既有之通訊方式,為 J这僅為舉例,本創作並非以此為限。 全巡ί:二^所示’為本創作又—實施例所揭露之保 200,=&例中’保全主機棚連接於巡邏資料記錄伺服器 ^斗^ 巡邏記錄之歷史龍。#巡邏用保全卡之識別 及此所紀錄之刷+時間匯整成的巡邏記錄,被上傳 至巡邏資料記錄伺服器2⑼存槽之後,這些資料J 保存麵邏:雜記·縣2⑽成 ί之自巡邏資料記錄祠服器200中匯出所有之巡邏記 ,同時,保全主機_驅動顯示單元_之資料 邏記以顯示自巡邏資料記錄伺服器200匯出之巡 保全保全人員每次巡邏時,透過讀卡機咖讀取 為-刷卡S王:ί識別貧料100,隨㈣皮保全主機働紀錄 刷卡時間,即匯整成-巡邏記錄,並上傳巡邏 記錄词服器200存檀,而每-次巡邏之紀錄存料 f ’因而產生巡邏記錄之敎資料。面不^ 即可顯不該些巡邏記錄之歷史資料。 里面520, 裝置IS圖第4圖」所示,為本創作實施保全巡邏資料紀錄 求,ΐ可向保全公司管制中心提出巡邏要 上,即保全公司官制中心立即人原派遣機動保=要 王貝則馬上抵達客戶端執行巡邏。機動保 宏機動保 =機讀取保全人員之保全^^時, t ,、王主機棚發达一保全信號回報至保全公司管制中心此 並且保全卡之識別資料】加 一巡邏記錄,ϋ上傳巡邏 之刷切間匯整成 棺。此時,使用者可直接^^邏機==服器存 料,巡·料見巡邏紀錄或是巡邏記錄之歷史資 方式發㈣雛叫子料、簡^ 遺失或造吻耐料容易 錄,因而增進使用上之便利性。各戶亦_時規看其巡邏紀 戶 任何熟f此技藝者,在不脫離本創==申 二咩動與潤飾,皆應涵蓋於本創作的範疇内,ί 1乍之保護範圍當視後附之申請專利範圍所界定者為準 乍的技術内容已經以較佳實施例揭露如上,然其並非_ Type Description: [New technical field] This _ has _ patrol management ‘, especially regarding the recordable security patrol information for the preservation of patrol data records. [Prior Art] The service of the maintenance service is usually divided into two types. A =1 full ^ art tour, for example - a type of genius ii ii will set up multiple patrol points, and the resident 5 kings are scheduled to perform regular patrols. ‘ 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 User_Security System Tour ΐίί: Use under; if you want to sign in to your home, and improve security, or in the event ^ ^ through the security personnel patrol ^ Logic people can be single - customers and in the machine, logic In this way, it is only applicable to patrols on non-customer, time, road, ', 'c point routes, and it is impossible to play the role of preservation. Not for sexual tasks. Because f new content] M430637 In the prior art, the preservation person Chang, n one, 丨-s Α logical meaning. In view of the above problems, it is easy to lose or falsify, and if the patrol is lost, the security guard can record a patrol data for the patrol, and the account of t=2: the patrol data record is loaded into a patrol data record. ===== A card reader and a security host.琏 枓 枓 枓 读 读 读 读 读 读 读 _ _ _ _ _ _ _ _ _ In order to protect the host, and to maintain the main K-electromechanical connection to the creation of one or a plurality of embodiments including a display unit, connected to the poor material recording device to generate more - operation written for the 'two king machine to drive the display list Logic data book uniforms sink] from the tour: screen. Security _ Move the display unit to display ^ 嶋 ϋ 嶋 发送 = = = = = = = = = = = = = = = = = = Patrol data record server 22 = Bei Cai Xiong to send a patrol data record to a designated receiver. Inciting the communication network to send the identification data through the security patrol data recording device, the security card, and record the security personnel to receive the patrol security, the time is consolidated into a patrol record, and upload the patrol data and service storage slot, thus solving the problem The security personnel records the occurrence of the feeding situation, and the customer can also watch the loss or fraud 4 points at any time, ^2 detailed description of the detailed characteristics of the creation and the superiority according to the face, the record according to this! ^=Tech# The technical content of the difficulty, the content of the 、, the scope and advantages of the cap patent. '', poor stomach skills can easily understand the purpose of this creation and [implementation] The entire patrol is not a kind of protection disclosed in this creative embodiment (10), and uploaded to the "patrol data record" Server 400. ',王^" The material reading device includes a card reader 300 and a security host or a "two 2 map" field. The card reader 300 is installed at the gate of the security client. t Read the identification data of the patrol security card. (10). When the warranty is displayed, the maintenance service is based on the patrol route back-end control center's finger-connecting machine: Second, the 'security personnel use the patrol to carry the security card and Γοο, and #彳^ induction, making the card reader _ Read and transfer the identification information of the full card, for the rear machine 400 to record the security personnel to the security client when the patrol host pastes the security personnel to this ^ full client companion, and the card reader _ ^ matching _ placed in the security Client. Even i to accompany the main ^η to perform a basic security function; in which the card reader is electrically, to the king of the king, and when the card reader 3GG reads the patrol security card, the security is fully received. The identification information of the security card (9) The card reader 300 reads the identification data 100 of the security card, and the Ik is saved as the main shed record as the card time. In addition, the security = don't, 100 and the credit card time recorded here are stored in the second, and the security host calls. The patrol data M430637 record server 200 is archived. Based on this, for the user who secures the client, the patrol record can be directly accessed through the security main shed to confirm the frequency of the patrol of the security personnel to the exact location. Users can also browse the patrol record or the historical data of the patrol record by directly connecting to the patrol data record server 20Q through other electronic devices such as a computer or a computer. The entire patrol shows the protection disclosed in another embodiment of the present invention. In this embodiment, the security patrol data recording device may further include - display 500. The display unit_connected to the security display unit 500 generates an operation screen 51, and uses the = control screen 510 to view the patrol record of the security personnel. The device test can be set to send a patrol record to the bite-------the t-shirt is usually connected to the connected-wired network ^ "^:^record ^200 can be sent through a network of information _ server to send patrol Patrol, data record feeding device 200 village through mobile communication network ====receiver security use ^ ^ Only the aforementioned mobile communication network can be better received by ^, mobile communication network includes third-generation mobile communication technology 忿6 ΐϊΖΓ (3.5G), using the existing communication methods such as 3G or 3.5G, this is only an example for J. This creation is not limited to this. Full ί 二 二 二 二 二 二 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本 为本The patrol record of the patrol security card and the recorded patrol record of the record + time is uploaded to the patrol data record server 2 (9) storage slot, these data J save the surface logic: Miscellaneous County 2 (10) into ί The patrol data record server 200 remits all the patrols, and at the same time, saves the data record of the host_drive display unit_ to display the patrol security personnel sent out from the patrol data record server 200 every time patrol Read the card machine to read as - swipe card S king: ί identify poor material 100, with (four) skin security host 働 record credit card time, that is, into a patrol record, and upload patrol record word service device 200 save sand, and each - The record of the second patrol is stored in the 'following record'. If you don't have a face, you can display the historical data of the patrol records. Inside 520, device IS diagram 4, as shown in the figure, for the purpose of implementing the preservation patrol data record, you can patrol the security company control center, that is, the company's official system immediately dispatched the mobile insurance = Wang Bei Then immediately arrive at the client to perform patrols. Mobile Baohong mobile insurance = machine read security personnel's security ^ ^, t,, Wang main shed developed a full signal to the security company control center and the security card identification information] plus a patrol record, ϋ upload patrol The brush cuts and merges into a shackle. At this point, the user can directly ^^ 机 = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = Therefore, the convenience of use is enhanced. Each household is also _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ The technical content defined by the scope of the appended patent application has been disclosed above in the preferred embodiment, but it is not