CN108449320A - The safe office system of intelligent automation and method - Google Patents

The safe office system of intelligent automation and method Download PDF

Info

Publication number
CN108449320A
CN108449320A CN201810139185.2A CN201810139185A CN108449320A CN 108449320 A CN108449320 A CN 108449320A CN 201810139185 A CN201810139185 A CN 201810139185A CN 108449320 A CN108449320 A CN 108449320A
Authority
CN
China
Prior art keywords
office
user
permission
information
intelligent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810139185.2A
Other languages
Chinese (zh)
Other versions
CN108449320B (en
Inventor
郭银召
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hundred Enlightenment Technology Co Ltd
Original Assignee
Beijing Hundred Enlightenment Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Hundred Enlightenment Technology Co Ltd filed Critical Beijing Hundred Enlightenment Technology Co Ltd
Priority to CN201810139185.2A priority Critical patent/CN108449320B/en
Publication of CN108449320A publication Critical patent/CN108449320A/en
Application granted granted Critical
Publication of CN108449320B publication Critical patent/CN108449320B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Abstract

Present disclose provides a kind of safe office systems of intelligent automation, including:Identification subsystem is used for user identity identification and access, including living things feature recognition equipment and access control system, wherein:Living things feature recognition equipment is used to acquire the biological attribute data of user;Access control system is connected to the living things feature recognition equipment, receives the biological information data of the living things feature recognition equipment acquisition, and receives the access that control signal realizes user;Artificial intelligence secure subsystem receives the biological information data, and realizes the control to access control system, office permission and/or working environment according to the biological information data.By the way that identification system to be combined with artificial intelligence secure subsystem, unified certification and timely processing information is realized, and realize the differentiation rights management under different office situations, further improve Information Security.

Description

The safe office system of intelligent automation and method
Technical field
This disclosure relates to Intelligent office field more particularly to a kind of safe office system of intelligent automation and method.
Background technology
Current most of Company Confidential files are easy leakage, and some even can cause deathblow to company.Although existing It has been popularized in office systems such as with no paper OA, ERP, but has been all based on account number cipher login, and there is also by it for account information The risk that other people usurp, and exist to be utilized and carry out the hidden danger such as violation examination & approval or inquiry confidential information.
Therefore, for the above safety and office automatic the problem of, existing Corporation system are carried out using fingerprint, face recognition The office automatics such as relevant authentication, authority distribution and Examination and approval, but each intelligence system independent operation can not combine unified certification With timely processing information, office efficiency is not high, and not can effectively prevent secret data in enterprise and leak.
Invention content
(1) technical problems to be solved
Present disclose provides a kind of safe office system of intelligent automation and methods, set forth above at least partly to solve The technical issues of.
(2) technical solution
According to one aspect of the disclosure, a kind of safe office system of intelligent automation is provided, including:
Identification subsystem is used for user identity identification and access, including:
Living things feature recognition equipment, the biological attribute data for acquiring user;
Access control system is connected to the living things feature recognition equipment, receives the living things feature recognition equipment acquisition Biological information data, and receive the access that control signal realizes user;
Artificial intelligence secure subsystem receives the biological information data, and according to the biological information number The factually existing control to access control system, office permission and/or working environment.
In the disclosure some embodiments, the artificial intelligence secure subsystem includes:Authentication and rights management mould Block will be in the biological information and database after the biological information data for receiving the acquisition of identification subsystem Information is compared, and obtains the relevant information of the personnel, including access permission information, working environment control information, at least one Office authority information;Working environment control module receives the working environment of the authentication and authority management module transmission Information is controlled, the office equipment in user's institute's management and control region is turned on and off;Office automation module receives the authentication And the office authority information of authority management module transmission, and according to the office authority information automatic distributing task.
In the disclosure some embodiments, the artificial intelligence secure subsystem further includes:Security management and control module is used for It authorizes after accessing office system, records the operation behavior of licensee, feed back to donor, and in equipment or authorize abnormal conditions Pass through mail, short message, voice mode automatic early-warning related personnel down.
In the disclosure some embodiments, the access permission information is used for the certification of each gate inhibition of enterprises;It is described to do The equipment that public context control information is used to determine user's management and control, and control is opened and closed to the equipment of user's management and control;It is described Office authority information include to the access right of office equipment and to file make increase, deletion, change, check, screenshotss and/ Or replicate the permission of operation.
In the disclosure some embodiments, the office automation module provides data according to the office authority information and receives Collection, data analysis, automation task assignment, system authentication, permission in batches, node examine function.
In the disclosure some embodiments, long-distance intelligent is handled official business subsystem, including:Intelligent mobile terminal is provided with The client of OA systems is connected to the artificial intelligence secure subsystem, to the identity characteristic information of upload user And the pre- operation information that data are carried out of user, while user is also provided in the enterprises file operation permission remotely executed Audit;Long-distance identity-certifying equipment is connected with the intelligent mobile terminal, for obtaining remote rights certification.
In the disclosure some embodiments, the client of the intelligent mobile terminal also provides authority request service, wherein User handles official business Permission Levels less than enterprises identification subsystem by the acquiescence that the long-distance identity-certifying equipment obtains The office Permission Levels obtained afterwards are authenticated, if user needs to obtain higher level-one permission at this time, are sent out by client Request is sent, is audited by approving person and obtains high level-one permission.
In the disclosure some embodiments, the client of the intelligent mobile terminal also provides permission grant service, including: When user is not in company, i.e., when not checking card, the user is unavailable in the corresponding authority of intra-company's equipment, only through excessive thing After intelligent mobile terminal mandate, the permission can be used people in the usage time of setting, and prompting user is before mandate expires It is no to apply for that party is continuing with.
A kind of method that intelligent automation is handled official business safely another aspect of the present disclosure provides, including:Step S1 is remotely being recognized to user's progress identity by identification subsystem in office or by long-distance intelligent office subsystem Card service, and identification authentication data is transmitted to artificial intelligence secure subsystem;Step S2, artificial intelligence secure subsystem is to described Identification authentication data is judged, corresponding permission is provided a user;Step S3, artificial intelligence secure subsystem is according to user's body Part authentication data realizes working environment control and office automatic.
In the disclosure some embodiments, in the step S2, after access control system is checked card, just give into personnel's correlation Processing authority, i.e., after access control system is checked card, indicate people in company, give corresponding first order permission;When user is not in company, When not checking card, after the long-distance intelligent office subsystem carries out authentication to user, second level permission is given;Work as user It does not check card in office, then others can not be operated using the user in the corresponding authority of intra-company's equipment, only be passed through It after crossing party's intelligent mobile terminal mandate, and can be used in setting acquiescence usage time, mandate is reminded before expiring and used Whether people will apply for that party is continuing with its permission.
In the disclosure some embodiments, in the step S2, when user is when other than Administrative Area, pass through cell phone application Living things feature recognition certification is carried out when examining or obtaining corresponding authority, enterprise VPN network need to be connected.
In the disclosure some embodiments, in the step S2, passes through intelligent mobile terminal combination fingerprint and/or face knows Not to obtain permission, and it is read-only file permission by the permission of the acquisition of intelligent mobile terminal.
In the disclosure some embodiments, in the step S3, doing of being administered is automatically analyzed by artificial intelligence system Public context control information and office authority information, after being checked card by face or fingerprint recognition system after user enters company, from Dynamic computer, printer, scanning machine, the server for starting institute's jurisdiction, to station after phase entered by living things feature recognition Relationship is united, and carries out related system authority distribution and each office system examination & approval of auxiliary, packet at work according to identification authentication data Include provide data collection, data analysis, automation task assignment, system authentication, permission in batches, node examination & approval.
(3) advantageous effect
It can be seen from the above technical proposal that the safe office system of disclosure intelligent automation and method are at least with following One of advantageous effect:
(1) by the way that identification system to be combined with artificial intelligence secure subsystem, unified certification and in time is realized Information is handled, access information attendance information, remote authentication information are combined with office authority information, and realizes different office feelings Differentiation rights management under shape, further increases Information Security;
(2) since access control system and living creature characteristic recognition system to be combined with working environment control, access control system in addition to It realizes traditional attendance checking function, can also be analyzed by artificial intelligence secure subsystem after triggering attendance according to information is acquired before Biological characteristic recognition information, control working environment and authority information and improve working environment intelligence to accelerate office efficiency Degree can be changed;
(3) due to using maltilevel security certification, and according to the safety of practical office space, Auto-matching administer equipment and File permission effectively prevents secret data in enterprise and leaks.
Description of the drawings
Fig. 1 is the structural schematic diagram of the safe office system of embodiment of the present disclosure intelligent automation.
Fig. 2 is the flow chart of the safe office procedure of embodiment of the present disclosure intelligent automation.
Specific implementation mode
Present disclose provides a kind of safe office system of intelligent automation, disclosure design aims at realization safety intelligent Energyization is handled official business, and by access control system, monitoring system, desktop virtualization, cell phone application and artificial intelligence fingerprint face identification system are integrated Change automatic office security system, by artificial intelligence system, by gate inhibition, monitoring, cloud desktop, mobile phone combination integrated intelligent office system System makes full use of the simple function of each equipment to play the great function more than single equipment, accelerates enterprise intelligentization office step It cuts down.At the same time it can also implement password, fingerprint, face's equipment various ways certification according to equipment or document degree of secrecy, public affairs are prevented Classified papers leakage is taken charge of, not only improves working efficiency, but also have powerful security mechanism.
To make the purpose, technical scheme and advantage of the disclosure be more clearly understood, below in conjunction with specific embodiment, and reference The disclosure is further described in attached drawing.
Disclosure some embodiments will be done with reference to appended attached drawing in rear and more comprehensively describe to property, some of but not complete The embodiment in portion will be shown.In fact, the various embodiments of the disclosure can be realized in many different forms, and should not be construed To be limited to this several illustrated embodiment;Relatively, these embodiments are provided so that the disclosure meets applicable legal requirement.
In first exemplary embodiment of the disclosure, a kind of safe office system of intelligent automation is provided.Fig. 1 is The structural schematic diagram of the safe office system of first embodiment of the present disclosure intelligent automation.As shown in Figure 1, disclosure intelligent automation Safe office system includes:Identification subsystem, artificial intelligence secure subsystem and long-distance intelligent office subsystem.
The identification subsystem includes living things feature recognition equipment and access control system.The living things feature recognition equipment Including fingerprint identification device, face recognition device, and/or retinal recognition device.This equipment needs face, fingerprint recognition Function and/or retinal recognition device, for acquiring face and the finger print data of all staff on board.For example, the biology is special Sign identification equipment be face recognition device, this equipment can with monitoring camera, can also computer camera or cell-phone camera Head is mainly used for carrying out facial recognition scan, is used for face scan certification, the purposes such as examination & approval.In different embodiments, the life Object characteristic identificating equipment can also be Fingerprint Identification Unit, this equipment can be monitoring punched-card machine, can also be that mobile fingerprint is known Other device individually buys Fingerprint Identification Unit, is mainly used for carrying out fingerprint recognition scanning, for purposes such as finger print identifying, examination & approval.
Access control system receives the biological information data of the living things feature recognition equipment acquisition, by the data transmission Artificial intelligence secure subsystem is given, realizes daily attendance record function, and provide data to artificial intelligence secure subsystem Afterwards, and the control signal of artificial intelligent and safe subsystem is received, realizes the judgement to the access of the user.
Traditional access control system is intended only as attendance data acquisition and uses, and access control system can also be according to acquiring before in the disclosure Information analyzes fingerprint or face recognition information after triggering attendance, the automatic decision certification by artificial intelligence secure subsystem When the equipment of information institute management and control and judgement are put and are opened and closed automatically, effective to shorten management time and maintenance cost, And differentiate change authentication information to the increase of fileinfo, deletion, change, check, the authority informations such as screenshotss, to control user behaviour Make behavior.
Artificial intelligence secure subsystem includes authentication and authority management module, working environment control module, handles official business certainly Dynamicization module and security management and control module.
The authentication and authority management module receive identification subsystem in artificial intelligence secure subsystem and adopt After the biological information data of collection, the biological information is compared with the information in database, obtains the personnel Relevant information, including access permission information, working environment control information, office authority information etc..Wherein access permission information For the certification of each access control system of enterprises, working environment information includes that control is opened and closed to the equipment of user's management and control, Office authority information includes to the access right of equipment and making increase to file, deletion, changing, check, screenshotss, and/or multiple The permission of the operations such as system.
The working environment control module receives the working environment control of the authentication and authority management module transmission Information processed is turned on and off the office equipment in user's institute's management and control region, such as user is after access control system certification, automatic to start The office equipment such as computer, printer, scanning machine, the server of institute's jurisdiction.Pass through fingerprint, face recognition intelligent automation System, user enter company and just automatically open corresponding office equipment and office system, enter working state quickly, do not use equipment Preceding manually opened relevant device is switched on a few minutes clock time waiting facilities, improves office efficiency.By fingerprint and face recognition come Certification associated rights and system audit will not be usurped by other people, safety are greatly improved.
The office automation module is a safe and intelligent automated system, receives the authentication and permission pipe The office authority information of module transfer is managed, and data collection, data analysis, automation times are provided according to the office authority information Be engaged in appointments, system authentication, permission in batches, node examine etc. functions.
The security management and control module can be after authorizing access office system, and record is received the operation behavior of donor, feedback To donor, and pass through the modes automatic early-warning related personnel such as mail, short message, voice under equipment or mandate abnormal conditions
The long-distance intelligent office subsystem includes intelligent mobile terminal and long-distance identity-certifying equipment, the intelligent mobile Terminal can be mobile phone, tablet computer, not be equipped with the client of OA systems thereon.The client is known with the identity Other equipment is connected, to the pre- operation information carried out to data of the identity characteristic information of upload user and user;Client simultaneously Audit of the user in the enterprises file operation permission remotely executed is also provided.Preferably, user passes through the intelligent slidings such as mobile phone Dynamic terminal needs to obtain purview certification in conjunction with fingerprint and face recognition double authentication.
Preferably, the long-distance identity-certifying integration of equipments is on intelligent mobile terminal, for example, by possessed by mobile phone Camera or fingerprint identification device are described when user needs in remotely progress office operation as long-distance identity-certifying equipment The client of intelligent mobile terminal identifies the body of user by identification apparatus such as camera, fingerprints by enterprise VPN network After part characteristic information, it is connected to the artificial intelligence secure subsystem, judges whether the user has permission and is remotely executing institute State operation information;The user is allowed to pass through operation information described in client executing if having;Otherwise identification apparatus weight is enabled The identity characteristic information of new acquisition user.
Preferably, user is authenticated by the long-distance identity-certifying equipment and enterprises identification subsystem Afterwards, the office Permission Levels obtained are different.For example, user is after access control system is checked card, people is indicated in company, gives corresponding the Level-one permission;If user, by long-distance identity-certifying device authentication, artificial intelligence secure subsystem is that the user distributes automatically Second level permission, the second level permission are only read-only file permissions, if user needs to obtain higher level-one permission at this time, are needed It is sent and is asked by client, passed through by approving person's audit, fingerprint could be opened, face's certification examination & approval obtain high level-one power Limit makes strange land office same safe and reliable as a result,.
In some embodiments, user indicates that people in company, gives corresponding first order permission after access control system is checked card; When people is not in company, i.e., when not checking card, others can not use the user to carry out first in the corresponding authority of intra-company's equipment The operation of grade permission, can be used, and acquiescence usage time is arranged only after party's intelligent mobile terminal mandate, authorize Remind whether user will apply for that party is continuing with first order permission before expiring.
So far, the safe office system introduction of first embodiment of the present disclosure intelligent automation finishes.
In second exemplary embodiment of the disclosure, a kind of method that intelligent automation is handled official business safely is provided, is wrapped It includes:
Step S1, by identification subsystem office or by long-distance intelligent handle official business subsystem remotely to Family carries out identity authentication service, and transmits identification authentication data to artificial intelligence secure subsystem;
Step S2, artificial intelligence secure subsystem judge the identification authentication data, provide a user corresponding Permission;
Step S3, artificial intelligence secure subsystem realize working environment control and automation according to authenticating user identification data Office.
Preferably, in the step S2, the client of the intelligent mobile terminal also provides authority request service.User is logical The acquiescence office Permission Levels that the long-distance identity-certifying equipment obtains are crossed less than enterprises identification subsystem to be recognized The office Permission Levels obtained after card are sent by client and are asked if user needs to obtain higher level-one permission at this time, It is audited by approving person and obtains high level-one permission.
In the step S2, the client of the intelligent mobile terminal also provides permission grant service.It is beaten in access control system It after card, just gives into the relevant processing authority of personnel, i.e., after access control system is checked card, indicates people in company, give corresponding the Level-one permission;When people is not in company, i.e., when not checking card, others can not use the user in the corresponding authority of intra-company's equipment The operation for carrying out first order permission can be used only after party's intelligent mobile terminal mandate, and acquiescence is arranged and uses Time, mandate remind whether user will apply for that party is continuing with first order permission before expiring.
When user goes on business or is in corresponding authority is examined or obtains by cell phone application progress fingerprint or face recognition certification (needing Connected Corp.'s VPN network).It is related to administration by fingerprint, face recognition examination & approval related procedure by using cell-phone customer terminal Equipment opens mobile phone terminal before solving, and the risk that concern of data is divulged a secret, and needs to tie by intelligent mobile terminals such as mobile phones Fingerprint and face recognition double authentication are closed to obtain permission, and is only read-only text by the permission of the acquisition of intelligent mobile terminal Part permission only opens fingerprint, face's certification examination & approval agreement permission to special approving person, makes the same safety of strange land office can It leans on, not only increases flexibility, but also safe and reliable increase office efficiency.
Wherein, in the step S3, administered equipment and document permission are automatically analyzed by artificial intelligence system, when with Family enters after company checked card by face or fingerprint recognition system after, the automatic computer for starting institute's jurisdiction, is swept printer Retouch the office equipment such as machine, server, to station after related system entered by face or fingerprint recognition certification, and recognized according to identity Card data carry out related system authority distribution and each office system examination & approval of auxiliary at work, including provide data collection, data Analysis, automation task assignment, system authentication, permission in batches, node examination & approval etc..
The disclosure is mutual by access control and attendance system, monitoring system, cloud desktop, cell-phone customer terminal, artificial intelligence office system Association enters the fingerprint and face recognition data of trade-after acquisition by user, to carry out the automations such as authority distribution, certification, examination & approval Office application will be connected by artificial intelligence system data processing centre between each system, calls distribute single realization mutually Function can start equipment of administering automatically as checked card by artificial intelligence center, lead under equipment or mandate abnormal conditions The modes automatic early-warning related personnel such as mail, short message, voice is crossed, this, which is individual equipment, to accomplish, effective in this way to save Management time and maintenance cost.Accelerate Intelligent office development.
In order to achieve the purpose that brief description, in above-described embodiment 1, any technical characteristic narration for making same application is all And in this, without repeating identical narration.
So far, the method introduction that second embodiment of the present disclosure intelligent automation is handled official business safely finishes.
So far, attached drawing is had been combined the embodiment of the present disclosure is described in detail.It should be noted that in attached drawing or saying In bright book text, the realization method for not being painted or describing is form known to a person of ordinary skill in the art in technical field, and It is not described in detail.In addition, the above-mentioned definition to each element and method be not limited in mentioning in embodiment it is various specific Structure, shape or mode, those of ordinary skill in the art simply can be changed or replaced to it.
Furthermore word "comprising" does not exclude the presence of element or step not listed in the claims.Before element Word "a" or "an" does not exclude the presence of multiple such elements.
In addition, unless specifically described or the step of must sequentially occur, there is no restriction in the above institute for the sequence of above-mentioned steps Row, and can change or rearrange according to required design.And above-described embodiment can be based on the considerations of design and reliability, that This mix and match is used using or with other embodiment mix and match, i.e., the technical characteristic in different embodiments can be freely combined Form more embodiments.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together with teaching based on this.As described above, it constructs required by this kind of system Structure be obvious.In addition, the disclosure is not also directed to any certain programmed language.It should be understood that can utilize various Programming language realizes content of this disclosure described here, and the description done above to language-specific is to disclose this public affairs The preferred forms opened.
The disclosure can by means of include several different elements hardware and by means of properly programmed computer come It realizes.The all parts embodiment of the disclosure can be with hardware realization, or to run on one or more processors Software module is realized, or is realized with combination thereof.It will be understood by those of skill in the art that can use in practice micro- Processor or digital signal processor realize some or all components in the relevant device according to the embodiment of the present disclosure Some or all functions.The disclosure is also implemented as executing some or all of method as described herein Equipment or program of device (for example, computer program and computer program product).It is such to realize that the program of the disclosure May be stored on the computer-readable medium, or can be with the form of one or more signal.Such signal can be from It downloads and obtains on internet website, either provide on carrier signal or provide in any other forms.
Those skilled in the art, which are appreciated that, to carry out adaptively the module in the equipment in embodiment Change and they are arranged in the one or more equipment different from the embodiment.It can be the module or list in embodiment Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it may be used any Combination is disclosed to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so to appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power Profit requires, abstract and attached drawing) disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation It replaces.Also, in the unit claims listing several devices, several in these devices can be by same hard Part item embodies.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of each open aspect, Above in the description of the exemplary embodiment of the disclosure, each feature of the disclosure is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:It is i.e. required to protect The disclosure of shield requires features more more than the feature being expressly recited in each claim.More precisely, as following Claims reflect as, open aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific implementation mode are expressly incorporated in the specific implementation mode, wherein each claim itself All as the separate embodiments of the disclosure.
Particular embodiments described above has carried out further in detail the purpose, technical solution and advantageous effect of the disclosure It describes in detail bright, it should be understood that the foregoing is merely the specific embodiment of the disclosure, is not limited to the disclosure, it is all Within the spirit and principle of the disclosure, any modification, equivalent substitution, improvement and etc. done should be included in the guarantor of the disclosure Within the scope of shield.

Claims (13)

1. a kind of safe office system of intelligent automation, including:
Identification subsystem is used for user identity identification and access, including living things feature recognition equipment and access control system, In:
Living things feature recognition equipment is used to acquire the biological attribute data of user;
Access control system is connected to the living things feature recognition equipment, and the biology for receiving the living things feature recognition equipment acquisition is special Information data is levied, and receives the access that control signal realizes user;
Artificial intelligence secure subsystem receives the biological information data, and according to biological information data reality Now to the control of access control system, office permission and/or working environment.
2. the safe office system of intelligent automation according to claim 1, wherein the artificial intelligence secure subsystem packet It includes:
Authentication and authority management module will be described after receiving the biological information data that identification subsystem acquires Biological information is compared with the information in database, obtains the relevant information of the personnel, including access permission information, does Public context control information, at least one office authority information;
Working environment control module receives the working environment control information of the authentication and authority management module transmission, It is turned on and off the office equipment in user's institute's management and control region;
Office automation module receives the office authority information of the authentication and authority management module transmission, and according to institute State office authority information automatic distributing task.
3. the safe office system of intelligent automation according to claim 2, wherein the artificial intelligence secure subsystem, Further include:
Security management and control module, for after authorizing access office system, recording the operation behavior of licensee, feeding back to mandate People, and pass through mail, short message, voice mode automatic early-warning related personnel under equipment or mandate abnormal conditions.
4. the safe office system of intelligent automation according to claim 2, wherein
The access permission information is used for the certification of each gate inhibition of enterprises;
The equipment that the working environment control information is used to determine user's management and control, and the equipment of user's management and control is opened and closed Control;
The office authority information include to the access right of office equipment and to file make increase, deletion, change, check, Screenshotss, and/or the permission for replicating operation.
5. the safe office system of intelligent automation according to claim 2, wherein
The office automation module refers to according to office authority information offer data collection, data analysis, automation task Group, system authentication, permission in batches, node examine function.
6. the safe office system of intelligent automation according to claim 2, further includes:
Long-distance intelligent office subsystem, including:
Intelligent mobile terminal is provided with the client of OA systems, is connected to the artificial intelligence secure subsystem, To the pre- operation information carried out to data of the identity characteristic information of upload user and user, while user being also provided and is remotely being held The audit of capable enterprises file operation permission;
Long-distance identity-certifying equipment is connected with the intelligent mobile terminal, for obtaining remote rights certification.
7. the safe office system of intelligent automation according to claim 6, the client of the intelligent mobile terminal also carry For authority request service, wherein
User handles official business Permission Levels less than enterprises identification by the acquiescence that the long-distance identity-certifying equipment obtains System is authenticated the office Permission Levels obtained afterwards, if user needs to obtain higher level-one permission at this time, passes through client End sends request, is audited by approving person and obtains high level-one permission.
8. the safe office system of intelligent automation according to claim 6, the client of the intelligent mobile terminal also carry For permission grant service, including:
When user is not in company, i.e., when not checking card, the user is unavailable in the corresponding authority of intra-company's equipment, only passes through After intelligent mobile terminal mandate, the permission can be used party in the usage time of setting, and mandate is reminded before expiring and used Whether people will apply for that party is continuing with.
9. a kind of method that intelligent automation is handled official business safely is pacified using such as claim 1-8 any one of them intelligent automation Full office system, including:
Step S1, by identification subsystem office or by long-distance intelligent handle official business subsystem remotely to user into Row identity authentication service, and identification authentication data is transmitted to artificial intelligence secure subsystem;
Step S2, artificial intelligence secure subsystem judge the identification authentication data, provide a user corresponding permission;
Step S3, artificial intelligence secure subsystem realize that working environment control and automation are done according to authenticating user identification data It is public.
10. the safe office procedure of intelligent automation according to claim 9, wherein in the step S2, in access control system It after checking card, just gives into the relevant processing authority of personnel, i.e., after access control system is checked card, indicates people in company, give corresponding First order permission;When user is not in company, i.e., when not checking card, the long-distance intelligent office subsystem carries out identity to user to be recognized After card, second level permission is given;
When user does not check card in office, then others can not be grasped using the user in the corresponding authority of intra-company's equipment Make, only after party's intelligent mobile terminal mandate, and can be used in setting acquiescence usage time, before mandate expires Remind whether user will apply for that party is continuing with its permission.
11. the safe office procedure of intelligent automation according to claim 10, wherein in the step S2, when user exists When other than Administrative Area, living things feature recognition certification is carried out by cell phone application when examining or obtaining corresponding authority, enterprise need to be connected Industry VPN network.
12. the safe office procedure of intelligent automation according to claim 9, wherein in the step S2, pass through intelligent sliding Dynamic terminal combination fingerprint and/or face recognition are read-only by the permission of the acquisition of intelligent mobile terminal to obtain permission File permission.
13. the safe office procedure of intelligent automation according to claim 9, wherein in the step S3, pass through artificial intelligence Energy system automatically analyzes administered working environment control information and office authority information, passes through face after user enters company Or after fingerprint recognition system is checked card, automatic computer, printer, scanning machine, the server for starting institute's jurisdiction, to after station Enter related system by living things feature recognition, and carried out at work according to identification authentication data related system authority distribution and It assists each office system to examine, including data collection, data analysis, automation task assignment, system authentication, permission point is provided It criticizes, node examination & approval.
CN201810139185.2A 2018-02-09 2018-02-09 Intelligent automatic safe office system and method Active CN108449320B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810139185.2A CN108449320B (en) 2018-02-09 2018-02-09 Intelligent automatic safe office system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810139185.2A CN108449320B (en) 2018-02-09 2018-02-09 Intelligent automatic safe office system and method

Publications (2)

Publication Number Publication Date
CN108449320A true CN108449320A (en) 2018-08-24
CN108449320B CN108449320B (en) 2020-08-14

Family

ID=63192266

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810139185.2A Active CN108449320B (en) 2018-02-09 2018-02-09 Intelligent automatic safe office system and method

Country Status (1)

Country Link
CN (1) CN108449320B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110097332A (en) * 2019-04-03 2019-08-06 福建天晴数码有限公司 The method and computer readable storage medium of privilege review and automatic processing
CN110351296A (en) * 2019-07-22 2019-10-18 深圳市口袋网络科技有限公司 A kind of application login method, device and its relevant device
CN110381055A (en) * 2019-07-16 2019-10-25 徐州医科大学 RFID system privacy-protection certification protocol method in healthcare supply chain
CN110399577A (en) * 2019-07-24 2019-11-01 秒针信息技术有限公司 Office facility sharing method and system
CN110620782A (en) * 2019-09-29 2019-12-27 深圳市珍爱云信息技术有限公司 Account authentication method and device, computer equipment and storage medium
CN110633561A (en) * 2019-09-23 2019-12-31 湖北师范大学 Multi-path identity authentication method for OA (office automation) office system
CN111708758A (en) * 2020-06-09 2020-09-25 孟磊 Construction method and application method of judicial-assisted case management database
CN113191729A (en) * 2021-04-26 2021-07-30 西安雷风电子科技有限公司 Cloud desktop management method and system
CN115146250A (en) * 2022-05-16 2022-10-04 苏州威达智电子科技有限公司 General module device of intelligent detection equipment and identification communication system thereof
CN115238257A (en) * 2022-09-26 2022-10-25 深圳市亲邻科技有限公司 Access control face permission updating method and device, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103729585A (en) * 2013-12-06 2014-04-16 南通芯迎设计服务有限公司 Home automation system
CN105550562A (en) * 2015-12-31 2016-05-04 北京无线电计量测试研究所 Iris recognition based identity authentication information management system and method
CN106249609A (en) * 2016-09-07 2016-12-21 苏州国锦智承信息科技有限公司 A kind of smart office system based on Internet of Things
CN106682881A (en) * 2017-01-05 2017-05-17 李铖浩 Intelligent office automation system
CN107464054A (en) * 2017-08-01 2017-12-12 太仓市智联信息科技有限公司 Intelligent Office space automated system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103729585A (en) * 2013-12-06 2014-04-16 南通芯迎设计服务有限公司 Home automation system
CN105550562A (en) * 2015-12-31 2016-05-04 北京无线电计量测试研究所 Iris recognition based identity authentication information management system and method
CN106249609A (en) * 2016-09-07 2016-12-21 苏州国锦智承信息科技有限公司 A kind of smart office system based on Internet of Things
CN106682881A (en) * 2017-01-05 2017-05-17 李铖浩 Intelligent office automation system
CN107464054A (en) * 2017-08-01 2017-12-12 太仓市智联信息科技有限公司 Intelligent Office space automated system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王轩: "采用智能工作流的办公管理系统设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110097332A (en) * 2019-04-03 2019-08-06 福建天晴数码有限公司 The method and computer readable storage medium of privilege review and automatic processing
CN110381055B (en) * 2019-07-16 2021-06-11 徐州医科大学 RFID system privacy protection authentication protocol method in medical supply chain
CN110381055A (en) * 2019-07-16 2019-10-25 徐州医科大学 RFID system privacy-protection certification protocol method in healthcare supply chain
CN110351296A (en) * 2019-07-22 2019-10-18 深圳市口袋网络科技有限公司 A kind of application login method, device and its relevant device
CN110399577A (en) * 2019-07-24 2019-11-01 秒针信息技术有限公司 Office facility sharing method and system
CN110633561A (en) * 2019-09-23 2019-12-31 湖北师范大学 Multi-path identity authentication method for OA (office automation) office system
CN110620782A (en) * 2019-09-29 2019-12-27 深圳市珍爱云信息技术有限公司 Account authentication method and device, computer equipment and storage medium
CN111708758A (en) * 2020-06-09 2020-09-25 孟磊 Construction method and application method of judicial-assisted case management database
CN111708758B (en) * 2020-06-09 2022-12-30 孟磊 Construction method and application method of judicial assistance case management database
CN113191729A (en) * 2021-04-26 2021-07-30 西安雷风电子科技有限公司 Cloud desktop management method and system
CN115146250A (en) * 2022-05-16 2022-10-04 苏州威达智电子科技有限公司 General module device of intelligent detection equipment and identification communication system thereof
CN115238257A (en) * 2022-09-26 2022-10-25 深圳市亲邻科技有限公司 Access control face permission updating method and device, computer equipment and storage medium
CN115238257B (en) * 2022-09-26 2023-01-06 深圳市亲邻科技有限公司 Access control face permission updating method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN108449320B (en) 2020-08-14

Similar Documents

Publication Publication Date Title
CN108449320A (en) The safe office system of intelligent automation and method
AU2019206006B2 (en) System and method for biometric protocol standards
CN104484617B (en) A kind of Access and control strategy of database method based on many strategy fusions
CN104253810B (en) Safe login method and system
US8713688B2 (en) Automated security analysis for federated relationship
CN106778325B (en) A kind of information privacy system and its operating method
JP6932175B2 (en) Personal number management device, personal number management method, and personal number management program
CN109067697B (en) User account management and control method for hybrid cloud and readable medium
CN103176817B (en) A kind of Linux security policy configuration based on self study
US20200168307A1 (en) Method and system for accessing electronic medical and health records by blockchain
CN106302483B (en) Decentralized management method and system
AU2013295701A1 (en) Method and system for secure authentication and information sharing and analysis
CN108733997B (en) Mobile power data monitoring system and method based on fingerprint identification
CN101741558A (en) Method for realizing uniform identity authentication
CN110175439A (en) User management method, device, equipment and computer readable storage medium
CN107862198A (en) One kind accesses verification method, system and client
CN109948331A (en) A kind of weak passwurd detection system and method
CN107545188A (en) The management method of application, apparatus and system
CN107707573A (en) Data access method and its device and computer installation and its readable storage medium storing program for executing
CN107368906A (en) Preengage the method and device in classroom
CN107181753B (en) Mobile terminal financial system and method
CN108377244A (en) A kind of Intranet uniform authentication method
CN109684802A (en) A kind of method and system providing a user artificial intelligence platform
CA2703784A1 (en) Electronic technical logbook
CN108881197A (en) High score grid system authentication system based on RBAC model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant