Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A community security management system and method based on the Internet of Things

A technology of management system and management method, which is applied in the field of community security, can solve problems such as living inconvenience and owner inconvenience, and achieve the effect of protecting safety

Active Publication Date: 2022-05-20
湖南大汉无忧智慧科技有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although this kind of access control device achieves the purpose of community security, it also brings inconvenience to the owner. For example, when the owner forgets to bring the magnetic card, the magnetic card is lost, foreign guests visit or takeaway delivery, etc., he must go to the gate of the community. To cope, to bring inconvenience to life

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A community security management system and method based on the Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] A community security management system based on the Internet of Things, including a community user information management module, a user identity division module, a judgment module, an Internet of Things identity authentication module and an access control module, the community user information management module is used to manage community user information The community user information includes user identity information, household registration information, access control card number, historical habits in the community and biological information of the user; the historical habits in the community include the correspondence between historical action tracks and historical time periods, and the user's Biological information includes user fingerprints, voiceprints and facial features; the user identity division module obtains the user's age according to the user identity information, and distinguishes the user's identity as a general user, a child, and an old man according to...

Embodiment 2

[0029] like figure 1 The illustrated embodiment further provides a community security management method based on the Internet of Things, the method comprising:

[0030] Step 1, manage community user information; the community user information includes user identity information, household registration information, access card number, historical habits in the community and biological information of users; the historical habits in the community include historical action tracks and historical time periods Correspondence, the biological information of the user includes user fingerprints, voiceprints and facial features;

[0031] Step 2, classify the user's identity, obtain the user's age according to the user's identity information, and distinguish the user's identity into general users, children and the elderly according to the age;

[0032] Step 3, judge different users, if it is judged that the user is a child or the elderly, then according to the user's historical habits, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a community security management method based on the Internet of Things, which is characterized in that community user information is managed; the community user information includes user identity information, household registration information, access control card number, historical habits in the community and biological information of users ; The historical habits in the community include the corresponding relationship between the historical action track and the historical time period, and the biological information of the user includes user fingerprints, voiceprints and facial features; the identity of the user is divided, and the user identity information is obtained according to the user The age of the user, and distinguish the identity of the user into general users, children and the elderly according to the age; judge different users, and carry out different identity authentication methods, through this method, relatively weak users can be tracked and protected. Multi-identification of potentially dangerous adult users.

Description

technical field [0001] The invention relates to the technical field of community security, in particular to a community security management system and method based on the Internet of Things. Background technique [0002] At present, community security is the focus of social security prevention and management. In order to prevent outsiders from entering and leaving the community at will, a variety of access control devices have been launched on the market. Now, various access control devices in the community basically use the way of card swiping to open the community gate. close. [0003] Although this kind of access control device achieves the purpose of community security, it also brings inconvenience to the owner. For example, when the owner forgets to bring the magnetic card, the magnetic card is lost, foreign guests visit or takeaway delivery, etc., he must go to the gate of the community. Going to meet and bring inconvenience to life. [0004] Therefore, the present i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/25G07C9/27G06V40/70G10L17/22G06Q50/26
CPCG07C9/25G07C9/27G10L17/22G06Q50/26G06V40/70Y02D30/70
Inventor 刘慧付胜龙付东哲
Owner 湖南大汉无忧智慧科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products