A community security management system and method based on the Internet of Things
A technology of management system and management method, which is applied in the field of community security, can solve problems such as living inconvenience and owner inconvenience, and achieve the effect of protecting safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0023] A community security management system based on the Internet of Things, including a community user information management module, a user identity division module, a judgment module, an Internet of Things identity authentication module and an access control module, the community user information management module is used to manage community user information The community user information includes user identity information, household registration information, access control card number, historical habits in the community and biological information of the user; the historical habits in the community include the correspondence between historical action tracks and historical time periods, and the user's Biological information includes user fingerprints, voiceprints and facial features; the user identity division module obtains the user's age according to the user identity information, and distinguishes the user's identity as a general user, a child, and an old man according to...
Embodiment 2
[0029] like figure 1 The illustrated embodiment further provides a community security management method based on the Internet of Things, the method comprising:
[0030] Step 1, manage community user information; the community user information includes user identity information, household registration information, access card number, historical habits in the community and biological information of users; the historical habits in the community include historical action tracks and historical time periods Correspondence, the biological information of the user includes user fingerprints, voiceprints and facial features;
[0031] Step 2, classify the user's identity, obtain the user's age according to the user's identity information, and distinguish the user's identity into general users, children and the elderly according to the age;
[0032] Step 3, judge different users, if it is judged that the user is a child or the elderly, then according to the user's historical habits, the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com