TWM635530U - Security graphic control system - Google Patents

Security graphic control system Download PDF

Info

Publication number
TWM635530U
TWM635530U TW111210152U TW111210152U TWM635530U TW M635530 U TWM635530 U TW M635530U TW 111210152 U TW111210152 U TW 111210152U TW 111210152 U TW111210152 U TW 111210152U TW M635530 U TWM635530 U TW M635530U
Authority
TW
Taiwan
Prior art keywords
server
security
interface
visitor
control system
Prior art date
Application number
TW111210152U
Other languages
Chinese (zh)
Inventor
張迺森
陳蕙美
王志強
張偉倫
簡霈錦
陳昶祿
Original Assignee
中興保全科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中興保全科技股份有限公司 filed Critical 中興保全科技股份有限公司
Priority to TW111210152U priority Critical patent/TWM635530U/en
Publication of TWM635530U publication Critical patent/TWM635530U/en

Links

Images

Landscapes

  • Burglar Alarm Systems (AREA)

Abstract

A security graphic control system includes a first server, a second server, and a third server. The first server is configured to store customer subscription data and apparatus configuration data corresponding to at least one electronic device in a security system. The second server is configured to enable the security system according to the customer subscription data and the apparatus configuration data and obtain an apparatus signal of the security system. The second server has a user database to verify a login authority of an administrator account and a user account. The third server is configured to store a configuration file corresponding to the customer subscription data for providing a monitoring interface. The monitoring interface is configured to display the status of the at least one electronic device according to the apparatus signal. The third server has a front end and a back end for the administrator account and the user account to respectively access the back end to edit the configuration data and access the front end to operate the monitoring interface after logging in from the second server.

Description

保全圖控系統Security map control system

本創作是關於一種圖形化控制技術,尤其是關於一種保全圖控系統。 This creation is about a graphic control technology, especially about a security graphic control system.

為了場域的安全性,一般透過保全廠商於場域設置保全系統。保全廠商提供設置於場域的控制設備(例如本地電腦)給客戶,以使客戶可以透過控制設備控制保全系統。當客戶具有圖形化控制保全系統的需求時,保全廠商可以於控制設備建立設定檔(例如圖資)及其相關的監控介面。然而,由於設備的限制,當客戶對設定檔或是監控介面具有更新需求時,客戶需通知保全廠商回收控制設備,而無法直接對控制設備進行修改操作,且在此情形中,保全廠商也無法遠端地對控制設備進行修改操作。再者,控制設備容易因不當的操作而遭到電腦病毒侵入,導致被盜用的風險增加。 For the safety of the field, the security system is generally set up in the field through the security manufacturer. Security vendors provide control equipment (such as local computers) set up in the field to customers, so that customers can control the security system through the control equipment. When the customer needs to control the security system graphically, the security vendor can create configuration files (such as graphics) and related monitoring interfaces on the control equipment. However, due to equipment limitations, when a customer needs to update the configuration file or monitoring interface, the customer needs to notify the security vendor to take back the control device, and cannot directly modify the control device, and in this case, the security vendor cannot Modify the control device remotely. Furthermore, the control equipment is easily invaded by computer viruses due to improper operation, resulting in an increased risk of being stolen.

鑒於上述,本創作提供一種保全圖控系統。保全圖控系統包含一第一伺服器、一第二伺服器及一第三伺服器。第一伺服器儲存一客戶訂閱資料及一設備配置資料。設備配置資料對應一保全系統中的至少一電子設備。第二伺服器連接第一伺服器及保全系統。第二伺服器依據客戶訂閱資料與設備配置資料啟用保全系統,並獲得保全系統的一設備訊號。第 二伺服器具有一使用者資料庫,以驗證一管理者帳戶與一使用者帳戶之登入權限。第三伺服器連接第二伺服器。第三伺服器儲存有對應客戶訂閱資料的一設備資訊顯示設定檔,以依據設備資訊顯示設定檔提供一監控介面。監控介面依據設備訊號顯示至少一電子設備的狀態。第三伺服器具有一前台端及一後台端,以供管理者帳戶於第二伺服器登入後進入後台端編輯設備資訊顯示設定檔,並供使用者帳戶於第二伺服器登入後進入前台端操作監控介面。 In view of the above, this creation provides a security graphic control system. The security image control system includes a first server, a second server and a third server. The first server stores a customer subscription data and a device configuration data. The device configuration data corresponds to at least one electronic device in a security system. The second server is connected to the first server and the security system. The second server activates the security system according to the customer subscription data and the device configuration data, and obtains a device signal of the security system. No. The second server has a user database to verify the login authority of an administrator account and a user account. The third server is connected to the second server. The third server stores an equipment information display configuration file corresponding to the customer subscription data, so as to provide a monitoring interface according to the equipment information display configuration file. The monitoring interface displays the state of at least one electronic device according to the device signal. The third server has a front end and a back end, for the administrator account to enter the back end to edit the device information display configuration file after logging in the second server, and for the user account to enter the front end after logging in the second server Operation monitoring interface.

綜上所述,依據本創作之實施例,可以使客戶能夠隨時對監控介面進行操作(例如修改操作),使保全人員可以遠端地對設備資訊顯示設定檔進行編輯,及增加系統的登入安全性以減少被盜用的風險。 To sum up, according to the embodiment of this creation, customers can operate the monitoring interface (such as modification operations) at any time, so that security personnel can remotely edit the device information display configuration file, and increase the login security of the system to reduce the risk of misappropriation.

10:保全圖控系統 10: Preserve the graphic control system

11:第一伺服器 11: First server

13:第二伺服器 13:Second server

15:第三伺服器 15: Third server

20:保全系統 20:Security system

21:保全主機 21: Security Host

22、23、25:電子設備 22, 23, 25: Electronic equipment

[圖1]係為本創作依據一些實施例之保全圖控系統的方塊示意圖。 [FIG. 1] is a schematic block diagram of a security image control system according to some embodiments of this invention.

[圖2]係為本創作依據一些實施例之監控介面的部分示意圖。 [FIG. 2] is a partial schematic diagram of a monitoring interface according to some embodiments of the invention.

參照圖1,係為本創作依據一些實施例之保全圖控系統10的方塊示意圖。保全圖控系統10包含第一伺服器11、第二伺服器13及第三伺服器15。第二伺服器13經由網路連接第一伺服器11及保全系統20。第三伺服器15經由網路連接第二伺服器13。保全系統20包含保全主機21及連接保全主機21的至少一電子設備22、23、25。在此僅繪示三個電子設備,但本創作並不限於此,電子設備的數量可以依據客戶的需求來調整。電子設備可透過有線通訊或無線通訊方式連接保全主機21。在一些實施例中, 電子設備22、23、25可以是保全監控設備或是物聯網設備。保全監控設備例如是門窗感測器、人體偵測器或監視攝影機等。物聯網設備例如是冰箱、電視、冷氣、插座、燈泡等連網受控設備,但本創作並非以此為限。 Referring to FIG. 1 , it is a schematic block diagram of a security image control system 10 according to some embodiments of the invention. The security map control system 10 includes a first server 11 , a second server 13 and a third server 15 . The second server 13 is connected to the first server 11 and the security system 20 via a network. The third server 15 is connected to the second server 13 via the network. The security system 20 includes a security host 21 and at least one electronic device 22 , 23 , 25 connected to the security host 21 . Only three electronic devices are shown here, but the invention is not limited thereto, and the number of electronic devices can be adjusted according to the needs of customers. The electronic device can be connected to the security host 21 through wired communication or wireless communication. In some embodiments, The electronic devices 22, 23, 25 may be security monitoring devices or IoT devices. The security monitoring equipment is, for example, a door and window sensor, a human body detector, or a surveillance camera. IoT devices are, for example, refrigerators, TVs, air conditioners, sockets, light bulbs and other connected and controlled devices, but this creation is not limited thereto.

第一伺服器11儲存客戶訂閱資料及設備配置資料。客戶訂閱資料是客戶訂閱保全服務的記錄,例如訂閱期限、報價金額、保全系統欲設置的地點(於後稱為案場)、及客戶身分資料(如客戶編號、客戶名稱及聯絡電話)等。設備配置資料對應保全系統20的電子設備22、23、25,例如設備配置資料包含欲架設的電子設備22、23、25的類型、名稱及型號等。舉例來說,在客戶欲訂閱保全服務時,保全人員可以根據客戶所選擇的服務內容整理出客戶訂閱資料及設備配置資料,並將客戶訂閱資料及設備配置資料透過輸入裝置(例如鍵盤、滑鼠、語音輸入器、觸碰輸入器、具有傳輸介面的輸入器等)(圖未示)輸入及儲存於第一伺服器11。 The first server 11 stores customer subscription data and device configuration data. Customer subscription information is the record of the customer's subscription to the security service, such as the subscription period, quotation amount, location where the security system is to be installed (hereinafter referred to as the case site), and customer identity information (such as customer number, customer name and contact number), etc. The equipment configuration information corresponds to the electronic equipment 22, 23, 25 of the security system 20, for example, the equipment configuration information includes the type, name and model of the electronic equipment 22, 23, 25 to be installed. For example, when a customer wants to subscribe to a security service, the security personnel can sort out the customer subscription data and device configuration data according to the service content selected by the customer, and pass the customer subscription data and device configuration data through the input device (such as keyboard, mouse, etc.) , a voice input device, a touch input device, an input device with a transmission interface, etc.) (not shown) input and stored in the first server 11.

第二伺服器13依據客戶訂閱資料及設備配置資料啟用保全系統20,並獲得保全系統20的設備訊號。舉例來說,保全人員於案場架設完保全系統20的保全主機21及電子設備22、23、25之後,確認保全系統20是否可以連接至管制中心(圖未示)。在確認保全系統20成功連接至管制中心之後,保全人員操作終端裝置連接第一伺服器11,以完成開通作業。所述開通作業是指第一伺服器11與第二伺服器13之間完成資料串接,即第一伺服器11將客戶訂閱資料及設備配置資料發送至第二伺服器13,第二伺服器13根據客戶訂閱資料及設備配置資料啟用保全系統20。例如,第二伺服器13根據客戶訂閱資料得知保全服務已被訂閱之後,發送置入有設備配置資料的啟動訊號至保全主機21,以將保全主機21的控制功能啟動, 並使保全主機21儲存設備配置資料以供其控制電子設備22、23、25的運作。第二伺服器13還將保全主機21與客戶訂閱資料相關聯。在保全系統20被啟用之後,第二伺服器13即可從保全系統20的保全主機21獲得有關電子設備22、23、25的設備訊號。設備訊號可以包含保全監控設備的監控訊號及/或物聯網設備的控制訊號。監控訊號例如是指示保全監控設備是否偵測到異常行為(例如遭到入侵)的訊號,當訊號指示異常狀態時表示保全監控設備偵測到異常行為,當訊號指示正常狀態時表示保全監控設備未偵測到異常行為。控制訊號例如是物聯網設備被開啟時所產生的開啟訊號或是物聯網設備被關閉時所產生的關閉訊號。 The second server 13 activates the security system 20 according to the customer subscription information and the equipment configuration information, and obtains the equipment signal of the security system 20 . For example, after the security personnel set up the security host 21 and the electronic devices 22, 23, 25 of the security system 20 at the case site, they confirm whether the security system 20 can be connected to the control center (not shown). After confirming that the security system 20 is successfully connected to the control center, the security personnel operate the terminal device to connect to the first server 11 to complete the opening operation. The opening operation refers to the completion of data connection between the first server 11 and the second server 13, that is, the first server 11 sends the customer subscription data and equipment configuration data to the second server 13, and the second server 13 13. Activate the security system 20 according to the customer subscription data and device configuration data. For example, after the second server 13 learns that the security service has been subscribed according to the customer subscription information, it sends an activation signal embedded with device configuration data to the security host 21 to activate the control function of the security host 21, And make the security host 21 store the device configuration data for it to control the operation of the electronic devices 22 , 23 , 25 . The second server 13 also associates the security host 21 with the customer subscription data. After the security system 20 is activated, the second server 13 can obtain device signals related to the electronic devices 22 , 23 , 25 from the security host 21 of the security system 20 . The device signal may include a monitoring signal of a security monitoring device and/or a control signal of an IoT device. The monitoring signal is, for example, a signal indicating whether the security monitoring equipment has detected an abnormal behavior (such as being invaded). When the signal indicates an abnormal state, it means that the security monitoring equipment has detected an abnormal behavior; Unusual behavior detected. The control signal is, for example, an on signal generated when the IoT device is turned on or a shutdown signal generated when the IoT device is turned off.

第三伺服器15儲存有對應客戶訂閱資料的設備資訊顯示設定檔。設備資訊顯示設定檔可以是案場的各樓層的平面圖或是案場的立體圖等圖資。第三伺服器15依據設備資訊顯示設定檔及設備配置資料提供監控介面。例如,監控介面可以是結合有設備資訊顯示設定檔及設備配置資料的圖形化介面。具體來說,監控介面可以以視覺化呈現電子設備22、23、25在案場的架設位置。例如根據於案場的架設位置,以視覺化圖案作為電子設備22、23、25而繪製於圖資中的對應位置。 The third server 15 stores device information display configuration files corresponding to customer subscription data. The device information display configuration file can be a floor plan of each floor of the office or a three-dimensional image of the office. The third server 15 provides a monitoring interface according to the device information display profile and device configuration data. For example, the monitoring interface may be a graphical interface combined with device information display configuration files and device configuration data. Specifically, the monitoring interface can visually present the installation positions of the electronic devices 22 , 23 , 25 in the case. For example, according to the installation position of the office, the visual patterns are used as the electronic devices 22 , 23 , 25 and drawn at the corresponding positions in the map.

監控介面依據設備訊號顯示電子設備22、23、25的狀態。例如,監控介面可以以視覺化的形式顯示電子設備22、23、25的狀態。具體來說,監控介面可以用不同的顏色及/或圖案來顯示電子設備22、23、25的不同狀態。舉例來說,監控介面具有電子設備22、23、25的名稱欄位及狀態欄位。當狀態欄位顯示綠色圓圈時表示對應的電子設備22、23、25被開啟,當狀態欄位顯示紅色叉叉時表示對應的電子設備22、23、25 被關閉。 The monitoring interface displays the status of the electronic equipment 22, 23, 25 according to the equipment signal. For example, the monitoring interface can display the states of the electronic devices 22 , 23 , 25 in a visual form. Specifically, the monitoring interface can use different colors and/or patterns to display different states of the electronic devices 22 , 23 , 25 . For example, the monitoring interface has a name field and a status field of the electronic devices 22 , 23 , 25 . When the status column displays a green circle, it means that the corresponding electronic device 22, 23, 25 is turned on; when the status column displays a red cross, it indicates that the corresponding electronic device 22, 23, 25 is closed.

第二伺服器13具有使用者資料庫,以驗證管理者帳戶及使用者帳戶之登入權限。經過第二伺服器13驗證通過後,可進入第三伺服器15使用其服務。管理者帳戶係供保全人員使用,使用者帳戶係供客戶使用。 The second server 13 has a user database to verify the login authority of the administrator account and the user account. After being verified by the second server 13, the user can enter the third server 15 to use its services. Manager accounts are for security personnel and user accounts are for customers.

第三伺服器15具有一前台端及一後台端。在一些實施例中,前台端及後台端可以由網頁實現。管理者帳戶於第二伺服器13登入後進入後台端編輯設備資訊顯示設定檔,例如對設備資訊顯示設定檔進行新增、刪除、及/或修改等動作。使用者帳戶於第二伺服器13登入後進入前台端操作監控介面。如此,客戶(如案場警衛人員)能夠隨時對監控介面進行操作,且保全人員也可以遠端地對設備資訊顯示設定檔進行編輯與維護,而不會受硬體設備的限制。在一些實施例中,在登入第二伺服器13而進入第三伺服器15後,第二伺服器13可以利用SSL加密對管理者帳戶進行編輯時所產生的指令進行加密,並對使用者帳戶進行操作時所產生的指令進行加密。如此,可以降低被盜用的風險。在一些實施例中,管理者帳戶除了透過後台端編輯設備資訊顯示設定檔之外,還可以透過後台端上傳一韌體更新檔至第三伺服器15,以使第三伺服器15根據韌體更新檔進行韌體更新。 The third server 15 has a front end and a back end. In some embodiments, the front end and the back end can be implemented by web pages. After logging in the second server 13, the administrator account enters the backend to edit the device information display configuration file, such as adding, deleting, and/or modifying the device information display configuration file. The user account enters the front-end operation monitoring interface after logging in the second server 13 . In this way, customers (such as case guards) can operate the monitoring interface at any time, and security personnel can also remotely edit and maintain device information display configuration files without being limited by hardware devices. In some embodiments, after logging into the second server 13 and entering the third server 15, the second server 13 can use SSL encryption to encrypt the commands generated when the administrator account is edited, and encrypt the user account. Instructions generated during operation are encrypted. In this way, the risk of being stolen can be reduced. In some embodiments, the administrator account can upload a firmware update file to the third server 15 through the background terminal in addition to editing the device information display configuration file through the background terminal, so that the third server 15 can Update file for firmware update.

參照圖2,係為本創作依據一些實施例之監控介面的部分示意圖。在一些實施例中,除了以圖資方式呈現監控介面之外,還可以呈現經過彙整的資訊,如儀表板(dashboard)。使用者帳戶透過前台端對監控介面進行的操作可以是將同一類型但位於不同場域的電子設備22、23、25的狀態顯示於同一畫面,並新增場域資料(例如台北店、新北店等)於 場域欄位。但本創作並不限於此,對於監控介面的操作也可以是將不同類型且同一場域的電子設備22、23、25的狀態顯示於同一畫面,或是將不同類型且不同場域的電子設備22、23、25的狀態顯示於多個畫面。 Referring to FIG. 2 , it is a partial schematic diagram of a monitoring interface according to some embodiments of the present invention. In some embodiments, in addition to presenting the monitoring interface in the form of graphics, aggregated information, such as a dashboard, can also be presented. The operation performed by the user account on the monitoring interface through the front end can be to display the status of the electronic equipment 22, 23, 25 of the same type but located in different fields on the same screen, and add field information (such as Taipei store, Xinbei store equal field field. But this creation is not limited to this, the operation of the monitoring interface can also be to display the states of electronic devices 22, 23, 25 of different types and in the same field on the same screen, or to display the status of electronic devices of different types and in different fields The states of 22, 23, and 25 are displayed on multiple screens.

在一些實施例中,客戶訂閱資料與使用者帳戶相關聯。當客戶不續訂保全服務時,保全人員操作第一伺服器11以禁用客戶訂閱資料。第一伺服器11的客戶訂閱資料被禁用後,第二伺服器13禁止使用者帳戶登入而進入第三伺服器15的前台端。也就是說,在保全服務被訂閱時,客戶能透過使用者帳戶登入第二伺服器13而進入第三伺服器15的前台端,在保全服務沒有被訂閱時,客戶無法透過使用者帳戶登入第二伺服器13,從而無法進入第三伺服器15的前台端。如此,可以確保客戶於第三伺服器15的使用權限是被實時更新,以節省資源。 In some embodiments, customer subscription data is associated with a user account. When the customer does not renew the security service, the security staff operates the first server 11 to disable the customer's subscription data. After the customer subscription information of the first server 11 is disabled, the second server 13 prohibits the user account login and enters the foreground of the third server 15 . That is to say, when the security service is subscribed, the customer can log in the second server 13 through the user account to enter the front end of the third server 15, and when the security service is not subscribed, the customer cannot log in to the third server 15 through the user account. The second server 13 cannot enter the front end of the third server 15 . In this way, it can be ensured that the customer's usage authority on the third server 15 is updated in real time, so as to save resources.

在一些實施例中,前台端具有一登入二維碼。第二伺服器13於終端裝置掃描登入二維碼後獲得登入訊息。例如,客戶的終端裝置安裝有與第二伺服器13相配合的應用程式,應用程式透過終端裝置的影像擷取裝置(例如相機)掃描登入二維碼以產生登入訊息,並將登入訊息透過網路傳輸至第二伺服器13。第二伺服器13根據使用者資料庫及登入訊息,驗證使用者帳戶。在一些實施例中,登入二維碼例如是QR碼。 In some embodiments, the front end has a login QR code. The second server 13 obtains the login information after the terminal device scans the login QR code. For example, the customer's terminal device is installed with an application program that cooperates with the second server 13. The application program scans the login QR code through the image capture device (such as a camera) of the terminal device to generate a login message, and sends the login message through the network. route to the second server 13. The second server 13 verifies the user account according to the user database and login information. In some embodiments, the login QR code is, for example, a QR code.

在一些實施例中,第二伺服器13儲存有第一交談識別碼(session ID)。在一些實施例中,第一交談識別碼可以儲存於使用者資料庫。在使用者帳戶登入第二伺服器13而進入第三伺服器15的前台端時,第三伺服器15產生第二交談識別碼,並將第二交談識別碼傳輸至第二伺服器13。第二伺服器13依據第一交談識別碼及第二交談識別碼,判斷是否將 使用者帳戶登出從而無法進入前台端。例如,第二伺服器13比對第一交談識別碼是否相符第二交談識別碼。在第一交談識別碼相符第二交談識別碼時,表示客戶並未透過使用者帳戶在異地登入而進入前台端,此時第二伺服器13維持使用者帳戶的登入。在第一交談識別碼不相符第二交談識別碼時,表示客戶透過使用者帳戶在異地登入而進入前台端,此時第二伺服器13將使用者帳戶登出從而無法進入前台端。如此,可以確保客戶無法在異地登入而進入前台端以操作監控介面,從而降低被盜用的風險。 In some embodiments, the second server 13 stores a first session ID (session ID). In some embodiments, the first chat ID may be stored in a user database. When the user account logs into the second server 13 and enters the front end of the third server 15 , the third server 15 generates a second chat ID and transmits the second chat ID to the second server 13 . The second server 13 judges whether to The user account is logged out and cannot enter the front end. For example, the second server 13 compares whether the first chat ID matches the second chat ID. When the first conversation identification code matches the second conversation identification code, it means that the customer has not logged in from another place through the user account and entered the foreground. At this time, the second server 13 maintains the login of the user account. When the first conversation identification code does not match the second conversation identification code, it means that the customer logs in through the user account in another place and enters the front end. At this time, the second server 13 logs out the user account and cannot enter the front end. In this way, it can be ensured that customers cannot log in from different places and enter the front end to operate the monitoring interface, thereby reducing the risk of being stolen.

在一些實施例中,在使用者帳戶登入而進入前台端之後且監控介面在一時段未被操作時,第二伺服器13將使用者帳戶登出從而無法進入前台端。也就是說,在監控介面被閒置該時段後,可以將使用者帳戶登出,以節省能源及被盜用的風險。 In some embodiments, after the user logins into the foreground and the monitoring interface is not operated for a period of time, the second server 13 logs out the user's account so that the foreground cannot be entered. That is to say, after the monitoring interface is idle for a period of time, the user account can be logged out to save energy and the risk of being stolen.

在一些實施例中,在管理者帳戶登入而進入後台端之後,第二伺服器13(例如第二伺服器13的計時器)累計登入時間,在登入時間大於時間閾值時,第二伺服器13使管理者帳戶登出而無法進入後台端。如此,確保保全人員以管理者帳戶登入第二伺服器13並進入第三伺服器15的後台端後所進行的編輯是在有限的時間內完成。也就是說,設備資訊顯示設定檔的更新不會遭到拖延。 In some embodiments, after the administrator account logs in and enters the backend, the second server 13 (such as a timer of the second server 13) accumulates the login time, and when the login time is greater than the time threshold, the second server 13 Make the administrator account log out and cannot enter the backend. In this way, it is ensured that the editing performed by the security personnel after logging into the second server 13 with the administrator account and entering the backend of the third server 15 is completed within a limited time. That is, the update of the device information display profile will not be delayed.

在一些實施例中,監控介面包含保全設定介面、解除介面、異常通知介面、設備啟閉介面、實時影像介面及異常影像介面。保全設定介面供設定保全系統20的保全狀態為啟用狀態或解除狀態。例如,保全設定介面具有保全啟用按鍵及保全解除按鍵。客戶可以以使用者帳戶登入第二伺服器13並進入第三伺服器15的前台端之後,點選保全啟用按鍵以設定 保全系統20的保全主機21的保全狀態為啟用狀態,或是點選保全解除按鍵以設定保全系統20的保全主機21的保全狀態為解除狀態。具體來說,在點選保全啟用按鍵之後,第三伺服器15經由第二伺服器13傳輸第一操作訊號至保全系統20的保全主機21,以使保全主機21響應第一操作訊號後將保全狀態設定為啟用狀態。在點選保全解除按鍵之後,第三伺服器15經由第二伺服器13傳輸第二操作訊號至保全系統20的保全主機21,以使保全主機21響應第二操作訊號後將保全狀態設定為解除狀態。在保全系統20處於啟用狀態且案場發生異常行為時,電子設備22、23、25可以發出警報及產生指示異常狀態的設備訊號。在保全系統20處於解除狀態下案場發生異常行為時,電子設備22、23、25雖偵測到異常行為,然而保全主機21不發出警報。 In some embodiments, the monitoring interface includes a security setting interface, a cancel interface, an abnormal notification interface, a device startup and shutdown interface, a real-time video interface, and an abnormal video interface. The security setting interface is used to set the security status of the security system 20 as enabled or disabled. For example, the security setting interface has a security activation button and a security release button. After the customer can log in the second server 13 with the user account and enter the front end of the third server 15, click the security enable button to set The security state of the security host 21 of the security system 20 is enabled, or the security release button is clicked to set the security state of the security host 21 of the security system 20 to be released. Specifically, after clicking the security activation button, the third server 15 transmits the first operation signal to the security host 21 of the security system 20 through the second server 13, so that the security host 21 will respond to the first operation signal. Status is set to enabled. After clicking the security release button, the third server 15 transmits the second operation signal to the security host 21 of the security system 20 through the second server 13, so that the security host 21 responds to the second operation signal and then sets the security status as release state. When the security system 20 is activated and abnormal behavior occurs in the crime scene, the electronic devices 22 , 23 , 25 can send out alarms and generate device signals indicating the abnormal state. When the security system 20 is in the disengaged state, when an abnormal behavior occurs in the case, although the electronic devices 22, 23, 25 detect the abnormal behavior, the security host 21 does not send an alarm.

異常通知介面響應於設備訊號為異常狀態時,發出異常通知,以提醒客戶案場當前發生異常行為。在一些實施例中,以電子設備22、23、25包含攝影機為例進行說明,若案場發生入侵或異常事件時,異常通知介面會彈跳出該區域的所有攝影機的即時畫面,並發出異常警示聲,直至案場警衛人員關閉該異常警示聲為止。在一些實施例中,在電子設備22、23、25發出警報時,異常通知介面主動彈跳出提醒,並將異常通知介面的畫面導向警報發生原因為何。在一些實施例中,在電子設備22、23、25發出警報時,異常通知介面主動帶出該區域的攝影機的即時畫面,以即時監控警報狀況。在一些實施例中,在電子設備22、23、25發出警報時,異常通知介面發出異常警示聲,直到案場警衛人員點擊異常通知介面的確認按鍵後停止播放,以確保警報發生時有人知悉。在一些實施例中,在案 場發生入侵或異常事件時,異常通知介面會顯示是哪一個電子設備22、23、25發生異常(即哪一個電子設備22、23、25當前產生指示異常狀態的設備訊號)。 The abnormal notification interface responds to the abnormal status of the device signal, and sends out abnormal notifications to remind customers that abnormal behaviors are currently occurring in the case. In some embodiments, the electronic devices 22, 23, and 25 include cameras as an example. If an intrusion or abnormal event occurs in the crime scene, the abnormal notification interface will pop up the real-time images of all the cameras in the area and issue an abnormal warning sound until the security personnel at the crime scene turn off the abnormal warning sound. In some embodiments, when the electronic device 22 , 23 , 25 sends out an alarm, the abnormality notification interface actively pops up a reminder, and guides the screen of the abnormality notification interface to what is the cause of the alarm. In some embodiments, when the electronic device 22 , 23 , 25 sends out an alarm, the abnormal notification interface actively brings out the real-time images of the cameras in the area to monitor the alarm status in real time. In some embodiments, when the electronic device 22, 23, 25 sends out an alarm, the abnormality notification interface emits an abnormality warning sound, until the guard at the crime scene clicks the confirmation button on the abnormality notification interface and stops playing, so as to ensure that someone knows when the alarm occurs. In some embodiments, documented When an intrusion or an abnormal event occurs in the field, the abnormal notification interface will display which electronic device 22, 23, 25 is abnormal (that is, which electronic device 22, 23, 25 is currently generating a device signal indicating an abnormal state).

設備啟閉介面供控制電子設備22、23、25的開啟或關閉。例如,設備啟閉介面具有多個開啟按鍵及多個關閉按鍵,每一電子設備22、23、25分別對應一個開啟按鍵及一個關閉按鍵。客戶可以以使用者帳戶登入第二伺服器13並進入第三伺服器15的前台端之後,點選開啟按鍵以將對應的電子設備22、23、25開啟,或是點選關閉按鍵以將對應的電子設備22、23、25關閉。具體來說,在點選開啟按鍵之後,第三伺服器15經由第二伺服器13傳輸第三操作訊號至對應的電子設備22、23、25,以使對應的電子設備22、23、25響應第三操作訊號後開啟。在點選關閉按鍵之後,第三伺服器15經由第二伺服器13傳輸第四操作訊號至對應的電子設備22、23、25,以使對應的電子設備22、23、25響應第四操作訊號後關閉。 The device opening and closing interface is used to control the opening or closing of the electronic equipment 22 , 23 , 25 . For example, the device opening and closing interface has multiple opening buttons and multiple closing buttons, and each electronic device 22 , 23 , 25 corresponds to one opening button and one closing button respectively. After the customer can log in to the second server 13 with a user account and enter the front end of the third server 15, click the open button to open the corresponding electronic device 22, 23, 25, or click the close button to open the corresponding electronic device. The electronic devices 22, 23, 25 are turned off. Specifically, after clicking the start button, the third server 15 transmits a third operation signal to the corresponding electronic devices 22, 23, 25 via the second server 13, so that the corresponding electronic devices 22, 23, 25 respond Turn on after the third operation signal. After clicking the close button, the third server 15 transmits the fourth operation signal to the corresponding electronic devices 22, 23, 25 via the second server 13, so that the corresponding electronic devices 22, 23, 25 respond to the fourth operation signal then close.

實時影像介面顯示電子設備22、23、25所拍攝的實時影像。舉例來說,以電子設備22、23、25包含監控攝影機的例子進行說明,該監控攝影機拍攝案場的景象以產生實時影像。終端裝置經過登入第二伺服器13而連線到第三伺服器15之後,可直接或間接連線至監控攝影機以獲得並於其上的實時影像介面顯示實時影像,以供客戶隨時監控案場的即時狀況。 The real-time image interface displays the real-time images captured by the electronic devices 22 , 23 , 25 . For example, an example will be described in which the electronic devices 22 , 23 , and 25 include surveillance cameras, and the surveillance cameras capture scenes of the crime scene to generate real-time images. After the terminal device logs into the second server 13 and connects to the third server 15, it can directly or indirectly connect to the surveillance camera to obtain and display real-time images on the real-time image interface for customers to monitor the case at any time instant status.

異常影像介面顯示在異常狀態時電子設備22、23、25所拍攝的監控錄影影像。舉例來說,以電子設備22、23、25包含監控攝影機 及門窗感測器的例子進行說明,當門窗感測器偵測到異常行為(例如門窗被異常地開啟)時,即異常狀態(設備訊號指示異常狀態)時,保全主機21產生觸發訊號至監控攝影機,以使監控攝影機響應觸發訊號後,將在異常行為的時點的前後一時段(如前後15秒)內對案場拍攝所產生的監控錄影影像傳輸至第二伺服器13。第三伺服器15從第二伺服器13獲得監控錄影影像,並透過異常影像介面顯示監控錄影影像,以供客戶可以直接檢視異常行為的相關影像而無需檢視其他無關影像。在一些實施例中,監控錄影影像也可以是傳輸至保全圖控系統10外部的其他伺服器(例如亞馬遜雲端服務),並將監控錄影影像傳輸給第三伺服器15。 The abnormal image interface displays the surveillance video images captured by the electronic equipment 22 , 23 , 25 in the abnormal state. For example, electronic devices 22, 23, 25 include surveillance cameras and the example of the door and window sensor for illustration, when the door and window sensor detects abnormal behavior (such as the door and window are opened abnormally), that is, when the abnormal state (equipment signal indicates an abnormal state), the security host 21 generates a trigger signal to the monitoring Camera, so that after the surveillance camera responds to the trigger signal, it transmits the surveillance video images generated by shooting the crime scene to the second server 13 within a period of time (such as before and after 15 seconds) before and after the time point of the abnormal behavior. The third server 15 obtains the surveillance video images from the second server 13, and displays the surveillance video images through the abnormal image interface, so that customers can directly view relevant images of abnormal behavior without viewing other irrelevant images. In some embodiments, the surveillance video image can also be transmitted to other servers outside the security image control system 10 (such as Amazon cloud service), and the surveillance video image is transmitted to the third server 15 .

在一些實施例中,異常影像介面還發出警示音,以提醒客戶案場具有異常行為發生。在一些實施例中,異常影像介面還標記處於異常狀態的電子設備22、23、25。例如,以視覺化圖案標記出處於異常狀態的電子設備22、23、25的類型、名稱及於圖資中的位置。如此,客戶即可快速得知哪一電子設備22、23、25因偵測到異常行為而發出警報。 In some embodiments, the abnormal image interface also emits a warning sound to remind the customer that there is an abnormal behavior in the case. In some embodiments, the abnormal image interface also marks electronic devices 22 , 23 , 25 that are in abnormal state. For example, the types, names and positions in the map data of the electronic devices 22 , 23 , 25 in abnormal states are marked with visual patterns. In this way, the customer can quickly know which electronic device 22 , 23 , 25 sends an alarm due to detection of abnormal behavior.

在一些實施例中,客戶的第一終端裝置的應用程式發送邀請連結至訪客的第二終端裝置。例如,客戶操作第一終端裝置的應用程式登入第二伺服器13並產生邀請連結,將邀請連結經由網路傳輸至第二終端裝置。第二終端裝置根據邀請連結下載應用程式,訪客輸入訪客資料於第二終端裝置,第二終端裝置透過應用程式及網路將訪客資料上傳至第二伺服器13。在一些實施例中,訪客資料可以儲存於使用者資料庫。在一些實施例中,訪客資料包含訪客身分資料、訪客的頭像影像及拜訪時間等。第二伺服器13在接收到訪客資料後,透過網路發出會議資料至第二終端裝置的 應用程式。在一些實施例中,會議資料包含會議室號碼。在一些實施例中,前台端具有一報到二維碼。在一些實施例中,報到二維碼例如是QR碼。 In some embodiments, the application on the customer's first terminal device sends an invitation to connect to the visitor's second terminal device. For example, the client operates the application program of the first terminal device to log in to the second server 13 and generates an invitation link, and transmits the invitation link to the second terminal device via the network. The second terminal device downloads the application program according to the invitation link, and the visitor inputs the visitor information into the second terminal device, and the second terminal device uploads the visitor information to the second server 13 through the application program and the network. In some embodiments, visitor information may be stored in a user database. In some embodiments, the visitor information includes visitor identity information, visitor's avatar image, visit time, and the like. After the second server 13 receives the visitor information, it sends the meeting information to the second terminal device through the network. application. In some embodiments, the meeting profile includes a meeting room number. In some embodiments, the front end has a check-in QR code. In some embodiments, the check-in QR code is, for example, a QR code.

在一些實施例中,第二伺服器13透過第二終端裝置的應用程式掃描報到二維碼以獲得報到訊息。例如,訪客的第二終端裝置的應用程式透過第二終端裝置的影像擷取裝置(例如相機)掃描報到二維碼以產生報到訊息,並將報到訊息透過網路傳輸至第二伺服器13。第二伺服器13根據訪客資料及報到訊息,判斷是否開啟保全系統20的電子設備22、23、25中的訪客閘門。具體來說,第二伺服器13比對訪客資料的訪客身分資料是否相符報到訊息,若訪客身分資料相符報到訊息,則開啟訪客閘門以供訪客進入案場從而前往目的位置(例如會議室)。若訪客身分資料不相符報到訊息,則關閉訪客閘門以拒絕訪客進入案場。 In some embodiments, the second server 13 scans the check-in QR code through the application of the second terminal device to obtain the check-in message. For example, the application program of the visitor's second terminal device scans the check-in QR code through the image capture device (such as a camera) of the second terminal device to generate a check-in message, and transmits the check-in message to the second server 13 through the network. The second server 13 judges whether to open the visitor gates in the electronic devices 22 , 23 , 25 of the security system 20 according to the visitor information and the check-in information. Specifically, the second server 13 compares whether the visitor identity information of the visitor data matches the check-in information, and if the visitor identity information matches the check-in information, then opens the visitor gate for the visitor to enter the case site and then go to the destination (such as a conference room). If the visitor's identity information does not match the registration information, the visitor gate will be closed to refuse the visitor to enter the case.

在一些實施例中,透過使用者帳戶登入而進入第三伺服器15的前台端的硬體裝置(例如電腦)可以具備影像擷取裝置(例如相機),該影像擷取裝置可以拍攝訪客的臉部以產生一待辨識人臉影像,且該硬體裝置可以透過前台端及網路將待辨識人臉影像傳輸給第三伺服器15,第三伺服器15根據訪客資料中的頭像影像及待辨識人臉影像進行人臉辨識,以產生一辨識結果,並根據辨識結果判斷是否開啟保全系統20的電子設備22、23、25中的訪客閘門。具體來說,在辨識結果是頭像影像相符於待辨識人臉影像時,則開啟訪客閘門以供訪客進入案場從而前往目的位置(例如會議室)。若辨識結果是頭像影像不相符於待辨識人臉影像,則關閉訪客閘門以拒絕訪客進入案場。 In some embodiments, the hardware device (such as a computer) that enters the front end of the third server 15 through user account login may be equipped with an image capture device (such as a camera), which can capture the visitor's face To generate a face image to be identified, and the hardware device can transmit the face image to be identified to the third server 15 through the front end and the network, and the third server 15 is based on the avatar image in the visitor data and the image to be identified Face recognition is performed on the face image to generate a recognition result, and it is determined whether to open the visitor gates in the electronic devices 22 , 23 , 25 of the security system 20 according to the recognition result. Specifically, when the recognition result is that the avatar image matches the face image to be recognized, the visitor gate is opened for the visitor to enter the case and go to the target location (such as a conference room). If the recognition result is that the avatar image does not match the face image to be recognized, the visitor gate is closed to deny visitors from entering the case.

在一些實施例中,在訪客閘門開啟之後,第二伺服器13經由 網路發送指引資料至第二終端裝置以顯示於其應用程式。指引資料可以是如何前往目的位置的導引圖。如此,訪客依據指引資料即可前往目的位置。 In some embodiments, after the visitor gate is opened, the second server 13 via The network sends the guidance data to the second terminal device to be displayed on its application program. The guidance material may be a map showing how to get to the destination. In this way, the visitor can go to the destination according to the guide information.

在一些實施例中,監控介面包含訪客追蹤介面及訪客時限介面。訪客追蹤介面顯示訪客的當前位置及透過第二終端裝置的應用程式與訪客進行通話。舉例來說,以電子設備22、23、25包含監控攝影機為例進行說明,監控攝影機可以持續跟隨訪客並拍攝訪客以傳輸一追蹤影像至第二伺服器13。第三伺服器15可以根據追蹤影像及設備資訊顯示設定檔中的案場的相關圖資(例如地形平面圖或地形立體圖),進行影像辨識以判斷出訪客的當前位置,並將訪客的當前位置顯示於訪客追蹤介面。如此,客戶即可追蹤訪客於案場中的行進動線,以確保訪客並未迷路。在一些實施例中,追蹤影像可以是儲存於保全圖控系統10外部的其他伺服器(例如亞馬遜雲端服務),並將追蹤影像傳輸至第三伺服器15。在一些實施例中,訪客追蹤介面具有一訪客通話按鍵,案場警衛人員的第一終端裝置以使用者帳戶登入第二伺服器13並進入第三伺服器15之後,可以點選訪客通話按鍵,而與第二終端裝置建立網路通話通道,以使警衛人員及訪客可以透過網路通話通道來進行通話。 In some embodiments, the monitoring interface includes a visitor tracking interface and a visitor time limit interface. The visitor tracking interface displays the visitor's current location and communicates with the visitor through the application program of the second terminal device. For example, the electronic equipment 22 , 23 , 25 includes a surveillance camera as an example for illustration. The surveillance camera can continuously follow the visitor and take pictures of the visitor so as to transmit a tracking image to the second server 13 . The third server 15 can perform image recognition to determine the current location of the visitor based on the tracking image and the relevant map information (such as topographic plan or topographic three-dimensional map) in the device information display configuration file, and display the current location of the visitor in the visitor tracking interface. In this way, the customer can track the travel line of the visitor in the case to ensure that the visitor does not get lost. In some embodiments, the tracking image can be stored in other servers outside the security image control system 10 (such as Amazon cloud service), and the tracking image is transmitted to the third server 15 . In some embodiments, the visitor tracking interface has a visitor call button. After the first terminal device of the guard at the crime site logs in the second server 13 and enters the third server 15 with a user account, he can click the visitor call button, A network communication channel is established with the second terminal device, so that guards and visitors can communicate through the network communication channel.

訪客時限介面根據訪客資料中的拜訪時間發出一時限通知,並供延長或縮短拜訪時間。舉例來說,第三伺服器15根據拜訪時間得知其時長,並在拜訪時間即將截止時(如拜訪時間截止的前5分鐘),第三伺服器15透過訪客時限介面發出時限通知。如此,警衛人員透過時限通知即可得知訪客即將離開案場。在一些實施例中,時限通知包含將訪客時限介面所顯示的訪客的當前位置呈現視覺化及/或聽覺化的提醒。例如, 在拜訪時間即將截止時,將訪客的當前位置的標記點以黃色呈現;在拜訪時間已截止時,將訪客的當前位置的標記點以紅色呈現,且訪客時限介面發出提醒音訊。在一些實施例中,訪客時限介面具有一延長按鍵及一縮短按鍵,案場警衛人員的第一終端裝置以使用者帳戶登入第二伺服器13並進入第三伺服器15之後,可以點選延長按鍵,以延長拜訪時間的時長。在案場警衛人員點選縮短按鍵時,可以縮短拜訪時間的時長。 The visitor time limit interface sends out a time limit notification according to the visiting time in the visitor's data, and can extend or shorten the visiting time. For example, the third server 15 knows the duration of the visit according to the visit time, and when the visit time is about to expire (eg, 5 minutes before the visit time expires), the third server 15 sends a time limit notification through the visitor time limit interface. In this way, the security personnel can know that the visitor is about to leave the crime scene through the time limit notification. In some embodiments, the time limit notification includes presenting a visual and/or audible reminder of the visitor's current location displayed on the visitor time limit interface. E.g, When the visiting time is about to end, the marker of the visitor's current location will be displayed in yellow; when the visiting time has expired, the marker of the visitor's current location will be displayed in red, and the visitor time limit interface will send out a reminder. In some embodiments, the visitor time limit interface has an extended button and a shortened button. After the first terminal device of the security personnel in the case field logs in the second server 13 with a user account and enters the third server 15, they can click to extend Press the key to extend the duration of the visit. When the guards at the crime scene click the shorten button, the duration of the visit time can be shortened.

綜上所述,依據本創作之實施例,可以使客戶能夠隨時對監控介面進行操作(例如修改操作),使保全人員可以遠端地對設備資訊顯示設定檔進行編輯,及增加系統的登入安全性以減少被盜用的風險。 To sum up, according to the embodiment of this creation, customers can operate the monitoring interface (such as modification operations) at any time, so that security personnel can remotely edit the device information display configuration file, and increase the login security of the system to reduce the risk of misappropriation.

10:保全圖控系統 10: Preserve the graphic control system

11:第一伺服器 11: First server

13:第二伺服器 13:Second server

15:第三伺服器 15: Third server

20:保全系統 20:Security system

21:保全主機 21: Security Host

22、23、25:電子設備 22, 23, 25: Electronic equipment

Claims (10)

一種保全圖控系統,包含: 一第一伺服器,儲存一客戶訂閱資料及一設備配置資料,其中該設備配置資料對應一保全系統中的至少一電子設備; 一第二伺服器,連接該第一伺服器及該保全系統,以依據該客戶訂閱資料與該設備配置資料啟用該保全系統,並獲得該保全系統的一設備訊號,其中該第二伺服器具有一使用者資料庫,以驗證一管理者帳戶與一使用者帳戶之登入權限;及 一第三伺服器,連接該第二伺服器,儲存有對應該客戶訂閱資料的一設備資訊顯示設定檔,以依據該設備資訊顯示設定檔及該設備配置資料提供一監控介面,該監控介面依據該設備訊號顯示該至少一電子設備的狀態,其中該第三伺服器具有一前台端及一後台端,以供該管理者帳戶於該第二伺服器登入後進入該後台端編輯該設備資訊顯示設定檔,並供該使用者帳戶於該第二伺服器登入後進入該前台端操作該監控介面。 A security picture control system, comprising: a first server storing a customer subscription data and a device configuration data, wherein the device configuration data corresponds to at least one electronic device in a security system; a second server, connected to the first server and the security system, so as to activate the security system according to the customer subscription data and the device configuration data, and obtain a device signal of the security system, wherein the second server has a user database to verify login privileges of an administrator account and a user account; and A third server, connected to the second server, stores a device information display configuration file corresponding to the customer subscription data, so as to provide a monitoring interface based on the device information display configuration file and the device configuration data, and the monitoring interface is based on The device signal displays the status of the at least one electronic device, wherein the third server has a front end and a back end, for the administrator account to enter the back end to edit the device information display after logging in the second server configuration file, and allow the user account to enter the front end to operate the monitoring interface after logging in the second server. 如請求項1所述之保全圖控系統,其中,該客戶訂閱資料與該使用者帳戶相關聯,該第一伺服器中的該客戶訂閱資料被禁用後,該第二伺服器禁止該使用者帳戶登入該第三伺服器的該前台端。The security graphic control system as described in claim 1, wherein the customer subscription data is associated with the user account, and after the customer subscription data in the first server is disabled, the second server prohibits the user The account logs into the front end of the third server. 如請求項1所述之保全圖控系統,其中,該前台端具有一登入二維碼,該第二伺服器於一終端裝置掃描該登入二維碼後獲得一登入訊息,該第二伺服器根據該使用者資料庫及該登入訊息驗證該使用者帳戶。The security graphic control system as described in claim 1, wherein the front end has a login QR code, and the second server obtains a login message after scanning the login QR code by a terminal device, and the second server Authenticate the user account based on the user database and the login information. 如請求項1所述之保全圖控系統,其中,該第二伺服器儲存有一第一交談識別碼,在該使用者帳戶登入該前台端時,該第二伺服器從該第三伺服器獲得一第二交談識別碼,並依據該第一交談識別碼及該第二交談識別碼,判斷是否使該使用者帳戶登出該前台端。The security picture control system as described in claim 1, wherein the second server stores a first conversation identification code, and when the user account logs into the front end, the second server obtains from the third server A second conversation identification code, and according to the first conversation identification code and the second conversation identification code, it is judged whether to make the user account log out of the front end. 如請求項1所述之保全圖控系統,其中,在該使用者帳戶登入該前台端之後且該監控介面在一時段未被操作時,該第二伺服器使該使用者帳戶登出該前台端。The security image control system as described in claim 1, wherein, after the user account logs into the front end and the monitoring interface is not operated for a period of time, the second server makes the user account log out of the front end end. 如請求項1所述之保全圖控系統,其中,在該管理者帳戶登入該後台端之後,該第二伺服器累計一登入時間,在該登入時間大於一時間閾值時,該第二伺服器使該管理者帳戶登出該後台端。The security graphic control system as described in claim 1, wherein, after the administrator account logs into the backend, the second server accumulates a login time, and when the login time is greater than a time threshold, the second server Log out the administrator account from the backend. 如請求項1所述之保全圖控系統,其中,該監控介面包含一保全設定介面、一解除介面、一異常通知介面、一設備啟閉介面、一實時影像介面及一異常影像介面,其中,該保全設定介面供設定該保全系統的一保全狀態為一啟用狀態或一解除狀態;該異常通知介面響應於該設備訊號為一異常狀態時,發出一異常通知;該設備啟閉介面供控制該至少一電子設備的開啟或關閉;該實時影像介面顯示該至少一電子設備所拍攝的一實時影像;該異常影像介面顯示在該異常狀態時該至少一電子設備所拍攝的一監控錄影影像。The security graphic control system as described in claim 1, wherein the monitoring interface includes a security setting interface, a release interface, an abnormal notification interface, an equipment opening and closing interface, a real-time image interface and an abnormal image interface, wherein, The security setting interface is used to set a security state of the security system as an enabled state or a released state; the abnormal notification interface sends an abnormal notification in response to the device signal being in an abnormal state; the device opening and closing interface is used to control the device The at least one electronic device is turned on or off; the real-time image interface displays a real-time image captured by the at least one electronic device; the abnormal image interface displays a surveillance video image captured by the at least one electronic device in the abnormal state. 如請求項7所述之保全圖控系統,其中,該異常影像介面還發出一警示音及標記處於該異常狀態的該電子設備。The security graphic control system as described in Claim 7, wherein the abnormal image interface also emits a warning sound and marks the electronic device in the abnormal state. 如請求項1所述之保全圖控系統,其中,該前台端具有一報到二維碼,該第二伺服器透過一第一終端裝置的一應用程式發送一邀請連結至一第二終端裝置,該第二終端裝置根據該邀請連結下載該應用程式並透過該應用程式上傳一訪客資料至該第二伺服器,且該第二伺服器發出一會議資料至該第二終端裝置的該應用程式; 其中,該第二伺服器透過該第二終端裝置的該應用程式掃描該報到二維碼以獲得一報到訊息,該第二伺服器根據該訪客資料及該報到訊息,判斷是否開啟該保全系統的該至少一電子設備中的一訪客閘門;或該第三伺服器透過該前台端根據從該第二伺服器獲得的該訪客資料對一訪客進行人臉辨識,以判斷是否開啟該訪客閘門; 其中,在該訪客閘門開啟之後,該第二終端裝置的該應用程式顯示一指引資料,以指引該訪客至一目的位置。 The security graphic control system as described in claim 1, wherein the front end has a check-in QR code, and the second server sends an invitation link to a second terminal device through an application program of a first terminal device, The second terminal device downloads the application program according to the invitation link and uploads a visitor information to the second server through the application program, and the second server sends a meeting information to the application program of the second terminal device; Wherein, the second server scans the check-in QR code through the application program of the second terminal device to obtain a check-in message, and the second server judges whether to open the security system according to the visitor information and the check-in message A visitor gate in the at least one electronic device; or the third server performs face recognition on a visitor based on the visitor information obtained from the second server through the front end to determine whether to open the visitor gate; Wherein, after the visitor gate is opened, the application program of the second terminal device displays a guide information to guide the visitor to a destination location. 如請求項9所述之保全圖控系統,其中,該監控介面包含一訪客追蹤介面及一訪客時限介面,該訪客追蹤介面顯示該訪客的一當前位置及透過該第二終端裝置的該應用程式與該訪客進行通話,該訪客時限介面根據該訪客資料中的一拜訪時間發出一時限通知,並供延長或縮短該拜訪時間。The security graphic control system as described in claim item 9, wherein the monitoring interface includes a visitor tracking interface and a visitor time limit interface, and the visitor tracking interface displays a current location of the visitor and the application program through the second terminal device Talk to the visitor, the visitor time limit interface sends a time limit notification according to a visit time in the visitor's data, and is used to extend or shorten the visit time.
TW111210152U 2022-09-16 2022-09-16 Security graphic control system TWM635530U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW111210152U TWM635530U (en) 2022-09-16 2022-09-16 Security graphic control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW111210152U TWM635530U (en) 2022-09-16 2022-09-16 Security graphic control system

Publications (1)

Publication Number Publication Date
TWM635530U true TWM635530U (en) 2022-12-11

Family

ID=85786639

Family Applications (1)

Application Number Title Priority Date Filing Date
TW111210152U TWM635530U (en) 2022-09-16 2022-09-16 Security graphic control system

Country Status (1)

Country Link
TW (1) TWM635530U (en)

Similar Documents

Publication Publication Date Title
US11373495B2 (en) Supervising property access with portable camera
US10991218B2 (en) Sharing video stream during an alarm event
US9300921B2 (en) Video security systems and methods
US8520068B2 (en) Video security system
US7015806B2 (en) Distributed monitoring for a video security system
US7130383B2 (en) Lifestyle multimedia security system
US11587417B2 (en) Object tracking using disparate monitoring systems
KR101814544B1 (en) Methods and systems for remote management of security systems
US20130329047A1 (en) Escort security surveillance system
US20120200711A1 (en) System and method for integrated surveillance and event notification
US10009353B2 (en) System and method to aggregate control of multiple devices via multicast messages and automatic set up of connections
US8942990B2 (en) Return fraud protection system
US9183735B1 (en) Methods and systems for remote management of security systems
KR100543670B1 (en) Method of home security service using robot and robot thereof
CN113223222A (en) Intelligent monitoring system for industrial pollution source
TWM635530U (en) Security graphic control system
TW202414250A (en) Security graphic control system
EP2772891B1 (en) System and method for interacting with digital video recorders through social networking applications
JP6380479B2 (en) Information processing apparatus, information processing system, control method, and program